- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for Curve (0.09 sec)
-
src/crypto/x509/x509.go
case *ecdsa.PublicKey: oid, ok := oidFromNamedCurve(pub.Curve) if !ok { return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve") } if !pub.Curve.IsOnCurve(pub.X, pub.Y) { return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: invalid elliptic curve public key") } publicKeyBytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y) publicKeyAlgorithm.Algorithm = oidPublicKeyECDSA
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
src/crypto/tls/common.go
if priv, ok := c.PrivateKey.(crypto.Signer); ok { switch pub := priv.Public().(type) { case *ecdsa.PublicKey: var curve CurveID switch pub.Curve { case elliptic.P256(): curve = CurveP256 case elliptic.P384(): curve = CurveP384 case elliptic.P521(): curve = CurveP521 default: return supportsRSAFallback(unsupportedCertificateError(c)) } var curveOk bool
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0) -
src/crypto/tls/handshake_messages.go
if !extData.ReadUint16LengthPrefixed(&curves) || curves.Empty() { return false } for !curves.Empty() { var curve uint16 if !curves.ReadUint16(&curve) { return false } m.supportedCurves = append(m.supportedCurves, CurveID(curve)) } case extensionSupportedPoints: // RFC 4492, Section 5.1.2 if !readUint8LengthPrefixed(&extData, &m.supportedPoints) ||
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 51.8K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
runServerTestTLS13(t, test) } func benchmarkHandshakeServer(b *testing.B, version uint16, cipherSuite uint16, curve CurveID, cert []byte, key crypto.PrivateKey) { config := testConfig.Clone() config.CipherSuites = []uint16{cipherSuite} config.CurvePreferences = []CurveID{curve} config.Certificates = make([]Certificate, 1) config.Certificates[0].Certificate = [][]byte{cert}
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
src/crypto/tls/tls_test.go
SupportedPoints: []uint8{pointFormatUncompressed}, SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256}, SupportedVersions: []uint16{VersionTLS12}, }, "certificate curve"}, {ecdsaCert, &ClientHelloInfo{ CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256}, SupportedCurves: []CurveID{CurveP256}, SupportedPoints: []uint8{1},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 60.5K bytes - Viewed (0) -
docs/changelogs/changelog_3x.md
* Fix: Don't create malformed URLs when `MockWebServer` is reached via an IPv6 address. * Fix: Don't crash if the system default authenticator is null. * Fix: Don't crash generating elliptic curve certificates on Android. * Fix: Don't crash doing platform detection on RoboVM. * Fix: Don't leak socket connections when web socket upgrades fail. ## Version 3.11.0 _2018-07-12_
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Sun Feb 06 14:55:54 UTC 2022 - 50.8K bytes - Viewed (0) -
src/crypto/tls/handshake_client_test.go
// See https://www.rfc-editor.org/rfc/rfc8446#page-14. if version == VersionTLS13 { deleteTicket() serverConfig = &Config{ // Use a different curve than the client to force a HelloRetryRequest. CurvePreferences: []CurveID{CurveP521, CurveP384, CurveP256}, MaxVersion: version, Certificates: testConfig.Certificates, }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 88.7K bytes - Viewed (0) -
src/crypto/internal/nistec/fiat/p384_fiat64.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 05 21:53:03 UTC 2022 - 90.8K bytes - Viewed (0)