- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for Ed25519 (0.1 sec)
-
internal/config/identity/openid/jwks.go
Curve: curve, X: &x, Y: &y, }, nil default: if key.Alg == "EdDSA" && key.Crv == "Ed25519" && key.X != "" { pb, err := base64.RawURLEncoding.DecodeString(key.X) if err != nil { return nil, errMalformedJWKECKey } return ed25519.PublicKey(pb), nil } return nil, fmt.Errorf("Unknown JWK key type %s", key.Kty) }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
docs/sts/tls.md
Signature Algorithm: ED25519 Issuer: CN = consoleAdmin Validity Not Before: Jul 19 15:08:44 2021 GMT Not After : Aug 18 15:08:44 2021 GMT Subject: CN = consoleAdmin Subject Public Key Info: Public Key Algorithm: ED25519 ED25519 Public-Key: pub:Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6K bytes - Viewed (1) -
cmd/testdata/dillon_test_key.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDVGk/SRz4fwTPK0+Ra7WYUGf3o08YkpI0yTMPpHwYoq ******@****.***...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Jun 05 07:51:13 UTC 2024 - 99 bytes - Viewed (0) -
docs/ftp/README.md
since those use the underlying algorithm. This list is sent to the client if it supports the server-sig-algs extension. Order is irrelevant. Valid values ``` ssh-ed25519 sk-ssh-ed25519@openssh.com ******@****.*** ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 rsa-sha2-256 rsa-sha2-512 ssh-rsa ssh-dss ```
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
lib/fips140/v1.0.0-c2097c7c.zip
*Element) One() *Element { *v = *feOne return v } // reduce reduces v modulo 2^255 - 19 and returns it. func (v *Element) reduce() *Element { v.carryPropagate() // After the light reduction we now have a field element representation // v < 2^255 + 2^13 * 19, but need v < 2^255 - 19. // If v >= 2^255 - 19, then v + 19 >= 2^255, which would overflow 2^255 - 1, // generating a carry. That is, c will be 0 if v < 2^255 - 19, and 1 otherwise. c := (v.l0 + 19) >> 51 c = (v.l1 + c) >> 51 c = (v.l2 + c) >>...
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Sep 25 19:53:19 UTC 2025 - 642.7K bytes - Viewed (0) -
lib/fips140/v1.1.0-rc1.zip
*Element) One() *Element { *v = *feOne return v } // reduce reduces v modulo 2^255 - 19 and returns it. func (v *Element) reduce() *Element { v.carryPropagate() // After the light reduction we now have a field element representation // v < 2^255 + 2^13 * 19, but need v < 2^255 - 19. // If v >= 2^255 - 19, then v + 19 >= 2^255, which would overflow 2^255 - 1, // generating a carry. That is, c will be 0 if v < 2^255 - 19, and 1 otherwise. c := (v.l0 + 19) >> 51 c = (v.l1 + c) >> 51 c = (v.l2 + c) >>...
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Dec 11 16:27:41 UTC 2025 - 663K bytes - Viewed (0) -
cmd/sts-handlers_test.go
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 103.4K bytes - Viewed (1) -
internal/crypto/crypto.go
} } // TLSCurveIDs returns a list of supported elliptic curve IDs // in preference order. func TLSCurveIDs() []tls.CurveID { return []tls.CurveID{tls.X25519MLKEM768, tls.CurveP256, tls.X25519, tls.CurveP384, tls.CurveP521}
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Jul 19 06:23:15 UTC 2025 - 2.8K bytes - Viewed (0)