Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for PSSWithSHA256 (0.6 sec)

  1. src/crypto/tls/defaults.go

    // CertificateRequest. The two fields are merged to match with TLS 1.3.
    // Note that in TLS 1.2, the ECDSA algorithms are not constrained to P-256, etc.
    var defaultSupportedSignatureAlgorithms = []SignatureScheme{
    	PSSWithSHA256,
    	ECDSAWithP256AndSHA256,
    	Ed25519,
    	PSSWithSHA384,
    	PSSWithSHA512,
    	PKCS1WithSHA256,
    	PKCS1WithSHA384,
    	PKCS1WithSHA512,
    	ECDSAWithP384AndSHA384,
    	ECDSAWithP521AndSHA512,
    	PKCS1WithSHA1,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  2. src/crypto/tls/auth.go

    	switch signatureAlgorithm {
    	case PKCS1WithSHA1, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512:
    		sigType = signaturePKCS1v15
    	case PSSWithSHA256, PSSWithSHA384, PSSWithSHA512:
    		sigType = signatureRSAPSS
    	case ECDSAWithSHA1, ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512:
    		sigType = signatureECDSA
    	case Ed25519:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  3. src/crypto/tls/common_string.go

    	// Re-run the stringer command to generate them again.
    	var x [1]struct{}
    	_ = x[PKCS1WithSHA256-1025]
    	_ = x[PKCS1WithSHA384-1281]
    	_ = x[PKCS1WithSHA512-1537]
    	_ = x[PSSWithSHA256-2052]
    	_ = x[PSSWithSHA384-2053]
    	_ = x[PSSWithSHA512-2054]
    	_ = x[ECDSAWithP256AndSHA256-1027]
    	_ = x[ECDSAWithP384AndSHA384-1283]
    	_ = x[ECDSAWithP521AndSHA512-1539]
    	_ = x[Ed25519-2055]
    	_ = x[PKCS1WithSHA1-513]
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 3.4K bytes
    - Viewed (0)
  4. src/crypto/tls/tls_test.go

    		wantErr string
    	}{
    		{rsaCert, &ClientHelloInfo{
    			ServerName:        "example.golang",
    			SignatureSchemes:  []SignatureScheme{PSSWithSHA256},
    			SupportedVersions: []uint16{VersionTLS13},
    		}, ""},
    		{ecdsaCert, &ClientHelloInfo{
    			SignatureSchemes:  []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
    			SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
    		}, ""},
    		{rsaCert, &ClientHelloInfo{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  5. src/crypto/tls/boring_test.go

    	switch alg {
    	default:
    		return false
    	case PKCS1WithSHA256,
    		ECDSAWithP256AndSHA256,
    		PKCS1WithSHA384,
    		ECDSAWithP384AndSHA384,
    		PKCS1WithSHA512,
    		ECDSAWithP521AndSHA512,
    		PSSWithSHA256,
    		PSSWithSHA384,
    		PSSWithSHA512:
    		// ok
    	}
    	return true
    }
    
    func TestBoringServerCipherSuites(t *testing.T) {
    	serverConfig := testConfig.Clone()
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  6. src/crypto/tls/common.go

    	PKCS1WithSHA256 SignatureScheme = 0x0401
    	PKCS1WithSHA384 SignatureScheme = 0x0501
    	PKCS1WithSHA512 SignatureScheme = 0x0601
    
    	// RSASSA-PSS algorithms with public key OID rsaEncryption.
    	PSSWithSHA256 SignatureScheme = 0x0804
    	PSSWithSHA384 SignatureScheme = 0x0805
    	PSSWithSHA512 SignatureScheme = 0x0806
    
    	// ECDSA algorithms. Only constrained to a specific curve in TLS 1.3.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
Back to top