Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for ECDSAWithP384AndSHA384 (0.36 sec)

  1. src/crypto/tls/common_string.go

    	_ = x[PKCS1WithSHA256-1025]
    	_ = x[PKCS1WithSHA384-1281]
    	_ = x[PKCS1WithSHA512-1537]
    	_ = x[PSSWithSHA256-2052]
    	_ = x[PSSWithSHA384-2053]
    	_ = x[PSSWithSHA512-2054]
    	_ = x[ECDSAWithP256AndSHA256-1027]
    	_ = x[ECDSAWithP384AndSHA384-1283]
    	_ = x[ECDSAWithP521AndSHA512-1539]
    	_ = x[Ed25519-2055]
    	_ = x[PKCS1WithSHA1-513]
    	_ = x[ECDSAWithSHA1-515]
    }
    
    const (
    	_SignatureScheme_name_0 = "PKCS1WithSHA1"
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 3.4K bytes
    - Viewed (0)
  2. src/crypto/tls/defaults.go

    var defaultSupportedSignatureAlgorithms = []SignatureScheme{
    	PSSWithSHA256,
    	ECDSAWithP256AndSHA256,
    	Ed25519,
    	PSSWithSHA384,
    	PSSWithSHA512,
    	PKCS1WithSHA256,
    	PKCS1WithSHA384,
    	PKCS1WithSHA512,
    	ECDSAWithP384AndSHA384,
    	ECDSAWithP521AndSHA512,
    	PKCS1WithSHA1,
    	ECDSAWithSHA1,
    }
    
    var tlsrsakex = godebug.New("tlsrsakex")
    var tls3des = godebug.New("tls3des")
    
    func defaultCipherSuites() []uint16 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  3. src/crypto/tls/auth.go

    			sigAlgs = []SignatureScheme{
    				ECDSAWithP256AndSHA256,
    				ECDSAWithP384AndSHA384,
    				ECDSAWithP521AndSHA512,
    				ECDSAWithSHA1,
    			}
    			break
    		}
    		switch pub.Curve {
    		case elliptic.P256():
    			sigAlgs = []SignatureScheme{ECDSAWithP256AndSHA256}
    		case elliptic.P384():
    			sigAlgs = []SignatureScheme{ECDSAWithP384AndSHA384}
    		case elliptic.P521():
    			sigAlgs = []SignatureScheme{ECDSAWithP521AndSHA512}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  4. src/crypto/tls/boring_test.go

    }
    
    func isBoringSignatureScheme(alg SignatureScheme) bool {
    	switch alg {
    	default:
    		return false
    	case PKCS1WithSHA256,
    		ECDSAWithP256AndSHA256,
    		PKCS1WithSHA384,
    		ECDSAWithP384AndSHA384,
    		PKCS1WithSHA512,
    		ECDSAWithP521AndSHA512,
    		PSSWithSHA256,
    		PSSWithSHA384,
    		PSSWithSHA512:
    		// ok
    	}
    	return true
    }
    
    func TestBoringServerCipherSuites(t *testing.T) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_client.go

    		// TLS 1.0 and 1.1 always use MD5+SHA1 for RSA and SHA1 for ECDSA.
    		switch {
    		case rsaAvail && ecAvail:
    			cri.SignatureSchemes = []SignatureScheme{
    				ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512,
    				PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512, PKCS1WithSHA1,
    			}
    		case rsaAvail:
    			cri.SignatureSchemes = []SignatureScheme{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  6. src/crypto/tls/tls_test.go

    			SupportedVersions: []uint16{VersionTLS13},
    		}, "not valid for requested server name"},
    		{ecdsaCert, &ClientHelloInfo{
    			SignatureSchemes:  []SignatureScheme{ECDSAWithP384AndSHA384},
    			SupportedVersions: []uint16{VersionTLS13},
    		}, "signature algorithms"},
    		{pkcs1Cert, &ClientHelloInfo{
    			SignatureSchemes:  []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  7. src/crypto/tls/common.go

    	PSSWithSHA384 SignatureScheme = 0x0805
    	PSSWithSHA512 SignatureScheme = 0x0806
    
    	// ECDSA algorithms. Only constrained to a specific curve in TLS 1.3.
    	ECDSAWithP256AndSHA256 SignatureScheme = 0x0403
    	ECDSAWithP384AndSHA384 SignatureScheme = 0x0503
    	ECDSAWithP521AndSHA512 SignatureScheme = 0x0603
    
    	// EdDSA algorithms.
    	Ed25519 SignatureScheme = 0x0807
    
    	// Legacy signature and hash algorithms for TLS 1.2.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  8. src/cmd/vendor/golang.org/x/tools/internal/stdlib/manifest.go

    		{"Dial", Func, 0},
    		{"DialWithDialer", Func, 3},
    		{"Dialer", Type, 15},
    		{"Dialer.Config", Field, 15},
    		{"Dialer.NetDialer", Field, 15},
    		{"ECDSAWithP256AndSHA256", Const, 8},
    		{"ECDSAWithP384AndSHA384", Const, 8},
    		{"ECDSAWithP521AndSHA512", Const, 8},
    		{"ECDSAWithSHA1", Const, 10},
    		{"Ed25519", Const, 13},
    		{"InsecureCipherSuites", Func, 14},
    		{"Listen", Func, 0},
    		{"LoadX509KeyPair", Func, 0},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 02 02:20:05 UTC 2024
    - 534.2K bytes
    - Viewed (0)
Back to top