- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for ECDSAWithSHA1 (0.22 sec)
-
src/crypto/tls/auth_test.go
{rsaCert, []SignatureScheme{PSSWithSHA384, PKCS1WithSHA1}, VersionTLS13, PSSWithSHA384, signatureRSAPSS, crypto.SHA384}, {ecdsaCert, []SignatureScheme{ECDSAWithSHA1}, VersionTLS12, ECDSAWithSHA1, signatureECDSA, crypto.SHA1}, {ecdsaCert, []SignatureScheme{ECDSAWithP256AndSHA256}, VersionTLS12, ECDSAWithP256AndSHA256, signatureECDSA, crypto.SHA256},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Apr 08 21:48:41 UTC 2020 - 6.9K bytes - Viewed (0) -
src/crypto/tls/common_string.go
_ = x[ECDSAWithP256AndSHA256-1027] _ = x[ECDSAWithP384AndSHA384-1283] _ = x[ECDSAWithP521AndSHA512-1539] _ = x[Ed25519-2055] _ = x[PKCS1WithSHA1-513] _ = x[ECDSAWithSHA1-515] } const ( _SignatureScheme_name_0 = "PKCS1WithSHA1" _SignatureScheme_name_1 = "ECDSAWithSHA1" _SignatureScheme_name_2 = "PKCS1WithSHA256" _SignatureScheme_name_3 = "ECDSAWithP256AndSHA256" _SignatureScheme_name_4 = "PKCS1WithSHA384"
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 3.4K bytes - Viewed (0) -
src/crypto/tls/auth.go
sigType = signatureRSAPSS case ECDSAWithSHA1, ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512: sigType = signatureECDSA case Ed25519: sigType = signatureEd25519 default: return 0, 0, fmt.Errorf("unsupported signature algorithm: %v", signatureAlgorithm) } switch signatureAlgorithm { case PKCS1WithSHA1, ECDSAWithSHA1: hash = crypto.SHA1
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0) -
src/crypto/tls/defaults.go
ECDSAWithP256AndSHA256, Ed25519, PSSWithSHA384, PSSWithSHA512, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512, PKCS1WithSHA1, ECDSAWithSHA1, } var tlsrsakex = godebug.New("tlsrsakex") var tls3des = godebug.New("tls3des") func defaultCipherSuites() []uint16 { suites := slices.Clone(cipherSuitesPreferenceOrder)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 3.9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/x509metrics/server_cert_deprecations.go
// 1. we get a x509.InsecureAlgorithmError with string `SHA1` // which indicates an error caused by an insecure SHA1 signature // 2. the server certificate in response contains a SHA1WithRSA or ECDSAWithSHA1 signature. // This indicates that this binary run with the GODEBUG=x509sha1=1 in env func NewDeprecatedCertificateRoundTripperWrapperConstructor(missingSAN, sha1 *metrics.Counter) func(rt http.RoundTripper) http.RoundTripper {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 26 17:14:05 UTC 2022 - 7.3K bytes - Viewed (0) -
api/go1.10.txt
pkg archive/zip, type FileHeader struct, NonUTF8 bool pkg bufio, method (*Reader) Size() int pkg bufio, method (*Writer) Size() int pkg crypto/tls, const ECDSAWithSHA1 = 515 pkg crypto/tls, const ECDSAWithSHA1 SignatureScheme pkg crypto/x509, const CANotAuthorizedForExtKeyUsage = 9 pkg crypto/x509, const CANotAuthorizedForExtKeyUsage InvalidReason
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 06 05:00:01 UTC 2018 - 30.1K bytes - Viewed (0) -
src/crypto/x509/x509.go
SHA1WithRSA // Only supported for signing, and verification of CRLs, CSRs, and OCSP responses. SHA256WithRSA SHA384WithRSA SHA512WithRSA DSAWithSHA1 // Unsupported. DSAWithSHA256 // Unsupported. ECDSAWithSHA1 // Only supported for signing, and verification of CRLs, CSRs, and OCSP responses. ECDSAWithSHA256 ECDSAWithSHA384 ECDSAWithSHA512 SHA256WithRSAPSS SHA384WithRSAPSS SHA512WithRSAPSS PureEd25519 )
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
src/crypto/x509/verify.go
// list. (While this is not specified, it is common practice in order to limit // the types of certificates a CA can issue.) // // Certificates that use SHA1WithRSA and ECDSAWithSHA1 signatures are not supported, // and will not be used to build chains. // // Certificates other than c in the returned chains should not be modified. // // WARNING: this function doesn't do any revocation checking.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0) -
src/crypto/x509/x509_test.go
cert, err := ParseCertificate(pemBlock.Bytes) if err != nil { t.Fatalf("failed to parse certificate: %s", err) } if sa := cert.SignatureAlgorithm; sa != ECDSAWithSHA1 { t.Errorf("signature algorithm is %v, want %v", sa, ECDSAWithSHA1) } if err = cert.CheckSignatureFrom(cert); err == nil { t.Fatalf("certificate verification succeeded incorrectly") } if _, ok := err.(InsecureAlgorithmError); !ok {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0) -
src/crypto/tls/common.go
ECDSAWithP521AndSHA512 SignatureScheme = 0x0603 // EdDSA algorithms. Ed25519 SignatureScheme = 0x0807 // Legacy signature and hash algorithms for TLS 1.2. PKCS1WithSHA1 SignatureScheme = 0x0201 ECDSAWithSHA1 SignatureScheme = 0x0203 ) // ClientHelloInfo contains information from a ClientHello message in order to // guide application logic in the GetCertificate and GetConfigForClient callbacks.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0)