Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 16 for PSS (0.13 sec)

  1. src/crypto/rsa/pss.go

    const (
    	// PSSSaltLengthAuto causes the salt in a PSS signature to be as large
    	// as possible when signing, and to be auto-detected when verifying.
    	PSSSaltLengthAuto = 0
    	// PSSSaltLengthEqualsHash causes the salt length to equal the length
    	// of the hash used in the signature.
    	PSSSaltLengthEqualsHash = -1
    )
    
    // PSSOptions contains options for creating and verifying PSS signatures.
    type PSSOptions struct {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 00:11:18 UTC 2024
    - 11K bytes
    - Viewed (0)
  2. src/crypto/rsa/testdata/pss-vect.txt.bz2

    pss-vect.txt # ========== # TEST VECTORS FOR RSASSA-PSS # ========== # # This file contains test vectors for the # RSASSA-PSS signature scheme with appendix as # defined in PKCS #1 v2.1. 10 RSA keys of # different sizes have been generated. For each # key, 6 random messages of length between 1 # and 256 octets have been RSASSA-PSS signed # via a random salt of length 20 octets. # # The underlying hash function in the EMSA-PSS # encoding method is SHA-1; the mask generation # function is MGF1 with...
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Sep 08 04:08:51 UTC 2014
    - 27.9K bytes
    - Viewed (0)
  3. src/crypto/rsa/pss_test.go

    	}
    }
    
    // TestPSSGolden tests all the test vectors in pss-vect.txt from
    // ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip
    func TestPSSGolden(t *testing.T) {
    	inFile, err := os.Open("testdata/pss-vect.txt.bz2")
    	if err != nil {
    		t.Fatalf("Failed to open input file: %s", err)
    	}
    	defer inFile.Close()
    
    	// The pss-vect.txt file contains RSA keys and then a series of
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 18:42:28 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  4. doc/next/6-stdlib/99-minor/crypto/x509/45990.md

    [CreateCertificateRequest] now correct supports RSA-PSS signature algorithms.
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 09:20:15 UTC 2024
    - 317 bytes
    - Viewed (0)
  5. src/crypto/tls/auth.go

    		return 0, 0, fmt.Errorf("tls: unsupported public key: %T", pub)
    	}
    }
    
    var rsaSignatureSchemes = []struct {
    	scheme          SignatureScheme
    	minModulusBytes int
    	maxVersion      uint16
    }{
    	// RSA-PSS is used with PSSSaltLengthEqualsHash, and requires
    	//    emLen >= hLen + sLen + 2
    	{PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
    	{PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  6. src/crypto/rsa/rsa.go

    // should use version 2, usually called by just OAEP and PSS, where
    // possible.
    //
    // Two sets of interfaces are included in this package. When a more abstract
    // interface isn't necessary, there are functions for encrypting/decrypting
    // with v1.5/OAEP and signing/verifying with v1.5/PSS. If one needs to abstract
    // over the public key primitive, the PrivateKey type implements the
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 00:11:18 UTC 2024
    - 23.4K bytes
    - Viewed (0)
  7. src/crypto/crypto.go

    	// private key.
    	Public() PublicKey
    
    	// Sign signs digest with the private key, possibly using entropy from
    	// rand. For an RSA key, the resulting signature should be either a
    	// PKCS #1 v1.5 or PSS signature (as indicated by opts). For an (EC)DSA
    	// key, it should be a DER-serialised, ASN.1 signature structure.
    	//
    	// Hash implements the SignerOpts interface and, in most cases, one can
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 6.8K bytes
    - Viewed (0)
  8. src/crypto/tls/boring_test.go

    	}
    
    	fipsOK := mode&boringCertFIPSOK != 0
    	return &boringCertificate{name, org, parentOrg, der, cert, key, fipsOK}
    }
    
    // A self-signed test certificate with an RSA key of size 2048, for testing
    // RSA-PSS with SHA512. SAN of example.golang.
    var (
    	testRSA2048Certificate []byte
    	testRSA2048PrivateKey  *rsa.PrivateKey
    )
    
    func init() {
    	block, _ := pem.Decode(obscuretestdata.Rot13([]byte(`
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  9. src/crypto/x509/x509.go

    	{PureEd25519, "Ed25519", oidSignatureEd25519, emptyRawValue, Ed25519, crypto.Hash(0) /* no pre-hashing */, false},
    }
    
    var emptyRawValue = asn1.RawValue{}
    
    // DER encoded RSA PSS parameters for the
    // SHA256, SHA384, and SHA512 hashes as defined in RFC 3447, Appendix A.2.3.
    // The parameters contain the following values:
    //   - hashAlgorithm contains the associated hash identifier with NULL parameters
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 09:20:15 UTC 2024
    - 82K bytes
    - Viewed (0)
  10. src/crypto/tls/tls_test.go

    	return s.Signer.Sign(rand, digest, opts.HashFunc())
    }
    
    // TestPKCS1OnlyCert uses a client certificate with a broken crypto.Signer that
    // always makes PKCS #1 v1.5 signatures, so can't be used with RSA-PSS.
    func TestPKCS1OnlyCert(t *testing.T) {
    	clientConfig := testConfig.Clone()
    	clientConfig.Certificates = []Certificate{{
    		Certificate: [][]byte{testRSACertificate},
    		PrivateKey:  brokenSigner{testRSAPrivateKey},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
Back to top