- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for ParseHPKEPublicKey (0.25 sec)
-
src/crypto/internal/hpke/hpke_test.go
} if _, ok := SupportedAEADs[uint16(aeadID)]; !ok { t.Skip("unsupported AEAD") } info := mustDecodeHex(t, setup["info"]) pubKeyBytes := mustDecodeHex(t, setup["pkRm"]) pub, err := ParseHPKEPublicKey(uint16(kemID), pubKeyBytes) if err != nil { t.Fatal(err) } ephemeralPrivKey := mustDecodeHex(t, setup["skEm"]) testingOnlyGenerateKey = func() (*ecdh.PrivateKey, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 4.7K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke.go
suiteID = binary.BigEndian.AppendUint16(suiteID, kemID) suiteID = binary.BigEndian.AppendUint16(suiteID, kdfID) suiteID = binary.BigEndian.AppendUint16(suiteID, aeadID) return suiteID } func ParseHPKEPublicKey(kemID uint16, bytes []byte) (*ecdh.PublicKey, error) { kemInfo, ok := SupportedKEMs[kemID] if !ok { return nil, errors.New("unsupported KEM id") } return kemInfo.curve.NewPublicKey(bytes) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 7K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
// will later mismatch. hello.supportedPoints = nil hello.ticketSupported = false hello.secureRenegotiationSupported = false hello.extendedMasterSecret = false echPK, err := hpke.ParseHPKEPublicKey(ech.config.KemID, ech.config.PublicKey) if err != nil { return nil, nil, nil, err } suite, err := pickECHCipherSuite(ech.config.SymmetricCipherSuite) if err != nil { return nil, nil, nil, err
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0)