- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 39 for SignatureAlgorithm (0.54 sec)
-
src/crypto/x509/x509.go
var override string if SignatureAlgorithm(e) == SHA1WithRSA || SignatureAlgorithm(e) == ECDSAWithSHA1 { override = " (temporarily override with GODEBUG=x509sha1=1)" } return fmt.Sprintf("x509: cannot verify signature: insecure algorithm %v", SignatureAlgorithm(e)) + override } // ConstraintViolationError results when a requested usage is not permitted by // a certificate. For example: checking a signature when the public key isn't a
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
src/crypto/tls/auth.go
} // typeAndHashFromSignatureScheme returns the corresponding signature type and // crypto.Hash for a given TLS SignatureScheme. func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) { switch signatureAlgorithm { case PKCS1WithSHA1, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512: sigType = signaturePKCS1v15 case PSSWithSHA256, PSSWithSHA384, PSSWithSHA512:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0) -
internal/config/certsinfo.go
func CertificateText(cert *x509.Certificate) string { var buf strings.Builder buf.WriteString(color.Blue("\nCertificate:\n")) if cert.SignatureAlgorithm != x509.UnknownSignatureAlgorithm { buf.WriteString(color.Blue("%4sSignature Algorithm: ", "") + color.Bold(fmt.Sprintf("%s\n", cert.SignatureAlgorithm))) } // Issuer information buf.WriteString(color.Blue("%4sIssuer: ", "")) printName(cert.Issuer.Names, &buf)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Nov 16 17:28:29 UTC 2021 - 3.1K bytes - Viewed (0) -
src/crypto/tls/key_agreement.go
} var signatureAlgorithm SignatureScheme var sigType uint8 var sigHash crypto.Hash if ka.version >= VersionTLS12 { signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms) if err != nil { return nil, err } sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm) if err != nil { return nil, err }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 11.8K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
issuer = subject } val signatureAlgorithm = signatureAlgorithm(issuerKeyPair) // Subset of certificate data that's covered by the signature. val tbsCertificate = TbsCertificate( // v3: version = 2L, serialNumber = serialNumber ?: BigInteger.ONE, signature = signatureAlgorithm, issuer = issuer, validity = validity(),
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 21.6K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
Adapters.BIT_STRING, decompose = { listOf( it.tbsCertificate, it.signatureAlgorithm, it.signatureValue, ) }, construct = { Certificate( tbsCertificate = it[0] as TbsCertificate, signatureAlgorithm = it[1] as AlgorithmIdentifier, signatureValue = it[2] as BitString, ) }, )
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 13.6K bytes - Viewed (0) -
src/crypto/x509/x509_test.go
t.Fatalf("Failed to parse generated CRL: %s", err) } if tc.template.SignatureAlgorithm != UnknownSignatureAlgorithm && parsedCRL.SignatureAlgorithm != tc.template.SignatureAlgorithm { t.Fatalf("SignatureAlgorithm mismatch: got %v; want %v.", parsedCRL.SignatureAlgorithm, tc.template.SignatureAlgorithm) } if len(tc.template.RevokedCertificates) > 0 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/x509metrics/server_cert_deprecations.go
// check all received non-self-signed certificates for deprecated signing algorithms for _, cert := range peerCertificates { if cert.SignatureAlgorithm == x509.SHA1WithRSA || cert.SignatureAlgorithm == x509.ECDSAWithSHA1 { // the SHA-1 deprecation does not involve self-signed root certificates if !reflect.DeepEqual(cert.Issuer, cert.Subject) { return true } } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 26 17:14:05 UTC 2022 - 7.3K bytes - Viewed (0) -
api/go1.15.txt
pkg crypto/x509, type RevocationList struct, Number *big.Int pkg crypto/x509, type RevocationList struct, RevokedCertificates []pkix.RevokedCertificate pkg crypto/x509, type RevocationList struct, SignatureAlgorithm SignatureAlgorithm pkg crypto/x509, type RevocationList struct, ThisUpdate time.Time pkg database/sql, method (*DB) SetConnMaxIdleTime(time.Duration) pkg database/sql, method (*Row) Err() error
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jul 17 02:15:01 UTC 2020 - 7.6K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
csrTemplate: &x509.CertificateRequest{ SignatureAlgorithm: x509.SHA256WithRSA, DNSNames: []string{"name_in_csr"}, Version: 3, }, }, { name: "Two subject IDs", subjectIDs: []string{"spiffe://test.com/abc/def", "test.com"}, signeeKey: rsaSigneeKey, csrTemplate: &x509.CertificateRequest{ SignatureAlgorithm: x509.SHA256WithRSA,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0)