Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 15 for SupportedSignatureAlgorithms (0.74 sec)

  1. src/crypto/tls/auth.go

    // for a given certificate, based on the public key and the protocol version,
    // and optionally filtered by its explicit SupportedSignatureAlgorithms.
    //
    // This function must be kept in sync with supportedSignatureAlgorithms.
    // FIPS filtering is applied in the caller, selectSignatureScheme.
    func signatureSchemesForCertificate(version uint16, cert *Certificate) []SignatureScheme {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  2. src/crypto/tls/auth_test.go

    	if err == nil {
    		t.Errorf("Ed25519: unexpected success")
    	}
    }
    
    // TestSupportedSignatureAlgorithms checks that all supportedSignatureAlgorithms
    // have valid type and hash information.
    func TestSupportedSignatureAlgorithms(t *testing.T) {
    	for _, sigAlg := range supportedSignatureAlgorithms() {
    		sigType, hash, err := typeAndHashFromSignatureScheme(sigAlg)
    		if err != nil {
    			t.Errorf("%v: unexpected error: %v", sigAlg, err)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Apr 08 21:48:41 UTC 2020
    - 6.9K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_messages_test.go

    		} else {
    			m.sessionTicket = make([]byte, 0)
    		}
    	}
    	if rand.Intn(10) > 5 {
    		m.supportedSignatureAlgorithms = supportedSignatureAlgorithms()
    	}
    	if rand.Intn(10) > 5 {
    		m.supportedSignatureAlgorithmsCert = supportedSignatureAlgorithms()
    	}
    	for i := 0; i < rand.Intn(5); i++ {
    		m.alpnProtocols = append(m.alpnProtocols, randomString(rand.Intn(20)+1, rand))
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 15.7K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_messages.go

    			return false
    		}
    		if len(data) < int(sigAndHashLen) {
    			return false
    		}
    		numSigAlgos := sigAndHashLen / 2
    		m.supportedSignatureAlgorithms = make([]SignatureScheme, numSigAlgos)
    		for i := range m.supportedSignatureAlgorithms {
    			m.supportedSignatureAlgorithms[i] = SignatureScheme(data[0])<<8 | SignatureScheme(data[1])
    			data = data[2:]
    		}
    	}
    
    	if len(data) < 2 {
    		return false
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_tls13.go

    		}
    	}
    	for i := range ch.supportedCurves {
    		if ch.supportedCurves[i] != ch1.supportedCurves[i] {
    			return true
    		}
    	}
    	for i := range ch.supportedSignatureAlgorithms {
    		if ch.supportedSignatureAlgorithms[i] != ch1.supportedSignatureAlgorithms[i] {
    			return true
    		}
    	}
    	for i := range ch.supportedSignatureAlgorithmsCert {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  6. src/crypto/tls/handshake_client.go

    			return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
    		}
    	}
    
    	if maxVersion >= VersionTLS12 {
    		hello.supportedSignatureAlgorithms = supportedSignatureAlgorithms()
    	}
    	if testingOnlyForceClientHelloSignatureAlgorithms != nil {
    		hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
    	}
    
    	var keyShareKeys *keySharePrivateKeys
    	if hello.supportedVersions[0] == VersionTLS13 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_server.go

    		certReq.certificateTypes = []byte{
    			byte(certTypeRSASign),
    			byte(certTypeECDSASign),
    		}
    		if c.vers >= VersionTLS12 {
    			certReq.hasSignatureAlgorithm = true
    			certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms()
    		}
    
    		// An empty list of certificateAuthorities signals to
    		// the client that it may send any certificate in response
    		// to our request. When we know the CAs we trust, then
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  8. src/crypto/tls/key_agreement.go

    	}
    
    	var signatureAlgorithm SignatureScheme
    	var sigType uint8
    	var sigHash crypto.Hash
    	if ka.version >= VersionTLS12 {
    		signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms)
    		if err != nil {
    			return nil, err
    		}
    		sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    		if err != nil {
    			return nil, err
    		}
    	} else {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  9. src/crypto/tls/quic_test.go

    		t.Fatalf("error during connection handshake: %v", err)
    	}
    
    	certReq := new(certificateRequestMsgTLS13)
    	certReq.ocspStapling = true
    	certReq.scts = true
    	certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms()
    	certReqBytes, err := certReq.marshal()
    	if err != nil {
    		t.Fatal(err)
    	}
    	if err := cli.conn.HandleData(QUICEncryptionLevelApplication, append([]byte{
    		byte(typeCertificateRequest),
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 19.3K bytes
    - Viewed (0)
  10. src/crypto/tls/handshake_client_tls13.go

    	if !ok {
    		c.sendAlert(alertUnexpectedMessage)
    		return unexpectedMessageError(certVerify, msg)
    	}
    
    	// See RFC 8446, Section 4.4.3.
    	if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: certificate used with invalid signature algorithm")
    	}
    	sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
Back to top