Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for hashForClientCertificate (0.32 sec)

  1. src/crypto/tls/prf.go

    	out := make([]byte, finishedVerifyLength)
    	h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
    	return out
    }
    
    // hashForClientCertificate returns the handshake messages so far, pre-hashed if
    // necessary, suitable for signing by a TLS client certificate.
    func (h finishedHash) hashForClientCertificate(sigType uint8, hashAlg crypto.Hash) []byte {
    	if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 21 16:29:49 UTC 2023
    - 9.2K bytes
    - Viewed (0)
  2. src/crypto/tls/handshake_server.go

    			}
    		} else {
    			sigType, sigHash, err = legacyTypeAndHashFromPublicKey(pub)
    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    		}
    
    		signed := hs.finishedHash.hashForClientCertificate(sigType, sigHash)
    		if err := verifyHandshakeSignature(sigType, pub, sigHash, signed, certVerify.signature); err != nil {
    			c.sendAlert(alertDecryptError)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_client.go

    		} else {
    			sigType, sigHash, err = legacyTypeAndHashFromPublicKey(key.Public())
    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    		}
    
    		signed := hs.finishedHash.hashForClientCertificate(sigType, sigHash)
    		signOpts := crypto.SignerOpts(sigHash)
    		if sigType == signatureRSAPSS {
    			signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
Back to top