Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for selectSignatureScheme (0.34 sec)

  1. src/crypto/tls/auth_test.go

    	}
    
    	for testNo, test := range tests {
    		sigAlg, err := selectSignatureScheme(test.tlsVersion, test.cert, test.peerSigAlgs)
    		if err != nil {
    			t.Errorf("test[%d]: unexpected selectSignatureScheme error: %v", testNo, err)
    		}
    		if test.expectedSigAlg != sigAlg {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Apr 08 21:48:41 UTC 2020
    - 6.9K bytes
    - Viewed (0)
  2. src/crypto/tls/auth.go

    			}
    		}
    		return filteredSigAlgs
    	}
    	return sigAlgs
    }
    
    // selectSignatureScheme picks a SignatureScheme from the peer's preference list
    // that works with the selected certificate. It's only called for protocol
    // versions that support signature algorithms, so TLS 1.2 and 1.3.
    func selectSignatureScheme(vers uint16, c *Certificate, peerAlgs []SignatureScheme) (SignatureScheme, error) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  3. src/crypto/tls/key_agreement.go

    	}
    
    	var signatureAlgorithm SignatureScheme
    	var sigType uint8
    	var sigHash crypto.Hash
    	if ka.version >= VersionTLS12 {
    		signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms)
    		if err != nil {
    			return nil, err
    		}
    		sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    		if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client_tls13.go

    	if len(cert.Certificate) == 0 {
    		return nil
    	}
    
    	certVerifyMsg := new(certificateVerifyMsg)
    	certVerifyMsg.hasSignatureAlgorithm = true
    
    	certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
    	if err != nil {
    		// getClientCertificate returned a certificate incompatible with the
    		// CertificateRequestInfo supported signature algorithms.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_tls13.go

    	if err != nil {
    		if err == errNoCertificates {
    			c.sendAlert(alertUnrecognizedName)
    		} else {
    			c.sendAlert(alertInternalError)
    		}
    		return err
    	}
    	hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
    	if err != nil {
    		// getCertificate returned a certificate that is unsupported or
    		// incompatible with the client's signature algorithms.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  6. src/crypto/tls/common.go

    	}
    
    	// If the client sent the signature_algorithms extension, ensure it supports
    	// schemes we can use with this certificate and TLS version.
    	if len(chi.SignatureSchemes) > 0 {
    		if _, err := selectSignatureScheme(vers, c, chi.SignatureSchemes); err != nil {
    			return supportsRSAFallback(err)
    		}
    	}
    
    	// In TLS 1.3 we are done because supported_groups is only relevant to the
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_client.go

    		}
    
    		var sigType uint8
    		var sigHash crypto.Hash
    		if c.vers >= VersionTLS12 {
    			signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
Back to top