Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for typeAndHashFromSignatureScheme (0.96 sec)

  1. src/crypto/tls/auth_test.go

    		if test.expectedSigAlg != sigAlg {
    			t.Errorf("test[%d]: expected signature scheme %v, got %v", testNo, test.expectedSigAlg, sigAlg)
    		}
    		sigType, hashFunc, err := typeAndHashFromSignatureScheme(sigAlg)
    		if err != nil {
    			t.Errorf("test[%d]: unexpected typeAndHashFromSignatureScheme error: %v", testNo, err)
    		}
    		if test.expectedSigType != sigType {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Apr 08 21:48:41 UTC 2020
    - 6.9K bytes
    - Viewed (0)
  2. src/crypto/tls/auth.go

    	}
    	h := sigHash.New()
    	h.Write(signaturePadding)
    	io.WriteString(h, context)
    	h.Write(transcript.Sum(nil))
    	return h.Sum(nil)
    }
    
    // typeAndHashFromSignatureScheme returns the corresponding signature type and
    // crypto.Hash for a given TLS SignatureScheme.
    func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
    	switch signatureAlgorithm {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 10K bytes
    - Viewed (0)
  3. src/crypto/tls/key_agreement.go

    	if ka.version >= VersionTLS12 {
    		signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms)
    		if err != nil {
    			return nil, err
    		}
    		sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    		if err != nil {
    			return nil, err
    		}
    	} else {
    		sigType, sigHash, err = legacyTypeAndHashFromPublicKey(priv.Public())
    		if err != nil {
    			return nil, err
    		}
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client_tls13.go

    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: certificate used with invalid signature algorithm")
    	}
    	sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    	if err != nil {
    		return c.sendAlert(alertInternalError)
    	}
    	if sigType == signaturePKCS1v15 || sigHash == crypto.SHA1 {
    		c.sendAlert(alertIllegalParameter)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_tls13.go

    		return err
    	}
    
    	certVerifyMsg := new(certificateVerifyMsg)
    	certVerifyMsg.hasSignatureAlgorithm = true
    	certVerifyMsg.signatureAlgorithm = hs.sigAlg
    
    	sigType, sigHash, err := typeAndHashFromSignatureScheme(hs.sigAlg)
    	if err != nil {
    		return c.sendAlert(alertInternalError)
    	}
    
    	signed := signedMessage(sigHash, serverSignatureContext, hs.transcript)
    	signOpts := crypto.SignerOpts(sigHash)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  6. src/crypto/tls/boring_test.go

    			serverConfig := testConfig.Clone()
    			serverConfig.Certificates = make([]Certificate, 1)
    
    			testingOnlyForceClientHelloSignatureAlgorithms = []SignatureScheme{sigHash}
    
    			sigType, _, _ := typeAndHashFromSignatureScheme(sigHash)
    			switch sigType {
    			case signaturePKCS1v15, signatureRSAPSS:
    				serverConfig.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_client.go

    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    			certVerify.hasSignatureAlgorithm = true
    			certVerify.signatureAlgorithm = signatureAlgorithm
    		} else {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_server.go

    				c.sendAlert(alertIllegalParameter)
    				return errors.New("tls: client certificate used with invalid signature algorithm")
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    		} else {
    			sigType, sigHash, err = legacyTypeAndHashFromPublicKey(pub)
    			if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
Back to top