- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for SignatureScheme (0.24 sec)
-
src/crypto/tls/auth.go
switch pub.Curve { case elliptic.P256(): sigAlgs = []SignatureScheme{ECDSAWithP256AndSHA256} case elliptic.P384(): sigAlgs = []SignatureScheme{ECDSAWithP384AndSHA384} case elliptic.P521(): sigAlgs = []SignatureScheme{ECDSAWithP521AndSHA512} default: return nil } case *rsa.PublicKey: size := pub.Size() sigAlgs = make([]SignatureScheme, 0, len(rsaSignatureSchemes))
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0) -
api/go1.8.txt
pkg crypto/tls, const PKCS1WithSHA384 = 1281 pkg crypto/tls, const PKCS1WithSHA384 SignatureScheme pkg crypto/tls, const PKCS1WithSHA512 = 1537 pkg crypto/tls, const PKCS1WithSHA512 SignatureScheme pkg crypto/tls, const PSSWithSHA256 = 2052 pkg crypto/tls, const PSSWithSHA256 SignatureScheme pkg crypto/tls, const PSSWithSHA384 = 2053 pkg crypto/tls, const PSSWithSHA384 SignatureScheme
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Dec 21 05:25:57 UTC 2016 - 16.3K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
// GetClientCertificate and SupportsCertificate select the right certificate. // The hash part of the SignatureScheme is a lie here, because // TLS 1.0 and 1.1 always use MD5+SHA1 for RSA and SHA1 for ECDSA. switch { case rsaAvail && ecAvail: cri.SignatureSchemes = []SignatureScheme{ ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/key_agreement.go
ka.ckx.ciphertext[0] = byte(len(ourPublicKey)) copy(ka.ckx.ciphertext[1:], ourPublicKey) var sigType uint8 var sigHash crypto.Hash if ka.version >= VersionTLS12 { signatureAlgorithm := SignatureScheme(sig[0])<<8 | SignatureScheme(sig[1]) sig = sig[2:] if len(sig) < 2 { return errServerKeyExchange } if !isSupportedSignatureAlgorithm(signatureAlgorithm, clientHello.supportedSignatureAlgorithms) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 11.8K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
for _, suite := range cipherSuites { if suite.id == id { return suite.flags&suiteECSign == suiteECSign } } panic(fmt.Sprintf("unknown cipher suite %#x", id)) } func isBoringSignatureScheme(alg SignatureScheme) bool { switch alg { default: return false case PKCS1WithSHA256, ECDSAWithP256AndSHA256, PKCS1WithSHA384, ECDSAWithP384AndSHA384, PKCS1WithSHA512, ECDSAWithP521AndSHA512,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
src/crypto/tls/handshake_messages_test.go
} return reflect.ValueOf(m) } func (*certificateVerifyMsg) Generate(rand *rand.Rand, size int) reflect.Value { m := &certificateVerifyMsg{} m.hasSignatureAlgorithm = true m.signatureAlgorithm = SignatureScheme(rand.Intn(30000)) m.signature = randomBytes(rand.Intn(15)+1, rand) return reflect.ValueOf(m) } func (*certificateStatusMsg) Generate(rand *rand.Rand, size int) reflect.Value { m := &certificateStatusMsg{}
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 15.7K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
clientHello *clientHelloMsg hello *serverHelloMsg sentDummyCCS bool usingPSK bool earlyData bool suite *cipherSuiteTLS13 cert *Certificate sigAlg SignatureScheme earlySecret []byte sharedKey []byte handshakeSecret []byte masterSecret []byte trafficSecret []byte // client_application_traffic_secret_0 transcript hash.Hash clientFinished []byte
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0) -
api/go1.10.txt
pkg archive/zip, type FileHeader struct, NonUTF8 bool pkg bufio, method (*Reader) Size() int pkg bufio, method (*Writer) Size() int pkg crypto/tls, const ECDSAWithSHA1 = 515 pkg crypto/tls, const ECDSAWithSHA1 SignatureScheme pkg crypto/x509, const CANotAuthorizedForExtKeyUsage = 9 pkg crypto/x509, const CANotAuthorizedForExtKeyUsage InvalidReason pkg crypto/x509, const ExtKeyUsageMicrosoftCommercialCodeSigning = 12
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 06 05:00:01 UTC 2018 - 30.1K bytes - Viewed (0)