Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 25 for SignatureAlgorithm (0.34 sec)

  1. src/crypto/tls/handshake_client_tls13.go

    	}
    
    	// See RFC 8446, Section 4.4.3.
    	if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: certificate used with invalid signature algorithm")
    	}
    	sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    	if err != nil {
    		return c.sendAlert(alertInternalError)
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  2. security/pkg/server/ca/authenticate/oidc_test.go

    			}
    		})
    	}
    }
    
    func generateJWT(key *jose.JSONWebKey, claims []byte) (string, error) {
    	signer, err := jose.NewSigner(jose.SigningKey{
    		Algorithm: jose.SignatureAlgorithm(key.Algorithm),
    		Key:       key,
    	}, nil)
    	if err != nil {
    		return "", fmt.Errorf("failed to create a signer: %v", err)
    	}
    	signature, err := signer.Sign(claims)
    	if err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 7.3K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_client.go

    		var sigType uint8
    		var sigHash crypto.Hash
    		if c.vers >= VersionTLS12 {
    			signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
    			if err != nil {
    				c.sendAlert(alertIllegalParameter)
    				return err
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  4. src/crypto/x509/root_windows.go

    	// ones we parsed. (We don't support custom curves ourselves.)
    	for i, parent := range chain[1:] {
    		if parent.PublicKeyAlgorithm != ECDSA {
    			continue
    		}
    		if err := parent.CheckSignature(chain[i].SignatureAlgorithm,
    			chain[i].RawTBSCertificate, chain[i].Signature); err != nil {
    			return nil, err
    		}
    	}
    	return chain, nil
    }
    
    // systemVerify is like Verify, except that it uses CryptoAPI calls
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 09 19:41:40 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  5. src/crypto/x509/pkix/pkix.go

    // signature.
    //
    // Deprecated: x509.RevocationList should be used instead.
    type CertificateList struct {
    	TBSCertList        TBSCertificateList
    	SignatureAlgorithm AlgorithmIdentifier
    	SignatureValue     asn1.BitString
    }
    
    // HasExpired reports whether certList should have been updated by now.
    func (certList *CertificateList) HasExpired(now time.Time) bool {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 9.1K bytes
    - Viewed (0)
  6. src/crypto/tls/handshake_server_tls13.go

    		}
    
    		// See RFC 8446, Section 4.4.3.
    		if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms()) {
    			c.sendAlert(alertIllegalParameter)
    			return errors.New("tls: client certificate used with invalid signature algorithm")
    		}
    		sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    		if err != nil {
    			return c.sendAlert(alertInternalError)
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc_test.go

    func loadRSAKey(t *testing.T, filepath string, alg jose.SignatureAlgorithm) *jose.JSONWebKey {
    	return loadKey(t, filepath, alg, func(b []byte) (interface{}, error) {
    		key, err := x509.ParsePKCS1PrivateKey(b)
    		if err != nil {
    			return nil, err
    		}
    		return key.Public(), nil
    	})
    }
    
    func loadRSAPrivKey(t *testing.T, filepath string, alg jose.SignatureAlgorithm) *jose.JSONWebKey {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 97.7K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_server.go

    		if c.vers >= VersionTLS12 {
    			if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, certReq.supportedSignatureAlgorithms) {
    				c.sendAlert(alertIllegalParameter)
    				return errors.New("tls: client certificate used with invalid signature algorithm")
    			}
    			sigType, sigHash, err = typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
    			if err != nil {
    				return c.sendAlert(alertInternalError)
    			}
    		} else {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  9. src/crypto/tls/handshake_messages.go

    	signatureAlgorithm    SignatureScheme
    	signature             []byte
    }
    
    func (m *certificateVerifyMsg) marshal() ([]byte, error) {
    	var b cryptobyte.Builder
    	b.AddUint8(typeCertificateVerify)
    	b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
    		if m.hasSignatureAlgorithm {
    			b.AddUint16(uint16(m.signatureAlgorithm))
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
  10. src/crypto/tls/handshake_test.go

    // testRSAPSSCertificate has signatureAlgorithm rsassaPss, but subjectPublicKeyInfo
    // algorithm rsaEncryption, for use with the rsa_pss_rsae_* SignatureSchemes.
    // See also TestRSAPSSKeyError. testRSAPSSCertificate is self-signed.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 24.5K bytes
    - Viewed (0)
Back to top