- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 132 for ECDSA (0.08 sec)
-
security/pkg/pki/util/generate_csr.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 4.1K bytes - Viewed (0) -
src/crypto/ecdsa/notboring.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !boringcrypto package ecdsa import "crypto/internal/boring" func boringPublicKey(*PublicKey) (*boring.PublicKeyECDSA, error) { panic("boringcrypto: not available") } func boringPrivateKey(*PrivateKey) (*boring.PrivateKeyECDSA, error) { panic("boringcrypto: not available")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Apr 29 14:23:22 UTC 2022 - 451 bytes - Viewed (0) -
cmd/kubelet/app/server_bootstrap_test.go
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package app import ( "crypto/ecdsa" "crypto/elliptic" "crypto/rand" "crypto/x509" "crypto/x509/pkix" "encoding/json" "encoding/pem" "io" "math/big" "net/http" "net/http/httptest" "os" "path/filepath" "sync"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 01 05:59:41 UTC 2022 - 10.5K bytes - Viewed (0) -
pilot/pkg/security/authn/utils/utils.go
protovalue "istio.io/istio/pkg/proto" ) // SupportedCiphers for server side TLS configuration. var SupportedCiphers = []string{ "ECDHE-ECDSA-AES256-GCM-SHA384", "ECDHE-RSA-AES256-GCM-SHA384", "ECDHE-ECDSA-AES128-GCM-SHA256", "ECDHE-RSA-AES128-GCM-SHA256", "AES256-GCM-SHA384", "AES128-GCM-SHA256", } // BuildInboundTLS returns the TLS context corresponding to the mTLS mode.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 00:16:21 UTC 2024 - 3.8K bytes - Viewed (0) -
internal/config/identity/openid/jwks.go
// // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package openid import ( "crypto" "crypto/ecdsa" "crypto/ed25519" "crypto/elliptic" "crypto/rsa" "encoding/base64" "errors" "fmt" "math/big" ) // JWKS - https://tools.ietf.org/html/rfc7517 type JWKS struct {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
internal/config/identity/openid/jwks_test.go
var err error keys[ii], err = jks.DecodePublicKey() if err != nil { t.Fatalf("Failed to decode key %d: %v", ii, err) } } //nolint:gocritic if key0, ok := keys[0].(*ecdsa.PublicKey); !ok { t.Fatalf("Expected ECDSA key[0], got %T", keys[0]) } else if key1, ok := keys[1].(*rsa.PublicKey); !ok { t.Fatalf("Expected RSA key[1], got %T", keys[1]) } else if key0.Curve != elliptic.P256() {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jan 02 17:15:06 UTC 2022 - 9.8K bytes - Viewed (0) -
pkg/serviceaccount/jwt_test.go
Namespace: "test", Labels: map[string]string{ "kubernetes.io/legacy-token-invalid-since": "2022-12-20", }, }, } ecdsaSecret := &v1.Secret{ ObjectMeta: metav1.ObjectMeta{ Name: "my-ecdsa-secret", Namespace: "test", }, } // Generate the RSA token rsaGenerator, err := serviceaccount.JWTTokenGenerator(serviceaccount.LegacyIssuer, getPrivateKey(rsaPrivateKey)) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 17K bytes - Viewed (0) -
src/crypto/x509/name_constraints_test.go
expectedError: "cannot parse dnsName \".example.com\"", }, } func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) { var serialBytes [16]byte rand.Read(serialBytes[:]) template := &Certificate{ SerialNumber: new(big.Int).SetBytes(serialBytes[:]),
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 22:40:21 UTC 2024 - 45.2K bytes - Viewed (0) -
src/crypto/x509/platform_test.go
windowsErr: "x509: certificate specifies an incompatible key usage", }, } leafKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) if err != nil { t.Fatalf("ecdsa.GenerateKey failed: %s", err) } for _, tc := range tests { tc := tc t.Run(tc.name, func(t *testing.T) { t.Parallel() parent := testRoot
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 20 17:18:29 UTC 2024 - 7.2K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
} ecdsaKey, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) if err != nil { panic("Could not generate ECDSA key") } os.Exit(m.Run()) } func TestNewCertAndKey(t *testing.T) { var tests = []struct { name string key crypto.Signer }{ { name: "ECDSA should succeed", key: ecdsaKey, }, } for _, rt := range tests {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0)