- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 132 for ECDSA (0.04 sec)
-
src/crypto/ecdh/ecdh.go
// // These keys can be parsed with [crypto/x509.ParsePKIXPublicKey] and encoded // with [crypto/x509.MarshalPKIXPublicKey]. For NIST curves, they then need to // be converted with [crypto/ecdsa.PublicKey.ECDH] after parsing. type PublicKey struct { curve Curve publicKey []byte boring *boring.PublicKeyECDH } // Bytes returns a copy of the encoding of the public key.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 6.4K bytes - Viewed (0) -
src/crypto/elliptic/elliptic.go
// generated using the given reader, which must return random data. // // Deprecated: for ECDH, use the GenerateKey methods of the [crypto/ecdh] package; // for ECDSA, use the GenerateKey function of the crypto/ecdsa package. func GenerateKey(curve Curve, rand io.Reader) (priv []byte, x, y *big.Int, err error) { N := curve.Params().N bitSize := N.BitLen() byteLen := (bitSize + 7) / 8
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 9K bytes - Viewed (0) -
pkg/controller/certificates/approver/sarapprove_test.go
See the License for the specific language governing permissions and limitations under the License. */ package approver import ( "context" "crypto/ecdsa" "crypto/elliptic" "crypto/x509" "crypto/x509/pkix" "encoding/pem" "fmt" "math/rand" "net" "testing" authorization "k8s.io/api/authorization/v1" capi "k8s.io/api/certificates/v1"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 02 21:12:04 UTC 2022 - 7.7K bytes - Viewed (0) -
src/crypto/x509/root_windows.go
// tricked into using custom curve parameters for a trusted root, by // double-checking all ECDSA signatures. If the system was tricked into // using spoofed parameters, the signature will be invalid for the correct // ones we parsed. (We don't support custom curves ourselves.) for i, parent := range chain[1:] { if parent.PublicKeyAlgorithm != ECDSA { continue } if err := parent.CheckSignature(chain[i].SignatureAlgorithm,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 09 19:41:40 UTC 2023 - 8.7K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
config.Certificates[0].PrivateKey = testECDSAPrivateKey config.BuildNameToCertificate() test := &serverTest{ name: "ECDHE-ECDSA-AES", command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-ECDSA-AES256-SHA", "-ciphersuites", "TLS_AES_128_GCM_SHA256"}, config: config, } runServerTestTLS10(t, test) runServerTestTLS12(t, test) runServerTestTLS13(t, test) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
src/crypto/tls/defaults.go
// the code advertises as supported in a TLS 1.2+ ClientHello and in a TLS 1.2+ // CertificateRequest. The two fields are merged to match with TLS 1.3. // Note that in TLS 1.2, the ECDSA algorithms are not constrained to P-256, etc. var defaultSupportedSignatureAlgorithms = []SignatureScheme{ PSSWithSHA256, ECDSAWithP256AndSHA256, Ed25519, PSSWithSHA384, PSSWithSHA512, PKCS1WithSHA256,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 3.9K bytes - Viewed (0) -
pkg/envoy/proxy.go
// Limit the TLSv1.2 ciphers in google_grpc client in Envoy to the compliant ciphers. cmd.Env = append(cmd.Env, "GRPC_SSL_CIPHER_SUITES=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384") } cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr if e.AgentIsRoot { cmd.SysProcAttr = &syscall.SysProcAttr{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 05 10:02:56 UTC 2024 - 6.9K bytes - Viewed (0) -
src/crypto/tls/cipher_suites.go
// that we're happy with. suiteECDHE = 1 << iota // suiteECSign indicates that the cipher suite involves an ECDSA or // EdDSA signature and therefore may only be selected when the server's // certificate is ECDSA or EdDSA. If this is not set then the cipher suite // is RSA based. suiteECSign // suiteTLS12 indicates that the cipher suite should only be advertised
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 25.5K bytes - Viewed (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/testing/PlatformRule.kt
const val LOOM_PROPERTY = "loom" /** * For whatever reason our BouncyCastle provider doesn't work with ECDSA keys. Just configure it * to use RSA-2048 instead. * * (We otherwise prefer ECDSA because it's faster.) */ private val localhostHandshakeCertificatesWithRsa2048: HandshakeCertificates by lazy { val heldCertificate =
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 15.3K bytes - Viewed (0) -
src/crypto/ecdsa/boring.go
// Copyright 2017 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build boringcrypto package ecdsa import ( "crypto/internal/boring" "crypto/internal/boring/bbig" "crypto/internal/boring/bcache" "math/big" ) // Cached conversions from Go PublicKey/PrivateKey to BoringCrypto. //
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Aug 18 00:30:19 UTC 2022 - 2.7K bytes - Viewed (0)