Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 132 for ECDSA (0.04 sec)

  1. src/crypto/ecdh/ecdh.go

    //
    // These keys can be parsed with [crypto/x509.ParsePKIXPublicKey] and encoded
    // with [crypto/x509.MarshalPKIXPublicKey]. For NIST curves, they then need to
    // be converted with [crypto/ecdsa.PublicKey.ECDH] after parsing.
    type PublicKey struct {
    	curve     Curve
    	publicKey []byte
    	boring    *boring.PublicKeyECDH
    }
    
    // Bytes returns a copy of the encoding of the public key.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 6.4K bytes
    - Viewed (0)
  2. src/crypto/elliptic/elliptic.go

    // generated using the given reader, which must return random data.
    //
    // Deprecated: for ECDH, use the GenerateKey methods of the [crypto/ecdh] package;
    // for ECDSA, use the GenerateKey function of the crypto/ecdsa package.
    func GenerateKey(curve Curve, rand io.Reader) (priv []byte, x, y *big.Int, err error) {
    	N := curve.Params().N
    	bitSize := N.BitLen()
    	byteLen := (bitSize + 7) / 8
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 9K bytes
    - Viewed (0)
  3. pkg/controller/certificates/approver/sarapprove_test.go

    See the License for the specific language governing permissions and
    limitations under the License.
    */
    
    package approver
    
    import (
    	"context"
    	"crypto/ecdsa"
    	"crypto/elliptic"
    	"crypto/x509"
    	"crypto/x509/pkix"
    	"encoding/pem"
    	"fmt"
    	"math/rand"
    	"net"
    	"testing"
    
    	authorization "k8s.io/api/authorization/v1"
    	capi "k8s.io/api/certificates/v1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 02 21:12:04 UTC 2022
    - 7.7K bytes
    - Viewed (0)
  4. src/crypto/x509/root_windows.go

    	// tricked into using custom curve parameters for a trusted root, by
    	// double-checking all ECDSA signatures. If the system was tricked into
    	// using spoofed parameters, the signature will be invalid for the correct
    	// ones we parsed. (We don't support custom curves ourselves.)
    	for i, parent := range chain[1:] {
    		if parent.PublicKeyAlgorithm != ECDSA {
    			continue
    		}
    		if err := parent.CheckSignature(chain[i].SignatureAlgorithm,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 09 19:41:40 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_test.go

    	config.Certificates[0].PrivateKey = testECDSAPrivateKey
    	config.BuildNameToCertificate()
    
    	test := &serverTest{
    		name:    "ECDHE-ECDSA-AES",
    		command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-ECDSA-AES256-SHA", "-ciphersuites", "TLS_AES_128_GCM_SHA256"},
    		config:  config,
    	}
    	runServerTestTLS10(t, test)
    	runServerTestTLS12(t, test)
    	runServerTestTLS13(t, test)
    }
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  6. src/crypto/tls/defaults.go

    // the code advertises as supported in a TLS 1.2+ ClientHello and in a TLS 1.2+
    // CertificateRequest. The two fields are merged to match with TLS 1.3.
    // Note that in TLS 1.2, the ECDSA algorithms are not constrained to P-256, etc.
    var defaultSupportedSignatureAlgorithms = []SignatureScheme{
    	PSSWithSHA256,
    	ECDSAWithP256AndSHA256,
    	Ed25519,
    	PSSWithSHA384,
    	PSSWithSHA512,
    	PKCS1WithSHA256,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  7. pkg/envoy/proxy.go

    		// Limit the TLSv1.2 ciphers in google_grpc client in Envoy to the compliant ciphers.
    		cmd.Env = append(cmd.Env,
    			"GRPC_SSL_CIPHER_SUITES=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384")
    	}
    	cmd.Stdout = os.Stdout
    	cmd.Stderr = os.Stderr
    	if e.AgentIsRoot {
    		cmd.SysProcAttr = &syscall.SysProcAttr{}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 05 10:02:56 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  8. src/crypto/tls/cipher_suites.go

    	// that we're happy with.
    	suiteECDHE = 1 << iota
    	// suiteECSign indicates that the cipher suite involves an ECDSA or
    	// EdDSA signature and therefore may only be selected when the server's
    	// certificate is ECDSA or EdDSA. If this is not set then the cipher suite
    	// is RSA based.
    	suiteECSign
    	// suiteTLS12 indicates that the cipher suite should only be advertised
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  9. okhttp-testing-support/src/main/kotlin/okhttp3/testing/PlatformRule.kt

          const val LOOM_PROPERTY = "loom"
    
          /**
           * For whatever reason our BouncyCastle provider doesn't work with ECDSA keys. Just configure it
           * to use RSA-2048 instead.
           *
           * (We otherwise prefer ECDSA because it's faster.)
           */
          private val localhostHandshakeCertificatesWithRsa2048: HandshakeCertificates by lazy {
            val heldCertificate =
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 15.3K bytes
    - Viewed (0)
  10. src/crypto/ecdsa/boring.go

    // Copyright 2017 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    //go:build boringcrypto
    
    package ecdsa
    
    import (
    	"crypto/internal/boring"
    	"crypto/internal/boring/bbig"
    	"crypto/internal/boring/bcache"
    	"math/big"
    )
    
    // Cached conversions from Go PublicKey/PrivateKey to BoringCrypto.
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Aug 18 00:30:19 UTC 2022
    - 2.7K bytes
    - Viewed (0)
Back to top