- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 10 for ECDSAWithP384AndSHA384 (0.63 sec)
-
src/crypto/tls/common_string.go
_ = x[PKCS1WithSHA256-1025] _ = x[PKCS1WithSHA384-1281] _ = x[PKCS1WithSHA512-1537] _ = x[PSSWithSHA256-2052] _ = x[PSSWithSHA384-2053] _ = x[PSSWithSHA512-2054] _ = x[ECDSAWithP256AndSHA256-1027] _ = x[ECDSAWithP384AndSHA384-1283] _ = x[ECDSAWithP521AndSHA512-1539] _ = x[Ed25519-2055] _ = x[PKCS1WithSHA1-513] _ = x[ECDSAWithSHA1-515] } const ( _SignatureScheme_name_0 = "PKCS1WithSHA1"
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 3.4K bytes - Viewed (0) -
src/crypto/tls/auth_test.go
{ecdsaCert, nil, VersionTLS12, ECDSAWithSHA1, signatureECDSA, crypto.SHA1}, // TLS 1.2 does not restrict the ECDSA curve (our ecdsaCert is P-256) {ecdsaCert, []SignatureScheme{ECDSAWithP384AndSHA384}, VersionTLS12, ECDSAWithP384AndSHA384, signatureECDSA, crypto.SHA384}, } for testNo, test := range tests { sigAlg, err := selectSignatureScheme(test.tlsVersion, test.cert, test.peerSigAlgs) if err != nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Apr 08 21:48:41 UTC 2020 - 6.9K bytes - Viewed (0) -
src/crypto/tls/defaults.go
var defaultSupportedSignatureAlgorithms = []SignatureScheme{ PSSWithSHA256, ECDSAWithP256AndSHA256, Ed25519, PSSWithSHA384, PSSWithSHA512, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512, PKCS1WithSHA1, ECDSAWithSHA1, } var tlsrsakex = godebug.New("tlsrsakex") var tls3des = godebug.New("tls3des") func defaultCipherSuites() []uint16 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 3.9K bytes - Viewed (0) -
src/crypto/tls/auth.go
sigAlgs = []SignatureScheme{ ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512, ECDSAWithSHA1, } break } switch pub.Curve { case elliptic.P256(): sigAlgs = []SignatureScheme{ECDSAWithP256AndSHA256} case elliptic.P384(): sigAlgs = []SignatureScheme{ECDSAWithP384AndSHA384} case elliptic.P521(): sigAlgs = []SignatureScheme{ECDSAWithP521AndSHA512}
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 10K bytes - Viewed (0) -
api/go1.8.txt
pkg compress/zlib, const HuffmanOnly ideal-int pkg crypto/tls, const ECDSAWithP256AndSHA256 = 1027 pkg crypto/tls, const ECDSAWithP256AndSHA256 SignatureScheme pkg crypto/tls, const ECDSAWithP384AndSHA384 = 1283 pkg crypto/tls, const ECDSAWithP384AndSHA384 SignatureScheme pkg crypto/tls, const ECDSAWithP521AndSHA512 = 1539 pkg crypto/tls, const ECDSAWithP521AndSHA512 SignatureScheme pkg crypto/tls, const PKCS1WithSHA1 = 513
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Dec 21 05:25:57 UTC 2016 - 16.3K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
} func isBoringSignatureScheme(alg SignatureScheme) bool { switch alg { default: return false case PKCS1WithSHA256, ECDSAWithP256AndSHA256, PKCS1WithSHA384, ECDSAWithP384AndSHA384, PKCS1WithSHA512, ECDSAWithP521AndSHA512, PSSWithSHA256, PSSWithSHA384, PSSWithSHA512: // ok } return true } func TestBoringServerCipherSuites(t *testing.T) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
// TLS 1.0 and 1.1 always use MD5+SHA1 for RSA and SHA1 for ECDSA. switch { case rsaAvail && ecAvail: cri.SignatureSchemes = []SignatureScheme{ ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512, PKCS1WithSHA1, } case rsaAvail: cri.SignatureSchemes = []SignatureScheme{
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/tls_test.go
SupportedVersions: []uint16{VersionTLS13}, }, "not valid for requested server name"}, {ecdsaCert, &ClientHelloInfo{ SignatureSchemes: []SignatureScheme{ECDSAWithP384AndSHA384}, SupportedVersions: []uint16{VersionTLS13}, }, "signature algorithms"}, {pkcs1Cert, &ClientHelloInfo{ SignatureSchemes: []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 60.5K bytes - Viewed (0) -
src/crypto/tls/common.go
PSSWithSHA384 SignatureScheme = 0x0805 PSSWithSHA512 SignatureScheme = 0x0806 // ECDSA algorithms. Only constrained to a specific curve in TLS 1.3. ECDSAWithP256AndSHA256 SignatureScheme = 0x0403 ECDSAWithP384AndSHA384 SignatureScheme = 0x0503 ECDSAWithP521AndSHA512 SignatureScheme = 0x0603 // EdDSA algorithms. Ed25519 SignatureScheme = 0x0807 // Legacy signature and hash algorithms for TLS 1.2.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0) -
src/cmd/vendor/golang.org/x/tools/internal/stdlib/manifest.go
{"Dial", Func, 0}, {"DialWithDialer", Func, 3}, {"Dialer", Type, 15}, {"Dialer.Config", Field, 15}, {"Dialer.NetDialer", Field, 15}, {"ECDSAWithP256AndSHA256", Const, 8}, {"ECDSAWithP384AndSHA384", Const, 8}, {"ECDSAWithP521AndSHA512", Const, 8}, {"ECDSAWithSHA1", Const, 10}, {"Ed25519", Const, 13}, {"InsecureCipherSuites", Func, 14}, {"Listen", Func, 0}, {"LoadX509KeyPair", Func, 0},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 02 02:20:05 UTC 2024 - 534.2K bytes - Viewed (0)