- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 415 for publicKey (0.15 sec)
-
security/pkg/nodeagent/test/mock/caserver.go
return nil, caerror.NewError(caerror.CSRError, err) } signingCert, signingKey, _, _ := s.KeyCertBundle.GetAll() certBytes, err := util.GenCertFromCSR(csr, signingCert, csr.PublicKey, *signingKey, subjectIDs, s.certLifetime, forCA) if err != nil { caServerLog.Errorf("failed to generate cert from CSR: %+v", err) return nil, caerror.NewError(caerror.CertGenError, err) } block := &pem.Block{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 5.9K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_s390x.go
case 1: // error return nil, errZeroParam case 2: // retry continue } panic("unreachable") } } func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error { c := pub.Curve functionCode, blockSize, ok := canUseKDSA(c) if !ok { return errNoAsm } r, s, err := parseSignature(sig) if err != nil { return err }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 5.3K bytes - Viewed (0) -
src/crypto/internal/boring/ecdh.go
} k := &PrivateKeyECDH{curve, key} // Note: Same as in NewPublicKeyECDH regarding finalizer and KeepAlive. runtime.SetFinalizer(k, (*PrivateKeyECDH).finalize) return k, nil } func (k *PrivateKeyECDH) PublicKey() (*PublicKeyECDH, error) { defer runtime.KeepAlive(k) group := C._goboringcrypto_EC_KEY_get0_group(k.key) if group == nil { return nil, fail("EC_KEY_get0_group") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Jul 20 17:51:31 UTC 2023 - 6.2K bytes - Viewed (0) -
pkg/kubelet/certificate/bootstrap/bootstrap.go
// regenerate every loop and we include usages which are not contained in the // CSR. This needs to be kept up to date as we add new fields to the node // certificates and with ensureCompatible. func digestedName(publicKey interface{}, subject *pkix.Name, usages []certificatesv1.KeyUsage) (string, error) { hash := sha512.New512_256() // Here we make sure two different inputs can't write the same stream
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Dec 27 08:04:25 UTC 2022 - 14.2K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
pcert = parent.cert pkey = parent.key } else { pcert = tmpl pkey = key } var pub interface{} switch k := key.(type) { case *rsa.PrivateKey: pub = &k.PublicKey case *ecdsa.PrivateKey: pub = &k.PublicKey default: t.Fatalf("invalid key %T", key) } der, err := x509.CreateCertificate(rand.Reader, tmpl, pcert, pub, pkey) if err != nil { t.Fatal(err) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
} pk.add(key.Kid, pkey) } return nil } func (pk *publicKeys) add(keyID string, key interface{}) { pk.Lock() defer pk.Unlock() pk.pkMap[keyID] = key } func (pk *publicKeys) get(kid string) interface{} { pk.RLock() defer pk.RUnlock() return pk.pkMap[kid] } // PopulatePublicKey - populates a new publickey from the JWKS URL. func (r *Config) PopulatePublicKey(arn arn.ARN) error {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 30 18:10:41 UTC 2024 - 8.3K bytes - Viewed (0) -
src/crypto/x509/verify.go
type pubKeyEqual interface { Equal(crypto.PublicKey) bool } var candidateSAN *pkix.Extension for _, ext := range candidate.Extensions { if ext.Id.Equal(oidExtensionSubjectAltName) { candidateSAN = &ext break } } for _, cert := range chain { if !bytes.Equal(candidate.RawSubject, cert.RawSubject) { continue } if !candidate.PublicKey.(pubKeyEqual).Equal(cert.PublicKey) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt
) val keyFactory = KeyFactory.getInstance("RSA") val publicKey = keyFactory.generatePublic(X509EncodedKeySpec(x509PublicKey.toByteArray())) val privateKey = keyFactory.generatePrivate(PKCS8EncodedKeySpec(privateKeyBytes.toByteArray())) val certificate = HeldCertificate.Builder() .keyPair(publicKey, privateKey) .build()
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 43.9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go
template.IPAddresses = append(template.IPAddresses, alternateIPs...) template.DNSNames = append(template.DNSNames, alternateDNS...) derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv) if err != nil { return nil, nil, err } // Generate cert certBuffer := bytes.Buffer{} if err := pem.Encode(&certBuffer, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes}); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 8K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
} key, err := generateECDHEKey(c.config.rand(), ecdhGroup) if err != nil { c.sendAlert(alertInternalError) return err } hs.hello.serverShare = keyShare{group: selectedGroup, data: key.PublicKey().Bytes()} peerKey, err := key.Curve().NewPublicKey(ecdhData) if err != nil { c.sendAlert(alertIllegalParameter) return errors.New("tls: invalid client key share") } hs.sharedKey, err = key.ECDH(peerKey)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0)