Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 131 for p384 (0.36 sec)

  1. src/crypto/ecdsa/equal_test.go

    	t.Run("P224", func(t *testing.T) { testEqual(t, elliptic.P224()) })
    	if testing.Short() {
    		return
    	}
    	t.Run("P256", func(t *testing.T) { testEqual(t, elliptic.P256()) })
    	t.Run("P384", func(t *testing.T) { testEqual(t, elliptic.P384()) })
    	t.Run("P521", func(t *testing.T) { testEqual(t, elliptic.P521()) })
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 05 18:05:10 UTC 2020
    - 2.1K bytes
    - Viewed (0)
  2. src/crypto/elliptic/elliptic.go

    // The cryptographic operations are implemented using constant-time algorithms.
    func P256() Curve {
    	initonce.Do(initAll)
    	return p256
    }
    
    // P384 returns a [Curve] which implements NIST P-384 (FIPS 186-3, section D.2.4),
    // also known as secp384r1. The CurveParams.Name of this [Curve] is "P-384".
    //
    // Multiple invocations of this function will return the same value, so it can
    // be used for equality checks and switch statements.
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 9K bytes
    - Viewed (0)
  3. src/crypto/elliptic/params.go

    // a generic, non-constant time implementation of [Curve].
    //
    // The generic Curve implementation is deprecated, and using custom curves
    // (those not returned by [P224], [P256], [P384], and [P521]) is not guaranteed
    // to provide any security property.
    type CurveParams struct {
    	P       *big.Int // the order of the underlying field
    	N       *big.Int // the order of the base point
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 16 17:46:09 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  4. src/crypto/ecdh/nist.go

    // P384 returns a [Curve] which implements NIST P-384 (FIPS 186-3, section D.2.4),
    // also known as secp384r1.
    //
    // Multiple invocations of this function will return the same value, which can
    // be used for equality checks and switch statements.
    func P384() Curve { return p384 }
    
    var p384 = &nistCurve[*nistec.P384Point]{
    	name:        "P-384",
    	newPoint:    nistec.NewP384Point,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 8.1K bytes
    - Viewed (0)
  5. src/crypto/ecdsa/ecdsa_s390x_test.go

    import (
    	"crypto/elliptic"
    	"testing"
    )
    
    func TestNoAsm(t *testing.T) {
    	testingDisableKDSA = true
    	defer func() { testingDisableKDSA = false }()
    
    	curves := [...]elliptic.Curve{
    		elliptic.P256(),
    		elliptic.P384(),
    		elliptic.P521(),
    	}
    
    	for _, curve := range curves {
    		name := curve.Params().Name
    		t.Run(name, func(t *testing.T) { testKeyGeneration(t, curve) })
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 834 bytes
    - Viewed (0)
  6. src/crypto/x509/boring.go

    	}
    
    	// The key must be RSA 2048, RSA 3072, RSA 4096,
    	// or ECDSA P-256, P-384, P-521.
    	switch k := c.PublicKey.(type) {
    	default:
    		return false
    	case *rsa.PublicKey:
    		if size := k.N.BitLen(); size != 2048 && size != 3072 && size != 4096 {
    			return false
    		}
    	case *ecdsa.PublicKey:
    		if k.Curve != elliptic.P256() && k.Curve != elliptic.P384() && k.Curve != elliptic.P521() {
    			return false
    		}
    	}
    	return true
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jan 26 22:52:27 UTC 2024
    - 993 bytes
    - Viewed (0)
  7. src/internal/cpu/cpu_s390x.go

    	sha3_256 function = 33 // SHA3-256
    	sha3_384 function = 34 // SHA3-384
    	sha3_512 function = 35 // SHA3-512
    	shake128 function = 36 // SHAKE-128
    	shake256 function = 37 // SHAKE-256
    
    	// KLMD function codes
    	ghash function = 65 // GHASH
    )
    
    const (
    	// KDSA function codes
    	ecdsaVerifyP256    function = 1  // NIST P256
    	ecdsaVerifyP384    function = 2  // NIST P384
    	ecdsaVerifyP521    function = 3  // NIST P521
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 22 17:11:03 UTC 2020
    - 5.9K bytes
    - Viewed (0)
  8. src/crypto/tls/key_schedule.go

    		return ecdh.P256(), true
    	case CurveP384:
    		return ecdh.P384(), true
    	case CurveP521:
    		return ecdh.P521(), true
    	default:
    		return nil, false
    	}
    }
    
    func curveIDForCurve(curve ecdh.Curve) (CurveID, bool) {
    	switch curve {
    	case ecdh.X25519():
    		return X25519, true
    	case ecdh.P256():
    		return CurveP256, true
    	case ecdh.P384():
    		return CurveP384, true
    	case ecdh.P521():
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 14:56:25 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  9. security/pkg/pki/util/crypto_test.go

    		},
    		"ECDSA-P256": {
    			key:           ecdsaPrivKeyP256,
    			isErr:         false,
    			expectedCurve: elliptic.P256(),
    		},
    		"ECDSA-P384": {
    			key:           ecdsaPrivKeyP384,
    			isErr:         false,
    			expectedCurve: elliptic.P384(),
    		},
    		"ECDSA-P512": {
    			key:           ecdsaPrivKeyP521,
    			isErr:         false,
    			expectedCurve: elliptic.P256(),
    		},
    		"ED25519": {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 04 13:00:07 UTC 2024
    - 14.6K bytes
    - Viewed (0)
  10. src/crypto/elliptic/nistec.go

    		Gy: bigFromHex("4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5"),
    	}
    }
    
    var p384 = &nistCurve[*nistec.P384Point]{
    	newPoint: nistec.NewP384Point,
    }
    
    func initP384() {
    	p384.params = &CurveParams{
    		Name:    "P-384",
    		BitSize: 384,
    		// FIPS 186-4, section D.1.2.4
    		P: bigFromDecimal("394020061963944792122790401001436138050797392704654" +
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Nov 21 16:19:34 UTC 2022
    - 9.6K bytes
    - Viewed (0)
Back to top