Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 155 for p256 (0.15 sec)

  1. security/pkg/pki/util/crypto.go

    	case *ecdsa.PrivateKey:
    		if key.Curve == elliptic.P384() {
    			return key.Curve, nil
    		}
    		return elliptic.P256(), nil
    	default:
    		return nil, fmt.Errorf("private key is not ECDSA based")
    	}
    }
    
    // PemCertBytestoString: takes an array of PEM certs in bytes and returns a string array in the same order with
    // trailing newline characters removed
    func PemCertBytestoString(caCerts []byte) []string {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 04 13:00:07 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  2. security/tools/generate_cert/main.go

    	isServer  = flag.Bool("server", false, "Whether this certificate is for a server.")
    	ec        = flag.String("ec-sig-alg", "", "Generate an elliptical curve private key with the specified algorithm")
    	curve     = flag.String("curve", "P256", "Specify the elliptic curve to use to generate an elliptical curve private key")
    	sanFields = flag.String("san", "", "Subject Alternative Names")
    )
    
    func checkCmdLine() {
    	flag.Parse()
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 28 16:21:30 UTC 2023
    - 5.7K bytes
    - Viewed (0)
  3. pkg/controller/certificates/approver/sarapprove_test.go

    	dns        []string
    	emails     []string
    	ips        []net.IP
    	signerName string
    }
    
    func makeFancyTestCsr(b csrBuilder) *capi.CertificateSigningRequest {
    	pk, err := ecdsa.GenerateKey(elliptic.P256(), insecureRand)
    	if err != nil {
    		panic(err)
    	}
    	csrb, err := x509.CreateCertificateRequest(insecureRand, &x509.CertificateRequest{
    		Subject: pkix.Name{
    			CommonName:   b.cn,
    			Organization: b.orgs,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 02 21:12:04 UTC 2022
    - 7.7K bytes
    - Viewed (0)
  4. src/crypto/x509/platform_test.go

    			windowsErr: "x509: certificate specifies an incompatible key usage",
    		},
    	}
    
    	leafKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
    	if err != nil {
    		t.Fatalf("ecdsa.GenerateKey failed: %s", err)
    	}
    
    	for _, tc := range tests {
    		tc := tc
    		t.Run(tc.name, func(t *testing.T) {
    			t.Parallel()
    			parent := testRoot
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Feb 20 17:18:29 UTC 2024
    - 7.2K bytes
    - Viewed (0)
  5. internal/config/identity/openid/jwks_test.go

    		t.Fatalf("Expected ECDSA key[0], got %T", keys[0])
    	} else if key1, ok := keys[1].(*rsa.PublicKey); !ok {
    		t.Fatalf("Expected RSA key[1], got %T", keys[1])
    	} else if key0.Curve != elliptic.P256() {
    		t.Fatal("Key[0] is not using P-256 curve")
    	} else if !bytes.Equal(key0.X.Bytes(), []byte{
    		0x30, 0xa0, 0x42, 0x4c, 0xd2,
    		0x1c, 0x29, 0x44, 0x83, 0x8a, 0x2d, 0x75, 0xc9, 0x2b, 0x37, 0xe7, 0x6e, 0xa2,
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sun Jan 02 17:15:06 UTC 2022
    - 9.8K bytes
    - Viewed (0)
  6. pilot/cmd/pilot-agent/options/options.go

    	eccSigAlgEnv        = env.Register("ECC_SIGNATURE_ALGORITHM", "", "The type of ECC signature algorithm to use when generating private keys").Get()
    	eccCurvEnv          = env.Register("ECC_CURVE", "P256", "The elliptic curve to use when ECC_SIGNATURE_ALGORITHM is set to ECDSA").Get()
    	fileMountedCertsEnv = env.Register("FILE_MOUNTED_CERTS", false, "").Get()
    	credFetcherTypeEnv  = env.Register("CREDENTIAL_FETCHER_TYPE", security.JWT,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jan 09 19:21:50 UTC 2024
    - 8.1K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_server_test.go

    			benchmarkHandshakeServer(b, VersionTLS12, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
    				CurveP256, testRSACertificate, testRSAPrivateKey)
    		})
    	})
    	b.Run("ECDHE-P256-ECDSA-P256", func(b *testing.B) {
    		b.Run("TLSv13", func(b *testing.B) {
    			benchmarkHandshakeServer(b, VersionTLS13, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
    				CurveP256, testP256Certificate, testP256PrivateKey)
    		})
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  8. cmd/kubeadm/app/apis/kubeadm/types.go

    type EncryptionAlgorithmType string
    
    const (
    	// EncryptionAlgorithmECDSAP256 defines the ECDSA encryption algorithm type with curve P256.
    	EncryptionAlgorithmECDSAP256 EncryptionAlgorithmType = "ECDSA-P256"
    	// EncryptionAlgorithmRSA2048 defines the RSA encryption algorithm type with key size 2048 bits.
    	EncryptionAlgorithmRSA2048 EncryptionAlgorithmType = "RSA-2048"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 17 03:12:52 UTC 2024
    - 32.6K bytes
    - Viewed (0)
  9. src/crypto/x509/verify_test.go

    		}
    	}
    }
    
    func generateCert(cn string, isCA bool, issuer *Certificate, issuerKey crypto.PrivateKey) (*Certificate, crypto.PrivateKey, error) {
    	priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
    	if err != nil {
    		return nil, nil, err
    	}
    
    	serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
    	serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 110.2K bytes
    - Viewed (0)
  10. src/crypto/x509/x509_test.go

    		}
    	}
    }
    
    func TestCreateRevocationList(t *testing.T) {
    	ec256Priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
    	if err != nil {
    		t.Fatalf("Failed to generate ECDSA P256 key: %s", err)
    	}
    	_, ed25519Priv, err := ed25519.GenerateKey(rand.Reader)
    	if err != nil {
    		t.Fatalf("Failed to generate Ed25519 key: %s", err)
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 163.4K bytes
    - Viewed (0)
Back to top