- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 24 for privPem (0.12 sec)
-
security/pkg/pki/util/keycertbundle.go
// NOTE: Callers should not modify the content of cert and privKey. func (b *KeyCertBundle) GetAll() (cert *x509.Certificate, privKey *crypto.PrivateKey, certChainBytes, rootCertBytes []byte, ) { b.mutex.RLock() cert = b.cert privKey = b.privKey certChainBytes = copyBytes(b.certChainBytes) rootCertBytes = copyBytes(b.rootCertBytes) b.mutex.RUnlock() return
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0) -
src/crypto/x509/pkcs8_test.go
continue } privKey, err := ParsePKCS8PrivateKey(derBytes) if err != nil { t.Errorf("%s: failed to decode PKCS#8: %s", test.name, err) continue } if reflect.TypeOf(privKey) != test.keyType { t.Errorf("%s: decoded PKCS#8 returned unexpected key type: %T", test.name, privKey) continue } if ecKey, isEC := privKey.(*ecdsa.PrivateKey); isEC && ecKey.Curve != test.curve {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat Nov 19 16:45:10 UTC 2022 - 9K bytes - Viewed (0) -
src/crypto/x509/sec1.go
for len(privKey.PrivateKey) > len(privateKey) { if privKey.PrivateKey[0] != 0 { return nil, errors.New("x509: invalid private key length") } privKey.PrivateKey = privKey.PrivateKey[1:] } // Some private keys remove all leading zeros, this is also invalid // according to [SEC1] but since OpenSSL used to do this, we ignore // this too. copy(privateKey[len(privateKey)-len(privKey.PrivateKey):], privKey.PrivateKey)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 4.6K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
} } // GetRSAKeySize returns the size if it is RSA key, otherwise it returns an error. func GetRSAKeySize(privKey crypto.PrivateKey) (int, error) { if t := reflect.TypeOf(privKey); t != reflect.TypeOf(&rsa.PrivateKey{}) { return 0, fmt.Errorf("key type is not RSA: %v", t) } pkey := privKey.(*rsa.PrivateKey) return pkey.N.BitLen(), nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_test.go
zeroHash := make([]byte, 64) privKey, err := GenerateKey(curve, rand.Reader) if err != nil { panic(err) } // Sign a hash consisting of all zeros. r, s, err := Sign(rand.Reader, privKey, zeroHash) if err != nil { panic(err) } // Confirm that it can be verified. if !Verify(&privKey.PublicKey, zeroHash, r, s) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:58 UTC 2024 - 13.5K bytes - Viewed (0) -
docs/debugging/inspect/decrypt-v2.go
error } func extractInspectV2(pk []byte, r io.Reader, w io.Writer, okMsg string) error { privKey, err := bytesToPrivateKey(pk) if err != nil { return fmt.Errorf("decoding key returned: %w", err) } sr, err := estream.NewReader(r) if err != nil { return err } sr.SetPrivateKey(privKey) sr.ReturnNonDecryptable(true) // Debug corrupted streams. if false { sr.SkipEncrypted(true)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Apr 11 21:22:47 UTC 2024 - 2.2K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/testing/testing.go
ecdsa++ keyName = fmt.Sprintf("%d.ecdsa", ecdsa) default: rsa++ keyName = fmt.Sprintf("%d.rsa", rsa) } if len(keyName) > 0 { privKey, err := pkiutil.TryLoadKeyFromDisk(fixtureDir, keyName) if err == nil { return privKey, nil } } fmt.Println("GeneratePrivateKey " + keyName + " for " + thisTest) signer, err := pkiutil.GeneratePrivateKey(keyType) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 3K bytes - Viewed (0) -
security/pkg/pki/util/generate_csr.go
if err != nil { return nil, nil, fmt.Errorf("CSR creation failed (%v)", err) } csr, privKey, err := encodePem(true, csrBytes, priv, options.PKCS8Key) return csr, privKey, err } // GenCSRTemplate generates a certificateRequest template with the given options. func GenCSRTemplate(options CertOptions) (*x509.CertificateRequest, error) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 4.1K bytes - Viewed (0) -
tests/integration/security/fuzz/fuzzers/jwt_tool/jwtconf.ini
[crypto] # The sample RSA public and private keys are used to generate different tokens for testing. They can be simply generated # with the command `make -f tools/certs/Makefile.selfsigned.mk sample-RSA`. pubkey = sample-RSA-public.pem privkey = sample-RSA-private.pem jwks = [services] jwt_tool_version = 2.2.3 # To disable the proxy option set this value to: False (no quotes) proxy = False
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 1.1K bytes - Viewed (0) -
docs/tls/README.md
**Note:** PowerShell may need to be restarted for this change to take effect. #### 3.3.2 Generate a private key Run the following command to generate a private `.key` file: ``` certtool.exe --generate-privkey --outfile private.key ``` A response similar to this one should be displayed: ``` Generating a 3072 bit RSA private key... ``` #### 3.3.3 Generate a public certificate
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 8.4K bytes - Viewed (0)