- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 132 for ECDSA (1.22 sec)
-
pkg/serviceaccount/jwt.go
signer, err = signerFromRSAPrivateKey(pk) if err != nil { return nil, fmt.Errorf("could not generate signer for RSA keypair: %v", err) } case *ecdsa.PrivateKey: signer, err = signerFromECDSAPrivateKey(pk) if err != nil { return nil, fmt.Errorf("could not generate signer for ECDSA keypair: %v", err) } case jose.OpaqueSigner: signer, err = signerFromOpaqueSigner(pk) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 10.7K bytes - Viewed (0) -
releasenotes/notes/ecc-p384.yaml
apiVersion: release-notes/v2 kind: feature area: security issue: [] releaseNotes: - |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 28 16:21:30 UTC 2023 - 145 bytes - Viewed (0) -
docs/ftp/README.md
it supports the server-sig-algs extension. Order is irrelevant. Valid values ``` ssh-ed25519 ******@****.*** sk-ecdsa******@****.*** ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 rsa-sha2-256 rsa-sha2-512 ssh-rsa ssh-dss ``` `--sftp=kex-algos=...` specifies the supported key-exchange algorithms in preference order.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_noasm.go
// Copyright 2020 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !s390x || purego package ecdsa import "io" func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error { return errNoAsm } func signAsm(priv *PrivateKey, csprng io.Reader, hash []byte) (sig []byte, err error) { return nil, errNoAsm
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 413 bytes - Viewed (0) -
security/pkg/pki/util/verify_cert.go
if err != nil { return err } privRSAKey, privRSAOk := priv.(*rsa.PrivateKey) pubRSAKey, pubRSAOk := cert.PublicKey.(*rsa.PublicKey) privECKey, privECOk := priv.(*ecdsa.PrivateKey) pubECKey, pubECOk := cert.PublicKey.(*ecdsa.PublicKey) rsaMatch := privRSAOk && pubRSAOk ecMatch := privECOk && pubECOk if rsaMatch { if !reflect.DeepEqual(privRSAKey.PublicKey, *pubRSAKey) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 05 10:37:29 UTC 2022 - 5.9K bytes - Viewed (0) -
pkg/model/fips.go
common_features "istio.io/istio/pkg/features" "istio.io/istio/pkg/log" ) var fipsCiphers = []string{ "ECDHE-ECDSA-AES128-GCM-SHA256", "ECDHE-RSA-AES128-GCM-SHA256", "ECDHE-ECDSA-AES256-GCM-SHA384", "ECDHE-RSA-AES256-GCM-SHA384", } var fipsGoCiphers = []uint16{ gotls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, gotls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 22:11:02 UTC 2024 - 2.9K bytes - Viewed (0) -
docs/tls/README.md
* 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa) * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa) * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate) #### 3.2.1 Generate a private key with ECDSA Use the following command to generate a private key with ECDSA: ```sh
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 8.4K bytes - Viewed (0) -
src/crypto/x509/x509_test.go
{"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA}, {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA256}, {"RSAPSS/RSAPSS", &testPrivateKey.PublicKey, testPrivateKey, true, SHA256WithRSAPSS}, {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/etcd3/testing/testingcert/certificates.go
// // expiry was changed from 1 year to 100 years (876000h) // // ca-csr.json: // // ca expiry was set to 100 years (876000h) ("ca":{"expiry":"876000h"}) // key was changed from ecdsa,384 to rsa,2048 // // req-csr.json: // // key was changed from ecdsa,384 to rsa,2048 // hosts were changed to "localhost","127.0.0.1" const CAFileContent = ` -----BEGIN CERTIFICATE----- MIIEUDCCAzigAwIBAgIUKfV5+qwlw3JneAPdJS7JCO8xIlYwDQYJKoZIhvcNAQEL
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Dec 16 06:50:02 UTC 2023 - 5.8K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_s390x_test.go
// Copyright 2020 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build s390x && !purego package ecdsa import ( "crypto/elliptic" "testing" ) func TestNoAsm(t *testing.T) { testingDisableKDSA = true defer func() { testingDisableKDSA = false }() curves := [...]elliptic.Curve{ elliptic.P256(), elliptic.P384(),
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 834 bytes - Viewed (0)