Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 132 for ECDSA (1.22 sec)

  1. pkg/serviceaccount/jwt.go

    		signer, err = signerFromRSAPrivateKey(pk)
    		if err != nil {
    			return nil, fmt.Errorf("could not generate signer for RSA keypair: %v", err)
    		}
    	case *ecdsa.PrivateKey:
    		signer, err = signerFromECDSAPrivateKey(pk)
    		if err != nil {
    			return nil, fmt.Errorf("could not generate signer for ECDSA keypair: %v", err)
    		}
    	case jose.OpaqueSigner:
    		signer, err = signerFromOpaqueSigner(pk)
    		if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 27 22:16:08 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  2. releasenotes/notes/ecc-p384.yaml

    apiVersion: release-notes/v2
    kind: feature
    area: security
    issue: []
    releaseNotes:
    - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 28 16:21:30 UTC 2023
    - 145 bytes
    - Viewed (0)
  3. docs/ftp/README.md

    it supports the server-sig-algs extension. Order is irrelevant.
    
    Valid values
    ```
    ssh-ed25519
    ******@****.***
    sk-ecdsa******@****.***
    ecdsa-sha2-nistp256
    ecdsa-sha2-nistp384
    ecdsa-sha2-nistp521
    rsa-sha2-256
    rsa-sha2-512
    ssh-rsa
    ssh-dss
    ```
    
    `--sftp=kex-algos=...` specifies the supported key-exchange algorithms in preference order.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  4. src/crypto/ecdsa/ecdsa_noasm.go

    // Copyright 2020 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    //go:build !s390x || purego
    
    package ecdsa
    
    import "io"
    
    func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error {
    	return errNoAsm
    }
    
    func signAsm(priv *PrivateKey, csprng io.Reader, hash []byte) (sig []byte, err error) {
    	return nil, errNoAsm
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 413 bytes
    - Viewed (0)
  5. security/pkg/pki/util/verify_cert.go

    		if err != nil {
    			return err
    		}
    
    		privRSAKey, privRSAOk := priv.(*rsa.PrivateKey)
    		pubRSAKey, pubRSAOk := cert.PublicKey.(*rsa.PublicKey)
    
    		privECKey, privECOk := priv.(*ecdsa.PrivateKey)
    		pubECKey, pubECOk := cert.PublicKey.(*ecdsa.PublicKey)
    
    		rsaMatch := privRSAOk && pubRSAOk
    		ecMatch := privECOk && pubECOk
    
    		if rsaMatch {
    			if !reflect.DeepEqual(privRSAKey.PublicKey, *pubRSAKey) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Sep 05 10:37:29 UTC 2022
    - 5.9K bytes
    - Viewed (0)
  6. pkg/model/fips.go

    	common_features "istio.io/istio/pkg/features"
    	"istio.io/istio/pkg/log"
    )
    
    var fipsCiphers = []string{
    	"ECDHE-ECDSA-AES128-GCM-SHA256",
    	"ECDHE-RSA-AES128-GCM-SHA256",
    	"ECDHE-ECDSA-AES256-GCM-SHA384",
    	"ECDHE-RSA-AES256-GCM-SHA384",
    }
    
    var fipsGoCiphers = []uint16{
    	gotls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
    	gotls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Mar 28 22:11:02 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  7. docs/tls/README.md

    * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa)
    * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa)
    * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate)
    
    #### 3.2.1 Generate a private key with ECDSA
    
    Use the following command to generate a private key with ECDSA:
    
    ```sh
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 8.4K bytes
    - Viewed (0)
  8. src/crypto/x509/x509_test.go

    		{"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
    		{"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA},
    		{"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA256},
    		{"RSAPSS/RSAPSS", &testPrivateKey.PublicKey, testPrivateKey, true, SHA256WithRSAPSS},
    		{"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 163.4K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/storage/etcd3/testing/testingcert/certificates.go

    //
    //	expiry was changed from 1 year to 100 years (876000h)
    //
    // ca-csr.json:
    //
    //	ca expiry was set to 100 years (876000h) ("ca":{"expiry":"876000h"})
    //	key was changed from ecdsa,384 to rsa,2048
    //
    // req-csr.json:
    //
    //	key was changed from ecdsa,384 to rsa,2048
    //	hosts were changed to "localhost","127.0.0.1"
    const CAFileContent = `
    -----BEGIN CERTIFICATE-----
    MIIEUDCCAzigAwIBAgIUKfV5+qwlw3JneAPdJS7JCO8xIlYwDQYJKoZIhvcNAQEL
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Dec 16 06:50:02 UTC 2023
    - 5.8K bytes
    - Viewed (0)
  10. src/crypto/ecdsa/ecdsa_s390x_test.go

    // Copyright 2020 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    //go:build s390x && !purego
    
    package ecdsa
    
    import (
    	"crypto/elliptic"
    	"testing"
    )
    
    func TestNoAsm(t *testing.T) {
    	testingDisableKDSA = true
    	defer func() { testingDisableKDSA = false }()
    
    	curves := [...]elliptic.Curve{
    		elliptic.P256(),
    		elliptic.P384(),
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 834 bytes
    - Viewed (0)
Back to top