Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 188 for ecdsa (0.07 sec)

  1. releasenotes/notes/fips.yaml

      on the Istiod container, the Istio Proxy container, and all other Istio
      components, TLS version is restricted to v1.2, the cipher suites to a subset
      of `ECDHE-ECDSA-AES128-GCM-SHA256`, `ECDHE-RSA-AES128-GCM-SHA256`,
      `ECDHE-ECDSA-AES256-GCM-SHA384`, `ECDHE-RSA-AES256-GCM-SHA384`, and ECDH
      curves to `P-256`. These restrictions apply on the following data paths:
    
      * mTLS communication between Envoy proxies;
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 00:16:21 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  2. cmd/kube-controller-manager/app/options/csrsigningcontroller.go

    	fs.StringVar(&o.ClusterSigningKeyFile, "cluster-signing-key-file", o.ClusterSigningKeyFile, "Filename containing a PEM-encoded RSA or ECDSA private key used to sign cluster-scoped certificates.  If specified, no more specific --cluster-signing-* flag may be specified.")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 03 06:47:49 UTC 2022
    - 7.5K bytes
    - Viewed (0)
  3. src/crypto/x509/pkcs8.go

    // Copyright 2011 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    package x509
    
    import (
    	"crypto/ecdh"
    	"crypto/ecdsa"
    	"crypto/ed25519"
    	"crypto/rsa"
    	"crypto/x509/pkix"
    	"encoding/asn1"
    	"errors"
    	"fmt"
    )
    
    // pkcs8 reflects an ASN.1, PKCS #8 PrivateKey. See
    // ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-8/pkcs-8v1_2.asn
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 5.8K bytes
    - Viewed (0)
  4. pkg/config/security/security.go

    var ValidCipherSuites = sets.New(
    	"ECDHE-ECDSA-AES128-GCM-SHA256",
    	"ECDHE-RSA-AES128-GCM-SHA256",
    	"ECDHE-ECDSA-AES256-GCM-SHA384",
    	"ECDHE-RSA-AES256-GCM-SHA384",
    	"ECDHE-ECDSA-CHACHA20-POLY1305",
    	"ECDHE-RSA-CHACHA20-POLY1305",
    	"ECDHE-ECDSA-AES128-SHA",
    	"ECDHE-RSA-AES128-SHA",
    	"ECDHE-ECDSA-AES256-SHA",
    	"ECDHE-RSA-AES256-SHA",
    	"AES128-GCM-SHA256",
    	"AES256-GCM-SHA384",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 07 04:43:34 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  5. tests/integration/security/ecc_signature_algorithm/mtls_strict_test.go

    			if err != nil {
    				t.Fatalf("failed to parse certificate: %v", err)
    			}
    
    			if certificate.PublicKeyAlgorithm != x509.ECDSA {
    				t.Fatalf("public key used in server cert is not ECDSA: %v", certificate.PublicKeyAlgorithm)
    			}
    		})
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  6. pkg/serviceaccount/jwt.go

    		signer, err = signerFromRSAPrivateKey(pk)
    		if err != nil {
    			return nil, fmt.Errorf("could not generate signer for RSA keypair: %v", err)
    		}
    	case *ecdsa.PrivateKey:
    		signer, err = signerFromECDSAPrivateKey(pk)
    		if err != nil {
    			return nil, fmt.Errorf("could not generate signer for ECDSA keypair: %v", err)
    		}
    	case jose.OpaqueSigner:
    		signer, err = signerFromOpaqueSigner(pk)
    		if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 27 22:16:08 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  7. releasenotes/notes/ecc-p384.yaml

    apiVersion: release-notes/v2
    kind: feature
    area: security
    issue: []
    releaseNotes:
    - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 28 16:21:30 UTC 2023
    - 145 bytes
    - Viewed (0)
  8. docs/ftp/README.md

    it supports the server-sig-algs extension. Order is irrelevant.
    
    Valid values
    ```
    ssh-ed25519
    ******@****.***
    sk-ecdsa******@****.***
    ecdsa-sha2-nistp256
    ecdsa-sha2-nistp384
    ecdsa-sha2-nistp521
    rsa-sha2-256
    rsa-sha2-512
    ssh-rsa
    ssh-dss
    ```
    
    `--sftp=kex-algos=...` specifies the supported key-exchange algorithms in preference order.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  9. src/crypto/ecdsa/ecdsa_noasm.go

    // Copyright 2020 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    //go:build !s390x || purego
    
    package ecdsa
    
    import "io"
    
    func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error {
    	return errNoAsm
    }
    
    func signAsm(priv *PrivateKey, csprng io.Reader, hash []byte) (sig []byte, err error) {
    	return nil, errNoAsm
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 413 bytes
    - Viewed (0)
  10. security/pkg/pki/util/verify_cert.go

    		if err != nil {
    			return err
    		}
    
    		privRSAKey, privRSAOk := priv.(*rsa.PrivateKey)
    		pubRSAKey, pubRSAOk := cert.PublicKey.(*rsa.PublicKey)
    
    		privECKey, privECOk := priv.(*ecdsa.PrivateKey)
    		pubECKey, pubECOk := cert.PublicKey.(*ecdsa.PublicKey)
    
    		rsaMatch := privRSAOk && pubRSAOk
    		ecMatch := privECOk && pubECOk
    
    		if rsaMatch {
    			if !reflect.DeepEqual(privRSAKey.PublicKey, *pubRSAKey) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Sep 05 10:37:29 UTC 2022
    - 5.9K bytes
    - Viewed (0)
Back to top