package
6.1.0+incompatible
Repository: https://github.com/sassoftware/relic.git
Documentation: pkg.go.dev

# Functions

Add flags associated with X509 certificate creation to the given command.
Add flags associated with X509 requests to the given command.
CrossSign takes a certificate as input and re-signs it using the given key.
Get a curve by a number of bits.
Get a curve by an elliptic.Curve value.
Get a curve by the DER encoding of its OID.
Get a curve by its ASN.1 object identifier.
Get a curve by a dotted decimal OID string.
Decode an ECDSA public key from its DER encoding.
Format the certificate issuer name in LDAP style.
Format the name (RDN sequence) from its raw DER to a readable style.
Format the certificate subject name in LDAP style.
FprintCertificate formats a certificate for display.
Determine the type of a public or private key.
No description provided by the author
No description provided by the author
Load a certificate pool from a file and set it as the root CA for a TLS config.
Make a self-signed X509 certificate using command-line arguments and return the PEM string.
Make a X509 certificate request using command-line arguments and return the PEM string.
Make a random 12 byte big.Int.
Pack a digest along with an algorithm identifier.
No description provided by the author
No description provided by the author
Given a public key and signer options, return the appropriate X.509 digest and signature algorithms.
Convert a crypto.Hash to a X.509 AlgorithmIdentifier.
Convert a X.509 AlgorithmIdentifier to a crypto.Hash.
Convert a crypto.PublicKey to a X.509 AlgorithmIdentifier.
Verify a signature using the algorithm specified by the given X.509 AlgorithmIdentifier.
No description provided by the author
Test whether two public or private keys have the same public key.
If the SSLKEYLOGFILE environment variable is set, then open it for appending and write TLS master secrets there in the "NSS Key Log Format".
SignCSR takes a PKCS#10 signing request in PEM or DER format as input and produces a signed certificate in PEM format.
Calculcate subject key identifier from a public key per RFC 3280.
Return the names of all supported ECDSA curves.
No description provided by the author
Unpack an ECDSA signature from an ASN.1 DER sequence.
No description provided by the author
Unpack an ECDSA signature consisting of two numbers concatenated per IEEE 1363.
Verify an RSA or ECDSA signature.
Choose a X509 signature algorithm suitable for the specified public key.

# Constants

returned by the Format* functions in case there's something cripplingly wrong with it.
No description provided by the author
No description provided by the author
No description provided by the author

# Variables

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
RFC 3279.
No description provided by the author
RFC 5758.
No description provided by the author
No description provided by the author
No description provided by the author
RFC 4055.
No description provided by the author
No description provided by the author
RFC 3279.
No description provided by the author

# Structs

Predefined named ECDSA curve.
ASN.1 structure used to encode an ECDSA signature.

# Type aliases

No description provided by the author