Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for cipher (0.12 sec)

  1. pilot/pkg/bootstrap/options.go

    	for _, cipher := range tls.InsecureCipherSuites() {
    		acceptedCiphers[cipher.Name] = cipher.ID
    	}
    	for _, cipher := range tls.CipherSuites() {
    		acceptedCiphers[cipher.Name] = cipher.ID
    	}
    	return acceptedCiphers
    }
    
    // TLSCipherSuites returns a list of cipher suite IDs from the cipher suite names passed.
    func TLSCipherSuites(cipherNames []string) ([]uint16, error) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 17:48:28 UTC 2024
    - 6.1K bytes
    - Viewed (0)
  2. maven-embedder/pom.xml

        <dependency>
          <groupId>org.codehaus.plexus</groupId>
          <artifactId>plexus-sec-dispatcher</artifactId>
        </dependency>
        <dependency>
          <groupId>org.codehaus.plexus</groupId>
          <artifactId>plexus-cipher</artifactId>
        </dependency>
        <dependency>
          <groupId>org.codehaus.plexus</groupId>
          <artifactId>plexus-interpolation</artifactId>
        </dependency>
        <dependency>
    Registered: Wed Jun 12 09:55:16 UTC 2024
    - Last Modified: Tue Jun 11 09:06:12 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  3. pkg/config/security/security.go

    		return nil
    	}
    	return fmt.Errorf("bad key (%s): should have format a[b]", key)
    }
    
    // ValidCipherSuites contains a list of all ciphers supported in Gateway.server.tls.cipherSuites
    // Extracted from: `bssl ciphers -openssl-name ALL | rg -v PSK`
    var ValidCipherSuites = sets.New(
    	"ECDHE-ECDSA-AES128-GCM-SHA256",
    	"ECDHE-RSA-AES128-GCM-SHA256",
    	"ECDHE-ECDSA-AES256-GCM-SHA384",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 07 04:43:34 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  4. pkg/envoy/proxy.go

    	/* #nosec */
    	cmd := exec.Command(e.BinaryPath, args...)
    	cmd.Env = os.Environ()
    	if common_features.CompliancePolicy == common_features.FIPS_140_2 {
    		// Limit the TLSv1.2 ciphers in google_grpc client in Envoy to the compliant ciphers.
    		cmd.Env = append(cmd.Env,
    			"GRPC_SSL_CIPHER_SUITES=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384")
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 05 10:02:56 UTC 2024
    - 6.9K bytes
    - Viewed (0)
Back to top