- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for cipher_suites (0.25 sec)
-
src/crypto/tls/cipher_suites.go
} // mutualCipherSuite returns a cipherSuite given a list of supported // ciphersuites and the id requested by the peer. func mutualCipherSuite(have []uint16, want uint16) *cipherSuite { for _, id := range have { if id == want { return cipherSuiteByID(id) } } return nil } func cipherSuiteByID(id uint16) *cipherSuite { for _, cipherSuite := range cipherSuites { if cipherSuite.id == id {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 25.5K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
// Reset the list of ciphers when the client only supports TLS 1.3. if len(hello.supportedVersions) == 1 { hello.cipherSuites = nil } if hasAESGCMHardwareSupport { hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13...) } else { hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13NoAES...) } curveID := config.curvePreferences(maxVersion)[0]
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
// Check that the client is still offering the ciphersuite in the session. for _, id := range hs.clientHello.cipherSuites { if id == sessionState.cipherSuite { cipherSuiteOk = true break } } if !cipherSuiteOk { return nil } // Check that we also support the ciphersuite from the session. suite := selectCipherSuite([]uint16{sessionState.cipherSuite}, c.config.cipherSuites(), hs.cipherSuiteOk)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
return true } for i := range ch.supportedVersions { if ch.supportedVersions[i] != ch1.supportedVersions[i] { return true } } for i := range ch.cipherSuites { if ch.cipherSuites[i] != ch1.cipherSuites[i] { return true } } for i := range ch.supportedCurves { if ch.supportedCurves[i] != ch1.supportedCurves[i] { return true } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0) -
src/crypto/tls/ticket.go
// sessionState returns a partially filled-out [SessionState] with information // from the current connection. func (c *Conn) sessionState() *SessionState { return &SessionState{ version: c.vers, cipherSuite: c.cipherSuite, createdAt: uint64(c.config.time().Unix()), alpnProtocol: c.clientProtocol, peerCertificates: c.peerCertificates, activeCertHandles: c.activeCertHandles,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 12.6K bytes - Viewed (0) -
src/crypto/tls/handshake_messages_test.go
m.vers = uint16(rand.Intn(65536)) m.random = randomBytes(32, rand) m.sessionId = randomBytes(rand.Intn(32), rand) m.cipherSuites = make([]uint16, rand.Intn(63)+1) for i := 0; i < len(m.cipherSuites); i++ { cs := uint16(rand.Int31()) if cs == scsvRenegotiation { cs += 1 } m.cipherSuites[i] = cs } m.compressionMethods = randomBytes(rand.Intn(63)+1, rand) if rand.Intn(10) > 5 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 15.7K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
return errors.New("tls: invalid early data for QUIC connection") } cipherSuite := cipherSuiteTLS13ByID(c.cipherSuite) if cipherSuite == nil || c.resumptionSecret == nil { return c.sendAlert(alertInternalError) } psk := cipherSuite.expandLabel(c.resumptionSecret, "resumption", msg.nonce, cipherSuite.hash.Size()) session := c.sessionState() session.secret = psk
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
switch sigType { case signaturePKCS1v15, signatureRSAPSS: serverConfig.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} serverConfig.Certificates[0].Certificate = [][]byte{testRSA2048Certificate} serverConfig.Certificates[0].PrivateKey = testRSA2048PrivateKey case signatureEd25519: serverConfig.CipherSuites = []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256}
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving.go
return err } } else if s.ServerCert.GeneratedCert != nil { c.Cert = s.ServerCert.GeneratedCert } if len(s.CipherSuites) != 0 { cipherSuites, err := cliflag.TLSCipherSuites(s.CipherSuites) if err != nil { return err } c.CipherSuites = cipherSuites } var err error c.MinTLSVersion, err = cliflag.TLSVersion(s.MinTLSVersion) if err != nil { return err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 13:08:18 UTC 2024 - 15.9K bytes - Viewed (0) -
cmd/utils.go
tlsConfig.ClientAuth = tls.RequestClientCert } if secureCiphers := env.Get(api.EnvAPISecureCiphers, config.EnableOn) == config.EnableOn; secureCiphers { tlsConfig.CipherSuites = fips.TLSCiphers() } else { tlsConfig.CipherSuites = fips.TLSCiphersBackwardCompatible() } tlsConfig.CurvePreferences = fips.TLSCurveIDs() return tlsConfig } /////////// Types and functions for OpenID IAM testing
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Wed Jun 05 22:00:34 UTC 2024 - 31.9K bytes - Viewed (0)