Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for ECDHE (0.45 sec)

  1. src/crypto/tls/handshake_server_test.go

    		name:    "RSA-AES-GCM",
    		command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES128-GCM-SHA256"},
    	}
    	runServerTestTLS12(t, test)
    }
    
    func TestHandshakeServerAES256GCMSHA384(t *testing.T) {
    	test := &serverTest{
    		name:    "RSA-AES256-GCM-SHA384",
    		command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES256-GCM-SHA384"},
    	}
    	runServerTestTLS12(t, test)
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  2. src/crypto/tls/handshake_client_test.go

    	test := &clientTest{
    		name: "ECDHE-RSA-AES",
    		args: []string{"-cipher", "ECDHE-RSA-AES128-SHA"},
    	}
    	runClientTestTLS10(t, test)
    	runClientTestTLS11(t, test)
    	runClientTestTLS12(t, test)
    }
    
    func TestHandshakeClientECDHEECDSAAES(t *testing.T) {
    	test := &clientTest{
    		name: "ECDHE-ECDSA-AES",
    		args: []string{"-cipher", "ECDHE-ECDSA-AES128-SHA"},
    		cert: testECDSACertificate,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 88.7K bytes
    - Viewed (0)
  3. pilot/pkg/security/authn/policy_applier_test.go

    				TlsMinimumProtocolVersion: tls.TlsParameters_TLSv1_2,
    				TlsMaximumProtocolVersion: tls.TlsParameters_TLSv1_3,
    				CipherSuites: []string{
    					"ECDHE-ECDSA-AES256-GCM-SHA384",
    					"ECDHE-RSA-AES256-GCM-SHA384",
    					"ECDHE-ECDSA-AES128-GCM-SHA256",
    					"ECDHE-RSA-AES128-GCM-SHA256",
    					"AES256-GCM-SHA384",
    					"AES128-GCM-SHA256",
    				},
    			},
    		},
    		RequireClientCertificate: protovalue.BoolTrue,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Dec 01 07:32:22 UTC 2023
    - 60.2K bytes
    - Viewed (0)
  4. src/crypto/tls/tls_test.go

    			SupportedPoints:   []uint8{pointFormatUncompressed},
    			SignatureSchemes:  []SignatureScheme{Ed25519},
    			SupportedVersions: []uint16{VersionTLS12},
    		}, ""},
    		{ed25519Cert, &ClientHelloInfo{
    			CipherSuites:      []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
    			SupportedCurves:   []CurveID{CurveP256}, // only relevant for ECDHE support
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  5. src/crypto/tls/common.go

    		}
    	}
    
    	// In TLS 1.3 we are done because supported_groups is only relevant to the
    	// ECDHE computation, point format negotiation is removed, cipher suites are
    	// only relevant to the AEAD choice, and static RSA does not exist.
    	if vers == VersionTLS13 {
    		return nil
    	}
    
    	// The only signed key exchange we support is ECDHE.
    	if !supportsECDHE(config, vers, chi.SupportedCurves, chi.SupportedPoints) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
Back to top