Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for cbc (0.05 sec)

  1. staging/src/k8s.io/apiserver/pkg/server/options/encryptionconfig/config_test.go

    		t,
    		"testdata/valid-configs/aes/aes-cbc-multiple-providers.json",
    		"k8s:enc:aescbc:v1:1:",
    		"testdata/valid-configs/aes/aes-cbc-multiple-providers-reversed.json",
    		"k8s:enc:aescbc:v1:2:",
    	)
    }
    
    func TestCBCKeyRotationWithoutOverlappingProviders(t *testing.T) {
    	testCBCKeyRotationWithProviders(
    		t,
    		"testdata/valid-configs/aes/aes-cbc-multiple-keys.json",
    		"k8s:enc:aescbc:v1:A:",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 16 16:56:39 UTC 2024
    - 72.3K bytes
    - Viewed (0)
  2. src/crypto/tls/conn.go

    	// Not likely enough to bother.
    	panic("TLS: sequence number wraparound")
    }
    
    // explicitNonceLen returns the number of bytes of explicit nonce or IV included
    // in each record. Explicit nonces are present only in CBC modes after TLS 1.0
    // and in certain AEAD modes in TLS 1.2.
    func (hc *halfConn) explicitNonceLen() int {
    	if hc.cipher == nil {
    		return 0
    	}
    
    	switch c := hc.cipher.(type) {
    	case cipher.Stream:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
  3. docs/changelogs/changelog_3x.md

        when used with this method. This does not impact already-encoded query
        parameters in APIs like `HttpUrl.parse()` and
        `HttpUrl.Builder.addEncodedQueryParameter()`.
     *  New: CBC-mode ECDSA cipher suites have been removed from OkHttp's default
        configuration: `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA` and
        `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`. This tracks a [Chromium
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Sun Feb 06 14:55:54 UTC 2022
    - 50.8K bytes
    - Viewed (0)
  4. src/crypto/tls/tls_test.go

    			// ECDHE < *
    			if aSuite.flags&suiteECDHE != 0 && bSuite.flags&suiteECDHE == 0 {
    				return -1
    			} else if aSuite.flags&suiteECDHE == 0 && bSuite.flags&suiteECDHE != 0 {
    				return +1
    			}
    			// AEAD < CBC
    			if aSuite.aead != nil && bSuite.aead == nil {
    				return -1
    			} else if aSuite.aead == nil && bSuite.aead != nil {
    				return +1
    			}
    			// AES < ChaCha20
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_server_test.go

    				TLS_RSA_WITH_AES_128_CBC_SHA,
    			},
    			serverHasAESGCM: false,
    			expectedCipher:  TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
    		},
    		{
    			name: "client prefers AES-GCM and AES-CBC over ChaCha, server doesn't have hardware AES (pick ChaCha)",
    			clientCiphers: []uint16{
    				TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
    				TLS_RSA_WITH_AES_128_CBC_SHA,
    				TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
    			},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
Back to top