Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for new256 (0.12 sec)

  1. src/vendor/golang.org/x/crypto/sha3/hashes.go

    import (
    	"hash"
    )
    
    // New224 creates a new SHA3-224 hash.
    // Its generic security strength is 224 bits against preimage attacks,
    // and 112 bits against collision attacks.
    func New224() hash.Hash {
    	return new224()
    }
    
    // New256 creates a new SHA3-256 hash.
    // Its generic security strength is 256 bits against preimage attacks,
    // and 128 bits against collision attacks.
    func New256() hash.Hash {
    	return new256()
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  2. src/vendor/golang.org/x/crypto/sha3/hashes_noasm.go

    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    //go:build !gc || purego || !s390x
    
    package sha3
    
    func new224() *state {
    	return new224Generic()
    }
    
    func new256() *state {
    	return new256Generic()
    }
    
    func new384() *state {
    	return new384Generic()
    }
    
    func new512() *state {
    	return new512Generic()
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 409 bytes
    - Viewed (0)
  3. src/vendor/golang.org/x/crypto/sha3/sha3_s390x.go

    func (s *asmState) Clone() ShakeHash {
    	return s.clone()
    }
    
    // new224 returns an assembly implementation of SHA3-224 if available,
    // otherwise it returns a generic implementation.
    func new224() hash.Hash {
    	if cpu.S390X.HasSHA3 {
    		return newAsmState(sha3_224)
    	}
    	return new224Generic()
    }
    
    // new256 returns an assembly implementation of SHA3-256 if available,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  4. pkg/config/security/security.go

    	"ECDHE-RSA-AES128-GCM-SHA256",
    	"ECDHE-ECDSA-AES256-GCM-SHA384",
    	"ECDHE-RSA-AES256-GCM-SHA384",
    	"ECDHE-ECDSA-CHACHA20-POLY1305",
    	"ECDHE-RSA-CHACHA20-POLY1305",
    	"ECDHE-ECDSA-AES128-SHA",
    	"ECDHE-RSA-AES128-SHA",
    	"ECDHE-ECDSA-AES256-SHA",
    	"ECDHE-RSA-AES256-SHA",
    	"AES128-GCM-SHA256",
    	"AES256-GCM-SHA384",
    	"AES128-SHA",
    	"AES256-SHA",
    	"DES-CBC3-SHA",
    )
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 07 04:43:34 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  5. pkg/envoy/proxy.go

    		// Limit the TLSv1.2 ciphers in google_grpc client in Envoy to the compliant ciphers.
    		cmd.Env = append(cmd.Env,
    			"GRPC_SSL_CIPHER_SUITES=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384")
    	}
    	cmd.Stdout = os.Stdout
    	cmd.Stderr = os.Stderr
    	if e.AgentIsRoot {
    		cmd.SysProcAttr = &syscall.SysProcAttr{}
    		cmd.SysProcAttr.Credential = &syscall.Credential{
    			Uid: 1337,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 05 10:02:56 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  6. cmd/sftp-server.go

    	kexAlgoCurve25519SHA256LibSSH = "******@****.***"
    	kexAlgoCurve25519SHA256       = "curve25519-sha256"
    
    	chacha20Poly1305ID = "******@****.***"
    	gcm256CipherID     = "aes256******@****.***"
    	aes128cbcID        = "aes128-cbc"
    	tripledescbcID     = "3des-cbc"
    )
    
    var (
    	errSFTPPublicKeyBadFormat = errors.New("the public key provided could not be parsed")
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Wed Jun 05 07:51:13 UTC 2024
    - 16K bytes
    - Viewed (0)
  7. src/runtime/gc_test.go

    	// further move the stack.
    	new2 := uintptr(unsafe.Pointer(new))
    
    	t.Logf("old stack pointer %x, new stack pointer %x", old, new2)
    	if new2 == old {
    		// Check that we didn't screw up the test's escape analysis.
    		if cls := runtime.GCTestPointerClass(unsafe.Pointer(new)); cls != "stack" {
    			t.Fatalf("test bug: new (%#x) should be a stack pointer, not %s", new2, cls)
    		}
    		// This was a real failure.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Jun 05 22:33:52 UTC 2024
    - 17.6K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_server_test.go

    	}
    	runServerTestTLS12(t, test)
    }
    
    func TestHandshakeServerAES256GCMSHA384(t *testing.T) {
    	test := &serverTest{
    		name:    "RSA-AES256-GCM-SHA384",
    		command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES256-GCM-SHA384"},
    	}
    	runServerTestTLS12(t, test)
    }
    
    func TestHandshakeServerAES128SHA256(t *testing.T) {
    	test := &serverTest{
    		name:    "AES128-SHA256",
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  9. cmd/encryption-v1.go

    )
    
    const (
    	// SSECustomerKeySize is the size of valid client provided encryption keys in bytes.
    	// Currently AWS supports only AES256. So the SSE-C key size is fixed to 32 bytes.
    	SSECustomerKeySize = 32
    
    	// SSEIVSize is the size of the IV data
    	SSEIVSize = 32 // 32 bytes
    
    	// SSEDAREPackageBlockSize - SSE dare package block size.
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 06:56:12 UTC 2024
    - 37.1K bytes
    - Viewed (0)
Back to top