- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for new256 (0.12 sec)
-
src/vendor/golang.org/x/crypto/sha3/hashes.go
import ( "hash" ) // New224 creates a new SHA3-224 hash. // Its generic security strength is 224 bits against preimage attacks, // and 112 bits against collision attacks. func New224() hash.Hash { return new224() } // New256 creates a new SHA3-256 hash. // Its generic security strength is 256 bits against preimage attacks, // and 128 bits against collision attacks. func New256() hash.Hash { return new256() }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 2.7K bytes - Viewed (0) -
src/vendor/golang.org/x/crypto/sha3/hashes_noasm.go
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !gc || purego || !s390x package sha3 func new224() *state { return new224Generic() } func new256() *state { return new256Generic() } func new384() *state { return new384Generic() } func new512() *state { return new512Generic()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 409 bytes - Viewed (0) -
src/vendor/golang.org/x/crypto/sha3/sha3_s390x.go
func (s *asmState) Clone() ShakeHash { return s.clone() } // new224 returns an assembly implementation of SHA3-224 if available, // otherwise it returns a generic implementation. func new224() hash.Hash { if cpu.S390X.HasSHA3 { return newAsmState(sha3_224) } return new224Generic() } // new256 returns an assembly implementation of SHA3-256 if available,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 7.5K bytes - Viewed (0) -
pkg/config/security/security.go
"ECDHE-RSA-AES128-GCM-SHA256", "ECDHE-ECDSA-AES256-GCM-SHA384", "ECDHE-RSA-AES256-GCM-SHA384", "ECDHE-ECDSA-CHACHA20-POLY1305", "ECDHE-RSA-CHACHA20-POLY1305", "ECDHE-ECDSA-AES128-SHA", "ECDHE-RSA-AES128-SHA", "ECDHE-ECDSA-AES256-SHA", "ECDHE-RSA-AES256-SHA", "AES128-GCM-SHA256", "AES256-GCM-SHA384", "AES128-SHA", "AES256-SHA", "DES-CBC3-SHA", )
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 07 04:43:34 UTC 2024 - 9.4K bytes - Viewed (0) -
pkg/envoy/proxy.go
// Limit the TLSv1.2 ciphers in google_grpc client in Envoy to the compliant ciphers. cmd.Env = append(cmd.Env, "GRPC_SSL_CIPHER_SUITES=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384") } cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr if e.AgentIsRoot { cmd.SysProcAttr = &syscall.SysProcAttr{} cmd.SysProcAttr.Credential = &syscall.Credential{ Uid: 1337,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 05 10:02:56 UTC 2024 - 6.9K bytes - Viewed (0) -
cmd/sftp-server.go
kexAlgoCurve25519SHA256LibSSH = "******@****.***" kexAlgoCurve25519SHA256 = "curve25519-sha256" chacha20Poly1305ID = "******@****.***" gcm256CipherID = "aes256******@****.***" aes128cbcID = "aes128-cbc" tripledescbcID = "3des-cbc" ) var ( errSFTPPublicKeyBadFormat = errors.New("the public key provided could not be parsed")
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Wed Jun 05 07:51:13 UTC 2024 - 16K bytes - Viewed (0) -
src/runtime/gc_test.go
// further move the stack. new2 := uintptr(unsafe.Pointer(new)) t.Logf("old stack pointer %x, new stack pointer %x", old, new2) if new2 == old { // Check that we didn't screw up the test's escape analysis. if cls := runtime.GCTestPointerClass(unsafe.Pointer(new)); cls != "stack" { t.Fatalf("test bug: new (%#x) should be a stack pointer, not %s", new2, cls) } // This was a real failure.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Jun 05 22:33:52 UTC 2024 - 17.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
} runServerTestTLS12(t, test) } func TestHandshakeServerAES256GCMSHA384(t *testing.T) { test := &serverTest{ name: "RSA-AES256-GCM-SHA384", command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES256-GCM-SHA384"}, } runServerTestTLS12(t, test) } func TestHandshakeServerAES128SHA256(t *testing.T) { test := &serverTest{ name: "AES128-SHA256",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
cmd/encryption-v1.go
) const ( // SSECustomerKeySize is the size of valid client provided encryption keys in bytes. // Currently AWS supports only AES256. So the SSE-C key size is fixed to 32 bytes. SSECustomerKeySize = 32 // SSEIVSize is the size of the IV data SSEIVSize = 32 // 32 bytes // SSEDAREPackageBlockSize - SSE dare package block size.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 06:56:12 UTC 2024 - 37.1K bytes - Viewed (0)