Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for ECDH (0.03 sec)

  1. cmd/sftp-server.go

    	kexAlgoDH14SHA256             = "diffie-hellman-group14-sha256"
    	kexAlgoDH16SHA512             = "diffie-hellman-group16-sha512"
    	kexAlgoECDH256                = "ecdh-sha2-nistp256"
    	kexAlgoECDH384                = "ecdh-sha2-nistp384"
    	kexAlgoECDH521                = "ecdh-sha2-nistp521"
    	kexAlgoCurve25519SHA256LibSSH = "******@****.***"
    	kexAlgoCurve25519SHA256       = "curve25519-sha256"
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  2. samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt

              // Consuming server Certificate handshake message
              // Consuming server CertificateStatus handshake message
              // Found trusted certificate
              // Consuming ECDH ServerKeyExchange handshake message
              // Consuming ServerHelloDone handshake message
              // Produced ECDHE ClientKeyExchange handshake message
              // Produced client Finished handshake message
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat May 10 11:15:14 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  3. lib/fips140/v1.0.0.zip

    &PublicKey{curve: c.curve, q: bytes.Clone(key)}, nil } func ECDH[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { fipsSelfTest() fips140.RecordApproved() return ecdh(c, k, peer) } func ecdh[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { if c.curve != k.pub.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } if k.pub.curve != peer.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } // This applies the Shared Secret Computation...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top