Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ECDH (0.04 sec)

  1. docs/ftp/README.md

    ssh-dss
    ```
    
    `--sftp=kex-algos=...` specifies the supported key-exchange algorithms in preference order.
    
    Valid values: 
    
    ```
    curve25519-sha256
    ******@****.***
    ecdh-sha2-nistp256
    ecdh-sha2-nistp384
    ecdh-sha2-nistp521
    diffie-hellman-group14-sha256
    diffie-hellman-group16-sha512
    diffie-hellman-group14-sha1
    diffie-hellman-group1-sha1
    ```
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  2. cmd/sftp-server.go

    	kexAlgoDH14SHA256             = "diffie-hellman-group14-sha256"
    	kexAlgoDH16SHA512             = "diffie-hellman-group16-sha512"
    	kexAlgoECDH256                = "ecdh-sha2-nistp256"
    	kexAlgoECDH384                = "ecdh-sha2-nistp384"
    	kexAlgoECDH521                = "ecdh-sha2-nistp521"
    	kexAlgoCurve25519SHA256LibSSH = "******@****.***"
    	kexAlgoCurve25519SHA256       = "curve25519-sha256"
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  3. samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt

              // Consuming server Certificate handshake message
              // Consuming server CertificateStatus handshake message
              // Found trusted certificate
              // Consuming ECDH ServerKeyExchange handshake message
              // Consuming ServerHelloDone handshake message
              // Produced ECDHE ClientKeyExchange handshake message
              // Produced client Finished handshake message
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat May 10 11:15:14 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  4. lib/fips140/v1.0.0.zip

    &PublicKey{curve: c.curve, q: bytes.Clone(key)}, nil } func ECDH[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { fipsSelfTest() fips140.RecordApproved() return ecdh(c, k, peer) } func ecdh[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { if c.curve != k.pub.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } if k.pub.curve != peer.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } // This applies the Shared Secret Computation...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top