Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for Encap (0.22 sec)

  1. src/crypto/internal/hpke/hpke_test.go

    			encap, context, err := SetupSender(
    				uint16(kemID),
    				uint16(kdfID),
    				uint16(aeadID),
    				pub,
    				info,
    			)
    			if err != nil {
    				t.Fatal(err)
    			}
    
    			expectedEncap := mustDecodeHex(t, setup["enc"])
    			if !bytes.Equal(encap, expectedEncap) {
    				t.Errorf("unexpected encapsulated key, got: %x, want %x", encap, expectedEncap)
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  2. pilot/pkg/networking/core/cluster_waypoint.go

    	// Creates "main_internal" cluster to route to the main internal listener.
    	// Creates "encap" cluster to route to the encap listener.
    	clusters = append(clusters, MainInternalCluster, EncapCluster)
    	// Creates per-VIP load balancing upstreams.
    	clusters = append(clusters, cb.buildWaypointInboundVIP(proxy, svcs)...)
    	// Upstream of the "encap" listener.
    	clusters = append(clusters, cb.buildWaypointConnectOriginate(proxy, push))
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 9K bytes
    - Viewed (0)
  3. src/crypto/internal/hpke/hpke.go

    	eaePRK := dh.kdf.LabeledExtract(dh.suiteID[:], nil, "eae_prk", dhKey)
    	return dh.kdf.LabeledExpand(dh.suiteID[:], eaePRK, "shared_secret", kemContext, dh.nSecret)
    }
    
    func (dh *dhKEM) Encap(pubRecipient *ecdh.PublicKey) (sharedSecret []byte, encapPub []byte, err error) {
    	var privEph *ecdh.PrivateKey
    	if testingOnlyGenerateKey != nil {
    		privEph, err = testingOnlyGenerateKey()
    	} else {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 7K bytes
    - Viewed (0)
  4. pilot/pkg/networking/core/waypoint.go

    	ConnectOriginate = "connect_originate"
    
    	// EncapClusterName is the name of the cluster used for traffic to the connect_originate listener.
    	EncapClusterName = "encap"
    
    	// ConnectUpgradeType is the type of upgrade for HTTP CONNECT.
    	ConnectUpgradeType = "CONNECT"
    )
    
    type waypointServices struct {
    	services        map[host.Name]*model.Service
    	orderedServices []*model.Service
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 3.8K bytes
    - Viewed (0)
  5. pilot/pkg/networking/core/listener_waypoint.go

    				xdsfilters.ConnectAuthorityNetworkFilter,
    			},
    				lb.buildInboundNetworkFilters(cc)...),
    			Name: "direct-tcp",
    		}
    		// TODO: maintains undesirable persistent HTTP connections to "encap"
    		httpChain := &listener.FilterChain{
    			Filters: append([]*listener.Filter{
    				xdsfilters.ConnectAuthorityNetworkFilter,
    			},
    				lb.buildWaypointInboundHTTPFilters(nil, cc)...),
    			Name: "direct-http",
    		}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  6. internal/grid/grid_test.go

    		t.Error("expected context.Canceled, got", err)
    	}
    }
    
    // testServerStreamNoPing will test if server and client handle no pings.
    func testServerStreamNoPing(t *testing.T, local, remote *Manager, inCap int) {
    	defer testlogger.T.SetErrorTB(t)()
    	errFatal := func(err error) {
    		t.Helper()
    		if err != nil {
    			t.Fatal(err)
    		}
    	}
    
    	// We fake a local and remote server.
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 07 15:51:52 UTC 2024
    - 36.4K bytes
    - Viewed (0)
Back to top