- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 169 for cipher (0.15 sec)
-
src/crypto/tls/common.go
InsecureSkipVerify bool // CipherSuites is a list of enabled TLS 1.0–1.2 cipher suites. The order of // the list is ignored. Note that TLS 1.3 ciphersuites are not configurable. // // If CipherSuites is nil, a safe default list is used. The default cipher // suites might change over time. In Go 1.22 RSA key exchange based cipher // suites were removed from the default list, but can be re-added with the
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving.go
tlsCipherPreferredValues := cliflag.PreferredTLSCipherNames() tlsCipherInsecureValues := cliflag.InsecureTLSCipherNames() fs.StringSliceVar(&s.CipherSuites, "tls-cipher-suites", s.CipherSuites, "Comma-separated list of cipher suites for the server. "+ "If omitted, the default Go cipher suites will be used. \n"+ "Preferred values: "+strings.Join(tlsCipherPreferredValues, ", ")+". \n"+
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 13:08:18 UTC 2024 - 15.9K bytes - Viewed (0) -
docs/ftp/README.md
ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 ``` `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. If unspecified then a sensible default is used. Valid values: ``` aes128-ctr aes192-ctr aes256-ctr ******@****.*** ******@****.***
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
if hs.suite != nil && selectedSuite != hs.suite { c.sendAlert(alertIllegalParameter) return errors.New("tls: server changed cipher suite after a HelloRetryRequest") } if selectedSuite == nil { c.sendAlert(alertIllegalParameter) return errors.New("tls: server chose an unconfigured cipher suite") } hs.suite = selectedSuite c.cipherSuite = hs.suite.id return nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0) -
doc/godebug.md
The [`jstmpllitinterp` setting](/pkg/html/template#hdr-Security_Model) no longer has any effect. Go 1.23 changed the default TLS cipher suites used by clients and servers when not explicitly configured, removing 3DES cipher suites. The default can be reverted using the [`tls3des` setting](/pkg/crypto/tls/#Config.CipherSuites).
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 30 17:52:17 UTC 2024 - 15.9K bytes - Viewed (0) -
maven-settings-builder/pom.xml
<dependency> <groupId>org.codehaus.plexus</groupId> <artifactId>plexus-sec-dispatcher</artifactId> </dependency> <dependency> <groupId>org.codehaus.plexus</groupId> <artifactId>plexus-cipher</artifactId> </dependency> <dependency> <groupId>javax.inject</groupId> <artifactId>javax.inject</artifactId> <scope>provided</scope> </dependency> <dependency>
Registered: Wed Jun 12 09:55:16 UTC 2024 - Last Modified: Wed May 22 14:07:09 UTC 2024 - 4.2K bytes - Viewed (0) -
pom.xml
<excludes> <exclude>org.sonatype.plexus:plexus-sec-dispatcher</exclude> <exclude>org.sonatype.plexus:plexus-cipher</exclude> </excludes> <message>ensure no more org.sonatype.plexus:plexus-cipher and org.sonatype.plexus:plexus-sec-dispatcher.</message> </bannedDependencies> </rules> <fail>true</fail>
Registered: Wed Jun 12 09:55:16 UTC 2024 - Last Modified: Tue Jun 11 09:13:34 UTC 2024 - 33.9K bytes - Viewed (0) -
maven-embedder/pom.xml
<dependency> <groupId>org.codehaus.plexus</groupId> <artifactId>plexus-sec-dispatcher</artifactId> </dependency> <dependency> <groupId>org.codehaus.plexus</groupId> <artifactId>plexus-cipher</artifactId> </dependency> <dependency> <groupId>org.codehaus.plexus</groupId> <artifactId>plexus-interpolation</artifactId> </dependency> <dependency>
Registered: Wed Jun 12 09:55:16 UTC 2024 - Last Modified: Tue Jun 11 09:06:12 UTC 2024 - 6.5K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa.go
if err != nil { return nil, err } // Create a CSPRNG that xors a stream of zeros with // the output of the AES-CTR instance. const aesIV = "IV for ECDSA CTR" return &cipher.StreamReader{ R: zeroReader, S: cipher.NewCTR(block, []byte(aesIV)), }, nil } type zr struct{} var zeroReader = zr{} // Read replaces the contents of dst with zeros. It is safe for concurrent use.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 20.4K bytes - Viewed (0) -
pilot/pkg/bootstrap/server_test.go
name string serverCipherSuites []uint16 clientCipherSuites []uint16 expectSuccess bool }{ { name: "default cipher suites", expectSuccess: true, }, { name: "client and istiod cipher suites match", serverCipherSuites: []uint16{tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256},
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 17:48:28 UTC 2024 - 23.1K bytes - Viewed (0)