- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 37 for new256 (2.14 sec)
-
src/crypto/tls/testdata/Client-TLSv12-ClientCert-RSA-AES256-GCM-SHA384
Roland Shoemaker <******@****.***> 1715710936 -0700
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:38 UTC 2024 - 10.4K bytes - Viewed (0) -
docs/kms/README.md
``` ``` mc stat myminio/bucket/test.file Name : test.file ... Encrypted : X-Amz-Server-Side-Encryption: AES256 ``` ## Encrypted Private Key MinIO supports encrypted KES client private keys. Therefore, you can use an password-protected private keys for `MINIO_KMS_KES_KEY_FILE`.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 7.1K bytes - Viewed (0) -
src/runtime/gc_test.go
// further move the stack. new2 := uintptr(unsafe.Pointer(new)) t.Logf("old stack pointer %x, new stack pointer %x", old, new2) if new2 == old { // Check that we didn't screw up the test's escape analysis. if cls := runtime.GCTestPointerClass(unsafe.Pointer(new)); cls != "stack" { t.Fatalf("test bug: new (%#x) should be a stack pointer, not %s", new2, cls) } // This was a real failure.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Jun 05 22:33:52 UTC 2024 - 17.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
} runServerTestTLS12(t, test) } func TestHandshakeServerAES256GCMSHA384(t *testing.T) { test := &serverTest{ name: "RSA-AES256-GCM-SHA384", command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES256-GCM-SHA384"}, } runServerTestTLS12(t, test) } func TestHandshakeServerAES128SHA256(t *testing.T) { test := &serverTest{ name: "AES128-SHA256",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
src/crypto/tls/handshake_client_test.go
args: []string{"-cipher", "AES128-GCM-SHA256"}, } runClientTestTLS12(t, test) } func TestHandshakeClientRSAAES256GCM(t *testing.T) { test := &clientTest{ name: "AES256-GCM-SHA384", args: []string{"-cipher", "AES256-GCM-SHA384"}, } runClientTestTLS12(t, test) } func TestHandshakeClientECDHERSAAES(t *testing.T) { test := &clientTest{ name: "ECDHE-RSA-AES",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 88.7K bytes - Viewed (0) -
internal/http/headers.go
AmzServerSideEncryptionCopyCustomerKeyMD5 = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5" AmzEncryptionAES = "AES256" AmzEncryptionKMS = "aws:kms" // Signature v2 related constants AmzSignatureV2 = "Signature" AmzAccessKeyID = "AWSAccessKeyId" // Response request id. AmzRequestID = "x-amz-request-id"
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Mar 28 17:44:56 UTC 2024 - 10.4K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
func (r *Config) Validate(ctx context.Context, arn arn.ARN, token, accessToken, dsecs string, claims map[string]interface{}) error { jp := new(jwtgo.Parser) jp.ValidMethods = []string{ "RS256", "RS384", "RS512", "ES256", "ES384", "ES512", "HS256", "HS384", "HS512", "RS3256", "RS3384", "RS3512", "ES3256", "ES3384", "ES3512", } keyFuncCallback := func(jwtToken *jwtgo.Token) (interface{}, error) {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 30 18:10:41 UTC 2024 - 8.3K bytes - Viewed (0) -
pkg/serviceaccount/jwt.go
} return signer, nil } func signerFromECDSAPrivateKey(keyPair *ecdsa.PrivateKey) (jose.Signer, error) { var alg jose.SignatureAlgorithm switch keyPair.Curve { case elliptic.P256(): alg = jose.ES256 case elliptic.P384(): alg = jose.ES384 case elliptic.P521(): alg = jose.ES512 default: return nil, fmt.Errorf("unknown private key curve, must be 256, 384, or 521") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 10.7K bytes - Viewed (0) -
pilot/pkg/networking/core/gateway_test.go
CipherSuites: []string{"ECDHE-ECDSA-AES128-SHA", "ECDHE-RSA-AES256-GCM-SHA384"}, }, }, result: &auth.DownstreamTlsContext{ CommonTlsContext: &auth.CommonTlsContext{ TlsParams: &auth.TlsParameters{ EcdhCurves: []string{"P-256", "P-384"}, CipherSuites: []string{"ECDHE-ECDSA-AES128-SHA", "ECDHE-RSA-AES256-GCM-SHA384"}, }, AlpnProtocols: util.ALPNHttp,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 144K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_test.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:58 UTC 2024 - 13.5K bytes - Viewed (0)