- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 259 for keylen (0.2 sec)
-
src/crypto/hmac/hmac_test.go
}, []byte("Sample message for keylen=blocklen"), "5fd596ee78d5553c8ff4e72d266dfd192366da29", sha1.Size, sha1.BlockSize, }, { sha1.New, []byte{ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, }, []byte("Sample message for keylen<blocklen"), "4c99ff0cb1b31bd33f8431dbaf4d17fcd356a807",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Nov 18 18:38:14 UTC 2020 - 21.8K bytes - Viewed (0) -
src/crypto/tls/prf.go
clientMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] serverMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] clientKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] serverKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] clientIV = keyMaterial[:ivLen] keyMaterial = keyMaterial[ivLen:] serverIV = keyMaterial[:ivLen] return }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Nov 21 16:29:49 UTC 2023 - 9.2K bytes - Viewed (0) -
src/net/http/fcgi/child.go
text := r.rawParams r.rawParams = nil for len(text) > 0 { keyLen, n := readSize(text) if n == 0 { return } text = text[n:] valLen, n := readSize(text) if n == 0 { return } text = text[n:] if int(keyLen)+int(valLen) > len(text) { return } key := readString(text, keyLen) text = text[keyLen:] val := readString(text, valLen) text = text[valLen:]
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Jan 10 03:29:50 UTC 2024 - 10.3K bytes - Viewed (0) -
src/crypto/tls/prf_test.go
clientRandom, serverRandom string masterSecret string clientMAC, serverMAC string clientKey, serverKey string macLen, keyLen int contextKeyingMaterial, noContextKeyingMaterial string } func TestKeysFromPreMasterSecret(t *testing.T) { for i, test := range testKeysFromTests {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Aug 27 22:24:05 UTC 2019 - 5.7K bytes - Viewed (0) -
src/strings/replace.go
// Iterate down the trie to the end, and grab the value and keylen with // the highest priority. bestPriority := 0 node := &r.root n := 0 for node != nil { if node.priority > bestPriority && !(ignoreRoot && node == &r.root) { bestPriority = node.priority val = node.value keylen = n found = true } if s == "" {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:10:31 UTC 2023 - 14.5K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
if !bytes.Equal(oldRootKeyPem, newRootKeyPem) { t.Errorf("private key should not change") } keyLen, err := getPublicKeySizeInBits(newRootKeyPem) if err != nil { t.Errorf("failed to parse private key: %v", err) } if keyLen != caKeySize { t.Errorf("Public key size should not change, (got %d) vs (expected %d)", keyLen, caKeySize) } oldRootCert, _ := ParsePemEncodedCertificate(oldRootCertPem)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0) -
src/crypto/tls/key_schedule.go
} // trafficKey generates traffic keys according to RFC 8446, Section 7.3. func (c *cipherSuiteTLS13) trafficKey(trafficSecret []byte) (key, iv []byte) { key = c.expandLabel(trafficSecret, "key", nil, c.keyLen) iv = c.expandLabel(trafficSecret, "iv", nil, aeadNonceLength) return } // finishedHash generates the Finished verify_data or PskBinderEntry according
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 6.5K bytes - Viewed (0) -
src/crypto/tls/cipher_suites.go
// mechanism, as well as the cipher+MAC pair or the AEAD. type cipherSuite struct { id uint16 // the lengths, in bytes, of the key material needed for each component. keyLen int macLen int ivLen int ka func(version uint16) keyAgreement // flags is a bitmask of the suite* values, above. flags int cipher func(key, iv []byte, isRead bool) any
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 25.5K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
c := hs.c clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV := keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen) var clientCipher, serverCipher any var clientHash, serverHash hash.Hash if hs.suite.aead == nil { clientCipher = hs.suite.cipher(clientKey, clientIV, true /* for reading */)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
c := hs.c clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV := keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen) var clientCipher, serverCipher any var clientHash, serverHash hash.Hash if hs.suite.cipher != nil { clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0)