Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 435 for cipher (0.23 sec)

  1. src/crypto/cipher/io.go

    // Copyright 2010 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    package cipher
    
    import "io"
    
    // The Stream* objects are so simple that all their members are public. Users
    // can create them themselves.
    
    // StreamReader wraps a [Stream] into an [io.Reader]. It calls XORKeyStream
    // to process each slice of data which passes through.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 1.5K bytes
    - Viewed (0)
  2. src/crypto/des/const.go

    	30, 48, 40, 49, 29, 36, 43, 54,
    	15, 4, 25, 19, 9, 1, 26, 16,
    	5, 11, 23, 8, 12, 7, 17, 0,
    	22, 3, 10, 14, 6, 20, 27, 24,
    }
    
    // 8 S-boxes composed of 4 rows and 16 columns
    // Used in the DES cipher function
    var sBoxes = [8][4][16]uint8{
    	// S-box 1
    	{
    		{14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7},
    		{0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 04 12:31:18 UTC 2017
    - 4.5K bytes
    - Viewed (0)
  3. pilot/pkg/security/authn/utils/utils.go

    		ctx.CommonTlsContext.AlpnProtocols = util.ALPNHttp
    	}
    	ciphers := SupportedCiphers
    	if mc != nil && mc.MeshMTLS != nil && mc.MeshMTLS.CipherSuites != nil {
    		ciphers = mc.MeshMTLS.CipherSuites
    	}
    	// Set Minimum TLS version to match the default client version and allowed strong cipher suites for sidecars.
    	ctx.CommonTlsContext.TlsParams = &tls.TlsParameters{
    		CipherSuites:              ciphers,
    		TlsMinimumProtocolVersion: minTLSVersion,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 00:16:21 UTC 2024
    - 3.8K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb/NtlmContext.java

        private byte[] type1Bytes;
    
        private byte[] signKey;
        private byte[] verifyKey;
        private byte[] sealClientKey;
        private byte[] sealServerKey;
    
        private Cipher sealClientHandle;
        private Cipher sealServerHandle;
    
    
        /**
         * @param tc
         *            context to use
         * @param auth
         *            credentials
         * @param doSigning
    Registered: Wed Jun 12 15:45:55 UTC 2024
    - Last Modified: Tue Jul 07 12:07:20 UTC 2020
    - 15.7K bytes
    - Viewed (0)
  5. staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/secretbox/secretbox.go

    	"k8s.io/apiserver/pkg/storage/value"
    )
    
    // secretbox implements at rest encryption of the provided values given a 32 byte secret key.
    // Uses a standard 24 byte nonce (placed at the beginning of the cipher text) generated
    // from crypto/rand. Does not perform authentication of the data at rest.
    type secretboxTransformer struct {
    	key [32]byte
    }
    
    const nonceSize = 24
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Feb 17 16:31:31 UTC 2022
    - 2.3K bytes
    - Viewed (0)
  6. docs/changelogs/changelog_3x.md

        cipher suite. We accidentally specified a key size of 256, preventing that cipher suite from
        being selected for any TLS handshakes. We didn't notice because this cipher suite isn't
        supported on Android, Java, or Conscrypt.
    
        We removed this cipher suite and `TLS_AES_128_CCM_SHA256` from the restricted, modern, and
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Sun Feb 06 14:55:54 UTC 2022
    - 50.8K bytes
    - Viewed (0)
  7. pkg/test/echo/fields.go

    	ActiveRequestsField   Field = "ActiveRequests"
    	DNSProtocolField      Field = "Protocol"
    	DNSQueryField         Field = "Query"
    	DNSServerField        Field = "DnsServer"
    	CipherField           Field = "Cipher"
    	TLSVersionField       Field = "Version"
    	TLSServerName         Field = "ServerName"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 23 16:20:31 UTC 2023
    - 2.9K bytes
    - Viewed (0)
  8. src/crypto/tls/common.go

    	InsecureSkipVerify bool
    
    	// CipherSuites is a list of enabled TLS 1.0–1.2 cipher suites. The order of
    	// the list is ignored. Note that TLS 1.3 ciphersuites are not configurable.
    	//
    	// If CipherSuites is nil, a safe default list is used. The default cipher
    	// suites might change over time. In Go 1.22 RSA key exchange based cipher
    	// suites were removed from the default list, but can be re-added with the
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  9. okhttp-testing-support/src/main/kotlin/okhttp3/OkHttpClientTestRule.kt

                "trustStore is",
                "Reload the trust store",
                "Reload trust certs",
                "Reloaded",
                "adding as trusted certificates",
                "Ignore disabled cipher suite",
                "Ignore unsupported cipher suite",
              ).joinToString(separator = "|"),
            )
            append(").*")
          },
        )
    
      private val testLogHandler =
        object : Handler() {
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apiserver/pkg/server/options/serving.go

    	tlsCipherPreferredValues := cliflag.PreferredTLSCipherNames()
    	tlsCipherInsecureValues := cliflag.InsecureTLSCipherNames()
    	fs.StringSliceVar(&s.CipherSuites, "tls-cipher-suites", s.CipherSuites,
    		"Comma-separated list of cipher suites for the server. "+
    			"If omitted, the default Go cipher suites will be used. \n"+
    			"Preferred values: "+strings.Join(tlsCipherPreferredValues, ", ")+". \n"+
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Apr 27 13:08:18 UTC 2024
    - 15.9K bytes
    - Viewed (0)
Back to top