- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 76 for CipherSuites (0.3 sec)
-
pilot/pkg/bootstrap/server.go
err := peerCertVerifier.VerifyPeerCert(rawCerts, verifiedChains) if err != nil { log.Infof("Could not verify certificate: %v", err) } return err }, MinVersion: tls.VersionTLS12, CipherSuites: args.ServerOptions.TLSOptions.CipherSuits, } // Compliance for xDS server TLS. sec_model.EnforceGoCompliance(cfg) tlsCreds := credentials.NewTLS(cfg)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 17:48:28 UTC 2024 - 46.3K bytes - Viewed (0) -
pkg/config/validation/validation.go
if len(tls.CipherSuites) == 0 { v = AppendWarningf(v, "TLS version below TLSV1_2 require setting compatible ciphers as by default they no longer include compatible ciphers.") } } invalidCiphers := sets.New[string]() validCiphers := sets.New[string]() duplicateCiphers := sets.New[string]() for _, cs := range tls.CipherSuites { if !security.IsValidCipherSuite(cs) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 04:03:33 UTC 2024 - 107.2K bytes - Viewed (0) -
cmd/kubelet/app/server.go
klog.InfoS("Warning: TLS 1.3 cipher suites are not configurable, ignoring --tls-cipher-suites") } } tlsOptions := &server.TLSOptions{ Config: &tls.Config{ MinVersion: minTLSVersion, CipherSuites: tlsCipherSuites, }, CertFile: kc.TLSCertFile, KeyFile: kc.TLSPrivateKeyFile, } if len(kc.Authentication.X509.ClientCAFile) > 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 00:05:34 UTC 2024 - 53.9K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/crd-all.gen.yaml
the certificate revocation list (CRL) to use in verifying a presented client side certificate.' type: string cipherSuites: description: 'Optional: If specified, only support the specified cipher list.' items: type: string
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 21:31:42 UTC 2024 - 671.7K bytes - Viewed (0) -
manifests/charts/base/crds/crd-all.gen.yaml
the certificate revocation list (CRL) to use in verifying a presented client side certificate.' type: string cipherSuites: description: 'Optional: If specified, only support the specified cipher list.' items: type: string
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 21:31:42 UTC 2024 - 671.6K bytes - Viewed (0) -
src/net/http/client_test.go
ts := newClientServerTest(t, mode, HandlerFunc(func(w ResponseWriter, r *Request) { w.Write([]byte("Hello")) })).ts c := ts.Client() tr := c.Transport.(*Transport) tr.TLSClientConfig.CipherSuites = []uint16{tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} tr.TLSClientConfig.MaxVersion = tls.VersionTLS12 // to get to pick the cipher suite tr.Dial = func(netw, addr string) (net.Conn, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 63.8K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/output/all_on.golden-show-in-gh-pull-request.yaml
caCertificates: description: REQUIRED if mode is `MUTUAL` or `OPTIONAL_MUTUAL`. type: string cipherSuites: description: 'Optional: If specified, only support the specified cipher list.' items: type: string
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 506.8K bytes - Viewed (0) -
pilot/pkg/config/kube/gateway/conversion.go
if tls == nil { return nil, nil } // Explicitly not supported: file mounted // Not yet implemented: TLS mode, https redirect, max protocol version, SANs, CipherSuites, VerifyCertificate out := &istio.ServerTLSSettings{ HttpsRedirect: false, } mode := k8s.TLSModeTerminate if tls.Mode != nil { mode = *tls.Mode } namespace := gw.Namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 84.7K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/CallTest.kt
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Wed Apr 10 19:46:48 UTC 2024 - 142.5K bytes - Viewed (0) -
src/net/http/h2_bundle.go
s.TLSConfig = new(tls.Config) } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 { // If they already provided a TLS 1.0–1.2 CipherSuite list, return an // error if it is missing ECDHE_RSA_WITH_AES_128_GCM_SHA256 or // ECDHE_ECDSA_WITH_AES_128_GCM_SHA256. haveRequired := false for _, cs := range s.TLSConfig.CipherSuites { switch cs {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 364.1K bytes - Viewed (0)