Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for New256 (0.04 sec)

  1. src/test/java/jcifs/pac/PacMacTest.java

            assertNotNull(derivedKey);
            assertEquals(16, derivedKey.length);
    
            // Test with a different key size
            KerberosKey key256 = new KerberosKey(TEST_PRINCIPAL, new byte[32], PacSignature.ETYPE_AES256_CTS_HMAC_SHA1_96, 0);
            byte[] derivedKey256 = PacMac.deriveKeyAES(key256, constant);
            assertNotNull(derivedKey256);
            assertEquals(32, derivedKey256.length);
        }
    
        /**
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  2. docs/sts/client-grants.py

                                      ExtraArgs={'ServerSideEncryption': 'AES256'})
    
    # Upload with server side encryption, using temporary credentials
    s3.meta.client.upload_file('/etc/hosts',
                               'testbucket',
                               'hosts',
                               ExtraArgs={'ServerSideEncryption': 'AES256'})
    
    # Download encrypted object using temporary credentials
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 1.2K bytes
    - Viewed (0)
  3. docs/tls/README.md

    ```
    read EC key
    writing EC key
    ```
    
    Alternatively, use the following command to generate a private ECDSA key protected by a password:
    
    ```sh
    openssl ecparam -genkey -name prime256v1 | openssl ec -aes256 -out private.key -passout pass:PASSWORD
    ```
    
    #### 3.2.2 Generate a private key with RSA
    
    Use the following command to generate a private key with RSA:
    
    ```sh
    openssl genrsa -out private.key 2048
    ```
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  4. cmd/generic-handlers_test.go

    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: false, ShouldFail: true}, // 1
    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: true, ShouldFail: false}, // 2
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  5. docs/ftp/README.md

    ```
    
    `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. 
    If unspecified then a sensible default is used.
    
    Valid values: 
    ```
    aes128-ctr
    aes192-ctr
    aes256-ctr
    ******@****.***
    aes256******@****.***
    ******@****.***
    arcfour256
    arcfour128
    arcfour
    aes128-cbc
    3des-cbc
    ```
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  6. cmd/bucket-encryption_test.go

    		shouldPass  bool
    	}{
    		// MinIO supported XML
    		{
    			inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
    			<Rule>
    			<ApplyServerSideEncryptionByDefault>
    			<SSEAlgorithm>AES256</SSEAlgorithm>
    			</ApplyServerSideEncryptionByDefault>
    			</Rule>
    			</ServerSideEncryptionConfiguration>`,
    			expectedErr: nil,
    			shouldPass:  true,
    		},
    		// Unsupported XML
    		{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri May 14 07:59:05 UTC 2021
    - 2.1K bytes
    - Viewed (0)
  7. docs/kms/README.md

    ```
    
    ```
    mc stat myminio/bucket/test.file
    Name      : test.file
    ...
    Encrypted :
      X-Amz-Server-Side-Encryption: AES256
    ```
    
    ## Encrypted Private Key
    
    MinIO supports encrypted KES client private keys. Therefore, you can use
    an password-protected private keys for `MINIO_KMS_KES_KEY_FILE`.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.2K bytes
    - Viewed (0)
Back to top