Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 28 for encryptions (2.25 sec)

  1. src/main/java/jcifs/internal/smb2/nego/EncryptionNegotiateContext.java

    package jcifs.internal.smb2.nego;
    
    import jcifs.Configuration;
    import jcifs.internal.SMBProtocolDecodingException;
    import jcifs.internal.util.SMBUtil;
    
    /**
     * SMB2 Encryption Negotiate Context.
     *
     * This negotiate context is used in SMB 3.x to negotiate
     * encryption capabilities and cipher suites.
     *
     * @author mbechler
     */
    public class EncryptionNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse {
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 3.8K bytes
    - Viewed (0)
  2. README.md

    - Configurable: Min/max versions can be set via configuration properties
    
    ### SMB3 Encryption Support
    - **SMB2 Transform Header**: Encrypted message wrapping
    - **AES-CCM/GCM Support**: Both AES-128-CCM (SMB 3.0/3.0.2) and AES-128-GCM (SMB 3.1.1) cipher suites
    - **Encryption Context**: Per-session encryption state management
    - **Key Derivation**: SMB3 KDF implementation with dialect-specific parameters
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 09:24:52 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/smb2/Smb2TransformHeader.java

        /**
         * Gets the flags field which contains flags in SMB 3.1.1 or encryption algorithm ID in SMB 3.0/3.0.2
         *
         * @return the flags (SMB 3.1.1) or encryption algorithm (SMB 3.0/3.0.2)
         */
        public int getFlags() {
            return this.flags;
        }
    
        /**
         * Sets the flags field which contains flags in SMB 3.1.1 or encryption algorithm ID in SMB 3.0/3.0.2
         *
         * @param flags
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.1K bytes
    - Viewed (0)
  4. src/test/java/jcifs/config/SecurityConfigurationTest.java

        }
    
        /**
         * Test that encryption is properly configured
         */
        @Test
        public void testEncryptionConfiguration() throws CIFSException {
            BaseConfiguration config = new BaseConfiguration(true);
    
            // Verify encryption configuration is available (default is false for compatibility)
            // But can be enabled when needed
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 3.1K bytes
    - Viewed (0)
  5. src/main/java/jcifs/util/Crypto.java

            return new HMACT64(key);
        }
    
        /**
         * Get an RC4 cipher instance initialized with the specified key.
         * @param key the encryption key
         * @return RC4 cipher in encryption mode
         */
        public static Cipher getArcfour(final byte[] key) {
            try {
                final Cipher c = Cipher.getInstance("RC4");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.7K bytes
    - Viewed (0)
  6. src/main/java/jcifs/pac/PacSignature.java

        /**
         * Kerberos encryption type for ARCFOUR-HMAC (RC4-HMAC).
         */
        public static final int ETYPE_ARCFOUR_HMAC = 23;
        /**
         * Kerberos encryption type for AES-128 CTS mode with HMAC-SHA1-96.
         */
        public static final int ETYPE_AES128_CTS_HMAC_SHA1_96 = 17;
        /**
         * Kerberos encryption type for AES-256 CTS mode with HMAC-SHA1-96.
         */
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 3.4K bytes
    - Viewed (0)
  7. src/main/java/jcifs/internal/smb1/com/ServerData.java

        /**
         * Server's time zone offset in minutes from UTC.
         */
        public int serverTimeZone;
        /**
         * Length of the encryption key.
         */
        public int encryptionKeyLength;
        /**
         * Encryption key for password encryption.
         */
        public byte[] encryptionKey;
        /**
         * Server's globally unique identifier.
         */
        public byte[] guid;
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 2.9K bytes
    - Viewed (0)
  8. src/main/java/jcifs/pac/PacMac.java

    /**
     * Utility class for calculating and verifying PAC (Privilege Attribute Certificate) message authentication codes.
     * This class provides methods for computing MACs using various Kerberos encryption types including
     * ARCFOUR-HMAC-MD5 and AES-based HMAC algorithms.
     */
    public class PacMac {
    
        /**
         * Private constructor to prevent instantiation of utility class.
         */
        private PacMac() {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 9K bytes
    - Viewed (0)
  9. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

        /**
         * Test decrypt with an unsupported encryption type.
         */
        @Test
        void testDecryptUnsupportedType() {
            Key key = new KerberosKey(null, new byte[16], 99, 0);
            byte[] data = new byte[16];
            Exception exception = assertThrows(GeneralSecurityException.class, () -> KerberosEncData.decrypt(data, key, 99));
            assertEquals("Unsupported encryption type 99", exception.getMessage());
        }
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  10. src/test/java/jcifs/CIFSUnsupportedCryptoExceptionTest.java

        @DisplayName("Message constructor should handle crypto-specific error messages")
        @NullAndEmptySource
        @ValueSource(strings = { "AES encryption not supported", "Missing Bouncy Castle provider", "Invalid key length for AES-128",
                "RC4 cipher not available in this JVM", "DES encryption is deprecated and not supported", "HMAC-SHA256 algorithm not found",
                "RSA key generation failed: key size not supported" })
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 4.1K bytes
    - Viewed (0)
Back to top