Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 69 for encrypted (0.05 sec)

  1. src/test/java/jcifs/util/SecureCredentialStorageTest.java

            byte[] encrypted = storage.encryptCredentials(plaintext);
            assertNotNull(encrypted, "Encrypted long password should not be null");
            assertTrue(encrypted.length > plaintext.length, "Encrypted data should be larger due to IV and auth tag");
    
            char[] decrypted = storage.decryptCredentials(encrypted);
            assertArrayEquals(plaintext, decrypted, "Decrypted long password should match original");
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  2. src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java

            long sessionId = 0x123456789ABCDEF0L;
    
            // When - Encrypt
            byte[] encrypted = context.encryptMessage(plaintext, sessionId);
    
            // Then - Verify encrypted message structure
            assertNotNull(encrypted, "Encrypted message should not be null");
            assertTrue(encrypted.length > plaintext.length, "Encrypted message should be larger than plaintext");
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 44.1K bytes
    - Viewed (0)
  3. src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java

            assertNotNull(cryptographer);
    
            String plainText = "Hello, World!";
            String encrypted = cryptographer.encrypt(plainText);
            assertNotNull(encrypted);
            assertFalse(plainText.equals(encrypted));
    
            String decrypted = cryptographer.decrypt(encrypted);
            assertEquals(plainText, decrypted);
        }
    
        public void test_invertibleCryptography_withEmptyString() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  4. cmd/encryption-v1.go

    		return data, nil
    	}
    	if _, encrypted := crypto.IsEncrypted(o.UserDefined); encrypted {
    		decrypted, err := o.metadataDecrypter(h)("object-checksum", data)
    		if err != nil {
    			return nil, err
    		}
    		data = decrypted
    	}
    	return data, nil
    }
    
    // metadataEncryptFn provides an encryption function for metadata.
    // Will return nil, nil if unencrypted.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 37.8K bytes
    - Viewed (0)
  5. cmd/encryption-v1_test.go

    	for i, test := range decryptObjectMetaTests {
    		if encrypted, err := DecryptObjectInfo(&test.info, test.request); err != test.expErr {
    			t.Errorf("Test %d: Decryption returned wrong error code: got %d , want %d", i, err, test.expErr)
    		} else if _, enc := crypto.IsEncrypted(test.info.UserDefined); encrypted && enc != encrypted {
    			t.Errorf("Test %d: Decryption thinks object is encrypted but it is not", i)
    		} else if !encrypted && enc != encrypted {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 19.9K bytes
    - Viewed (0)
  6. src/main/java/org/codelibs/core/crypto/CachedCipher.java

        /**
         * Encrypts the given data.
         *
         * @param data
         *            the data to encrypt
         * @return the encrypted data
         */
        public byte[] encrypto(final byte[] data) {
            final Cipher cipher = pollEncryptoCipher();
            byte[] encrypted;
            try {
                encrypted = cipher.doFinal(data);
            } catch (final IllegalBlockSizeException e) {
    Registered: Fri Sep 05 20:58:11 UTC 2025
    - Last Modified: Sat Jul 05 00:11:05 UTC 2025
    - 11.5K bytes
    - Viewed (0)
  7. src/test/java/org/codelibs/fess/helper/RoleQueryHelperTest.java

            Set<String> roleSet;
            boolean encrypted;
            String value;
    
            encrypted = false;
            value = "";
            roleSet = decodedRoleList(roleQueryHelperImpl, value, encrypted);
            assertEquals(0, roleSet.size());
    
            encrypted = false;
            value = "role1";
            roleSet = decodedRoleList(roleQueryHelperImpl, value, encrypted);
            assertEquals(0, roleSet.size());
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 19 23:49:30 UTC 2025
    - 28.5K bytes
    - Viewed (0)
  8. docs/site-replication/run-ssec-object-replication.sh

    	exit_1
    fi
    
    # Stat the SSEC objects from source site
    echo "Stat minio1/test-bucket/encrypted"
    ./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json
    stat_out1=$(./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json)
    src_obj1_etag=$(echo "${stat_out1}" | jq '.etag')
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  9. docs/en/docs/deployment/https.md

    * Nginx
    * HAProxy
    
    ## Let's Encrypt { #lets-encrypt }
    
    Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties.
    
    The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive.
    
    But then **<a href="https://letsencrypt.org/" class="external-link" target="_blank">Let's Encrypt</a>** was created.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  10. docs/security/README.md

    
    1a) Send encrypted data key and master key ID to KMS.
    1b) Receive decrypted data key.
    2)  Decrypt encrypted object key with the KEK derived from the data key.
    3a) Receive new plain data key from the KMS using the master key ID of the server config.
    3b) Receive encrypted form of the data key from the KMS.
    4)  Derive a new KEK from the new data key and re-encrypt the OEK with it.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
Back to top