- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 95 for _encrypted (0.1 sec)
-
tests/update_test.go
return nil } type Token struct { UserID int `gorm:"primary_key"` Content string `gorm:"type:varchar(100)"` } func (t *Token) BeforeSave(tx *gorm.DB) error { t.Content += "_encrypted" return nil } func TestSaveWithHooks(t *testing.T) { DB.Migrator().DropTable(&Token{}, &TokenOwner{}) DB.AutoMigrate(&Token{}, &TokenOwner{})
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Jul 21 02:46:58 UTC 2025 - 30.4K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java
long sessionId = 0x123456789ABCDEF0L; // When - Encrypt byte[] encrypted = context.encryptMessage(plaintext, sessionId); // Then - Verify encrypted message structure assertNotNull(encrypted, "Encrypted message should not be null"); assertTrue(encrypted.length > plaintext.length, "Encrypted message should be larger than plaintext");
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 44.1K bytes - Viewed (0) -
src/test/java/jcifs/util/SecureCredentialStorageTest.java
byte[] encrypted = storage.encryptCredentials(plaintext); assertNotNull(encrypted, "Encrypted long password should not be null"); assertTrue(encrypted.length > plaintext.length, "Encrypted data should be larger due to IV and auth tag"); char[] decrypted = storage.decryptCredentials(encrypted); assertArrayEquals(plaintext, decrypted, "Decrypted long password should match original");
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
cmd/encryption-v1.go
return data, nil } if _, encrypted := crypto.IsEncrypted(o.UserDefined); encrypted { decrypted, err := o.metadataDecrypter(h)("object-checksum", data) if err != nil { return nil, err } data = decrypted } return data, nil } // metadataEncryptFn provides an encryption function for metadata. // Will return nil, nil if unencrypted.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 37.8K bytes - Viewed (0) -
cmd/encryption-v1_test.go
for i, test := range decryptObjectMetaTests { if encrypted, err := DecryptObjectInfo(&test.info, test.request); err != test.expErr { t.Errorf("Test %d: Decryption returned wrong error code: got %d , want %d", i, err, test.expErr) } else if _, enc := crypto.IsEncrypted(test.info.UserDefined); encrypted && enc != encrypted { t.Errorf("Test %d: Decryption thinks object is encrypted but it is not", i) } else if !encrypted && enc != encrypted {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 19.9K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* The contents are **encrypted**, even though they are being sent with the **HTTP protocol**.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java
assertNotNull(cryptographer); String plainText = "Hello, World!"; String encrypted = cryptographer.encrypt(plainText); assertNotNull(encrypted); assertFalse(plainText.equals(encrypted)); String decrypted = cryptographer.decrypt(encrypted); assertEquals(plainText, decrypted); } public void test_invertibleCryptography_withEmptyString() {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 12.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2TransformHeader.java
} /** * Gets the signature or authentication tag for the encrypted message * * @return the signature/authentication tag */ public byte[] getSignature() { return this.signature; } /** * Sets the signature or authentication tag for the encrypted message * * @param signature * the signature/authentication tag to set
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.1K bytes - Viewed (0) -
docs/security/README.md
- Delete one/some master keys. From a security standpoint, this is equal to erasing all SSE-S3 encrypted objects protected by these master keys. All these objects are lost forever as they cannot be decrypted. Especially deleting all master keys at the KMS is equivalent to secure erasing all SSE-S3 encrypted objects.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
src/test/java/jcifs/util/CryptoTest.java
byte[] encrypted = cipher.doFinal(plaintext); cipher.init(Cipher.DECRYPT_MODE, keySpec, ivSpec); byte[] decrypted = cipher.doFinal(encrypted); // Then assertNotNull(encrypted); assertNotNull(decrypted); assertArrayEquals(plaintext, decrypted); assertNotEquals(new String(plaintext), new String(encrypted)); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.4K bytes - Viewed (0)