Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 12 for AES256 (0.05 sec)

  1. cmd/encryption-v1_test.go

    			xhttp.AmzServerSideEncryptionCustomerAlgorithm: "AES256",
    			xhttp.AmzServerSideEncryptionCustomerKey:       "XAm0dRrJsEsyPb1UuFNezv1bl9hxuYsgUVC/MUctE2k=",
    			xhttp.AmzServerSideEncryptionCustomerKeyMD5:    "bY4wkxQejw9mUJfo72k53A==",
    		},
    		metadata: map[string]string{},
    	},
    	{
    		header: map[string]string{
    			xhttp.AmzServerSideEncryptionCustomerAlgorithm: "AES256",
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 19.9K bytes
    - Viewed (0)
  2. internal/kms/secret-key.go

    	if len(b) == 0 {
    		return b, kms.AES256
    	}
    
    	if b[0] == '{' && b[len(b)-1] == '}' { // JSON object
    		var c ciphertext
    		if err := c.UnmarshalJSON(b); err != nil {
    			// It may happen that a random ciphertext starts with '{' and ends with '}'.
    			// In such a case, parsing will fail but we must not return an error. Instead
    			// we return the ciphertext as it is.
    			return b, kms.AES256
    		}
    
    		b = b[:0]
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Apr 21 16:23:51 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  3. docs/tls/README.md

    ```
    read EC key
    writing EC key
    ```
    
    Alternatively, use the following command to generate a private ECDSA key protected by a password:
    
    ```sh
    openssl ecparam -genkey -name prime256v1 | openssl ec -aes256 -out private.key -passout pass:PASSWORD
    ```
    
    #### 3.2.2 Generate a private key with RSA
    
    Use the following command to generate a private key with RSA:
    
    ```sh
    openssl genrsa -out private.key 2048
    ```
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  4. cmd/generic-handlers_test.go

    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: false, ShouldFail: true}, // 1
    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: true, ShouldFail: false}, // 2
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  5. docs/ftp/README.md

    ```
    
    `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. 
    If unspecified then a sensible default is used.
    
    Valid values: 
    ```
    aes128-ctr
    aes192-ctr
    aes256-ctr
    ******@****.***
    aes256******@****.***
    ******@****.***
    arcfour256
    arcfour128
    arcfour
    aes128-cbc
    3des-cbc
    ```
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  6. cmd/sftp-server.go

    	kexAlgoCurve25519SHA256LibSSH = "******@****.***"
    	kexAlgoCurve25519SHA256       = "curve25519-sha256"
    
    	chacha20Poly1305ID = "******@****.***"
    	gcm256CipherID     = "aes256******@****.***"
    	aes128cbcID        = "aes128-cbc"
    	tripledescbcID     = "3des-cbc"
    )
    
    var (
    	errSFTPPublicKeyBadFormat = errors.New("the public key provided could not be parsed")
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  7. src/test/java/jcifs/pac/PacMacTest.java

            // Test AES128
            byte[] mac2 = PacMac.calculateMac(PacSignature.HMAC_SHA1_96_AES128, keys, TEST_DATA);
            assertNotNull(mac2);
            assertEquals(12, mac2.length);
    
            // Test AES256
            byte[] mac3 = PacMac.calculateMac(PacSignature.HMAC_SHA1_96_AES256, keys, TEST_DATA);
            assertNotNull(mac3);
            assertEquals(12, mac3.length);
        }
    
        /**
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  8. docs/kms/README.md

    ```
    
    ```
    mc stat myminio/bucket/test.file
    Name      : test.file
    ...
    Encrypted :
      X-Amz-Server-Side-Encryption: AES256
    ```
    
    ## Encrypted Private Key
    
    MinIO supports encrypted KES client private keys. Therefore, you can use
    an password-protected private keys for `MINIO_KMS_KES_KEY_FILE`.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  9. internal/http/headers.go

    	AmzServerSideEncryptionCopyCustomerKeyMD5    = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5"
    
    	AmzEncryptionAES = "AES256"
    	AmzEncryptionKMS = "aws:kms"
    
    	// Signature v2 related constants
    	AmzSignatureV2 = "Signature"
    	AmzAccessKeyID = "AWSAccessKeyId"
    
    	// Response request id.
    	AmzRequestID     = "x-amz-request-id"
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed May 07 15:37:12 UTC 2025
    - 10.8K bytes
    - Viewed (0)
  10. cmd/encryption-v1.go

    )
    
    const (
    	// SSECustomerKeySize is the size of valid client provided encryption keys in bytes.
    	// Currently AWS supports only AES256. So the SSE-C key size is fixed to 32 bytes.
    	SSECustomerKeySize = 32
    
    	// SSEIVSize is the size of the IV data
    	SSEIVSize = 32 // 32 bytes
    
    	// SSEDAREPackageBlockSize - SSE dare package block size.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 38K bytes
    - Viewed (0)
Back to top