Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 16 for New256 (0.05 sec)

  1. api/go1.24.txt

    pkg crypto/pbkdf2, func Key[$0 hash.Hash](func() $0, string, []uint8, int, int) ([]uint8, error) #69488
    pkg crypto/rand, func Text() string #67057
    pkg crypto/sha3, func New224() *SHA3 #69982
    pkg crypto/sha3, func New256() *SHA3 #69982
    pkg crypto/sha3, func New384() *SHA3 #69982
    pkg crypto/sha3, func New512() *SHA3 #69982
    pkg crypto/sha3, func NewCSHAKE128([]uint8, []uint8) *SHAKE #69982
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Dec 17 21:28:29 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  2. src/test/java/jcifs/pac/PacMacTest.java

            assertNotNull(derivedKey);
            assertEquals(16, derivedKey.length);
    
            // Test with a different key size
            KerberosKey key256 = new KerberosKey(TEST_PRINCIPAL, new byte[32], PacSignature.ETYPE_AES256_CTS_HMAC_SHA1_96, 0);
            byte[] derivedKey256 = PacMac.deriveKeyAES(key256, constant);
            assertNotNull(derivedKey256);
            assertEquals(32, derivedKey256.length);
        }
    
        /**
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  3. internal/config/identity/openid/ecdsa-sha3_contrib.go

    	_ "golang.org/x/crypto/sha3"
    )
    
    // Specific instances for EC256 and company
    var (
    	SigningMethodES3256 *jwt.SigningMethodECDSA
    	SigningMethodES3384 *jwt.SigningMethodECDSA
    	SigningMethodES3512 *jwt.SigningMethodECDSA
    )
    
    func init() {
    	// ES256
    	SigningMethodES3256 = &jwt.SigningMethodECDSA{Name: "ES3256", Hash: crypto.SHA3_256, KeySize: 32, CurveBits: 256}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri May 16 14:27:42 UTC 2025
    - 1.7K bytes
    - Viewed (0)
  4. cmd/encryption-v1_test.go

    			xhttp.AmzServerSideEncryptionCustomerAlgorithm: "AES256",
    			xhttp.AmzServerSideEncryptionCustomerKey:       "XAm0dRrJsEsyPb1UuFNezv1bl9hxuYsgUVC/MUctE2k=",
    			xhttp.AmzServerSideEncryptionCustomerKeyMD5:    "bY4wkxQejw9mUJfo72k53A==",
    		},
    		metadata: map[string]string{},
    	},
    	{
    		header: map[string]string{
    			xhttp.AmzServerSideEncryptionCustomerAlgorithm: "AES256",
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 19.9K bytes
    - Viewed (0)
  5. src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java

            // Test creating context with AES-256 cipher IDs
            byte[] key256 = new byte[32]; // 256-bit key
            new SecureRandom().nextBytes(key256);
    
            Smb2EncryptionContext context256CCM =
                    new Smb2EncryptionContext(Smb2EncryptionContext.CIPHER_AES_256_CCM, DialectVersion.SMB311, key256, key256);
            assertEquals(Smb2EncryptionContext.CIPHER_AES_256_CCM, context256CCM.getCipherId());
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 44.1K bytes
    - Viewed (0)
  6. internal/kms/secret-key.go

    	if len(b) == 0 {
    		return b, kms.AES256
    	}
    
    	if b[0] == '{' && b[len(b)-1] == '}' { // JSON object
    		var c ciphertext
    		if err := c.UnmarshalJSON(b); err != nil {
    			// It may happen that a random ciphertext starts with '{' and ends with '}'.
    			// In such a case, parsing will fail but we must not return an error. Instead
    			// we return the ciphertext as it is.
    			return b, kms.AES256
    		}
    
    		b = b[:0]
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Apr 21 16:23:51 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  7. docs/tls/README.md

    ```
    read EC key
    writing EC key
    ```
    
    Alternatively, use the following command to generate a private ECDSA key protected by a password:
    
    ```sh
    openssl ecparam -genkey -name prime256v1 | openssl ec -aes256 -out private.key -passout pass:PASSWORD
    ```
    
    #### 3.2.2 Generate a private key with RSA
    
    Use the following command to generate a private key with RSA:
    
    ```sh
    openssl genrsa -out private.key 2048
    ```
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  8. cmd/generic-handlers_test.go

    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: false, ShouldFail: true}, // 1
    	{URL: &url.URL{}, Header: http.Header{xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"}}, IsTLS: true, ShouldFail: false}, // 2
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  9. docs/ftp/README.md

    ```
    
    `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. 
    If unspecified then a sensible default is used.
    
    Valid values: 
    ```
    aes128-ctr
    aes192-ctr
    aes256-ctr
    ******@****.***
    aes256******@****.***
    ******@****.***
    arcfour256
    arcfour128
    arcfour
    aes128-cbc
    3des-cbc
    ```
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  10. cmd/sftp-server.go

    	kexAlgoCurve25519SHA256LibSSH = "******@****.***"
    	kexAlgoCurve25519SHA256       = "curve25519-sha256"
    
    	chacha20Poly1305ID = "******@****.***"
    	gcm256CipherID     = "aes256******@****.***"
    	aes128cbcID        = "aes128-cbc"
    	tripledescbcID     = "3des-cbc"
    )
    
    var (
    	errSFTPPublicKeyBadFormat = errors.New("the public key provided could not be parsed")
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 16.5K bytes
    - Viewed (0)
Back to top