- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 76 for Decrypt (1.07 sec)
-
src/main/java/org/codelibs/core/crypto/CachedCipher.java
Registered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 15.9K bytes - Viewed (0) -
src/main/java/jcifs/pac/kerberos/KerberosEncData.java
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 12.5K bytes - Viewed (0) -
src/test/java/org/codelibs/core/crypto/CachedCipherTest.java
// Encrypt with new method, decrypt with old method @SuppressWarnings("deprecation") final String encrypted1 = cipher.encryptText(original); @SuppressWarnings("deprecation") final String decrypted1 = cipher.decryptoText(encrypted1); assertThat(decrypted1, is(original)); // Encrypt with old method, decrypt with new methodRegistered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 5.3K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
byte[] decrypted = KerberosEncData.decrypt(data, key, KerberosConstants.DES_ENC_TYPE); assertNotNull(decrypted); // With dummy data, we can't verify the content, just that it decrypts without error // and returns a result of the expected size. assertEquals(data.length - 24, decrypted.length); } /** * Test decrypt with an unsupported encryption type. */ @Test
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0) -
internal/config/crypto_test.go
} for i, test := range encryptDecryptTests { ciphertext, err := Encrypt(KMS, bytes.NewReader(test.Data), test.Context) if err != nil { t.Fatalf("Test %d: failed to encrypt stream: %v", i, err) } data, err := io.ReadAll(ciphertext) if err != nil { t.Fatalf("Test %d: failed to encrypt stream: %v", i, err) } plaintext, err := Decrypt(KMS, bytes.NewReader(data), test.Context) if err != nil {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 3.2K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
} /// Encrypt a block of bytes. /** * Encrypts an 8-byte block using DES * @param clearText the 8-byte plaintext block * @param cipherText the output 8-byte ciphertext block */ public void encrypt(final byte[] clearText, final byte[] cipherText) { encrypt(clearText, 0, cipherText, 0); } /// Decrypt a block of bytes. /**Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0) -
internal/crypto/sse.go
) const ( // SealAlgorithm is the encryption/sealing algorithm used to derive & seal // the key-encryption-key and to en/decrypt the object data. SealAlgorithm = "DAREv2-HMAC-SHA256" // InsecureSealAlgorithm is the legacy encryption/sealing algorithm used // to derive & seal the key-encryption-key and to en/decrypt the object data. // This algorithm should not be used for new objects because its key derivation
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
src/test/java/jcifs/util/SecureCredentialStorageTest.java
byte[] salt = storage.getSalt(); // Encrypt with first storage byte[] encrypted = storage.encryptCredentials(plaintext); // Create new storage with same salt SecureCredentialStorage storage2 = new SecureCredentialStorage(masterPassword.clone(), salt); try { // Should be able to decrypt with same salt and password
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
cmd/encryption-v1.go
if err != nil { return encryptedETag } return hex.EncodeToString(etagBytes) } // GetDecryptedRange - To decrypt the range (off, length) of the // decrypted object stream, we need to read the range (encOff, // encLength) of the encrypted object stream to decrypt it, and // compute skipLen, the number of bytes to skip in the beginning of // the encrypted range. //Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Nginx * HAProxy ## Let's Encrypt { #lets-encrypt } Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties. The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive. But then **<a href="https://letsencrypt.org/" class="external-link" target="_blank">Let's Encrypt</a>** was created.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0)