- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 230 for encryptions (0.25 sec)
-
src/test/java/jcifs/util/SecureCredentialStorageTest.java
byte[] encrypted2 = storage.encryptCredentials(plaintext.clone()); // Should produce different ciphertexts due to random IV assertFalse(Arrays.equals(encrypted1, encrypted2), "Different encryptions should produce different ciphertexts"); // But both should decrypt to same plaintext char[] decrypted1 = storage.decryptCredentials(encrypted1);
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java
new SecureRandom().nextBytes(testDecryptionKey); // Create encryption context with required parameters encryptionContext = new Smb2EncryptionContext(1, DialectVersion.SMB311, testEncryptionKey, testDecryptionKey); } @Test @DisplayName("Should create encryption context with valid parameters") void testConstructor() { // When
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 44.1K bytes - Viewed (0) -
cmd/encryption-v1.go
errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests. errObjectTampered = errors.New("The requested object was modified and may be compromised") // error returned when invalid encryption parameters are specified errInvalidEncryptionParameters = errors.New("The encryption parameters are not applicable to this object")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0) -
cmd/bucket-encryption.go
"io" sse "github.com/minio/minio/internal/bucket/encryption" ) // BucketSSEConfigSys - in-memory cache of bucket encryption config type BucketSSEConfigSys struct{} // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache func NewBucketSSEConfigSys() *BucketSSEConfigSys { return &BucketSSEConfigSys{} } // Get - gets bucket encryption config for the given bucket.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 1.7K bytes - Viewed (1) -
internal/crypto/auto-encryption.go
package crypto import ( "github.com/minio/minio/internal/config" "github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off".
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0) -
cmd/bucket-encryption-handlers.go
"github.com/minio/minio/internal/logger" "github.com/minio/mux" "github.com/minio/pkg/v3/policy" ) const ( // Bucket Encryption configuration file name. bucketSSEConfig = "bucket-encryption.xml" ) // PutBucketEncryptionHandler - Stores given bucket encryption configuration // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6.4K bytes - Viewed (0) -
cmd/encryption-v1_test.go
if opts.ServerSideEncryption == nil && test.encryptionType != "" { t.Errorf("Case %d: expected opts to be of %v encryption type", i, test.encryptionType) } if opts.ServerSideEncryption != nil && test.encryptionType != opts.ServerSideEncryption.Type() { t.Errorf("Case %d: expected opts to have encryption type %v but was %v ", i, test.encryptionType, opts.ServerSideEncryption.Type()) } } }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 19.9K bytes - Viewed (0) -
docs/kms/IAM.md
# KMS IAM/Config Encryption MinIO supports encrypting config, IAM assets with KMS provided keys. If the KMS is not enabled, MinIO will store the config, IAM data as plain text erasure coded in its backend. ## MinIO KMS Quick Start MinIO supports two ways of encrypting IAM and configuration data. You can either use KES - together with an external KMS - or, much simpler,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/crypto/doc.go
// for implementing Server-Side-Encryption (SSE-S3) and Server-Side-Encryption // with customer provided keys (SSE-C). // // All objects are encrypted with an unique and randomly generated 'ObjectKey'. // The ObjectKey itself is never stored in plaintext. Instead it is only stored // in a sealed from. The sealed 'ObjectKey' is created by encrypting the 'ObjectKey' // with an unique key-encryption-key. Given the correct key-encryption-key the
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 26 19:52:29 UTC 2022 - 5K bytes - Viewed (0) -
internal/crypto/header_test.go
"X-Amz-Server-Side-Encryption": []string{""}, "X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{""}, "X-Amz-Server-Side-Encryption-Context": []string{""}, }, Expected: true, }, // 4 { Header: http.Header{ "X-Amz-Server-Side-Encryption": []string{"AES256"}, "X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{""}, }, Expected: true, }, // 5Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Jul 13 14:52:15 UTC 2022 - 21.4K bytes - Viewed (0)