- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 161 for Decrypt (0.69 sec)
-
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
byte[] decrypted = KerberosEncData.decrypt(data, key, KerberosConstants.DES_ENC_TYPE); assertNotNull(decrypted); // With dummy data, we can't verify the content, just that it decrypts without error // and returns a result of the expected size. assertEquals(data.length - 24, decrypted.length); } /** * Test decrypt with an unsupported encryption type. */ @Test
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecryptionRequest.java
} /** * Creates a new request to decrypt the specified settings. * * @param settings The settings to decrypt, must not be {@code null}. */ public DefaultSettingsDecryptionRequest(Settings settings) { setServers(settings.getServers()); setProxies(settings.getProxies()); } /** * Creates a new request to decrypt the specified server. *Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 2.9K bytes - Viewed (0) -
docs/security/README.md
unique, randomly generated secret key per object also known as, Object Encryption Key ([OEK](#oek)). Neither the client-provided SSE-C key nor the KMS-managed key is directly used to en/decrypt an object. Instead, the OEK is stored as part of the object metadata next to the object in an encrypted form. To en/decrypt the OEK another secret key is needed also known as, Key Encryption Key ([KEK](#kek)). The MinIO server runs a key-derivation algorithm to generate the KEK using a pseudo-random...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
internal/config/crypto_test.go
} for i, test := range encryptDecryptTests { ciphertext, err := Encrypt(KMS, bytes.NewReader(test.Data), test.Context) if err != nil { t.Fatalf("Test %d: failed to encrypt stream: %v", i, err) } data, err := io.ReadAll(ciphertext) if err != nil { t.Fatalf("Test %d: failed to encrypt stream: %v", i, err) } plaintext, err := Decrypt(KMS, bytes.NewReader(data), test.Context) if err != nil {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 3.2K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
} /// Encrypt a block of bytes. /** * Encrypts an 8-byte block using DES * @param clearText the 8-byte plaintext block * @param cipherText the output 8-byte ciphertext block */ public void encrypt(final byte[] clearText, final byte[] cipherText) { encrypt(clearText, 0, cipherText, 0); } /// Decrypt a block of bytes. /**Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0) -
internal/kms/secret-key_test.go
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 2.9K bytes - Viewed (0) -
internal/kms/secret-key.go
Plaintext: plaintext, Ciphertext: ciphertext, }, nil } // Decrypt decrypts req.Ciphertext. The key name req.Name must match the key // name of the secretKey. // // Decrypt supports decryption of binary-encoded ciphertexts, as produced by KES // and MinKMS, and legacy JSON formatted ciphertexts. func (s secretKey) Decrypt(_ context.Context, req *DecryptRequest) ([]byte, error) { if req.Name != s.keyID {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Apr 21 16:23:51 UTC 2025 - 8.4K bytes - Viewed (0) -
internal/crypto/sse.go
) const ( // SealAlgorithm is the encryption/sealing algorithm used to derive & seal // the key-encryption-key and to en/decrypt the object data. SealAlgorithm = "DAREv2-HMAC-SHA256" // InsecureSealAlgorithm is the legacy encryption/sealing algorithm used // to derive & seal the key-encryption-key and to en/decrypt the object data. // This algorithm should not be used for new objects because its key derivation
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
src/test/java/jcifs/util/SecureCredentialStorageTest.java
byte[] salt = storage.getSalt(); // Encrypt with first storage byte[] encrypted = storage.encryptCredentials(plaintext); // Create new storage with same salt SecureCredentialStorage storage2 = new SecureCredentialStorage(masterPassword.clone(), salt); try { // Should be able to decrypt with same salt and password
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
internal/kms/kms.go
k.updateMetrics(err, time.Since(start)) return dek, err } // Decrypt decrypts a ciphertext using the master key req.Name. // It returns ErrKeyNotFound if the key does not exist. func (k *KMS) Decrypt(ctx context.Context, req *DecryptRequest) ([]byte, error) { start := time.Now() plaintext, err := k.conn.Decrypt(ctx, req) k.updateMetrics(err, time.Since(start)) return plaintext, err }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Apr 24 15:33:57 UTC 2025 - 11.4K bytes - Viewed (0)