- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 118 for hmac (0.02 sec)
-
src/main/java/jcifs/smb1/ntlmssp/Type3Message.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 24.1K bytes - Viewed (0) -
src/main/java/jcifs/ntlmssp/Type3Message.java
final byte[] sk = this.masterKey; if (sk == null) { return; } final MessageDigest mac = Crypto.getHMACT64(sk); mac.update(type1); mac.update(type2); final byte[] type3 = toByteArray(); mac.update(type3); setMic(mac.digest()); } /** * Creates a Type-3 message with the specified parameters. * * @param flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 32.7K bytes - Viewed (0) -
docs/iam/access-management-plugin.md
```json { "input": { "account": "minio", "groups": null, "action": "s3:ListBucket", "bucket": "test", "conditions": { "Authorization": [ "AWS4-HMAC-SHA256 Credential=minio/20220507/us-east-1/s3/aws4_request, SignedHeaders=host;x-amz-content-sha256;x-amz-date, Signature=62012db6c47d697620cf6c68f0f45f6e34894589a53ab1faf6dc94338468c78a" ], "CurrentTime": [
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Dec 13 22:28:48 UTC 2022 - 4.4K bytes - Viewed (1) -
cmd/signature-v4-utils.go
} if _, ok := claims[policy.SessionPolicyName]; ok { owner = false } return cred, owner, ErrNone } // sumHMAC calculate hmac between two input byte array. func sumHMAC(key []byte, data []byte) []byte { hash := hmac.New(sha256.New, key) hash.Write(data) return hash.Sum(nil) } // extractSignedHeaders extract signed headers from Authorization header
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Nov 25 17:10:22 UTC 2024 - 9.1K bytes - Viewed (0) -
cmd/signature-v2.go
// // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package cmd import ( "crypto/hmac" "crypto/sha1" "crypto/subtle" "encoding/base64" "fmt" "net/http" "net/url" "sort" "strconv" "strings" xhttp "github.com/minio/minio/internal/http"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb3KeyDerivation.java
import org.bouncycastle.crypto.DerivationParameters; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.generators.KDFCounterBytesGenerator; import org.bouncycastle.crypto.macs.HMac; import org.bouncycastle.crypto.params.KDFCounterParameters; /** * SMB3 SP800-108 Counter Mode Key Derivation * * @author mbechler * */ public final class Smb3KeyDerivation {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 6.5K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
// Changing domain should change the key (domain is part of MAC input) byte[] differentDomain = NtlmUtil.nTOWFv2("DOMAIN", user, password); assertFalse(Arrays.equals(viaPassword, differentDomain), "Different domain should produce a different key"); } @Test @DisplayName("computeResponse: HMAC(server||clientData) prepended to clientData") void testComputeResponse_basic() {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (0) -
cmd/encryption-v1.go
var partIDbin [4]byte binary.LittleEndian.PutUint32(partIDbin[:], uint32(partID)) // marshal part ID mac := hmac.New(sha256.New, d.objectEncryptionKey) // derive part encryption key from part ID and object key mac.Write(partIDbin[:]) partEncryptionKey := mac.Sum(nil) // Limit the reader, so the decryptor doesn't receive bytes // from the next part (different DARE stream)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 37.8K bytes - Viewed (0) -
src/main/java/jcifs/pac/kerberos/KerberosConstants.java
/** DES encryption type identifier */ int DES_ENC_TYPE = 3; /** RC4 encryption type identifier */ int RC4_ENC_TYPE = 23; /** RC4 algorithm name */ String RC4_ALGORITHM = "ARCFOUR"; /** HMAC algorithm name */ String HMAC_ALGORITHM = "HmacMD5"; /** Size of confounder in bytes */ int CONFOUNDER_SIZE = 8; /** Size of checksum in bytes */ int CHECKSUM_SIZE = 16;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 1.9K bytes - Viewed (0) -
src/test/java/jcifs/CIFSUnsupportedCryptoExceptionTest.java
@ValueSource(strings = { "AES encryption not supported", "Missing Bouncy Castle provider", "Invalid key length for AES-128", "RC4 cipher not available in this JVM", "DES encryption is deprecated and not supported", "HMAC-SHA256 algorithm not found", "RSA key generation failed: key size not supported" }) void testMessageConstructorWithCryptoMessages(String message) { // Given & When
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 4.1K bytes - Viewed (0)