Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 18 of 18 for GCM (0.02 sec)

  1. docs/security/README.md

    - [PRF](#prf): HMAC-SHA-256
    - [AEAD](#aead): AES-256-GCM if the CPU supports AES-NI, ChaCha20-Poly1305 otherwise. More specifically AES-256-GCM is only selected for X86-64 CPUs with AES-NI extension.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/smb2/nego/Smb2NegotiateRequest.java

                if (config.isEncryptionEnabled()) {
                    // Build cipher list based on AES-256 support
                    List<Integer> ciphers = new ArrayList<>();
    
                    // Prefer GCM over CCM for better performance
                    if (config.isAES256Enabled()) {
                        ciphers.add(EncryptionNegotiateContext.CIPHER_AES256_GCM);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  3. src/test/java/jcifs/audit/SecurityAuditLoggerTest.java

        }
    
        @Test
        @DisplayName("Test log encryption")
        void testLogEncryption() {
            logger.logEncryption(true, "AES-128-GCM", "SMB3.1.1");
    
            Map<EventType, Long> stats = logger.getStatistics();
            assertEquals(Long.valueOf(1), stats.get(EventType.ENCRYPTION_ENABLED), "Should have 1 encryption event");
        }
    
        @Test
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  4. docs/smb3-features/02-persistent-handles-design.md

    ```java
    public class SecureHandleStorage {
        private final SecretKey encryptionKey;
        
        public void saveEncrypted(HandleInfo handle, Path file) throws Exception {
            Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
            cipher.init(Cipher.ENCRYPT_MODE, encryptionKey);
            
            ByteArrayOutputStream baos = new ByteArrayOutputStream();
            try (CipherOutputStream cos = new CipherOutputStream(baos, cipher);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 31.6K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb/SmbTransportImpl.java

            int cipherId = -1;
    
            if (dialect.atLeast(DialectVersion.SMB311)) {
                cipherId = resp.getSelectedCipher();
                if (cipherId == -1) {
                    // Default to AES-128-GCM for SMB 3.1.1 if no cipher negotiated
                    cipherId = EncryptionNegotiateContext.CIPHER_AES128_GCM;
                }
            } else if (dialect.atLeast(DialectVersion.SMB300)) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 69.8K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.25.md

    ###  Introduced KMS v2
    
    Introduce KMS v2alpha1 API to add performance, rotation, and observability improvements. Encrypt data at rest (ie Kubernetes `Secrets`) with DEK using AES-GCM instead of AES-CBC for kms data encryption. No user action is required. Reads with AES-GCM and AES-CBC will continue to be allowed. See the guide [Using a KMS provider for data encryption](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/) for more information.
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.7.md

      * Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton))
    
    * Bug fixes:
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (1)
  8. CHANGELOG/CHANGELOG-1.8.md

    * Add secretbox and AES-CBC encryption modes to at rest encryption.  AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
Back to top