- Sort Score
- Result 10 results
- Languages All
Results 11 - 18 of 18 for GCM (0.02 sec)
-
docs/security/README.md
- [PRF](#prf): HMAC-SHA-256 - [AEAD](#aead): AES-256-GCM if the CPU supports AES-NI, ChaCha20-Poly1305 otherwise. More specifically AES-256-GCM is only selected for X86-64 CPUs with AES-NI extension.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/nego/Smb2NegotiateRequest.java
if (config.isEncryptionEnabled()) { // Build cipher list based on AES-256 support List<Integer> ciphers = new ArrayList<>(); // Prefer GCM over CCM for better performance if (config.isAES256Enabled()) { ciphers.add(EncryptionNegotiateContext.CIPHER_AES256_GCM);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 9.3K bytes - Viewed (0) -
src/test/java/jcifs/audit/SecurityAuditLoggerTest.java
} @Test @DisplayName("Test log encryption") void testLogEncryption() { logger.logEncryption(true, "AES-128-GCM", "SMB3.1.1"); Map<EventType, Long> stats = logger.getStatistics(); assertEquals(Long.valueOf(1), stats.get(EventType.ENCRYPTION_ENABLED), "Should have 1 encryption event"); } @Test
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 8.6K bytes - Viewed (0) -
docs/smb3-features/02-persistent-handles-design.md
```java public class SecureHandleStorage { private final SecretKey encryptionKey; public void saveEncrypted(HandleInfo handle, Path file) throws Exception { Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); cipher.init(Cipher.ENCRYPT_MODE, encryptionKey); ByteArrayOutputStream baos = new ByteArrayOutputStream(); try (CipherOutputStream cos = new CipherOutputStream(baos, cipher);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 02:53:50 UTC 2025 - 31.6K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbTransportImpl.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 69.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### Introduced KMS v2 Introduce KMS v2alpha1 API to add performance, rotation, and observability improvements. Encrypt data at rest (ie Kubernetes `Secrets`) with DEK using AES-GCM instead of AES-CBC for kms data encryption. No user action is required. Reads with AES-GCM and AES-CBC will continue to be allowed. See the guide [Using a KMS provider for data encryption](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/) for more information.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.7.md
* Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton)) * Bug fixes:
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 308.7K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.8.md
* Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0)