Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 242 for Encryption (0.05 sec)

  1. docs/site-replication/run-sse-kms-object-replication.sh

    echo "Stat minio2/test-bucket/defpartsize"
    ./mc stat --no-list minio2/test-bucket/defpartsize --insecure --json
    stat_out2_rep=$(./mc stat --no-list minio2/test-bucket/defpartsize --insecure --json)
    rep_obj2_algo=$(echo "${stat_out2_rep}" | jq '.metadata."X-Amz-Server-Side-Encryption"')
    rep_obj2_keyid=$(echo "${stat_out2_rep}" | jq '.metadata."X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id"')
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  2. src/main/java/jcifs/util/Crypto.java

            return new HMACT64(key);
        }
    
        /**
         * Get an RC4 cipher instance initialized with the specified key.
         * @param key the encryption key
         * @return RC4 cipher in encryption mode
         */
        public static Cipher getArcfour(final byte[] key) {
            try {
                final Cipher c = Cipher.getInstance("RC4");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.7K bytes
    - Viewed (0)
  3. internal/crypto/sse.go

    	"github.com/minio/sio"
    )
    
    const (
    	// SealAlgorithm is the encryption/sealing algorithm used to derive & seal
    	// the key-encryption-key and to en/decrypt the object data.
    	SealAlgorithm = "DAREv2-HMAC-SHA256"
    
    	// InsecureSealAlgorithm is the legacy encryption/sealing algorithm used
    	// to derive & seal the key-encryption-key and to en/decrypt the object data.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  4. src/main/java/jcifs/internal/smb2/nego/EncryptionNegotiateContext.java

    package jcifs.internal.smb2.nego;
    
    import jcifs.Configuration;
    import jcifs.internal.SMBProtocolDecodingException;
    import jcifs.internal.util.SMBUtil;
    
    /**
     * SMB2 Encryption Negotiate Context.
     *
     * This negotiate context is used in SMB 3.x to negotiate
     * encryption capabilities and cipher suites.
     *
     * @author mbechler
     */
    public class EncryptionNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse {
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 3.8K bytes
    - Viewed (0)
  5. README.md

    - Configurable: Min/max versions can be set via configuration properties
    
    ### SMB3 Encryption Support
    - **SMB2 Transform Header**: Encrypted message wrapping
    - **AES-CCM/GCM Support**: Both AES-128-CCM (SMB 3.0/3.0.2) and AES-128-GCM (SMB 3.1.1) cipher suites
    - **Encryption Context**: Per-session encryption state management
    - **Key Derivation**: SMB3 KDF implementation with dialect-specific parameters
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 09:24:52 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  6. cmd/batch-rotate.go

    			encMetadata[k] = v
    		}
    	}
    
    	if (sseKMS || sseS3) && r.Encryption.Type == ssekms {
    		if err = r.Encryption.Validate(); err != nil {
    			return err
    		}
    		newKeyID = strings.TrimPrefix(r.Encryption.Key, crypto.ARNPrefix)
    		newKeyContext = r.Encryption.kmsContext
    	}
    	if err = rotateKey(ctx, []byte{}, newKeyID, []byte{}, r.Bucket, oi.Name, encMetadata, newKeyContext); err != nil {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 14.7K bytes
    - Viewed (0)
  7. internal/config/crypto.go

    	if err != nil {
    		return nil, err
    	}
    	return io.ReadAll(ciphertext)
    }
    
    // DecryptBytes decrypts the ciphertext using a key managed by the KMS.
    // The same context that have been used during encryption must be
    // provided.
    func DecryptBytes(k *kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) {
    	plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context)
    	if err != nil {
    		return nil, err
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri May 16 14:27:42 UTC 2025
    - 4.7K bytes
    - Viewed (0)
  8. docs/distributed/decom-encrypted-sse-s3.sh

    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected versioning enabled after expansion"
    	exit 1
    fi
    
    ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled"
    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected encryption enabled after expansion"
    	exit 1
    fi
    
    ./mc mirror cmd myminio/versioned/ --quiet >/dev/null
    
    ./mc ls -r myminio/versioned/ >expanded_ns.txt
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  9. internal/crypto/error.go

    func (e Error) Error() string {
    	if e.msg == "" {
    		return "crypto: cause <nil>"
    	}
    	return e.msg
    }
    
    var (
    	// ErrInvalidEncryptionMethod indicates that the specified SSE encryption method
    	// is not supported.
    	ErrInvalidEncryptionMethod = Errorf("The encryption method is not supported")
    
    	// ErrInvalidCustomerAlgorithm indicates that the specified SSE-C algorithm
    	// is not supported.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  10. src/main/java/jcifs/pac/PacSignature.java

        /**
         * Kerberos encryption type for ARCFOUR-HMAC (RC4-HMAC).
         */
        public static final int ETYPE_ARCFOUR_HMAC = 23;
        /**
         * Kerberos encryption type for AES-128 CTS mode with HMAC-SHA1-96.
         */
        public static final int ETYPE_AES128_CTS_HMAC_SHA1_96 = 17;
        /**
         * Kerberos encryption type for AES-256 CTS mode with HMAC-SHA1-96.
         */
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 3.4K bytes
    - Viewed (0)
Back to top