- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 171 for encryptions (1.53 sec)
-
src/main/java/jcifs/pac/PacMac.java
/** * Utility class for calculating and verifying PAC (Privilege Attribute Certificate) message authentication codes. * This class provides methods for computing MACs using various Kerberos encryption types including * ARCFOUR-HMAC-MD5 and AES-based HMAC algorithms. */ public class PacMac { /** * Private constructor to prevent instantiation of utility class. */ private PacMac() {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 9K bytes - Viewed (0) -
docs/tls/README.md
Copy the existing private key and public certificate to the `certs` directory. The default certs directory is: * **Linux:** `${HOME}/.minio/certs`
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0) -
src/test/java/jcifs/CIFSUnsupportedCryptoExceptionTest.java
@DisplayName("Message constructor should handle crypto-specific error messages") @NullAndEmptySource @ValueSource(strings = { "AES encryption not supported", "Missing Bouncy Castle provider", "Invalid key length for AES-128", "RC4 cipher not available in this JVM", "DES encryption is deprecated and not supported", "HMAC-SHA256 algorithm not found", "RSA key generation failed: key size not supported" })
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 4.1K bytes - Viewed (0) -
docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
"Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::multi-key-poc/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption-aws-kms-key-id":"minio-default-key" } } } ]
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 439 bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
import javax.security.auth.Destroyable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Secure credential storage with encryption at rest. * * Provides secure storage of passwords and other sensitive credentials * using AES-GCM encryption with PBKDF2 key derivation. * * Features: * - Encrypts credentials at rest using AES-256-GCM * - Uses PBKDF2 for key derivation from master password
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
#RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then # echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though." # exit_1 #fi # Add replication site
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/object-api-options.go
} // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:34:38 UTC 2025 - 14.2K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**. * So, the **certificate and encryption** handling is done **before HTTP**. * **TCP doesn't know about "domains"**. Only about IP addresses.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
src/main/java/jcifs/pac/kerberos/KerberosEncData.java
private List<KerberosAuthData> userAuthorizations; /** * Constructs KerberosEncData from encrypted token bytes. * * @param token the encrypted Kerberos token * @param keys map of encryption keys indexed by key type * @throws PACDecodingException if decoding fails */ public KerberosEncData(byte[] token, Map<Integer, KerberosKey> keys) throws PACDecodingException {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 12.5K bytes - Viewed (0) -
docs/debugging/s3-check-md5/main.go
continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Feb 17 01:15:57 UTC 2024 - 6.3K bytes - Viewed (0)