Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 16 for sida (0.18 sec)

  1. cmd/storage-datatypes_test.go

    ModTime: UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEE...
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Sep 19 18:05:16 GMT 2022
    - 9.4K bytes
    - Viewed (0)
  2. internal/crypto/error.go

    	ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
    	// ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time
    	ErrIncompatibleEncryptionWithCompression = Errorf("Server side encryption specified with SSE-C with compression not allowed")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 4.4K bytes
    - Viewed (0)
  3. internal/bucket/encryption/bucket-sse-config.go

    	var config BucketSSEConfig
    	err := xml.NewDecoder(r).Decode(&config)
    	if err != nil {
    		return nil, err
    	}
    
    	// Validates server-side encryption config rules
    	// Only one rule is allowed on AWS S3
    	if len(config.Rules) != 1 {
    		return nil, errors.New("only one server-side encryption rule is allowed at a time")
    	}
    
    	for _, rule := range config.Rules {
    		switch rule.DefaultEncryptionAction.Algorithm {
    		case AES256:
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 4.9K bytes
    - Viewed (0)
  4. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 17 01:15:57 GMT 2024
    - 6.3K bytes
    - Viewed (0)
  5. internal/logger/target/kafka/kafka_scram_client_contrib.go

    // to create Client objects configured for SHA-512 hashing.
    var KafkaSHA512 scram.HashGeneratorFcn = sha512.New
    
    // XDGSCRAMClient implements the client-side of an authentication
    // conversation with a server.  A new conversation must be created for
    // each authentication attempt.
    type XDGSCRAMClient struct {
    	*scram.Client
    	*scram.ClientConversation
    	scram.HashGeneratorFcn
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Nov 09 04:04:01 GMT 2023
    - 3.3K bytes
    - Viewed (1)
  6. internal/config/etcd/etcd.go

    	cfg.PathPrefix = env.Get(EnvEtcdPathPrefix, kvs.Get(PathPrefix))
    	if etcdSecure {
    		cfg.TLS = &tls.Config{
    			RootCAs: rootCAs,
    		}
    		// This is only to support client side certificate authentication
    		// https://coreos.com/etcd/docs/latest/op-guide/security.html
    		etcdClientCertFile := env.Get(EnvEtcdClientCert, kvs.Get(ClientCert))
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Sep 04 19:57:37 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  7. internal/crypto/sse_test.go

    		Headers: http.Header{
    			"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},
    			"X-Amz-Server-Side-Encryption-Customer-Key":       []string{"MzJieXRlc2xvbmdzZWNyZXRrZXltdXN0cHJvdmlkZWQ="},
    			"X-Amz-Server-Side-Encryption-Customer-Key-Md5":   []string{"7PpPLAK26ONlVUGOWlusfg=="},
    		},
    		Bucket: "bucket",
    		Object: "object",
    		Metadata: map[string]string{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jun 01 21:59:40 GMT 2021
    - 8.4K bytes
    - Viewed (0)
  8. internal/deadlineconn/deadlineconn.go

    	c.setWriteDeadline()
    	n, err = c.Conn.Write(b)
    	return n, err
    }
    
    // WithReadDeadline sets a new read side net.Conn deadline.
    func (c *DeadlineConn) WithReadDeadline(d time.Duration) *DeadlineConn {
    	c.readDeadline = d
    	return c
    }
    
    // WithWriteDeadline sets a new write side net.Conn deadline.
    func (c *DeadlineConn) WithWriteDeadline(d time.Duration) *DeadlineConn {
    	c.writeDeadline = d
    	return c
    }
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Nov 05 18:09:21 GMT 2022
    - 2.3K bytes
    - Viewed (0)
  9. internal/crypto/doc.go

    // along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    // Package crypto implements AWS S3 related cryptographic building blocks
    // for implementing Server-Side-Encryption (SSE-S3) and Server-Side-Encryption
    // with customer provided keys (SSE-C).
    //
    // All objects are encrypted with an unique and randomly generated 'ObjectKey'.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Aug 26 19:52:29 GMT 2022
    - 5K bytes
    - Viewed (0)
  10. internal/crypto/sse.go

    type Type interface {
    	fmt.Stringer
    
    	IsRequested(http.Header) bool
    	IsEncrypted(map[string]string) bool
    }
    
    // IsRequested returns true and the SSE Type if the HTTP headers
    // indicate that some form server-side encryption is requested.
    //
    // If no SSE headers are present then IsRequested returns false
    // and no Type.
    func IsRequested(h http.Header) (Type, bool) {
    	switch {
    	case S3.IsRequested(h):
    		return S3, true
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Aug 30 15:26:43 GMT 2022
    - 4.4K bytes
    - Viewed (0)
Back to top