- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 61 for Encryption (0.06 seconds)
-
internal/crypto/auto-encryption.go
package crypto import ( "github.com/minio/minio/internal/config" "github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off".
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 24 23:05:23 GMT 2024 - 1.4K bytes - Click Count (0) -
cmd/bucket-encryption.go
"io" sse "github.com/minio/minio/internal/bucket/encryption" ) // BucketSSEConfigSys - in-memory cache of bucket encryption config type BucketSSEConfigSys struct{} // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache func NewBucketSSEConfigSys() *BucketSSEConfigSys { return &BucketSSEConfigSys{} } // Get - gets bucket encryption config for the given bucket.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 1.7K bytes - Click Count (1) -
cmd/bucket-encryption-handlers.go
"github.com/minio/minio/internal/logger" "github.com/minio/mux" "github.com/minio/pkg/v3/policy" ) const ( // Bucket Encryption configuration file name. bucketSSEConfig = "bucket-encryption.xml" ) // PutBucketEncryptionHandler - Stores given bucket encryption configuration // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 24 23:05:23 GMT 2024 - 6.4K bytes - Click Count (0) -
internal/crypto/metadata.go
// MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key" // MetaKeyID is the KMS master key ID used to generate/encrypt the data // encryption key (DEK). MetaKeyID = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id" // MetaDataEncryptionKey is the sealed data encryption key (DEK) received from
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jun 10 17:40:33 GMT 2024 - 6.4K bytes - Click Count (0) -
internal/crypto/sse_test.go
"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"}, "X-Amz-Server-Side-Encryption-Customer-Key": []string{"MzJieXRlc2xvbmdzZWNyZXRrZXltdXN0cHJvdmlkZWQ="}, "X-Amz-Server-Side-Encryption-Customer-Key-Md5": []string{"7PpPLAK26ONlVUGOWlusfg=="}, }, Bucket: "bucket", Object: "object2", Metadata: map[string]string{Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Jun 01 21:59:40 GMT 2021 - 8.4K bytes - Click Count (0) -
cmd/storage-datatypes_test.go
UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEEEWw/DoTs...
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 9.1K bytes - Click Count (0) -
internal/crypto/doc.go
// for implementing Server-Side-Encryption (SSE-S3) and Server-Side-Encryption // with customer provided keys (SSE-C). // // All objects are encrypted with an unique and randomly generated 'ObjectKey'. // The ObjectKey itself is never stored in plaintext. Instead it is only stored // in a sealed from. The sealed 'ObjectKey' is created by encrypting the 'ObjectKey' // with an unique key-encryption-key. Given the correct key-encryption-key the
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 26 19:52:29 GMT 2022 - 5K bytes - Click Count (0) -
internal/config/crypto.go
if err != nil { return nil, err } return io.ReadAll(ciphertext) } // DecryptBytes decrypts the ciphertext using a key managed by the KMS. // The same context that have been used during encryption must be // provided. func DecryptBytes(k *kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) { plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context) if err != nil { return nil, err }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 4.7K bytes - Click Count (0) -
docs/distributed/decom-encrypted-sse-s3.sh
ret=$? if [ $ret -ne 0 ]; then echo "expected versioning enabled after expansion" exit 1 fi ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled" ret=$? if [ $ret -ne 0 ]; then echo "expected encryption enabled after expansion" exit 1 fi ./mc mirror cmd myminio/versioned/ --quiet >/dev/null ./mc ls -r myminio/versioned/ >expanded_ns.txt
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon May 27 19:17:46 GMT 2024 - 4.5K bytes - Click Count (0) -
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/package-info.java
*/ /** * Provides the API for the Maven Password Encryption tool ({@code mvnenc}). * * <p>This package contains interfaces and classes for the password encryption tool, * which helps secure sensitive information in Maven settings and configuration files.</p> * * <p>Key features include:</p> * <ul> * <li>Password encryption and decryption</li> * <li>Master password management</li>
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Mar 04 14:17:18 GMT 2025 - 1.4K bytes - Click Count (0)