Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 66 for Encryption (0.09 sec)

  1. internal/crypto/auto-encryption.go

    package crypto
    
    import (
    	"github.com/minio/minio/internal/config"
    	"github.com/minio/pkg/v3/env"
    )
    
    const (
    	// EnvKMSAutoEncryption is the environment variable used to en/disable
    	// SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled,
    	// requires a valid KMS configuration and turns any non-SSE-C
    	// request into an SSE-S3 request.
    	// If present EnvAutoEncryption must be either "on" or "off".
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 1.4K bytes
    - Viewed (0)
  2. cmd/bucket-encryption.go

    	"io"
    
    	sse "github.com/minio/minio/internal/bucket/encryption"
    )
    
    // BucketSSEConfigSys - in-memory cache of bucket encryption config
    type BucketSSEConfigSys struct{}
    
    // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache
    func NewBucketSSEConfigSys() *BucketSSEConfigSys {
    	return &BucketSSEConfigSys{}
    }
    
    // Get - gets bucket encryption config for the given bucket.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 25 00:44:15 UTC 2022
    - 1.7K bytes
    - Viewed (0)
  3. cmd/bucket-encryption-handlers.go

    	"github.com/minio/minio/internal/logger"
    	"github.com/minio/mux"
    	"github.com/minio/pkg/v3/policy"
    )
    
    const (
    	// Bucket Encryption configuration file name.
    	bucketSSEConfig = "bucket-encryption.xml"
    )
    
    // PutBucketEncryptionHandler - Stores given bucket encryption configuration
    // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  4. internal/crypto/metadata.go

    	// MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS
    	MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key"
    
    	// MetaKeyID is the KMS master key ID used to generate/encrypt the data
    	// encryption key (DEK).
    	MetaKeyID = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id"
    	// MetaDataEncryptionKey is the sealed data encryption key (DEK) received from
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  5. internal/config/crypto.go

    	if err != nil {
    		return nil, err
    	}
    	return io.ReadAll(ciphertext)
    }
    
    // DecryptBytes decrypts the ciphertext using a key managed by the KMS.
    // The same context that have been used during encryption must be
    // provided.
    func DecryptBytes(k *kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) {
    	plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context)
    	if err != nil {
    		return nil, err
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 5K bytes
    - Viewed (0)
  6. internal/crypto/sse_test.go

    			"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},
    			"X-Amz-Server-Side-Encryption-Customer-Key":       []string{"MzJieXRlc2xvbmdzZWNyZXRrZXltdXN0cHJvdmlkZWQ="},
    			"X-Amz-Server-Side-Encryption-Customer-Key-Md5":   []string{"7PpPLAK26ONlVUGOWlusfg=="},
    		},
    		Bucket: "bucket",
    		Object: "object2",
    		Metadata: map[string]string{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Jun 01 21:59:40 UTC 2021
    - 8.4K bytes
    - Viewed (0)
  7. docs/distributed/decom-encrypted-sse-s3.sh

    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected versioning enabled after expansion"
    	exit 1
    fi
    
    ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled"
    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected encryption enabled after expansion"
    	exit 1
    fi
    
    ./mc mirror cmd myminio/versioned/ --quiet >/dev/null
    
    ./mc ls -r myminio/versioned/ >expanded_ns.txt
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  8. cmd/storage-datatypes_test.go

    UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEEEWw/DoTs...
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Sep 19 18:05:16 UTC 2022
    - 9.4K bytes
    - Viewed (0)
  9. internal/crypto/doc.go

    // for implementing Server-Side-Encryption (SSE-S3) and Server-Side-Encryption
    // with customer provided keys (SSE-C).
    //
    // All objects are encrypted with an unique and randomly generated 'ObjectKey'.
    // The ObjectKey itself is never stored in plaintext. Instead it is only stored
    // in a sealed from. The sealed 'ObjectKey' is created by encrypting the 'ObjectKey'
    // with an unique key-encryption-key. Given the correct key-encryption-key the
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Aug 26 19:52:29 UTC 2022
    - 5K bytes
    - Viewed (0)
  10. docs/site-replication/README.md

    - **Removing a site** is not allowed from a set of replicated sites once configured.
    - All sites must be using the **same** external IDP(s) if any.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Feb 26 21:30:28 UTC 2024
    - 3.4K bytes
    - Viewed (0)
Back to top