- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 52 for SSE (0.01 sec)
-
internal/crypto/sse.go
) // Type represents an AWS SSE type: // - SSE-C // - SSE-S3 // - SSE-KMS type Type interface { fmt.Stringer IsRequested(http.Header) bool IsEncrypted(map[string]string) bool } // IsRequested returns true and the SSE Type if the HTTP headers // indicate that some form server-side encryption is requested. // // If no SSE headers are present then IsRequested returns falseRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
okhttp-sse/api/okhttp-sse.api
public abstract fun cancel ()V public abstract fun request ()Lokhttp3/Request; } public abstract interface class okhttp3/sse/EventSource$Factory { public abstract fun newEventSource (Lokhttp3/Request;Lokhttp3/sse/EventSourceListener;)Lokhttp3/sse/EventSource; } public abstract class okhttp3/sse/EventSourceListener { public fun <init> ()V public fun onClosed (Lokhttp3/sse/EventSource;)V
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Oct 03 07:51:20 UTC 2025 - 1.1K bytes - Viewed (0) -
internal/crypto/sse-c.go
type ssec struct{} var ( // SSEC represents AWS SSE-C. It provides functionality to handle // SSE-C requests. SSEC = ssec{} _ Type = SSEC ) // String returns the SSE domain as string. For SSE-C the // domain is "SSE-C". func (ssec) String() string { return "SSE-C" } // IsRequested returns true if the HTTP headers contains // at least one SSE-C header. SSE-C copy headers are ignored.Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 5.2K bytes - Viewed (0) -
docs/security/README.md
MinIO supports two different types of server-side encryption ([SSE](#sse)): - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS. - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3). ### Server-Side Encryption - Preliminaries
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
internal/etag/etag.go
// // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as // for single resp. multipart plaintext objects. In particular, // the ETag of a singlepart SSE-S3 object is its content MD5. // // In case of SSE-C and SSE-KMS, the ETag of an object is computed
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 16 14:27:42 UTC 2025 - 13.2K bytes - Viewed (0) -
internal/crypto/error.go
ErrCustomerKeyMD5Mismatch = Errorf("The provided SSE-C key MD5 does not match the computed MD5 of the SSE-C key") // ErrIncompatibleEncryptionMethod indicates that both SSE-C headers and SSE-S3 headers were specified, and are incompatible // The client needs to remove the SSE-S3 header or the SSE-C headers ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.4K bytes - Viewed (0) -
Makefile
@echo "Running tests for automatic site replication of SSE-C objects" @(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket" @(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Apr 27 00:44:22 UTC 2025 - 11.2K bytes - Viewed (0) -
okhttp-sse/src/main/kotlin/okhttp3/sse/EventSources.kt
* See the License for the specific language governing permissions and * limitations under the License. */ package okhttp3.sse import okhttp3.Call import okhttp3.OkHttpClient import okhttp3.Response import okhttp3.sse.internal.RealEventSource object EventSources { @Deprecated( message = "required for binary-compatibility!", level = DeprecationLevel.HIDDEN, )Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Oct 03 07:51:20 UTC 2025 - 1.6K bytes - Viewed (0) -
okhttp-sse/build.gradle.kts
id("org.jetbrains.dokka") id("com.vanniktech.maven.publish.base") id("binary-compatibility-validator") } project.applyOsgi( "Export-Package: okhttp3.sse", "Bundle-SymbolicName: com.squareup.okhttp3.sse" ) project.applyJavaModules("okhttp3.sse") dependencies { api(projects.okhttp) testImplementation(projects.okhttpTestingSupport) testImplementation(projects.mockwebserver3)
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Sep 21 06:22:22 UTC 2025 - 679 bytes - Viewed (0) -
cmd/encryption-v1.go
return objInfo.ETag } } // As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data. // Since server side copy with same source and dest just replaces the ETag, we save // encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag // encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0)