Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 52 for SSE (0.01 sec)

  1. internal/crypto/sse.go

    )
    
    // Type represents an AWS SSE type:
    //   - SSE-C
    //   - SSE-S3
    //   - SSE-KMS
    type Type interface {
    	fmt.Stringer
    
    	IsRequested(http.Header) bool
    	IsEncrypted(map[string]string) bool
    }
    
    // IsRequested returns true and the SSE Type if the HTTP headers
    // indicate that some form server-side encryption is requested.
    //
    // If no SSE headers are present then IsRequested returns false
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  2. okhttp-sse/api/okhttp-sse.api

    	public abstract fun cancel ()V
    	public abstract fun request ()Lokhttp3/Request;
    }
    
    public abstract interface class okhttp3/sse/EventSource$Factory {
    	public abstract fun newEventSource (Lokhttp3/Request;Lokhttp3/sse/EventSourceListener;)Lokhttp3/sse/EventSource;
    }
    
    public abstract class okhttp3/sse/EventSourceListener {
    	public fun <init> ()V
    	public fun onClosed (Lokhttp3/sse/EventSource;)V
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Oct 03 07:51:20 UTC 2025
    - 1.1K bytes
    - Viewed (0)
  3. internal/crypto/sse-c.go

    type ssec struct{}
    
    var (
    	// SSEC represents AWS SSE-C. It provides functionality to handle
    	// SSE-C requests.
    	SSEC = ssec{}
    
    	_ Type = SSEC
    )
    
    // String returns the SSE domain as string. For SSE-C the
    // domain is "SSE-C".
    func (ssec) String() string { return "SSE-C" }
    
    // IsRequested returns true if the HTTP headers contains
    // at least one SSE-C header. SSE-C copy headers are ignored.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  4. docs/security/README.md

    MinIO supports two different types of server-side encryption ([SSE](#sse)):
    
    - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS.
    - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
    
    ### Server-Side Encryption - Preliminaries
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  5. internal/etag/etag.go

    //
    // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3
    // and SSE-KMS - with different semantics w.r.t. ETags.
    // In case of SSE-S3, the ETag of an object is computed the same as
    // for single resp. multipart plaintext objects. In particular,
    // the ETag of a singlepart SSE-S3 object is its content MD5.
    //
    // In case of SSE-C and SSE-KMS, the ETag of an object is computed
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri May 16 14:27:42 UTC 2025
    - 13.2K bytes
    - Viewed (0)
  6. internal/crypto/error.go

    	ErrCustomerKeyMD5Mismatch = Errorf("The provided SSE-C key MD5 does not match the computed MD5 of the SSE-C key")
    	// ErrIncompatibleEncryptionMethod indicates that both SSE-C headers and SSE-S3 headers were specified, and are incompatible
    	// The client needs to remove the SSE-S3 header or the SSE-C headers
    	ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  7. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Apr 27 00:44:22 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  8. okhttp-sse/src/main/kotlin/okhttp3/sse/EventSources.kt

     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    package okhttp3.sse
    
    import okhttp3.Call
    import okhttp3.OkHttpClient
    import okhttp3.Response
    import okhttp3.sse.internal.RealEventSource
    
    object EventSources {
      @Deprecated(
        message = "required for binary-compatibility!",
        level = DeprecationLevel.HIDDEN,
      )
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Oct 03 07:51:20 UTC 2025
    - 1.6K bytes
    - Viewed (0)
  9. okhttp-sse/build.gradle.kts

      id("org.jetbrains.dokka")
      id("com.vanniktech.maven.publish.base")
      id("binary-compatibility-validator")
    }
    
    project.applyOsgi(
      "Export-Package: okhttp3.sse",
      "Bundle-SymbolicName: com.squareup.okhttp3.sse"
    )
    
    project.applyJavaModules("okhttp3.sse")
    
    dependencies {
      api(projects.okhttp)
    
      testImplementation(projects.okhttpTestingSupport)
      testImplementation(projects.mockwebserver3)
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Sun Sep 21 06:22:22 UTC 2025
    - 679 bytes
    - Viewed (0)
  10. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 38K bytes
    - Viewed (0)
Back to top