- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 33 for ecryptfs (0.26 sec)
-
internal/disk/type_linux.go
"4244": "HFS", "4d44": "MSDOS", "52654973": "REISERFS", "5346544e": "NTFS", "58465342": "XFS", "61756673": "AUFS", "6969": "NFS", "ef51": "EXT2OLD", "ef53": "EXT4", "f15f": "ecryptfs", "794c7630": "overlayfs", "2fc12fc1": "zfs", "ff534d42": "cifs", "53464846": "wslfs", } // getFSType returns the filesystem type of the underlying mounted filesystem func getFSType(ftype int64) string {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Aug 19 01:35:22 GMT 2021 - 1.6K bytes - Viewed (3) -
internal/disk/stat_linux_s390x.go
"4244": "HFS", "4d44": "MSDOS", "52654973": "REISERFS", "5346544e": "NTFS", "58465342": "XFS", "61756673": "AUFS", "6969": "NFS", "ef51": "EXT2OLD", "ef53": "EXT4", "f15f": "ecryptfs", "794c7630": "overlayfs", "2fc12fc1": "zfs", "ff534d42": "cifs", "53464846": "wslfs", } // getFSType returns the filesystem type of the underlying mounted filesystem func getFSType(ftype uint32) string {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Feb 26 19:34:50 GMT 2024 - 2.6K bytes - Viewed (2) -
internal/disk/stat_linux_32bit.go
"4244": "HFS", "4d44": "MSDOS", "52654973": "REISERFS", "5346544e": "NTFS", "58465342": "XFS", "61756673": "AUFS", "6969": "NFS", "ef51": "EXT2OLD", "ef53": "EXT4", "f15f": "ecryptfs", "794c7630": "overlayfs", "2fc12fc1": "zfs", "ff534d42": "cifs", "53464846": "wslfs", } // getFSType returns the filesystem type of the underlying mounted filesystem func getFSType(ftype int32) string {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Feb 26 19:34:50 GMT 2024 - 2.6K bytes - Viewed (0) -
internal/crypto/sse.go
return r } // EncryptMultiPart encrypts an io.Reader which must be the body of // multi-part PUT request. It derives an unique encryption key from // the partID and the object key. func EncryptMultiPart(r io.Reader, partID int, key ObjectKey) io.Reader { partKey := key.DerivePartKey(uint32(partID)) return EncryptSinglePart(r, ObjectKey(partKey)) } // DecryptSinglePart decrypts an io.Writer which must an object
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Tue Aug 30 15:26:43 GMT 2022 - 4.4K bytes - Viewed (0) -
internal/config/crypto.go
jsoniter "github.com/json-iterator/go" "github.com/minio/minio/internal/fips" "github.com/minio/minio/internal/kms" "github.com/secure-io/sio-go" "github.com/secure-io/sio-go/sioutil" ) // EncryptBytes encrypts the plaintext with a key managed by KMS. // The context is bound to the returned ciphertext. // // The same context must be provided when decrypting the // ciphertext.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 4.8K bytes - Viewed (0) -
internal/crypto/key.go
Key [64]byte // The encrypted and authenticated object-key. IV [32]byte // The random IV used to encrypt the object-key. Algorithm string // The sealing algorithm used to encrypt the object key. } // Seal encrypts the ObjectKey using the 256 bit external key and IV. The sealed // key is also cryptographically bound to the object's path (bucket/object) and the // domain (SSE-C or SSE-S3).
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Tue Mar 19 20:28:10 GMT 2024 - 6.4K bytes - Viewed (0) -
cmd/encryption-v1.go
if strings.HasPrefix(kmsID, ARNPrefix) { return kmsID } return ARNPrefix + kmsID } // DecryptETags decryptes the ETag of all ObjectInfos using the KMS. // // It adjusts the size of all encrypted objects since encrypted // objects are slightly larger due to encryption overhead. // Further, it decrypts all single-part SSE-S3 encrypted objects // and formats ETags of SSE-C / SSE-KMS encrypted objects to // be AWS S3 compliant.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 36.5K bytes - Viewed (0) -
internal/kms/kes.go
c.lock.RLock() defer c.lock.RUnlock() return c.client.ImportKey(ctx, keyID, &kes.ImportKeyRequest{ Key: bytes, }) } // EncryptKey Encrypts and authenticates a (small) plaintext with the cryptographic key // The plaintext must not exceed 1 MB func (c *kesClient) EncryptKey(keyID string, plaintext []byte, ctx Context) ([]byte, error) { c.lock.RLock()
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Tue Apr 16 15:43:39 GMT 2024 - 14.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
Java - Registered: Sun Apr 28 00:10:09 GMT 2024 - Last Modified: Fri Mar 22 20:39:42 GMT 2019 - 21.4K bytes - Viewed (0) -
docs/security/README.md
## Server-Side Encryption MinIO supports two different types of server-side encryption ([SSE](#sse)): - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS. - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
Plain Text - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 13.8K bytes - Viewed (0)