Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 33 for ecryptfs (0.26 sec)

  1. internal/disk/type_linux.go

    	"4244":     "HFS",
    	"4d44":     "MSDOS",
    	"52654973": "REISERFS",
    	"5346544e": "NTFS",
    	"58465342": "XFS",
    	"61756673": "AUFS",
    	"6969":     "NFS",
    	"ef51":     "EXT2OLD",
    	"ef53":     "EXT4",
    	"f15f":     "ecryptfs",
    	"794c7630": "overlayfs",
    	"2fc12fc1": "zfs",
    	"ff534d42": "cifs",
    	"53464846": "wslfs",
    }
    
    // getFSType returns the filesystem type of the underlying mounted filesystem
    func getFSType(ftype int64) string {
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Aug 19 01:35:22 GMT 2021
    - 1.6K bytes
    - Viewed (3)
  2. internal/disk/stat_linux_s390x.go

    	"4244":     "HFS",
    	"4d44":     "MSDOS",
    	"52654973": "REISERFS",
    	"5346544e": "NTFS",
    	"58465342": "XFS",
    	"61756673": "AUFS",
    	"6969":     "NFS",
    	"ef51":     "EXT2OLD",
    	"ef53":     "EXT4",
    	"f15f":     "ecryptfs",
    	"794c7630": "overlayfs",
    	"2fc12fc1": "zfs",
    	"ff534d42": "cifs",
    	"53464846": "wslfs",
    }
    
    // getFSType returns the filesystem type of the underlying mounted filesystem
    func getFSType(ftype uint32) string {
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Mon Feb 26 19:34:50 GMT 2024
    - 2.6K bytes
    - Viewed (2)
  3. internal/disk/stat_linux_32bit.go

    	"4244":     "HFS",
    	"4d44":     "MSDOS",
    	"52654973": "REISERFS",
    	"5346544e": "NTFS",
    	"58465342": "XFS",
    	"61756673": "AUFS",
    	"6969":     "NFS",
    	"ef51":     "EXT2OLD",
    	"ef53":     "EXT4",
    	"f15f":     "ecryptfs",
    	"794c7630": "overlayfs",
    	"2fc12fc1": "zfs",
    	"ff534d42": "cifs",
    	"53464846": "wslfs",
    }
    
    // getFSType returns the filesystem type of the underlying mounted filesystem
    func getFSType(ftype int32) string {
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Mon Feb 26 19:34:50 GMT 2024
    - 2.6K bytes
    - Viewed (0)
  4. internal/crypto/sse.go

    	return r
    }
    
    // EncryptMultiPart encrypts an io.Reader which must be the body of
    // multi-part PUT request. It derives an unique encryption key from
    // the partID and the object key.
    func EncryptMultiPart(r io.Reader, partID int, key ObjectKey) io.Reader {
    	partKey := key.DerivePartKey(uint32(partID))
    	return EncryptSinglePart(r, ObjectKey(partKey))
    }
    
    // DecryptSinglePart decrypts an io.Writer which must an object
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Aug 30 15:26:43 GMT 2022
    - 4.4K bytes
    - Viewed (0)
  5. internal/config/crypto.go

    	jsoniter "github.com/json-iterator/go"
    	"github.com/minio/minio/internal/fips"
    	"github.com/minio/minio/internal/kms"
    	"github.com/secure-io/sio-go"
    	"github.com/secure-io/sio-go/sioutil"
    )
    
    // EncryptBytes encrypts the plaintext with a key managed by KMS.
    // The context is bound to the returned ciphertext.
    //
    // The same context must be provided when decrypting the
    // ciphertext.
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Mon Mar 06 16:56:10 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  6. internal/crypto/key.go

    	Key       [64]byte // The encrypted and authenticated object-key.
    	IV        [32]byte // The random IV used to encrypt the object-key.
    	Algorithm string   // The sealing algorithm used to encrypt the object key.
    }
    
    // Seal encrypts the ObjectKey using the 256 bit external key and IV. The sealed
    // key is also cryptographically bound to the object's path (bucket/object) and the
    // domain (SSE-C or SSE-S3).
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Mar 19 20:28:10 GMT 2024
    - 6.4K bytes
    - Viewed (0)
  7. cmd/encryption-v1.go

    	if strings.HasPrefix(kmsID, ARNPrefix) {
    		return kmsID
    	}
    	return ARNPrefix + kmsID
    }
    
    // DecryptETags decryptes the ETag of all ObjectInfos using the KMS.
    //
    // It adjusts the size of all encrypted objects since encrypted
    // objects are slightly larger due to encryption overhead.
    // Further, it decrypts all single-part SSE-S3 encrypted objects
    // and formats ETags of SSE-C / SSE-KMS encrypted objects to
    // be AWS S3 compliant.
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 36.5K bytes
    - Viewed (0)
  8. internal/kms/kes.go

    	c.lock.RLock()
    	defer c.lock.RUnlock()
    
    	return c.client.ImportKey(ctx, keyID, &kes.ImportKeyRequest{
    		Key: bytes,
    	})
    }
    
    // EncryptKey Encrypts and authenticates a (small) plaintext with the cryptographic key
    // The plaintext must not exceed 1 MB
    func (c *kesClient) EncryptKey(keyID string, plaintext []byte, ctx Context) ([]byte, error) {
    	c.lock.RLock()
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Tue Apr 16 15:43:39 GMT 2024
    - 14.9K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb1/util/DES.java

        }
    
        /// Decrypt a block of bytes.
        public void decrypt( byte[] cipherText, byte[] clearText ) {
    
            decrypt( cipherText, 0, clearText, 0 );
        }
    
        /**
         * encrypts an array where the length must be a multiple of 8
         */
        public byte[] encrypt(byte[] clearText) {
    
            int length = clearText.length;
    
            if (length % 8 != 0) {
    Java
    - Registered: Sun Apr 28 00:10:09 GMT 2024
    - Last Modified: Fri Mar 22 20:39:42 GMT 2019
    - 21.4K bytes
    - Viewed (0)
  10. docs/security/README.md

    ## Server-Side Encryption
    
    MinIO supports two different types of server-side encryption ([SSE](#sse)):
    
    - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS.
    - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
    
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 13.8K bytes
    - Viewed (0)
Back to top