Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for predictable (0.2 sec)

  1. cmd/object-multipart-handlers.go

    		s2c, cb := newS2CompressReader(actualReader, actualSize, wantEncryption)
    		idxCb = cb
    		defer s2c.Close()
    		reader = etag.Wrap(s2c, actualReader)
    		size = -1   // Since compressed size is un-predictable.
    		md5hex = "" // Do not try to verify the content.
    		sha256hex = ""
    	}
    
    	var forceMD5 []byte
    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 39K bytes
    - Viewed (0)
  2. cmd/object-handlers.go

    		s2c, idxCb = newS2CompressReader(actualReader, actualSize, wantEncryption)
    		defer s2c.Close()
    
    		reader = etag.Wrap(s2c, actualReader)
    		size = -1   // Since compressed size is un-predictable.
    		md5hex = "" // Do not try to verify the content.
    		sha256hex = ""
    	}
    
    	var forceMD5 []byte
    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Mon Apr 22 17:49:30 GMT 2024
    - 125K bytes
    - Viewed (0)
  3. internal/etag/etag.go

    // MD5 of the object. For multipart uploads the ETag is also not
    // the MD5 of the individual part checksums but it still contains
    // the number of parts as suffix.
    //
    // Instead, the ETag is kind of unpredictable for S3 clients when
    // an object is encrypted using SSE-C or SSE-KMS. Maybe AWS S3
    // computes the ETag as MD5 of the encrypted content but there is
    // no way to verify this assumption since the encryption happens
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sun Mar 10 21:09:36 GMT 2024
    - 13.3K bytes
    - Viewed (0)
Back to top