- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for predictable (0.2 sec)
-
cmd/object-multipart-handlers.go
s2c, cb := newS2CompressReader(actualReader, actualSize, wantEncryption) idxCb = cb defer s2c.Close() reader = etag.Wrap(s2c, actualReader) size = -1 // Since compressed size is un-predictable. md5hex = "" // Do not try to verify the content. sha256hex = "" } var forceMD5 []byte // Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 39K bytes - Viewed (0) -
cmd/object-handlers.go
s2c, idxCb = newS2CompressReader(actualReader, actualSize, wantEncryption) defer s2c.Close() reader = etag.Wrap(s2c, actualReader) size = -1 // Since compressed size is un-predictable. md5hex = "" // Do not try to verify the content. sha256hex = "" } var forceMD5 []byte // Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Apr 22 17:49:30 GMT 2024 - 125K bytes - Viewed (0) -
internal/etag/etag.go
// MD5 of the object. For multipart uploads the ETag is also not // the MD5 of the individual part checksums but it still contains // the number of parts as suffix. // // Instead, the ETag is kind of unpredictable for S3 clients when // an object is encrypted using SSE-C or SSE-KMS. Maybe AWS S3 // computes the ETag as MD5 of the encrypted content but there is // no way to verify this assumption since the encryption happens
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Sun Mar 10 21:09:36 GMT 2024 - 13.3K bytes - Viewed (0)