- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 65 for ENCRYPTION (0.16 sec)
-
internal/crypto/sse.go
"github.com/minio/sio" ) const ( // SealAlgorithm is the encryption/sealing algorithm used to derive & seal // the key-encryption-key and to en/decrypt the object data. SealAlgorithm = "DAREv2-HMAC-SHA256" // InsecureSealAlgorithm is the legacy encryption/sealing algorithm used // to derive & seal the key-encryption-key and to en/decrypt the object data.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 30 15:26:43 GMT 2022 - 4.4K bytes - Viewed (0) -
cmd/handler-utils.go
var validSSEReplicationHeaders = map[string]string{ "X-Minio-Internal-Server-Side-Encryption-Sealed-Key": "X-Minio-Replication-Server-Side-Encryption-Sealed-Key", "X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm", "X-Minio-Internal-Server-Side-Encryption-Iv": "X-Minio-Replication-Server-Side-Encryption-Iv",
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 15.5K bytes - Viewed (3) -
internal/config/compress/compress.go
type Config struct { Enabled bool `json:"enabled"` AllowEncrypted bool `json:"allow_encryption"` Extensions []string `json:"extensions"` MimeTypes []string `json:"mime-types"` } // Compression environment variables const ( Extensions = "extensions" AllowEncrypted = "allow_encryption" MimeTypes = "mime_types" EnvCompressState = "MINIO_COMPRESSION_ENABLE"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 04 19:57:37 GMT 2023 - 5K bytes - Viewed (0) -
internal/config/crypto.go
if err != nil { return nil, err } return io.ReadAll(ciphertext) } // DecryptBytes decrypts the ciphertext using a key managed by the KMS. // The same context that have been used during encryption must be // provided. func DecryptBytes(k kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) { plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context) if err != nil { return nil, err }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 4.8K bytes - Viewed (0) -
internal/crypto/error.go
func (e Error) Error() string { if e.msg == "" { return "crypto: cause <nil>" } return e.msg } var ( // ErrInvalidEncryptionMethod indicates that the specified SSE encryption method // is not supported. ErrInvalidEncryptionMethod = Errorf("The encryption method is not supported") // ErrInvalidCustomerAlgorithm indicates that the specified SSE-C algorithm // is not supported.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 4.4K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
// NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 39K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
// BucketSSEConfig - represents default bucket encryption configuration type BucketSSEConfig struct { XMLNS string `xml:"xmlns,attr,omitempty"` XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config_test.go
} if tc.keyID != "" && tc.keyID != ssec.KeyID() { t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID()) } if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) } }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 16 18:28:30 GMT 2022 - 6.1K bytes - Viewed (0) -
cmd/api-errors.go
Code: "InvalidArgument", Description: "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms", HTTPStatusCode: http.StatusBadRequest, }, ErrIncompatibleEncryptionMethod: { Code: "InvalidArgument", Description: "Server Side Encryption with Customer provided key is incompatible with the encryption method specified", HTTPStatusCode: http.StatusBadRequest,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun May 05 16:56:21 GMT 2024 - 91.4K bytes - Viewed (7) -
cmd/bucket-lifecycle.go
type RestoreRequestType string const ( // SelectRestoreRequest specifies select request. This is the only valid value SelectRestoreRequest RestoreRequestType = "SELECT" ) // Encryption specifies encryption setting on restored bucket type Encryption struct { EncryptionType sse.Algorithm `xml:"EncryptionType"` KMSContext string `xml:"KMSContext,omitempty"` KMSKeyID string `xml:"KMSKeyId,omitempty"` }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 17 05:09:58 GMT 2024 - 33.1K bytes - Viewed (0)