- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 46 for ecryptfs (0.07 sec)
-
internal/kms/kes.go
func (c *kesConn) ImportKey(ctx context.Context, keyID string, bytes []byte) error { return c.client.ImportKey(ctx, keyID, &kes.ImportKeyRequest{ Key: bytes, }) } // EncryptKey Encrypts and authenticates a (small) plaintext with the cryptographic key // The plaintext must not exceed 1 MB func (c *kesConn) EncryptKey(keyID string, plaintext []byte, ctx Context) ([]byte, error) {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 7.3K bytes - Viewed (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/SettingsDecrypter.java
* under the License. */ package org.apache.maven.settings.crypto; /** * Decrypts passwords in the settings. * * @deprecated since 4.0.0 */ @Deprecated(since = "4.0.0") public interface SettingsDecrypter { /** * Decrypts passwords in the settings. * * @param request The settings decryption request that holds the parameters, must not be {@code null}.Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 1.3K bytes - Viewed (0) -
cmd/encryption-v1.go
if strings.HasPrefix(kmsID, ARNPrefix) { return kmsID } return ARNPrefix + kmsID } // DecryptETags decryptes the ETag of all ObjectInfos using the KMS. // // It adjusts the size of all encrypted objects since encrypted // objects are slightly larger due to encryption overhead. // Further, it decrypts all single-part SSE-S3 encrypted objects // and formats ETags of SSE-C / SSE-KMS encrypted objects to // be AWS S3 compliant.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0) -
cmd/s3-zip-handlers.go
} files.OptimizeSize() zipInfo, err := files.Serialize() if err != nil { return nil, err } at := archiveType zipInfoStr := string(zipInfo) if opts.EncryptFn != nil { at = archiveTypeEnc zipInfoStr = string(opts.EncryptFn(archiveTypeEnc, zipInfo)) } srcInfo.UserDefined[archiveTypeMetadataKey] = at popts := ObjectOptions{ MTime: srcInfo.ModTime, VersionID: srcInfo.VersionID,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 15.8K bytes - Viewed (0) -
docs/kms/README.md
# KMS Guide [](https://slack.min.io) MinIO uses a key-management-system (KMS) to support SSE-S3. If a client requests SSE-S3, or auto-encryption is enabled, the MinIO server encrypts each object with a unique object key which is protected by a master key managed by the KMS. ## Quick Start
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.2K bytes - Viewed (0) -
internal/crypto/sse-s3.go
func (sses3) IsEncrypted(metadata map[string]string) bool { if _, ok := metadata[MetaSealedKeyS3]; ok { return true } return false } // UnsealObjectKey extracts and decrypts the sealed object key // from the metadata using KMS and returns the decrypted object // key. func (s3 sses3) UnsealObjectKey(k *kms.KMS, metadata map[string]string, bucket, object string) (key ObjectKey, err error) {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
docs/security/README.md
## Server-Side Encryption MinIO supports two different types of server-side encryption ([SSE](#sse)): - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS. - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
internal/kms/secret-key.go
func (s secretKey) CreateKey(_ context.Context, req *CreateKeyRequest) error { if req.Name != s.keyID { return ErrNotSupported } return ErrKeyExists } // GenerateKey decrypts req.Ciphertext. The key name req.Name must match the key // name of the secretKey. // // The returned DEK is encrypted using AES-GCM and the ciphertext format is compatible // with KES and MinKMS.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Apr 21 16:23:51 UTC 2025 - 8.4K bytes - Viewed (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java
import org.apache.maven.settings.building.SettingsProblem.Severity; import org.codehaus.plexus.components.secdispatcher.SecDispatcher; import org.codehaus.plexus.components.secdispatcher.SecDispatcherException; /** * Decrypts passwords in the settings. * * @deprecated since 4.0.0 */ @Named @Singleton @Deprecated(since = "4.0.0") public class DefaultSettingsDecrypter implements SettingsDecrypter {Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Sat Nov 16 13:55:43 UTC 2024 - 6K bytes - Viewed (0) -
docs/kms/IAM.md
## FAQ > Why is this change needed? Before, there were two separate mechanisms - S3 objects got encrypted using a KMS, if present, and the IAM / configuration data got encrypted with the root credentials. Now, MinIO encrypts IAM / configuration and S3 objects with a KMS, if present. This change unified the key-management aspect within MinIO. The unified KMS-based approach has several advantages:
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0)