Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 182 for encrypter (0.18 sec)

  1. cmd/encryption-v1_test.go

    	for i, test := range decryptObjectMetaTests {
    		if encrypted, err := DecryptObjectInfo(&test.info, test.request); err != test.expErr {
    			t.Errorf("Test %d: Decryption returned wrong error code: got %d , want %d", i, err, test.expErr)
    		} else if _, enc := crypto.IsEncrypted(test.info.UserDefined); encrypted && enc != encrypted {
    			t.Errorf("Test %d: Decryption thinks object is encrypted but it is not", i)
    		} else if !encrypted && enc != encrypted {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Sep 24 04:17:08 UTC 2022
    - 19.9K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/core/crypto/CachedCipher.java

            } finally {
                offerEncryptoCipher(cipher);
            }
            return encrypted;
        }
    
        public byte[] encrypto(final byte[] data, final Key key) {
            final Cipher cipher = pollEncryptoCipher(key);
            byte[] encrypted;
            try {
                encrypted = cipher.doFinal(data);
            } catch (final IllegalBlockSizeException e) {
    Registered: Fri Nov 01 20:58:10 UTC 2024
    - Last Modified: Thu Mar 07 01:59:08 UTC 2024
    - 8.1K bytes
    - Viewed (0)
  3. internal/crypto/metadata.go

    	// MetaKeyID is the KMS master key ID used to generate/encrypt the data
    	// encryption key (DEK).
    	MetaKeyID = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id"
    	// MetaDataEncryptionKey is the sealed data encryption key (DEK) received from
    	// the KMS.
    	MetaDataEncryptionKey = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key"
    
    	// MetaSsecCRC is the encrypted checksum of the SSE-C encrypted object.
    	MetaSsecCRC = "X-Minio-Replication-Ssec-Crc"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  4. docs/debugging/README.md

    }
    ```
    
    Optionally `--encrypt` can be specified. This will output an encrypted file and a decryption key:
    
    ```
    $ mc support inspect --encrypt play/test123/test*/*/part.*
    mc: Encrypted file data successfully downloaded as inspect.ad2b43d8.enc
    mc: Decryption key: ad2b43d847fdb14e54c5836200177f7158b3f745433525f5d23c0e0208e50c9948540b54
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Feb 25 01:17:53 UTC 2022
    - 8.7K bytes
    - Viewed (0)
  5. docs/kms/IAM.md

    ## FAQ
    
    > Why is this change needed?
    
    Before, there were two separate mechanisms - S3 objects got encrypted using a KMS,
    if present, and the IAM / configuration data got encrypted with the root credentials.
    Now, MinIO encrypts IAM / configuration and S3 objects with a KMS, if present. This
    change unified the key-management aspect within MinIO.
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  6. docs/bucket/replication/setup_3site_replication.sh

    multipart-debug --endpoint 127.0.0.1:9002 --accesskey minio --secretkey minio123 multipart complete --bucket bucket --object new-test-encrypted-object --uploadid ${upload_id} 1.${etag_1} 2.${etag_2}
    
    sleep 10
    
    ./mc stat --no-list sitea/bucket/new-test-encrypted-object
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 10.3K bytes
    - Viewed (0)
  7. cmd/object-multipart-handlers.go

    		writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    		return
    	}
    
    	// We have to adjust the size of encrypted parts since encrypted parts
    	// are slightly larger due to encryption overhead.
    	// Further, we have to adjust the ETags of parts when using SSE-S3.
    	// Due to AWS S3, SSE-S3 encrypted parts return the plaintext ETag
    	// being the content MD5 of that particular part. This is not the
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  8. internal/etag/etag.go

    }
    
    // IsEncrypted reports whether the ETag is encrypted.
    func (e ETag) IsEncrypted() bool {
    	// An encrypted ETag must be at least 32 bytes long.
    	// It contains the encrypted ETag value + an authentication
    	// code generated by the AEAD cipher.
    	//
    	// Here is an incorrect implementation of IsEncrypted:
    	//
    	//   return len(e) > 16 && !bytes.ContainsRune(e, '-')
    	//
    	// An encrypted ETag may contain some random bytes - e.g.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Mar 10 21:09:36 UTC 2024
    - 13.3K bytes
    - Viewed (0)
  9. docs/security/README.md

    
    1a) Send encrypted data key and master key ID to KMS.
    1b) Receive decrypted data key.
    2)  Decrypt encrypted object key with the KEK derived from the data key.
    3a) Receive new plain data key from the KMS using the master key ID of the server config.
    3b) Receive encrypted form of the data key from the KMS.
    4)  Derive a new KEK from the new data key and re-encrypt the OEK with it.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
  10. internal/config/crypto.go

    	if err != nil {
    		return nil, err
    	}
    	return io.ReadAll(plaintext)
    }
    
    // Encrypt encrypts the plaintext with a key managed by KMS.
    // The context is bound to the returned ciphertext.
    //
    // The same context must be provided when decrypting the
    // ciphertext.
    func Encrypt(k *kms.KMS, plaintext io.Reader, ctx kms.Context) (io.Reader, error) {
    	algorithm := sio.AES_256_GCM
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 5K bytes
    - Viewed (0)
Back to top