- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 167 for Encryption (0.05 seconds)
-
docs/site-replication/run-ssec-object-replication.sh
src_obj1_etag=$(echo "${stat_out1}" | jq '.etag') src_obj1_size=$(echo "${stat_out1}" | jq '.size') src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"') echo "Stat minio1/test-bucket/defpartsize" ./mc stat --no-list minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --jsonCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Sep 24 08:03:58 GMT 2024 - 9.9K bytes - Click Count (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
#RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then # echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though." # exit_1 #fi # Add replication siteCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Sep 24 08:03:58 GMT 2024 - 8.3K bytes - Click Count (0) -
cmd/object-multipart-handlers.go
// NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 07 16:13:09 GMT 2025 - 39.5K bytes - Click Count (1) -
cmd/object-api-options.go
} // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.3K bytes - Click Count (0) -
internal/bucket/encryption/bucket-sse-config.go
// BucketSSEConfig - represents default bucket encryption configuration type BucketSSEConfig struct { XMLNS string `xml:"xmlns,attr,omitempty"` XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Click Count (0) -
internal/bucket/encryption/bucket-sse-config_test.go
} if tc.keyID != "" && tc.keyID != ssec.KeyID() { t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID()) } if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) } }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 16 18:28:30 GMT 2022 - 6.1K bytes - Click Count (0) -
internal/http/headers.go
AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm" AmzServerSideEncryptionCopyCustomerKey = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key" AmzServerSideEncryptionCopyCustomerKeyMD5 = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5" AmzEncryptionAES = "AES256" AmzEncryptionKMS = "aws:kms"
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed May 07 15:37:12 GMT 2025 - 10.8K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
* Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**. * So, the **certificate and encryption** handling is done **before HTTP**. * **TCP doesn't know about "domains"**. Only about IP addresses.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 19:34:08 GMT 2025 - 14.3K bytes - Click Count (0) -
compat/maven-settings/src/site/apt/index.apt
* {{{https://maven.apache.org/guides/mini/guide-deployment-security-settings.html} Security and Deployment Settings}}, * {{{https://maven.apache.org/guides/mini/guide-encryption-4.html} Password Encryption}},Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Sun Nov 16 18:16:44 GMT 2025 - 2.1K bytes - Click Count (0) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 13.2K bytes - Click Count (0)