Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 31 - 40 of 167 for Encryption (0.05 seconds)

  1. docs/site-replication/run-ssec-object-replication.sh

    src_obj1_etag=$(echo "${stat_out1}" | jq '.etag')
    src_obj1_size=$(echo "${stat_out1}" | jq '.size')
    src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"')
    echo "Stat minio1/test-bucket/defpartsize"
    ./mc stat --no-list minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --json
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Sep 24 08:03:58 GMT 2024
    - 9.9K bytes
    - Click Count (0)
  2. docs/site-replication/run-ssec-object-replication-with-compression.sh

    #RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1)
    #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then
    #	echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though."
    #	exit_1
    #fi
    
    # Add replication site
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Sep 24 08:03:58 GMT 2024
    - 8.3K bytes
    - Click Count (0)
  3. cmd/object-multipart-handlers.go

    // NewMultipartUploadHandler - New multipart upload.
    // Notice: The S3 client can send secret keys in headers for encryption related jobs,
    // the handler should ensure to remove these keys before sending them to the object layer.
    // Currently these keys are:
    //   - X-Amz-Server-Side-Encryption-Customer-Key
    //   - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key
    func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 07 16:13:09 GMT 2025
    - 39.5K bytes
    - Click Count (1)
  4. cmd/object-api-options.go

    }
    
    // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata
    func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) {
    	return putOptsFromReq(ctx, r, bucket, object, metadata)
    }
    
    // get ObjectOptions for Copy calls with encryption headers provided on the source side
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  5. internal/bucket/encryption/bucket-sse-config.go

    // BucketSSEConfig - represents default bucket encryption configuration
    type BucketSSEConfig struct {
    	XMLNS   string   `xml:"xmlns,attr,omitempty"`
    	XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"`
    	Rules   []Rule   `xml:"Rule"`
    }
    
    // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config
    func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 4.9K bytes
    - Click Count (0)
  6. internal/bucket/encryption/bucket-sse-config_test.go

    		}
    
    		if tc.keyID != "" && tc.keyID != ssec.KeyID() {
    			t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID())
    		}
    
    		if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) {
    			t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML)
    		}
    	}
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 16 18:28:30 GMT 2022
    - 6.1K bytes
    - Click Count (0)
  7. internal/http/headers.go

    	AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm"
    	AmzServerSideEncryptionCopyCustomerKey       = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key"
    	AmzServerSideEncryptionCopyCustomerKeyMD5    = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5"
    
    	AmzEncryptionAES = "AES256"
    	AmzEncryptionKMS = "aws:kms"
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed May 07 15:37:12 GMT 2025
    - 10.8K bytes
    - Click Count (0)
  8. docs/en/docs/deployment/https.md

    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
        * So, the **certificate and encryption** handling is done **before HTTP**.
    * **TCP doesn't know about "domains"**. Only about IP addresses.
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 19:34:08 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  9. compat/maven-settings/src/site/apt/index.apt

      * {{{https://maven.apache.org/guides/mini/guide-deployment-security-settings.html} Security and Deployment Settings}},
    
      * {{{https://maven.apache.org/guides/mini/guide-encryption-4.html} Password Encryption}},
    
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Sun Nov 16 18:16:44 GMT 2025
    - 2.1K bytes
    - Click Count (0)
  10. internal/etag/etag.go

    //
    //	For example: ceb8853ddc5086cc4ab9e149f8f09c88-5
    //
    // However, this scheme is only used for multipart objects that are
    // not encrypted.
    //
    // # Server-side Encryption
    //
    // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3
    // and SSE-KMS - with different semantics w.r.t. ETags.
    // In case of SSE-S3, the ETag of an object is computed the same as
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri May 16 14:27:42 GMT 2025
    - 13.2K bytes
    - Click Count (0)
Back to Top