- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 331 for sido (0.02 sec)
-
docs/iam/policies/deny-non-sse-kms-objects.json
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 413 bytes - Viewed (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/samr.idl
[in] uint32_t access_mask, [in] uint32_t rid, [out] policy_handle *alias_handle); [op(0x21)] int SamrGetMembersInAlias([in] policy_handle *alias_handle, [out] LsarSidArray *sids); typedef [v1_enum] enum { SE_GROUP_MANDATORY = 0x00000001, SE_GROUP_ENABLED_BY_DEFAULT = 0x00000002, SE_GROUP_ENABLED = 0x00000004, SE_GROUP_OWNER = 0x00000008,
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 3.1K bytes - Viewed (0) -
internal/crypto/sse.go
return } // EncryptSinglePart encrypts an io.Reader which must be the // body of a single-part PUT request. func EncryptSinglePart(r io.Reader, key ObjectKey) io.Reader { r, err := sio.EncryptReader(r, sio.Config{MinVersion: sio.Version20, Key: key[:], CipherSuites: fips.DARECiphers()}) if err != nil { logger.CriticalIf(context.Background(), errors.New("Unable to encrypt io.Reader using object key")) } return r }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 30 15:26:43 UTC 2022 - 4.4K bytes - Viewed (0) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
docs/bucket/replication/sio-error.sh
Poorna <******@****.***> 1716056341 -0700
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat May 18 18:19:01 UTC 2024 - 1.7K bytes - Viewed (0) -
cmd/encryption-v1.go
objectEncryptionKey, err := newEncryptMetadata(ctx, kind, keyID, key, bucket, object, metadata, cryptoCtx) if err != nil { return nil, crypto.ObjectKey{}, err } reader, err := sio.EncryptReader(content, sio.Config{Key: objectEncryptionKey[:], MinVersion: sio.Version20, CipherSuites: fips.DARECiphers()}) if err != nil { return nil, crypto.ObjectKey{}, crypto.ErrInvalidCustomerKey } return reader, objectEncryptionKey, nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
docs/sts/assume-role.md
- To be able to easily get the temporary credentials to upload to a prefix. Make it possible for a client to upload a whole folder using the session. The server side applications need not create a presigned URL and serve to the client for each file. Since, the client would have the session it can do it by itself.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/dcerpc/msrpc/samr.idl
[in] uint32_t access_mask, [in] uint32_t rid, [out] policy_handle *alias_handle); [op(0x21)] int SamrGetMembersInAlias([in] policy_handle *alias_handle, [out] LsarSidArray *sids); typedef [v1_enum] enum { SE_GROUP_MANDATORY = 0x00000001, SE_GROUP_ENABLED_BY_DEFAULT = 0x00000002, SE_GROUP_ENABLED = 0x00000004, SE_GROUP_OWNER = 0x00000008,
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 3.1K bytes - Viewed (0) -
Makefile
test-iam-import-with-openid: install-race @echo "Test IAM import configurations with openid" @env bash $(PWD)/docs/distributed/iam-import-with-openid.sh test-sio-error: @(env bash $(PWD)/docs/bucket/replication/sio-error.sh) test-replication-2site: @(env bash $(PWD)/docs/bucket/replication/setup_2site_existing_replication.sh) test-replication-3site:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 11.1K bytes - Viewed (0) -
docs/bucket/replication/README.md
bject-retention.html) enabled. Similarly objects encrypted on the server side, will be replicated if destination also supports encryption. Replication status can be seen in the metadata on the source and destination objects. On the source side, the `X-Amz-Replication-Status` changes from `PENDING` to `COMPLETED` or `FAILED` after replication attempt either succeeded or failed respectively. On the destination side, a `X-Amz-Replication-Status` status of `REPLICA` indicates that the object...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jan 24 23:46:33 UTC 2023 - 18.2K bytes - Viewed (0)