- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 1,246 for sset (0.06 sec)
-
cmd/object-handlers.go
w.Header().Set(xhttp.AmzServerSideEncryptionKmsContext, kmsCtx) } case crypto.SSEC: // Validate the SSE-C Key set in the header. if _, err = crypto.SSEC.UnsealObjectKey(r.Header, objInfo.UserDefined, bucket, object); err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0) -
docs/debugging/xattr/main.go
return xattr.LSet(path, name, data) } func main() { flag.StringVar(&path, "path", "", "path name where the attribute shall be applied") flag.StringVar(&name, "name", "", "attribute name or it can be a wildcard if '.' is specified") flag.Uint64Var(&value, "value", 0, "attribute value expects the value to be uint64") flag.BoolVar(&set, "set", false, "this is a set attribute operation") flag.Parse()
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Dec 29 23:52:41 UTC 2023 - 3.2K bytes - Viewed (0) -
cmd/encryption-v1.go
} } // As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data. // Since server side copy with same source and dest just replaces the ETag, we save // encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag // encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/metrics-v3-cluster-erasure-set.go
labels := []string{poolIDL, poolLV, setIDL, setLV} m.Set(erasureSetReadQuorum, float64(h.ReadQuorum), labels...) m.Set(erasureSetWriteQuorum, float64(h.WriteQuorum), labels...) m.Set(erasureSetOnlineDrivesCount, float64(h.HealthyDrives), labels...) m.Set(erasureSetHealingDrivesCount, float64(h.HealingDrives), labels...) m.Set(erasureSetHealth, b2f(h.Healthy), labels...) readHealthy := true
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 14 07:25:56 UTC 2024 - 4.4K bytes - Viewed (0) -
android/guava/src/com/google/common/base/Optional.java
/** * Returns an immutable singleton {@link Set} whose only element is the contained instance if it * is present; an empty immutable {@link Set} otherwise. * * <p><b>Comparison to {@code java.util.Optional}:</b> this method has no equivalent in Java 8's * {@code Optional} class. However, this common usage: * * <pre>{@code * for (Foo foo : possibleFoo.asSet()) { * doSomethingWith(foo); * }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 14:20:11 UTC 2024 - 15.4K bytes - Viewed (0) -
cmd/api-response.go
switch kind, _ := crypto.IsEncrypted(object.UserDefined); kind { case crypto.S3: content.UserMetadata.Set(xhttp.AmzServerSideEncryption, xhttp.AmzEncryptionAES) case crypto.S3KMS: content.UserMetadata.Set(xhttp.AmzServerSideEncryption, xhttp.AmzEncryptionKMS) case crypto.SSEC: content.UserMetadata.Set(xhttp.AmzServerSideEncryptionCustomerAlgorithm, xhttp.AmzEncryptionAES) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 19:27:06 UTC 2024 - 33.4K bytes - Viewed (0) -
docs/iam/policies/deny-non-sse-kms-objects.json
Shubhendu <******@****.***> 1715701387 +0530
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 413 bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/riscv64.s
BEXT X26, X28, X29 // b35eae49 BEXT $63, X28 // 135efe4b BEXTI $1, X29, X30 // 13df1e48 BINV X30, X5, X6 // 3393e269 BINV $63, X6 // 1313f36b BINVI $1, X7, X8 // 13941368 BSET X8, X9, X10 // 33958428 BSET $63, X9 // 9394f42b BSETI $1, X10, X11 // 93151528 // // Privileged ISA // // 3.3.1: Environment Call and Breakpoint ECALL // 73000000 SCALL // 73000000
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0) -
Makefile
@echo "Running tests for automatic site replication of SSE-C objects" @(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket" @(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 11.1K bytes - Viewed (0) -
internal/http/headers.go
AmzMetaUnencryptedContentLength = "X-Amz-Meta-X-Amz-Unencrypted-Content-Length" AmzMetaUnencryptedContentMD5 = "X-Amz-Meta-X-Amz-Unencrypted-Content-Md5" // AWS server-side encryption headers for SSE-S3, SSE-KMS and SSE-C. AmzServerSideEncryption = "X-Amz-Server-Side-Encryption" AmzServerSideEncryptionKmsID = AmzServerSideEncryption + "-Aws-Kms-Key-Id"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 28 15:31:56 UTC 2024 - 10.4K bytes - Viewed (0)