- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 174 for ENCRYPTION (0.18 sec)
-
internal/config/crypto.go
if err != nil { return nil, err } return io.ReadAll(ciphertext) } // DecryptBytes decrypts the ciphertext using a key managed by the KMS. // The same context that have been used during encryption must be // provided. func DecryptBytes(k kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) { plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context) if err != nil { return nil, err }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 4.8K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
// BucketSSEConfig - represents default bucket encryption configuration type BucketSSEConfig struct { XMLNS string `xml:"xmlns,attr,omitempty"` XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
src_obj1_keyid=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id"') echo "Stat minio1/test-bucket/defpartsize" ./mc stat minio1/test-bucket/defpartsize --insecure --json stat_out2=$(./mc stat minio1/test-bucket/defpartsize --insecure --json) src_obj2_algo=$(echo "${stat_out2}" | jq '.metadata."X-Amz-Server-Side-Encryption"')
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 08:43:09 GMT 2024 - 10K bytes - Viewed (0) -
docs/kms/IAM.md
The unified KMS-based approach has several advantages: - Key management is now centralized. There is one way to change or rotate encryption keys. There used to be two different mechanisms - one for regular S3 objects and one for IAM data. - Reduced server startup time. For IAM encryption with the root credentials, MinIO had to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Viewed (0) -
cmd/object-api-options.go
} // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Apr 20 09:05:54 GMT 2024 - 14.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/nego/Smb2NegotiateResponse.java
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Mar 22 10:09:46 GMT 2020 - 17.6K bytes - Viewed (0) -
docs/site-replication/README.md
- **Removing a site** is not allowed from a set of replicated sites once configured. - All sites must be using the **same** external IDP(s) if any.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Feb 26 21:30:28 GMT 2024 - 3.4K bytes - Viewed (0) -
cmd/api-errors.go
Code: "InvalidArgument", Description: "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms", HTTPStatusCode: http.StatusBadRequest, }, ErrIncompatibleEncryptionMethod: { Code: "InvalidArgument", Description: "Server Side Encryption with Customer provided key is incompatible with the encryption method specified", HTTPStatusCode: http.StatusBadRequest,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun May 05 16:56:21 GMT 2024 - 91.4K bytes - Viewed (7) -
docs/en/docs/deployment/https.md
* Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**. * So, the **certificate and encryption** handling is done **before HTTP**. * **TCP doesn't know about "domains"**. Only about IP addresses.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Jan 11 16:31:18 GMT 2024 - 12K bytes - Viewed (0) -
internal/config/compress/compress.go
type Config struct { Enabled bool `json:"enabled"` AllowEncrypted bool `json:"allow_encryption"` Extensions []string `json:"extensions"` MimeTypes []string `json:"mime-types"` } // Compression environment variables const ( Extensions = "extensions" AllowEncrypted = "allow_encryption" MimeTypes = "mime_types" EnvCompressState = "MINIO_COMPRESSION_ENABLE"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 04 19:57:37 GMT 2023 - 5K bytes - Viewed (0)