- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 175 for Encryption (0.13 sec)
-
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/EncryptOptions.java
import org.apache.maven.api.annotations.Nonnull; import org.apache.maven.api.cli.Options; /** * Defines the options specific to the Maven encryption tool. * This interface extends the general {@link Options} interface, adding encryption-specific configuration options. * * @since 4.0.0 */ @Experimental public interface EncryptOptions extends Options { /**
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Mon Oct 14 19:57:22 UTC 2024 - 2.4K bytes - Viewed (0) -
docs/kms/IAM.md
The unified KMS-based approach has several advantages: - Key management is now centralized. There is one way to change or rotate encryption keys. There used to be two different mechanisms - one for regular S3 objects and one for IAM data. - Reduced server startup time. For IAM encryption with the root credentials, MinIO had to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config_test.go
} if tc.keyID != "" && tc.keyID != ssec.KeyID() { t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID()) } if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 16 18:28:30 UTC 2022 - 6.1K bytes - Viewed (0) -
internal/kms/conn.go
// storage. type DEK struct { KeyID string // Name of the master key Version int // Version of the master key (MinKMS only) Plaintext []byte // Paintext of the data encryption key Ciphertext []byte // Ciphertext of the data encryption key } var ( _ encoding.TextMarshaler = (*DEK)(nil) _ encoding.TextUnmarshaler = (*DEK)(nil) ) // MarshalText encodes the DEK's key ID and ciphertext // as JSON.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 5K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**. * So, the **certificate and encryption** handling is done **before HTTP**. * **TCP doesn't know about "domains"**. Only about IP addresses.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 12K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
// BucketSSEConfig - represents default bucket encryption configuration type BucketSSEConfig struct { XMLNS string `xml:"xmlns,attr,omitempty"` XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 4.9K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
// NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
#RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then # echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though." # exit_1 #fi # Add replication site
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/object-api-options.go
} // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 21 21:13:59 UTC 2024 - 14.4K bytes - Viewed (0)