- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 179 for encryption (0.07 sec)
-
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/EncryptParser.java
import org.apache.maven.api.cli.ParserException; import org.apache.maven.api.cli.ParserRequest; /** * Defines the contract for parsing encryption-related command-line arguments and creating an EncryptInvokerRequest. * This interface extends the general {@link Parser} interface, specializing it for encryption operations. * * @since 4.0.0 */ @Experimental public interface EncryptParser extends Parser<EncryptInvokerRequest> { /**
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Thu Oct 03 16:03:55 UTC 2024 - 2.1K bytes - Viewed (0) -
internal/http/lambda-headers.go
AmzFwdHeaderSSE = "x-amz-fwd-header-x-amz-server-side-encryption" AmzFwdHeaderSSEC = "x-amz-fwd-header-x-amz-server-side-encryption-customer-algorithm" AmzFwdHeaderSSEKMSID = "x-amz-fwd-header-x-amz-server-side-encryption-aws-kms-key-id" AmzFwdHeaderSSECMD5 = "x-amz-fwd-header-x-amz-server-side-encryption-customer-key-MD5"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 07 16:12:41 UTC 2023 - 3.1K bytes - Viewed (0) -
cmd/object-api-options.go
} } opts.MTime = mtime opts.UserDefined = make(map[string]string) // Transfer SSEC key in opts.EncryptFn if crypto.SSEC.IsRequested(r.Header) { key, err := ParseSSECustomerRequest(r) if err == nil { // Set EncryptFn to return SSEC key opts.EncryptFn = func(baseKey string, data []byte) []byte { return key } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 21 21:13:59 UTC 2024 - 14.4K bytes - Viewed (0) -
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/EncryptOptions.java
import org.apache.maven.api.annotations.Nonnull; import org.apache.maven.api.cli.Options; /** * Defines the options specific to the Maven encryption tool. * This interface extends the general {@link Options} interface, adding encryption-specific configuration options. * * @since 4.0.0 */ @Experimental public interface EncryptOptions extends Options { /**
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Mon Oct 14 19:57:22 UTC 2024 - 2.4K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
// NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config_test.go
} if tc.keyID != "" && tc.keyID != ssec.KeyID() { t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID()) } if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 16 18:28:30 UTC 2022 - 6.1K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**. * So, the **certificate and encryption** handling is done **before HTTP**. * **TCP doesn't know about "domains"**. Only about IP addresses.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 12K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
// BucketSSEConfig - represents default bucket encryption configuration type BucketSSEConfig struct { XMLNS string `xml:"xmlns,attr,omitempty"` XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 4.9K bytes - Viewed (0) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
#RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then # echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though." # exit_1 #fi # Add replication site
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 8.3K bytes - Viewed (0)