Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 178 for Encryption (0.52 sec)

  1. docs/kms/IAM.md

    The unified KMS-based approach has several advantages:
    
    - Key management is now centralized. There is one way to change or rotate encryption keys.
       There used to be two different mechanisms - one for regular S3 objects and one for IAM data.
    - Reduced server startup time. For IAM encryption with the root credentials, MinIO had
       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  2. docs/tls/README.md

    Copy the existing private key and public certificate to the `certs` directory. The default certs directory is:
    
    * **Linux:** `${HOME}/.minio/certs`
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  3. src/test/java/jcifs/CIFSUnsupportedCryptoExceptionTest.java

        @DisplayName("Message constructor should handle crypto-specific error messages")
        @NullAndEmptySource
        @ValueSource(strings = { "AES encryption not supported", "Missing Bouncy Castle provider", "Invalid key length for AES-128",
                "RC4 cipher not available in this JVM", "DES encryption is deprecated and not supported", "HMAC-SHA256 algorithm not found",
                "RSA key generation failed: key size not supported" })
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  4. cmd/object-multipart-handlers.go

    // NewMultipartUploadHandler - New multipart upload.
    // Notice: The S3 client can send secret keys in headers for encryption related jobs,
    // the handler should ensure to remove these keys before sending them to the object layer.
    // Currently these keys are:
    //   - X-Amz-Server-Side-Encryption-Customer-Key
    //   - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key
    func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  5. docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json

             "Principal":"*",
             "Action":"s3:PutObject",
             "Resource":"arn:aws:s3:::multi-key-poc/*",
             "Condition":{
                "StringNotEquals":{
                   "s3:x-amz-server-side-encryption-aws-kms-key-id":"minio-default-key"
                }
             }
          }
       ]
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 14 15:43:07 UTC 2024
    - 439 bytes
    - Viewed (0)
  6. src/test/java/jcifs/smb/SmbSessionImplTest.java

            assertFalse(session.isConnected());
            assertTrue(session.isFailed());
        }
    
        @Test
        @DisplayName("encryption: flags, encryption, and decryption delegation")
        void testEncryptionDelegation() throws Exception {
            SmbSessionImpl session = newSession();
    
            // No encryption context -> throws
            CIFSException notEnabled = assertThrows(CIFSException.class, () -> session.encryptMessage(new byte[] { 1 }));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 12.5K bytes
    - Viewed (0)
  7. docs/site-replication/run-ssec-object-replication-with-compression.sh

    #RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1)
    #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then
    #	echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though."
    #	exit_1
    #fi
    
    # Add replication site
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  8. cmd/object-api-options.go

    }
    
    // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata
    func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) {
    	return putOptsFromReq(ctx, r, bucket, object, metadata)
    }
    
    // get ObjectOptions for Copy calls with encryption headers provided on the source side
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:34:38 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  9. docs/en/docs/deployment/https.md

    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
        * So, the **certificate and encryption** handling is done **before HTTP**.
    * **TCP doesn't know about "domains"**. Only about IP addresses.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  10. src/main/java/jcifs/ntlmssp/NtlmFlags.java

        int NTLMSSP_NEGOTIATE_VERSION = 0x2000000;
    
        /**
         * Indicates that 128-bit encryption is supported.
         */
        int NTLMSSP_NEGOTIATE_128 = 0x20000000;
    
        /**
         * Request explicit key exchange
         */
        int NTLMSSP_NEGOTIATE_KEY_EXCH = 0x40000000;
    
        /**
         * Indicates that 56-bit encryption is supported.
         */
        int NTLMSSP_NEGOTIATE_56 = 0x80000000;
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.5K bytes
    - Viewed (0)
Back to top