- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 129 for _encrypted (0.45 sec)
-
tests/update_test.go
return nil } type Token struct { UserID int `gorm:"primary_key"` Content string `gorm:"type:varchar(100)"` } func (t *Token) BeforeSave(tx *gorm.DB) error { t.Content += "_encrypted" return nil } func TestSaveWithHooks(t *testing.T) { DB.Migrator().DropTable(&Token{}, &TokenOwner{}) DB.AutoMigrate(&Token{}, &TokenOwner{})
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Mon Dec 04 03:50:58 UTC 2023 - 30.3K bytes - Viewed (0) -
cmd/encryption-v1.go
if len(data) == 0 { return nil } if part > 0 && !crypto.SSEC.IsEncrypted(o.UserDefined) { // already decrypted in ToObjectInfo for multipart objects for _, pi := range o.Parts { if pi.Number == part { return pi.Checksums } } } if _, encrypted := crypto.IsEncrypted(o.UserDefined); encrypted { decrypted, err := o.metadataDecrypter(h)("object-checksum", data) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
internal/etag/etag.go
} return hex.EncodeToString(e) } // IsEncrypted reports whether the ETag is encrypted. func (e ETag) IsEncrypted() bool { // An encrypted ETag must be at least 32 bytes long. // It contains the encrypted ETag value + an authentication // code generated by the AEAD cipher. // // Here is an incorrect implementation of IsEncrypted: // // return len(e) > 16 && !bytes.ContainsRune(e, '-') //
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* The contents are **encrypted**, even though they are being sent with the **HTTP protocol**.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 12K bytes - Viewed (0) -
cmd/encryption-v1_test.go
for i, test := range decryptObjectMetaTests { if encrypted, err := DecryptObjectInfo(&test.info, test.request); err != test.expErr { t.Errorf("Test %d: Decryption returned wrong error code: got %d , want %d", i, err, test.expErr) } else if _, enc := crypto.IsEncrypted(test.info.UserDefined); encrypted && enc != encrypted { t.Errorf("Test %d: Decryption thinks object is encrypted but it is not", i) } else if !encrypted && enc != encrypted {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Sep 24 04:17:08 UTC 2022 - 19.9K bytes - Viewed (0) -
internal/crypto/sse-c.go
return true } if _, ok := h[xhttp.AmzServerSideEncryptionCustomerKeyMD5]; ok { return true } return false } // IsEncrypted returns true if the metadata contains an SSE-C // entry indicating that the object has been encrypted using // SSE-C. func (ssec) IsEncrypted(metadata map[string]string) bool { if _, ok := metadata[MetaSealedKeySSEC]; ok { return true } return false }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/metadata.go
// // IsEncrypted only checks whether the metadata contains at least // one entry indicating SSE-C or SSE-S3. func IsEncrypted(metadata map[string]string) (Type, bool) { if S3KMS.IsEncrypted(metadata) { return S3KMS, true } if S3.IsEncrypted(metadata) { return S3, true } if SSEC.IsEncrypted(metadata) { return SSEC, true } if IsMultiPart(metadata) { return nil, true }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 17:40:33 UTC 2024 - 6.4K bytes - Viewed (0) -
docs/distributed/decom-encrypted.sh
exit 1 fi got_checksum=$(./mc cat myminio/versioned/dsync/drwmutex.go | md5sum) if [ "${expected_checksum}" != "${got_checksum}" ]; then echo "BUG: decommission failed on encrypted objects: expected ${expected_checksum} got ${got_checksum}" exit 1 fi ./s3-check-md5 -versions -access-key minioadmin -secret-key minioadmin -endpoint http://127.0.0.1:9001/ -bucket versioned
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.1K bytes - Viewed (0) -
internal/crypto/metadata_test.go
func TestIsEncrypted(t *testing.T) { for i, test := range isEncryptedTests { if _, isEncrypted := IsEncrypted(test.Metadata); isEncrypted != test.Encrypted { t.Errorf("Test %d: got '%v' - want '%v'", i, isEncrypted, test.Encrypted) } } } var s3IsEncryptedTests = []struct { Metadata map[string]string Encrypted bool }{ {Encrypted: false, Metadata: map[string]string{MetaMultipart: ""}}, // 0
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 18.7K bytes - Viewed (0) -
docs/security/README.md
- Delete one/some master keys. From a security standpoint, this is equal to erasing all SSE-S3 encrypted objects protected by these master keys. All these objects are lost forever as they cannot be decrypted. Especially deleting all master keys at the KMS is equivalent to secure erasing all SSE-S3 encrypted objects.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0)