Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 136 for decrypted (0.06 sec)

  1. cmd/encryption-v1_test.go

    	for i, test := range decryptObjectMetaTests {
    		if encrypted, err := DecryptObjectInfo(&test.info, test.request); err != test.expErr {
    			t.Errorf("Test %d: Decryption returned wrong error code: got %d , want %d", i, err, test.expErr)
    		} else if _, enc := crypto.IsEncrypted(test.info.UserDefined); encrypted && enc != encrypted {
    			t.Errorf("Test %d: Decryption thinks object is encrypted but it is not", i)
    		} else if !encrypted && enc != encrypted {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Sep 24 04:17:08 UTC 2022
    - 19.9K bytes
    - Viewed (0)
  2. internal/crypto/sse-s3.go

    func (sses3) IsEncrypted(metadata map[string]string) bool {
    	if _, ok := metadata[MetaSealedKeyS3]; ok {
    		return true
    	}
    	return false
    }
    
    // UnsealObjectKey extracts and decrypts the sealed object key
    // from the metadata using KMS and returns the decrypted object
    // key.
    func (s3 sses3) UnsealObjectKey(k *kms.KMS, metadata map[string]string, bucket, object string) (key ObjectKey, err error) {
    	if k == nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  3. docs/debugging/README.md

    Optionally `--encrypt` can be specified. This will output an encrypted file and a decryption key:
    
    ```
    $ mc support inspect --encrypt play/test123/test*/*/part.*
    mc: Encrypted file data successfully downloaded as inspect.ad2b43d8.enc
    mc: Decryption key: ad2b43d847fdb14e54c5836200177f7158b3f745433525f5d23c0e0208e50c9948540b54
    
    mc: The decryption key will ONLY be shown here. It cannot be recovered.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Feb 25 01:17:53 UTC 2022
    - 8.7K bytes
    - Viewed (0)
  4. cmd/kms-handlers.go

    			return
    		}
    		writeSuccessResponseJSON(w, resp)
    		return
    	}
    
    	// 2. Verify that we can indeed decrypt the (encrypted) key
    	decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{
    		Name:           key.KeyID,
    		Ciphertext:     key.Ciphertext,
    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		response.DecryptionErr = err.Error()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  5. internal/kms/conn.go

    	// The same context must be provided when the generated key
    	// should be decrypted. Therefore, it is the callers
    	// responsibility to remember the corresponding context for
    	// a particular DEK. The context may be nil.
    	GenerateKey(context.Context, *GenerateKeyRequest) (DEK, error)
    
    	// DecryptKey decrypts the ciphertext with the key referenced
    	// by the key ID. The context must match the context value
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 5K bytes
    - Viewed (0)
  6. internal/config/crypto_test.go

    		}
    
    		plaintext, err := Decrypt(KMS, bytes.NewReader(data), test.Context)
    		if err != nil {
    			t.Fatalf("Test %d: failed to decrypt stream: %v", i, err)
    		}
    		data, err = io.ReadAll(plaintext)
    		if err != nil {
    			t.Fatalf("Test %d: failed to decrypt stream: %v", i, err)
    		}
    
    		if !bytes.Equal(data, test.Data) {
    			t.Fatalf("Test %d: decrypted data does not match original data", i)
    		}
    	}
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  7. internal/crypto/sse.go

    func Requested(h http.Header) bool {
    	return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h)
    }
    
    // UnsealObjectKey extracts and decrypts the sealed object key
    // from the metadata using the SSE-Copy client key of the HTTP headers
    // and returns the decrypted object key.
    func (sse ssecCopy) UnsealObjectKey(h http.Header, metadata map[string]string, bucket, object string) (key ObjectKey, err error) {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 30 15:26:43 UTC 2022
    - 4.4K bytes
    - Viewed (0)
  8. internal/config/certs.go

    	}
    
    	return x509Certs, nil
    }
    
    // LoadX509KeyPair - load an X509 key pair (private key , certificate)
    // from the provided paths. The private key may be encrypted and is
    // decrypted using the ENV_VAR: MINIO_CERT_PASSWD.
    func LoadX509KeyPair(certFile, keyFile string) (tls.Certificate, error) {
    	certPEMBlock, err := os.ReadFile(certFile)
    	if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 14 17:11:51 UTC 2024
    - 3.8K bytes
    - Viewed (0)
  9. docs/en/docs/deployment/https.md

    So, the client sends an **HTTPS request**. This is just an HTTP request through an encrypted TLS connection.
    
    <img src="/img/deployment/https/https04.svg">
    
    ### Decrypt the Request
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  10. cmd/object-api-datatypes.go

    // It will be decrypted if needed.
    func (o *ObjectInfo) ArchiveInfo(h http.Header) []byte {
    	if len(o.UserDefined) == 0 {
    		return nil
    	}
    	z, ok := o.UserDefined[archiveInfoMetadataKey]
    	if !ok {
    		return nil
    	}
    	data := []byte(z)
    	if v, ok := o.UserDefined[archiveTypeMetadataKey]; ok && v == archiveTypeEnc {
    		decrypted, err := o.metadataDecrypter(h)(archiveTypeEnc, data)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:31:51 UTC 2024
    - 20.9K bytes
    - Viewed (0)
Back to top