- Sort Score
- Num 10 results
- Language All
Results 41 - 50 of 225 for ENCRYPTION (0.1 seconds)
-
docs/kms/IAM.md
The unified KMS-based approach has several advantages: - Key management is now centralized. There is one way to change or rotate encryption keys. There used to be two different mechanisms - one for regular S3 objects and one for IAM data. - Reduced server startup time. For IAM encryption with the root credentials, MinIO had to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Click Count (0) -
internal/http/headers.go
AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm" AmzServerSideEncryptionCopyCustomerKey = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key" AmzServerSideEncryptionCopyCustomerKeyMD5 = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5" AmzEncryptionAES = "AES256" AmzEncryptionKMS = "aws:kms"
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed May 07 15:37:12 GMT 2025 - 10.8K bytes - Click Count (0) -
docs/site-replication/run-ssec-object-replication.sh
src_obj1_etag=$(echo "${stat_out1}" | jq '.etag') src_obj1_size=$(echo "${stat_out1}" | jq '.size') src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"') echo "Stat minio1/test-bucket/defpartsize" ./mc stat --no-list minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --jsonCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Sep 24 08:03:58 GMT 2024 - 9.9K bytes - Click Count (0) -
src/main/java/jcifs/pac/PacMac.java
/** * Utility class for calculating and verifying PAC (Privilege Attribute Certificate) message authentication codes. * This class provides methods for computing MACs using various Kerberos encryption types including * ARCFOUR-HMAC-MD5 and AES-based HMAC algorithms. */ public class PacMac { /** * Private constructor to prevent instantiation of utility class. */ private PacMac() {
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 9K bytes - Click Count (0) -
src/main/java/jcifs/smb/SmbSessionImpl.java
// Server requires encryption - create encryption context try { if (log.isDebugEnabled()) { log.debug("Server requires encryption, creating encryption context"); } SmbTransportImpl transport = getTransport();Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 68.9K bytes - Click Count (0) -
internal/kms/conn.go
// storage. type DEK struct { KeyID string // Name of the master key Version int // Version of the master key (MinKMS only) Plaintext []byte // Paintext of the data encryption key Ciphertext []byte // Ciphertext of the data encryption key } var ( _ encoding.TextMarshaler = (*DEK)(nil) _ encoding.TextUnmarshaler = (*DEK)(nil) ) // MarshalText encodes the DEK's key ID and ciphertext // as JSON.Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Aug 18 06:43:03 GMT 2024 - 5K bytes - Click Count (0) -
compat/maven-settings/src/site/apt/index.apt
* {{{https://maven.apache.org/guides/mini/guide-deployment-security-settings.html} Security and Deployment Settings}}, * {{{https://maven.apache.org/guides/mini/guide-encryption-4.html} Password Encryption}},Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Sun Nov 16 18:16:44 GMT 2025 - 2.1K bytes - Click Count (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
import javax.security.auth.Destroyable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Secure credential storage with encryption at rest. * * Provides secure storage of passwords and other sensitive credentials * using AES-GCM encryption with PBKDF2 key derivation. * * Features: * - Encrypts credentials at rest using AES-256-GCM * - Uses PBKDF2 for key derivation from master password
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
internal/http/lambda-headers.go
AmzFwdHeaderSSE = "x-amz-fwd-header-x-amz-server-side-encryption" AmzFwdHeaderSSEC = "x-amz-fwd-header-x-amz-server-side-encryption-customer-algorithm" AmzFwdHeaderSSEKMSID = "x-amz-fwd-header-x-amz-server-side-encryption-aws-kms-key-id" AmzFwdHeaderSSECMD5 = "x-amz-fwd-header-x-amz-server-side-encryption-customer-key-MD5"
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Mar 07 16:12:41 GMT 2023 - 3.1K bytes - Click Count (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
#RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then # echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though." # exit_1 #fi # Add replication siteCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Sep 24 08:03:58 GMT 2024 - 8.3K bytes - Click Count (0)