Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 133 for ssec (0.14 sec)

  1. docs/site-replication/run-ssec-object-replication.sh

    	exit_1
    fi
    
    repcount4=$(./mc ls minio2/test-bucket/custpartsize --insecure | wc -l)
    if [ "${repcount4}" -ne 1 ]; then
    	echo "BUG: object test-bucket/custpartsize not replicated"
    	exit_1
    fi
    
    # Stat the SSEC objects from source site
    echo "Stat minio1/test-bucket/encrypted"
    ./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  2. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 37.8K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  4. cmd/object-api-options.go

    			if err != nil {
    				return
    			}
    			if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    				return
    			}
    			opts.ServerSideEncryption = encrypt.SSECopy(sse)
    			return
    		}
    		return
    	}
    
    	if crypto.SSEC.IsRequested(header) {
    		clientKey, err = crypto.SSEC.ParseHTTP(header)
    		if err != nil {
    			return
    		}
    		if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    			return
    		}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:34:38 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  5. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Apr 27 00:44:22 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  6. cmd/encryption-v1_test.go

    			xhttp.AmzServerSideEncryptionCustomerKeyMD5:    []string{"7PpPLAK26ONlVUGOWlusfg=="},
    		},
    		copySource:     false,
    		metadata:       nil,
    		encryptionType: encrypt.SSEC,
    		err:            nil,
    	}, // 0
    	{
    		headers: http.Header{
    			xhttp.AmzServerSideEncryptionCustomerAlgorithm: []string{"AES256"},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 19.9K bytes
    - Viewed (0)
  7. cmd/bucket-replication-utils.go

    		ExistingObjResync:    existingObjResync,
    		TargetStatuses:       tgtStatuses,
    		TargetPurgeStatuses:  purgeStatuses,
    		ReplicationTimestamp: tm,
    		SSEC:                 crypto.SSEC.IsEncrypted(oi.UserDefined),
    		UserTags:             oi.UserTags,
    	}
    	if r.SSEC {
    		r.Checksum = oi.Checksum
    	}
    	return r
    }
    
    // ReplicationState - returns replication state using other internal replication metadata in ObjectInfo
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26K bytes
    - Viewed (0)
  8. cmd/api-response.go

    		m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata)
    		if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
    			m[xhttp.AmzServerSideEncryptionKmsContext] = kmsCtx
    		}
    	case crypto.SSEC:
    		m[xhttp.AmzServerSideEncryptionCustomerAlgorithm] = xhttp.AmzEncryptionAES
    	}
    
    	var toRemove []string
    	for k := range cleanMinioInternalMetadataKeys(m) {
    		if stringsHasPrefixFold(k, ReservedMetadataPrefixLower) {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Feb 18 16:25:55 UTC 2025
    - 33.7K bytes
    - Viewed (0)
  9. docs/site-replication/run-sse-kms-object-replication.sh

    # sleep for replication to complete
    sleep 30
    
    # Create bucket in source cluster
    echo "Create bucket in source MinIO instance"
    ./mc mb minio1/test-bucket --insecure
    
    # Enable SSE KMS for the bucket
    ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure
    
    # Load objects to source site
    echo "Loading objects to source MinIO instance"
    ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  10. docs/security/README.md

    MinIO supports two different types of server-side encryption ([SSE](#sse)):
    
    - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS.
    - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
    
    ### Server-Side Encryption - Preliminaries
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
Back to top