Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for spec (1.02 sec)

  1. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  2. cmd/erasure-multipart.go

    			}
    			return result, toObjectErr(err, bucket, object)
    		}
    		break
    	}
    
    	for i := range uploadIDs {
    		uploadIDs[i] = strings.TrimSuffix(uploadIDs[i], SlashSeparator)
    	}
    
    	// S3 spec says uploadIDs should be sorted based on initiated time, we need
    	// to read the metadata entry.
    	var uploads []MultipartInfo
    
    	populatedUploadIDs := set.NewStringSet()
    
    	for _, uploadID := range uploadIDs {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 47.3K bytes
    - Viewed (0)
  3. cmd/object-handlers.go

    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  4. cmd/erasure-object.go

    		return &GetObjectReader{
    			ObjInfo: objInfo,
    		}, toObjectErr(errMethodNotAllowed, bucket, object)
    	}
    
    	// Set NoDecryption for SSE-C objects and if replication request
    	if crypto.SSEC.IsEncrypted(objInfo.UserDefined) && opts.ReplicationRequest {
    		opts.NoDecryption = true
    	}
    
    	if objInfo.Size == 0 {
    		if _, _, err := rs.GetOffsetLength(objInfo.Size); err != nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 80.4K bytes
    - Viewed (0)
Back to top