Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ssec (0.18 sec)

  1. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  2. cmd/object-handlers.go

    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  3. cmd/erasure-multipart.go

    	// Therefore, we adjust all ETags sent by the client to match what is stored
    	// on the backend.
    	kind, _ := crypto.IsEncrypted(fi.Metadata)
    
    	var objectEncryptionKey []byte
    	switch kind {
    	case crypto.SSEC:
    		if checksumType.IsSet() {
    			if opts.EncryptFn == nil {
    				return oi, crypto.ErrMissingCustomerKey
    			}
    			baseKey := opts.EncryptFn("", nil)
    			if len(baseKey) != 32 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 47.3K bytes
    - Viewed (0)
  4. cmd/erasure-object.go

    		return &GetObjectReader{
    			ObjInfo: objInfo,
    		}, toObjectErr(errMethodNotAllowed, bucket, object)
    	}
    
    	// Set NoDecryption for SSE-C objects and if replication request
    	if crypto.SSEC.IsEncrypted(objInfo.UserDefined) && opts.ReplicationRequest {
    		opts.NoDecryption = true
    	}
    
    	if objInfo.Size == 0 {
    		if _, _, err := rs.GetOffsetLength(objInfo.Size); err != nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 80.4K bytes
    - Viewed (0)
Back to top