- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 239 for ssec (0.04 sec)
-
internal/crypto/sse-c.go
"github.com/minio/minio/internal/logger" ) type ssec struct{} var ( // SSEC represents AWS SSE-C. It provides functionality to handle // SSE-C requests. SSEC = ssec{} _ Type = SSEC ) // String returns the SSE domain as string. For SSE-C the // domain is "SSE-C". func (ssec) String() string { return "SSE-C" } // IsRequested returns true if the HTTP headers containsRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 5.2K bytes - Viewed (0) -
internal/crypto/sse.go
) // Type represents an AWS SSE type: // - SSE-C // - SSE-S3 // - SSE-KMS type Type interface { fmt.Stringer IsRequested(http.Header) bool IsEncrypted(map[string]string) bool } // IsRequested returns true and the SSE Type if the HTTP headers // indicate that some form server-side encryption is requested. // // If no SSE headers are present then IsRequested returns falseRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
cmd/encryption-v1.go
return objInfo.ETag } } // As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data. // Since server side copy with same source and dest just replaces the ETag, we save // encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag // encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0) -
cmd/object-api-options.go
if err != nil { return opts, err } if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil { return opts, err } opts.ServerSideEncryption = encrypt.SSECopy(sse) return opts, err } return opts, err } if crypto.SSEC.IsRequested(header) { clientKey, err = crypto.SSEC.ParseHTTP(header) if err != nil { return opts, err } if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
var objectEncryptionKey crypto.ObjectKey if isEncrypted { if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) { writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL) return } if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) { writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 39.5K bytes - Viewed (0) -
internal/bucket/replication/replication_test.go
{ObjectOpts{Name: "c2test", VersionID: "vid", DeleteMarker: true, SSEC: true, OpType: DeleteReplicationType}, cfgs[1], false}, // 14. permanent delete of version, disqualified by SSE-C & DeleteReplication status {ObjectOpts{Name: "c2test", DeleteMarker: true, SSEC: true, OpType: DeleteReplicationType}, cfgs[1], false}, // 15. setting DeleteMarker on SSE-C encrypted object, disqualified by SSE-C & DeleteMarkerReplication statusRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 32.4K bytes - Viewed (0) -
Makefile
@echo "Running tests for automatic site replication of SSE-C objects" @(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket" @(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Apr 27 00:44:22 UTC 2025 - 11.2K bytes - Viewed (0) -
cmd/bucket-replication-utils.go
ExistingObjResync: existingObjResync, TargetStatuses: tgtStatuses, TargetPurgeStatuses: purgeStatuses, ReplicationTimestamp: tm, SSEC: crypto.SSEC.IsEncrypted(oi.UserDefined), UserTags: oi.UserTags, } if r.SSEC { r.Checksum = oi.Checksum } return r } // ReplicationState - returns replication state using other internal replication metadata in ObjectInfo
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 26.1K bytes - Viewed (0) -
cmd/bucket-replication.go
Dsc: dsc, TargetStatuses: tgtStatuses, TargetPurgeStatuses: purgeStatuses, ReplicationTimestamp: tm, SSEC: crypto.SSEC.IsEncrypted(oi.UserDefined), UserTags: oi.UserTags, } if ri.SSEC { ri.Checksum = oi.Checksum } if dsc.Synchronous() { replicateObject(ctx, ri, o) } else {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 118.2K bytes - Viewed (0) -
cmd/object-handlers.go
sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header) sseC := crypto.SSEC.IsRequested(r.Header) sseS3 := crypto.S3.IsRequested(r.Header) sseKMS := crypto.S3KMS.IsRequested(r.Header) isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS isTargetEncrypted := sseC || sseS3 || sseKMS if sseC { newKey, err = ParseSSECustomerRequest(r)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 120.6K bytes - Viewed (0)