Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 239 for ssec (0.04 sec)

  1. internal/crypto/sse-c.go

    	"github.com/minio/minio/internal/logger"
    )
    
    type ssec struct{}
    
    var (
    	// SSEC represents AWS SSE-C. It provides functionality to handle
    	// SSE-C requests.
    	SSEC = ssec{}
    
    	_ Type = SSEC
    )
    
    // String returns the SSE domain as string. For SSE-C the
    // domain is "SSE-C".
    func (ssec) String() string { return "SSE-C" }
    
    // IsRequested returns true if the HTTP headers contains
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  2. internal/crypto/sse.go

    )
    
    // Type represents an AWS SSE type:
    //   - SSE-C
    //   - SSE-S3
    //   - SSE-KMS
    type Type interface {
    	fmt.Stringer
    
    	IsRequested(http.Header) bool
    	IsEncrypted(map[string]string) bool
    }
    
    // IsRequested returns true and the SSE Type if the HTTP headers
    // indicate that some form server-side encryption is requested.
    //
    // If no SSE headers are present then IsRequested returns false
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  3. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 38K bytes
    - Viewed (0)
  4. cmd/object-api-options.go

    			if err != nil {
    				return opts, err
    			}
    			if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    				return opts, err
    			}
    			opts.ServerSideEncryption = encrypt.SSECopy(sse)
    			return opts, err
    		}
    		return opts, err
    	}
    
    	if crypto.SSEC.IsRequested(header) {
    		clientKey, err = crypto.SSEC.ParseHTTP(header)
    		if err != nil {
    			return opts, err
    		}
    		if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  5. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  6. internal/bucket/replication/replication_test.go

    		{ObjectOpts{Name: "c2test", VersionID: "vid", DeleteMarker: true, SSEC: true, OpType: DeleteReplicationType}, cfgs[1], false}, // 14. permanent delete of version, disqualified by SSE-C & DeleteReplication status
    		{ObjectOpts{Name: "c2test", DeleteMarker: true, SSEC: true, OpType: DeleteReplicationType}, cfgs[1], false},                   // 15. setting DeleteMarker on SSE-C encrypted object, disqualified by SSE-C & DeleteMarkerReplication status
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 32.4K bytes
    - Viewed (0)
  7. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Apr 27 00:44:22 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  8. cmd/bucket-replication-utils.go

    		ExistingObjResync:    existingObjResync,
    		TargetStatuses:       tgtStatuses,
    		TargetPurgeStatuses:  purgeStatuses,
    		ReplicationTimestamp: tm,
    		SSEC:                 crypto.SSEC.IsEncrypted(oi.UserDefined),
    		UserTags:             oi.UserTags,
    	}
    	if r.SSEC {
    		r.Checksum = oi.Checksum
    	}
    	return r
    }
    
    // ReplicationState - returns replication state using other internal replication metadata in ObjectInfo
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 26.1K bytes
    - Viewed (0)
  9. cmd/bucket-replication.go

    		Dsc:                  dsc,
    		TargetStatuses:       tgtStatuses,
    		TargetPurgeStatuses:  purgeStatuses,
    		ReplicationTimestamp: tm,
    		SSEC:                 crypto.SSEC.IsEncrypted(oi.UserDefined),
    		UserTags:             oi.UserTags,
    	}
    	if ri.SSEC {
    		ri.Checksum = oi.Checksum
    	}
    	if dsc.Synchronous() {
    		replicateObject(ctx, ri, o)
    	} else {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 118.2K bytes
    - Viewed (0)
  10. cmd/object-handlers.go

    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 120.6K bytes
    - Viewed (0)
Back to top