- Sort Score
- Num 10 results
- Language All
Results 1 - 9 of 9 for s3sms (0.02 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
internal/crypto/metadata.go
// // IsEncrypted only checks whether the metadata contains at least // one entry indicating SSE-C or SSE-S3. func IsEncrypted(metadata map[string]string) (Type, bool) { if S3KMS.IsEncrypted(metadata) { return S3KMS, true } if S3.IsEncrypted(metadata) { return S3, true } if SSEC.IsEncrypted(metadata) { return SSEC, true } if IsMultiPart(metadata) { return nil, true }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jun 10 17:40:33 GMT 2024 - 6.4K bytes - Click Count (0) -
cmd/encryption-v1.go
return nil case crypto.S3KMS: if GlobalKMS == nil { return errKMSNotConfigured } objectKey, err := crypto.S3KMS.UnsealObjectKey(GlobalKMS, metadata, bucket, object) if err != nil { return err } if len(cryptoCtx) == 0 { _, _, _, cryptoCtx, err = crypto.S3KMS.ParseMetadata(metadata) if err != nil { return err } }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 38K bytes - Click Count (0) -
internal/crypto/sse.go
switch { case S3.IsRequested(h): return S3, true case S3KMS.IsRequested(h): return S3KMS, true case SSEC.IsRequested(h): return SSEC, true default: return nil, false } } // Requested returns whether any type of encryption is requested. func Requested(h http.Header) bool { return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h) }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 4.3K bytes - Click Count (0) -
cmd/s3-zip-handlers.go
func (api objectAPIHandlers) getObjectInArchiveFileHandler(ctx context.Context, objectAPI ObjectLayer, bucket, object string, w http.ResponseWriter, r *http.Request) { if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL) return }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 15.8K bytes - Click Count (0) -
cmd/batch-rotate.go
srcBucket := r.Bucket srcObject := objInfo.Name if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() { return nil } sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined) sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined) if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed return errInvalidEncryptionParameters }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 14.7K bytes - Click Count (0) -
cmd/object-api-options.go
} } if metadata == nil { metadata = make(map[string]string) } etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag)) if crypto.S3KMS.IsRequested(hdr) { keyID, context, err := crypto.S3KMS.ParseHTTP(hdr) if err != nil { return ObjectOptions{}, err } sseKms, err := encrypt.NewSSEKMS(keyID, context) if err != nil { return ObjectOptions{}, err }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.3K bytes - Click Count (0) -
cmd/api-response.go
m := cloneMSS(metadata) switch kind, _ := crypto.IsEncrypted(metadata); kind { case crypto.S3: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES case crypto.S3KMS: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata) if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Oct 24 04:05:19 GMT 2025 - 35K bytes - Click Count (0) -
cmd/bucket-handlers.go
case crypto.SSEC: key, err = ParseSSECustomerHeader(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } case crypto.S3KMS: keyID, kmsCtx, err = crypto.S3KMS.ParseHTTP(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } } if len(fanOutEntries) == 0 {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 63.9K bytes - Click Count (0) -
cmd/erasure-multipart.go
} objectEncryptionKey, err = decryptObjectMeta(baseKey, bucket, object, fi.Metadata) if err != nil { return oi, err } } case crypto.S3, crypto.S3KMS: objectEncryptionKey, err = decryptObjectMeta(nil, bucket, object, fi.Metadata) if err != nil { return oi, err } } if len(objectEncryptionKey) == 32 { var key crypto.ObjectKey
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Oct 24 04:05:31 GMT 2025 - 47.1K bytes - Click Count (0)