Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for sseKMS (0.05 sec)

  1. cmd/batch-rotate.go

    func (e BatchJobKeyRotateEncryption) Validate() error {
    	if e.Type != sses3 && e.Type != ssekms {
    		return errInvalidArgument
    	}
    	spaces := strings.HasPrefix(e.Key, " ") || strings.HasSuffix(e.Key, " ")
    	if e.Type == ssekms && spaces {
    		return crypto.ErrInvalidEncryptionKeyID
    	}
    
    	if e.Type == ssekms && GlobalKMS != nil {
    		ctx := kms.Context{}
    		if e.Context != "" {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
  2. internal/crypto/sse-kms.go

    	"github.com/minio/minio/internal/logger"
    )
    
    type ssekms struct{}
    
    var (
    	// S3KMS represents AWS SSE-KMS. It provides functionality to
    	// handle SSE-KMS requests.
    	S3KMS = ssekms{}
    
    	_ Type = S3KMS
    )
    
    // String returns the SSE domain as string. For SSE-KMS the
    // domain is "SSE-KMS".
    func (ssekms) String() string { return "SSE-KMS" }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  3. cmd/object-api-options.go

    		keyID, context, err := crypto.S3KMS.ParseHTTP(hdr)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    		sseKms, err := encrypt.NewSSEKMS(keyID, context)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    		return ObjectOptions{
    			ServerSideEncryption: sseKms,
    			UserDefined:          metadata,
    			MTime:                mtime,
    			WantChecksum:         wantCRC,
    			PreserveETag:         etag,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 21 21:13:59 UTC 2024
    - 14.4K bytes
    - Viewed (0)
  4. cmd/object-handlers.go

    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    		if err != nil {
    			writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
Back to top