Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for object_key (0.1 sec)

  1. cmd/encryption-v1.go

    				return crypto.ObjectKey{}, errKMSKeyNotFound
    			}
    			return crypto.ObjectKey{}, err
    		}
    
    		objectKey := crypto.GenerateKey(key.Plaintext, rand.Reader)
    		sealedKey = objectKey.Seal(key.Plaintext, crypto.GenerateIV(rand.Reader), crypto.S3KMS.String(), bucket, object)
    		crypto.S3KMS.CreateMetadata(metadata, key.KeyID, key.Ciphertext, sealedKey, cryptoCtx)
    		return objectKey, nil
    	case crypto.SSEC:
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  2. cmd/bucket-metadata.go

    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		return nil, err
    	}
    	var objectKey crypto.ObjectKey
    	if err = objectKey.Unseal(extKey, sealedKey, crypto.S3.String(), bucket, ""); err != nil {
    		return nil, err
    	}
    
    	outbuf := bytes.NewBuffer(nil)
    	_, err = sio.Decrypt(outbuf, bytes.NewBuffer(input), sio.Config{Key: objectKey[:], MinVersion: sio.Version20, CipherSuites: fips.DARECiphers()})
    	return outbuf.Bytes(), err
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 28 15:32:18 UTC 2024
    - 18.2K bytes
    - Viewed (0)
  3. internal/s3select/sql/evaluate.go

    	}
    	pathExpr := e.StripTableAlias(alias)
    	_, rawVal := r.Raw()
    	switch rowVal := rawVal.(type) {
    	case jstream.KVS, simdjson.Object:
    		if len(pathExpr) == 0 {
    			pathExpr = []*JSONPathElement{{Key: &ObjectKey{ID: e.BaseKey}}}
    		}
    
    		result, _, err := jsonpathEval(pathExpr, rowVal)
    		if err != nil {
    			return nil, err
    		}
    
    		return jsonToValue(result)
    	default:
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Sep 23 19:35:41 UTC 2024
    - 12K bytes
    - Viewed (0)
  4. cmd/object-multipart-handlers.go

    		writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    		return
    	}
    	dstOpts.IndexCB = idxCb
    
    	rawReader := srcInfo.Reader
    	pReader := NewPutObjReader(rawReader)
    
    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  5. cmd/object-handlers.go

    		writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrInvalidSSECustomerAlgorithm), r.URL)
    		return
    	}
    
    	var oldKey, newKey []byte
    	var newKeyID string
    	var kmsCtx kms.Context
    	var objEncKey crypto.ObjectKey
    	sseCopyKMS := crypto.S3KMS.IsEncrypted(srcInfo.UserDefined)
    	sseCopyS3 := crypto.S3.IsEncrypted(srcInfo.UserDefined)
    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  6. cmd/erasure-multipart.go

    		objectEncryptionKey, err = decryptObjectMeta(nil, bucket, object, fi.Metadata)
    		if err != nil {
    			return oi, err
    		}
    	}
    	if len(objectEncryptionKey) == 32 {
    		var key crypto.ObjectKey
    		copy(key[:], objectEncryptionKey)
    		opts.EncryptFn = metadataEncrypter(key)
    	}
    
    	for idx, part := range partInfoFiles {
    		if part.Error != "" {
    			err = objPartToPartErr(part)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Sep 29 22:40:36 UTC 2024
    - 44.7K bytes
    - Viewed (0)
  7. cmd/bucket-handlers.go

    	if err != nil {
    		writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    		return
    	}
    
    	rawReader := hashReader
    	pReader := NewPutObjReader(rawReader)
    	var objectEncryptionKey crypto.ObjectKey
    
    	// Check if bucket encryption is enabled
    	sseConfig, _ := globalBucketSSEConfigSys.Get(bucket)
    	sseConfig.Apply(formValues, sse.ApplyOptions{
    		AutoEncrypt: globalAutoEncryption,
    	})
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 12 12:24:04 UTC 2024
    - 63.4K bytes
    - Viewed (0)
Back to top