Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 43 for swesec (0.05 sec)

  1. docs/site-replication/run-ssec-object-replication.sh

    	exit_1
    fi
    
    repcount4=$(./mc ls minio2/test-bucket/custpartsize --insecure | wc -l)
    if [ "${repcount4}" -ne 1 ]; then
    	echo "BUG: object test-bucket/custpartsize not replicated"
    	exit_1
    fi
    
    # Stat the SSEC objects from source site
    echo "Stat minio1/test-bucket/encrypted"
    ./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  2. docs/site-replication/run-ssec-object-replication-with-compression.sh

    ./mc cp /tmp/data/defpartsize minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure
    
    # Below should fail as compression and SSEC used at the same time
    # DISABLED: We must check the response header to see if compression was actually applied
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  4. internal/crypto/sse-c.go

    	"github.com/minio/minio/internal/logger"
    )
    
    type ssec struct{}
    
    var (
    	// SSEC represents AWS SSE-C. It provides functionality to handle
    	// SSE-C requests.
    	SSEC = ssec{}
    
    	_ Type = SSEC
    )
    
    // String returns the SSE domain as string. For SSE-C the
    // domain is "SSE-C".
    func (ssec) String() string { return "SSE-C" }
    
    // IsRequested returns true if the HTTP headers contains
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  5. cmd/object-handlers.go

    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  6. cmd/encryption-v1.go

    		crypto.S3KMS.CreateMetadata(metadata, newKey.KeyID, newKey.Ciphertext, sealedKey, cryptoCtx)
    		return nil
    	case crypto.SSEC:
    		sealedKey, err := crypto.SSEC.ParseMetadata(metadata)
    		if err != nil {
    			return err
    		}
    
    		var objectKey crypto.ObjectKey
    		if err = objectKey.Unseal(oldKey, sealedKey, crypto.SSEC.String(), bucket, object); err != nil {
    			if subtle.ConstantTimeCompare(oldKey, newKey) == 1 {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  7. internal/crypto/sse.go

    		return S3, true
    	case S3KMS.IsRequested(h):
    		return S3KMS, true
    	case SSEC.IsRequested(h):
    		return SSEC, true
    	default:
    		return nil, false
    	}
    }
    
    // Requested returns whether any type of encryption is requested.
    func Requested(h http.Header) bool {
    	return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h)
    }
    
    // UnsealObjectKey extracts and decrypts the sealed object key
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 30 15:26:43 UTC 2022
    - 4.4K bytes
    - Viewed (0)
  8. cmd/tier-sweeper.go

    			ObjName:   os.RemoteObject,
    			VersionID: os.TransitionVersionID,
    			TierName:  os.TransitionTier,
    		}, true
    	}
    	return jentry{}, false
    }
    
    // Sweep removes the transitioned object if it's no longer referred to.
    func (os *objSweeper) Sweep() {
    	if je, ok := os.shouldRemoveRemoteObject(); ok {
    		globalExpiryState.enqueueTierJournalEntry(je)
    	}
    }
    
    type jentry struct {
    	ObjName   string
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Apr 17 05:09:58 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  9. internal/bucket/encryption/bucket-sse-config_test.go

    				t.Errorf("Test case %d: Expected %s but got %s", i+1, tc.expectedErr, err)
    			}
    			continue
    		}
    
    		if tc.keyID != "" && tc.keyID != ssec.KeyID() {
    			t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID())
    		}
    
    		if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 16 18:28:30 UTC 2022
    - 6.1K bytes
    - Viewed (0)
  10. internal/crypto/metadata.go

    func IsEncrypted(metadata map[string]string) (Type, bool) {
    	if S3KMS.IsEncrypted(metadata) {
    		return S3KMS, true
    	}
    	if S3.IsEncrypted(metadata) {
    		return S3, true
    	}
    	if SSEC.IsEncrypted(metadata) {
    		return SSEC, true
    	}
    	if IsMultiPart(metadata) {
    		return nil, true
    	}
    	if _, ok := metadata[MetaIV]; ok {
    		return nil, true
    	}
    	if _, ok := metadata[MetaAlgorithm]; ok {
    		return nil, true
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
Back to top