- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for s3sms (0.01 sec)
-
fess-crawler-lasta/src/main/resources/crawler/extractor.xml
"application/vnd.renlearn.rlprint", "application/vnd.rim.cod", "application/vnd.rn-realmedia", "application/vnd.route66.link66+xml", "application/vnd.ruckus.download", "application/vnd.s3sms", "application/vnd.sbm.cid", "application/vnd.sbm.mid2", "application/vnd.scribus", "application/vnd.sealed.3df", "application/vnd.sealed.csf", "application/vnd.sealed.doc",
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Sun Nov 23 03:46:53 UTC 2025 - 50.1K bytes - Viewed (0) -
cmd/encryption-v1.go
return nil case crypto.S3KMS: if GlobalKMS == nil { return errKMSNotConfigured } objectKey, err := crypto.S3KMS.UnsealObjectKey(GlobalKMS, metadata, bucket, object) if err != nil { return err } if len(cryptoCtx) == 0 { _, _, _, cryptoCtx, err = crypto.S3KMS.ParseMetadata(metadata) if err != nil { return err } }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 38K bytes - Viewed (0) -
internal/crypto/sse.go
switch { case S3.IsRequested(h): return S3, true case S3KMS.IsRequested(h): return S3KMS, true case SSEC.IsRequested(h): return SSEC, true default: return nil, false } } // Requested returns whether any type of encryption is requested. func Requested(h http.Header) bool { return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h) }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
cmd/object-handlers.go
var objEncKey crypto.ObjectKey sseCopyKMS := crypto.S3KMS.IsEncrypted(srcInfo.UserDefined) sseCopyS3 := crypto.S3.IsEncrypted(srcInfo.UserDefined) sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header) sseC := crypto.SSEC.IsRequested(r.Header) sseS3 := crypto.S3.IsRequested(r.Header) sseKMS := crypto.S3KMS.IsRequested(r.Header)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 120.6K bytes - Viewed (0) -
cmd/s3-zip-handlers.go
func (api objectAPIHandlers) getObjectInArchiveFileHandler(ctx context.Context, objectAPI ObjectLayer, bucket, object string, w http.ResponseWriter, r *http.Request) { if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL) return }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 15.8K bytes - Viewed (0) -
cmd/batch-rotate.go
srcBucket := r.Bucket srcObject := objInfo.Name if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() { return nil } sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined) sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined) if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed return errInvalidEncryptionParameters }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 14.7K bytes - Viewed (0) -
cmd/object-api-options.go
} } if metadata == nil { metadata = make(map[string]string) } etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag)) if crypto.S3KMS.IsRequested(hdr) { keyID, context, err := crypto.S3KMS.ParseHTTP(hdr) if err != nil { return ObjectOptions{}, err } sseKms, err := encrypt.NewSSEKMS(keyID, context) if err != nil { return ObjectOptions{}, err }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL) return } if crypto.SSEC.IsRequested(r.Header) && crypto.S3KMS.IsRequested(r.Header) { writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL) return } _, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 39.5K bytes - Viewed (0) -
cmd/api-response.go
m := cloneMSS(metadata) switch kind, _ := crypto.IsEncrypted(metadata); kind { case crypto.S3: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES case crypto.S3KMS: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata) if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Oct 24 04:05:19 UTC 2025 - 35K bytes - Viewed (0) -
cmd/bucket-handlers.go
case crypto.SSEC: key, err = ParseSSECustomerHeader(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } case crypto.S3KMS: keyID, kmsCtx, err = crypto.S3KMS.ParseHTTP(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } } if len(fanOutEntries) == 0 {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 63.9K bytes - Viewed (0)