- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for s3sms (0.04 sec)
-
internal/crypto/metadata.go
// // IsEncrypted only checks whether the metadata contains at least // one entry indicating SSE-C or SSE-S3. func IsEncrypted(metadata map[string]string) (Type, bool) { if S3KMS.IsEncrypted(metadata) { return S3KMS, true } if S3.IsEncrypted(metadata) { return S3, true } if SSEC.IsEncrypted(metadata) { return SSEC, true } if IsMultiPart(metadata) { return nil, true }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 17:40:33 UTC 2024 - 6.4K bytes - Viewed (0) -
cmd/encryption-v1.go
return nil case crypto.S3KMS: if GlobalKMS == nil { return errKMSNotConfigured } objectKey, err := crypto.S3KMS.UnsealObjectKey(GlobalKMS, metadata, bucket, object) if err != nil { return err } if len(cryptoCtx) == 0 { _, _, _, cryptoCtx, err = crypto.S3KMS.ParseMetadata(metadata) if err != nil { return err } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/object-handlers.go
var objEncKey crypto.ObjectKey sseCopyKMS := crypto.S3KMS.IsEncrypted(srcInfo.UserDefined) sseCopyS3 := crypto.S3.IsEncrypted(srcInfo.UserDefined) sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header) sseC := crypto.SSEC.IsRequested(r.Header) sseS3 := crypto.S3.IsRequested(r.Header) sseKMS := crypto.S3KMS.IsRequested(r.Header)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0) -
cmd/s3-zip-handlers.go
func (api objectAPIHandlers) getObjectInArchiveFileHandler(ctx context.Context, objectAPI ObjectLayer, bucket, object string, w http.ResponseWriter, r *http.Request) { if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL) return }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 15:31:51 UTC 2024 - 15.8K bytes - Viewed (0) -
cmd/api-response.go
m := cloneMSS(metadata) switch kind, _ := crypto.IsEncrypted(metadata); kind { case crypto.S3: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES case crypto.S3KMS: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata) if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 19:27:06 UTC 2024 - 33.4K bytes - Viewed (0) -
cmd/batch-rotate.go
srcBucket := r.Bucket srcObject := objInfo.Name if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() { return nil } sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined) sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined) if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed return errInvalidEncryptionParameters }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Sep 18 17:59:03 UTC 2024 - 14.7K bytes - Viewed (0) -
cmd/object-api-options.go
if err != nil { return opts, fmt.Errorf("invalid/unknown checksum sent: %v", err) } etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag)) if crypto.S3KMS.IsRequested(hdr) { keyID, context, err := crypto.S3KMS.ParseHTTP(hdr) if err != nil { return ObjectOptions{}, err } sseKms, err := encrypt.NewSSEKMS(keyID, context) if err != nil { return ObjectOptions{}, err }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 21 21:13:59 UTC 2024 - 14.4K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL) return } if crypto.SSEC.IsRequested(r.Header) && crypto.S3KMS.IsRequested(r.Header) { writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL) return } _, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
cmd/bucket-handlers.go
case crypto.SSEC: key, err = ParseSSECustomerHeader(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } case crypto.S3KMS: keyID, kmsCtx, err = crypto.S3KMS.ParseHTTP(formValues) if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } } if len(fanOutEntries) == 0 {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 12:24:04 UTC 2024 - 63.4K bytes - Viewed (0) -
cmd/erasure-multipart.go
} objectEncryptionKey, err = decryptObjectMeta(baseKey, bucket, object, fi.Metadata) if err != nil { return oi, err } } case crypto.S3, crypto.S3KMS: objectEncryptionKey, err = decryptObjectMeta(nil, bucket, object, fi.Metadata) if err != nil { return oi, err } } if len(objectEncryptionKey) == 32 { var key crypto.ObjectKey
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Sep 29 22:40:36 UTC 2024 - 44.7K bytes - Viewed (0)