Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 207 for ssec (0.1 sec)

  1. docs/site-replication/run-ssec-object-replication.sh

    	exit_1
    fi
    
    repcount4=$(./mc ls minio2/test-bucket/custpartsize --insecure | wc -l)
    if [ "${repcount4}" -ne 1 ]; then
    	echo "BUG: object test-bucket/custpartsize not replicated"
    	exit_1
    fi
    
    # Stat the SSEC objects from source site
    echo "Stat minio1/test-bucket/encrypted"
    ./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  2. docs/site-replication/run-ssec-object-replication-with-compression.sh

    # Below should fail as compression and SSEC used at the same time
    # DISABLED: We must check the response header to see if compression was actually applied
    #RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1)
    #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  4. cmd/object-multipart-handlers.go

    	var objectEncryptionKey crypto.ObjectKey
    	if isEncrypted {
    		if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  5. internal/crypto/metadata.go

    //
    // IsEncrypted only checks whether the metadata contains at least
    // one entry indicating SSE-C or SSE-S3.
    func IsEncrypted(metadata map[string]string) (Type, bool) {
    	if S3KMS.IsEncrypted(metadata) {
    		return S3KMS, true
    	}
    	if S3.IsEncrypted(metadata) {
    		return S3, true
    	}
    	if SSEC.IsEncrypted(metadata) {
    		return SSEC, true
    	}
    	if IsMultiPart(metadata) {
    		return nil, true
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  6. cmd/object-api-options.go

    			if err != nil {
    				return
    			}
    			if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    				return
    			}
    			opts.ServerSideEncryption = encrypt.SSECopy(sse)
    			return
    		}
    		return
    	}
    
    	if crypto.SSEC.IsRequested(header) {
    		clientKey, err = crypto.SSEC.ParseHTTP(header)
    		if err != nil {
    			return
    		}
    		if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    			return
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 21 21:13:59 UTC 2024
    - 14.4K bytes
    - Viewed (0)
  7. internal/crypto/metadata_test.go

    func TestSSECCreateMetadata(t *testing.T) {
    	defer func(l bool) { logger.DisableLog = l }(logger.DisableLog)
    	logger.DisableLog = true
    	for i, test := range ssecCreateMetadataTests {
    		metadata := SSEC.CreateMetadata(nil, test.SealedKey)
    		sealedKey, err := SSEC.ParseMetadata(metadata)
    		if err != nil {
    			t.Errorf("Test %d: failed to parse metadata: %v", i, err)
    			continue
    		}
    		if sealedKey.Algorithm != test.SealedKey.Algorithm {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jul 12 20:51:54 UTC 2024
    - 18.7K bytes
    - Viewed (0)
  8. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  9. cmd/object-handlers.go

    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  10. cmd/bucket-replication.go

    		Dsc:                  dsc,
    		TargetStatuses:       tgtStatuses,
    		TargetPurgeStatuses:  purgeStatuses,
    		ReplicationTimestamp: tm,
    		SSEC:                 crypto.SSEC.IsEncrypted(oi.UserDefined),
    		UserTags:             oi.UserTags,
    	}
    	if ri.SSEC {
    		ri.Checksum = oi.Checksum
    	}
    	if dsc.Synchronous() {
    		replicateObject(ctx, ri, o)
    	} else {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 116.1K bytes
    - Viewed (0)
Back to top