Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for sses3 (0.02 sec)

  1. internal/crypto/sse-s3.go

    	"github.com/minio/minio/internal/logger"
    )
    
    type sses3 struct{}
    
    var (
    	// S3 represents AWS SSE-S3. It provides functionality to handle
    	// SSE-S3 requests.
    	S3 = sses3{}
    
    	_ Type = S3
    )
    
    // String returns the SSE domain as string. For SSE-S3 the
    // domain is "SSE-S3".
    func (sses3) String() string { return "SSE-S3" }
    
    func (sses3) IsRequested(h http.Header) bool {
    Registered: Sun Oct 27 19:28:09 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  2. cmd/batch-rotate.go

    		return nil
    	}
    	sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined)
    	sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined)
    	if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed
    		return errInvalidEncryptionParameters
    	}
    	if sseKMS && r.Encryption.Type == sses3 { // previously encrypted with sse-kms, now sse-s3 disallowed
    		return errInvalidEncryptionParameters
    	}
    Registered: Sun Oct 27 19:28:09 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    	if err != nil {
    		writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    		return
    	}
    
    	if isEncrypted {
    		sseS3 := crypto.S3.IsRequested(r.Header) || crypto.S3.IsEncrypted(mi.UserDefined)
    		partInfo.ETag = tryDecryptETag(objectEncryptionKey[:], partInfo.ETag, sseS3)
    	}
    
    	response := generateCopyObjectPartResponse(partInfo.ETag, partInfo.LastModified)
    	encodedSuccessResponse := encodeResponse(response)
    
    Registered: Sun Oct 27 19:28:09 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  4. cmd/encryption-v1.go

    func tryDecryptETag(key []byte, encryptedETag string, sses3 bool) string {
    	// ETag for SSE-C or SSE-KMS encrypted objects need not be content MD5Sum.While encrypted
    	// md5sum is stored internally, return just the last 32 bytes of hex-encoded and
    	// encrypted md5sum string for SSE-C
    	if !sses3 {
    		return encryptedETag[len(encryptedETag)-32:]
    	}
    	var objectKey crypto.ObjectKey
    Registered: Sun Oct 27 19:28:09 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  5. cmd/object-handlers.go

    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    		if err != nil {
    Registered: Sun Oct 27 19:28:09 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
Back to top