Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for SSE (0.01 sec)

  1. cmd/object-api-options.go

    			if err != nil {
    				return
    			}
    			if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    				return
    			}
    			opts.ServerSideEncryption = encrypt.SSECopy(sse)
    			return
    		}
    		return
    	}
    
    	if crypto.SSEC.IsRequested(header) {
    		clientKey, err = crypto.SSEC.ParseHTTP(header)
    		if err != nil {
    			return
    		}
    		if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    			return
    		}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:34:38 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  2. cmd/object-multipart-handlers.go

    	// are slightly larger due to encryption overhead.
    	// Further, we have to adjust the ETags of parts when using SSE-S3.
    	// Due to AWS S3, SSE-S3 encrypted parts return the plaintext ETag
    	// being the content MD5 of that particular part. This is not the
    	// case for SSE-C and SSE-KMS objects.
    	if kind, ok := crypto.IsEncrypted(listPartsInfo.UserDefined); ok {
    		var objectEncryptionKey []byte
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  3. cmd/object-handlers.go

    			writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    			return
    		}
    	}
    
    	// If src == dst and either
    	// - the object is encrypted using SSE-C and two different SSE-C keys are present
    	// - the object is encrypted using SSE-S3 and the SSE-S3 header is present
    	// - the object storage class is not changing
    	// then execute a key rotation.
    	if cpSrcDstSame && (sseCopyC && sseC) && !chStorageClass {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  4. cmd/erasure-object.go

    		}
    		// Make sure to return object info to provide extra information.
    		return &GetObjectReader{
    			ObjInfo: objInfo,
    		}, toObjectErr(errMethodNotAllowed, bucket, object)
    	}
    
    	// Set NoDecryption for SSE-C objects and if replication request
    	if crypto.SSEC.IsEncrypted(objInfo.UserDefined) && opts.ReplicationRequest {
    		opts.NoDecryption = true
    	}
    
    	if objInfo.Size == 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 80.4K bytes
    - Viewed (0)
Back to top