Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ContentMD5Requested (0.06 sec)

  1. internal/etag/etag.go

    	if err != nil {
    		return nil, err
    	}
    	if len(b) != md5.Size {
    		return nil, errors.New("etag: invalid content-md5")
    	}
    	return ETag(b), nil
    }
    
    // ContentMD5Requested - for http.request.header is not request Content-Md5
    func ContentMD5Requested(h http.Header) bool {
    	_, ok := h[xhttp.ContentMD5]
    	return ok
    }
    
    // Multipart computes an S3 multipart ETag given a list of
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri May 16 14:27:42 UTC 2025
    - 13.2K bytes
    - Viewed (0)
  2. cmd/object-multipart-handlers.go

    	}
    
    	var forceMD5 []byte
    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    	// for server that is started with `--no-compat`.
    	if !etag.ContentMD5Requested(r.Header) && (crypto.S3KMS.IsEncrypted(mi.UserDefined) || crypto.SSEC.IsRequested(r.Header) || !globalServerCtxt.StrictS3Compat) {
    		forceMD5 = mustGetUUIDBytes()
    	}
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  3. cmd/bucket-handlers.go

    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    	// for server that is started with `--no-compat`.
    	kind, _ := crypto.IsRequested(formValues)
    	if !etag.ContentMD5Requested(formValues) && (kind == crypto.SSEC || kind == crypto.S3KMS || !globalServerCtxt.StrictS3Compat) {
    		forceMD5 = mustGetUUIDBytes()
    	}
    
    	hashReader, err := hash.NewReaderWithOpts(ctx, reader, hash.Options{
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 63.9K bytes
    - Viewed (0)
  4. cmd/object-handlers.go

    	}
    
    	var forceMD5 []byte
    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    	// for server that is started with `--no-compat`.
    	if !etag.ContentMD5Requested(r.Header) && (crypto.S3KMS.IsRequested(r.Header) || crypto.SSEC.IsRequested(r.Header) || !globalServerCtxt.StrictS3Compat) {
    		forceMD5 = mustGetUUIDBytes()
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 120.6K bytes
    - Viewed (0)
Back to top