Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ParseSSECustomerRequest (0.19 sec)

  1. cmd/encryption-v1.go

    		return nil, crypto.ErrIncompatibleEncryptionMethod
    	}
    	k, err := crypto.SSECopy.ParseHTTP(h)
    	return k[:], err
    }
    
    // ParseSSECustomerRequest parses the SSE-C header fields of the provided request.
    // It returns the client provided key on success.
    func ParseSSECustomerRequest(r *http.Request) (key []byte, err error) {
    	return ParseSSECustomerHeader(r.Header)
    }
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 06:56:12 UTC 2024
    - 37.1K bytes
    - Viewed (0)
  2. cmd/object-api-options.go

    	opts.UserDefined[ReservedMetadataPrefix+"Actual-Object-Size"] = r.Header.Get(xhttp.MinIOReplicationActualObjectSize)
    	// Transfer SSEC key in opts.EncryptFn
    	if crypto.SSEC.IsRequested(r.Header) {
    		key, err := ParseSSECustomerRequest(r)
    		if err == nil {
    			// Set EncryptFn to return SSEC key
    			opts.EncryptFn = func(baseKey string, data []byte) []byte {
    				return key
    			}
    		}
    	}
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 06:56:12 UTC 2024
    - 14.3K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    			writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
    			return
    		}
    		var key []byte
    		if crypto.SSEC.IsRequested(r.Header) {
    			key, err = ParseSSECustomerRequest(r)
    			if err != nil {
    				writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    				return
    			}
    		}
    		key, err = decryptObjectMeta(key, dstBucket, dstObject, mi.UserDefined)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 38.8K bytes
    - Viewed (0)
  4. cmd/object-handlers.go

    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    	isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS
    	isTargetEncrypted := sseC || sseS3 || sseKMS
    
    	if sseC {
    		newKey, err = ParseSSECustomerRequest(r)
    		if err != nil {
    			writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    			return
    		}
    	}
    	if crypto.S3KMS.IsRequested(r.Header) {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 124.2K bytes
    - Viewed (0)
Back to top