- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 38 for sse (0.12 sec)
-
internal/crypto/sse.go
) // Type represents an AWS SSE type: // - SSE-C // - SSE-S3 // - SSE-KMS type Type interface { fmt.Stringer IsRequested(http.Header) bool IsEncrypted(map[string]string) bool } // IsRequested returns true and the SSE Type if the HTTP headers // indicate that some form server-side encryption is requested. // // If no SSE headers are present then IsRequested returns false
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 30 15:26:43 GMT 2022 - 4.4K bytes - Viewed (0) -
internal/crypto/sse_test.go
package crypto import ( "net/http" "testing" ) func TestS3String(t *testing.T) { const Domain = "SSE-S3" if domain := S3.String(); domain != Domain { t.Errorf("S3's string method returns wrong domain: got '%s' - want '%s'", domain, Domain) } } func TestSSECString(t *testing.T) { const Domain = "SSE-C" if domain := SSEC.String(); domain != Domain {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Jun 01 21:59:40 GMT 2021 - 8.4K bytes - Viewed (0) -
internal/crypto/sse-c.go
type ssec struct{} var ( // SSEC represents AWS SSE-C. It provides functionality to handle // SSE-C requests. SSEC = ssec{} _ Type = SSEC ) // String returns the SSE domain as string. For SSE-C the // domain is "SSE-C". func (ssec) String() string { return "SSE-C" } // IsRequested returns true if the HTTP headers contains // at least one SSE-C header. SSE-C copy headers are ignored.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/sse-kms.go
type ssekms struct{} var ( // S3KMS represents AWS SSE-KMS. It provides functionality to // handle SSE-KMS requests. S3KMS = ssekms{} _ Type = S3KMS ) // String returns the SSE domain as string. For SSE-KMS the // domain is "SSE-KMS". func (ssekms) String() string { return "SSE-KMS" } // IsRequested returns true if the HTTP headers contains // at least one SSE-KMS header. func (ssekms) IsRequested(h http.Header) bool {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.4K bytes - Viewed (0) -
internal/crypto/sse-s3.go
"github.com/minio/minio/internal/logger" ) type sses3 struct{} var ( // S3 represents AWS SSE-S3. It provides functionality to handle // SSE-S3 requests. S3 = sses3{} _ Type = S3 ) // String returns the SSE domain as string. For SSE-S3 the // domain is "SSE-S3". func (sses3) String() string { return "SSE-S3" } func (sses3) IsRequested(h http.Header) bool { _, ok := h[xhttp.AmzServerSideEncryption]
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.5K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
} } // Algo returns the SSE algorithm specified by the SSE configuration. func (b *BucketSSEConfig) Algo() Algorithm { for _, rule := range b.Rules { return rule.DefaultEncryptionAction.Algorithm } return "" } // KeyID returns the KMS key ID specified by the SSE configuration. // If the SSE configuration does not specify SSE-KMS it returns an // empty key ID.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config_test.go
// GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package sse import ( "bytes" "encoding/xml" "errors" "testing" ) // TestParseBucketSSEConfig performs basic sanity tests on ParseBucketSSEConfig func TestParseBucketSSEConfig(t *testing.T) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 16 18:28:30 GMT 2022 - 6.1K bytes - Viewed (0) -
internal/crypto/doc.go
// - SealedKey <- metadata // - KeyEncKey := HMAC-SHA256(ClientKey, IV || 'SSE-C' || 'DAREv2-HMAC-SHA256' || bucket || '/' || object) // - ObjectKey := DAREv2_Dec(KeyEncKey, SealedKey) // - object_data := DAREv2_Dec(ObjectKey, enc_object_data) // Output: object_data // // ## SSE-S3 // // SSE-S3 can use either a master key or a KMS as root-of-trust.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Aug 26 19:52:29 GMT 2022 - 5K bytes - Viewed (0) -
cmd/batch-rotate.go
) // keyrotate: // apiVersion: v1 // bucket: BUCKET // prefix: PREFIX // encryption: // type: sse-s3 # valid values are sse-s3 and sse-kms // key: <new-kms-key> # valid only for sse-kms // context: <new-kms-key-context> # valid only for sse-kms // # optional flags based filtering criteria // # for all objects // flags: // filter:
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 14.2K bytes - Viewed (0) -
internal/crypto/error.go
ErrCustomerKeyMD5Mismatch = Errorf("The provided SSE-C key MD5 does not match the computed MD5 of the SSE-C key") // ErrIncompatibleEncryptionMethod indicates that both SSE-C headers and SSE-S3 headers were specified, and are incompatible // The client needs to remove the SSE-S3 header or the SSE-C headers ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 4.4K bytes - Viewed (0)