- Sort Score
- Result 10 results
- Languages All
Results 1 - 6 of 6 for sses3 (0.03 sec)
-
internal/crypto/sse-s3.go
"github.com/minio/minio/internal/logger" ) type sses3 struct{} var ( // S3 represents AWS SSE-S3. It provides functionality to handle // SSE-S3 requests. S3 = sses3{} _ Type = S3 ) // String returns the SSE domain as string. For SSE-S3 the // domain is "SSE-S3". func (sses3) String() string { return "SSE-S3" } func (sses3) IsRequested(h http.Header) bool {
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
cmd/batch-rotate.go
return nil } sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined) sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined) if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed return errInvalidEncryptionParameters } if sseKMS && r.Encryption.Type == sses3 { // previously encrypted with sse-kms, now sse-s3 disallowed return errInvalidEncryptionParameters }
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Wed Sep 18 17:59:03 UTC 2024 - 14.7K bytes - Viewed (0) -
docs/security/README.md
- **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3). ### Server-Side Encryption - Preliminaries #### Secret Keys
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } if isEncrypted { sseS3 := crypto.S3.IsRequested(r.Header) || crypto.S3.IsEncrypted(mi.UserDefined) partInfo.ETag = tryDecryptETag(objectEncryptionKey[:], partInfo.ETag, sseS3) } response := generateCopyObjectPartResponse(partInfo.ETag, partInfo.LastModified) encodedSuccessResponse := encodeResponse(response)
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
cmd/encryption-v1.go
func tryDecryptETag(key []byte, encryptedETag string, sses3 bool) string { // ETag for SSE-C or SSE-KMS encrypted objects need not be content MD5Sum.While encrypted // md5sum is stored internally, return just the last 32 bytes of hex-encoded and // encrypted md5sum string for SSE-C if !sses3 { return encryptedETag[len(encryptedETag)-32:] } var objectKey crypto.ObjectKey
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/object-handlers.go
sseC := crypto.SSEC.IsRequested(r.Header) sseS3 := crypto.S3.IsRequested(r.Header) sseKMS := crypto.S3KMS.IsRequested(r.Header) isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS isTargetEncrypted := sseC || sseS3 || sseKMS if sseC { newKey, err = ParseSSECustomerRequest(r) if err != nil {
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0)