- Sort Score
- Num 10 results
- Language All
Results 11 - 15 of 15 for s3sms (0.03 seconds)
-
cmd/batch-rotate.go
srcBucket := r.Bucket srcObject := objInfo.Name if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() { return nil } sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined) sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined) if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed return errInvalidEncryptionParameters }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 14.7K bytes - Click Count (0) -
cmd/object-api-options.go
} } if metadata == nil { metadata = make(map[string]string) } etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag)) if crypto.S3KMS.IsRequested(hdr) { keyID, context, err := crypto.S3KMS.ParseHTTP(hdr) if err != nil { return ObjectOptions{}, err } sseKms, err := encrypt.NewSSEKMS(keyID, context) if err != nil { return ObjectOptions{}, err }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.3K bytes - Click Count (0) -
cmd/api-response.go
m := cloneMSS(metadata) switch kind, _ := crypto.IsEncrypted(metadata); kind { case crypto.S3: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES case crypto.S3KMS: m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata) if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Oct 24 04:05:19 GMT 2025 - 35K bytes - Click Count (0) -
cmd/erasure-multipart.go
} objectEncryptionKey, err = decryptObjectMeta(baseKey, bucket, object, fi.Metadata) if err != nil { return oi, err } } case crypto.S3, crypto.S3KMS: objectEncryptionKey, err = decryptObjectMeta(nil, bucket, object, fi.Metadata) if err != nil { return oi, err } } if len(objectEncryptionKey) == 32 { var key crypto.ObjectKey
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Oct 24 04:05:31 GMT 2025 - 47.1K bytes - Click Count (0) -
cmd/bucket-replication.go
} } putOpts.Internal.LegalholdTimestamp = lholdTimestamp } if crypto.S3.IsEncrypted(objInfo.UserDefined) { putOpts.ServerSideEncryption = encrypt.NewSSE() } if crypto.S3KMS.IsEncrypted(objInfo.UserDefined) { // If KMS key ID replication is enabled (as by default) // we include the object's KMS key ID. In any case, we // always set the SSE-KMS header. If no KMS key ID is
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 118.2K bytes - Click Count (0)