Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 21 - 30 of 172 for decrypted (0.14 seconds)

  1. internal/crypto/sse.go

    func Requested(h http.Header) bool {
    	return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h)
    }
    
    // UnsealObjectKey extracts and decrypts the sealed object key
    // from the metadata using the SSE-Copy client key of the HTTP headers
    // and returns the decrypted object key.
    func (sse ssecCopy) UnsealObjectKey(h http.Header, metadata map[string]string, bucket, object string) (key ObjectKey, err error) {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 4.3K bytes
    - Click Count (0)
  2. cmd/kms-handlers.go

    			return
    		}
    		writeSuccessResponseJSON(w, resp)
    		return
    	}
    
    	// 2. Verify that we can indeed decrypt the (encrypted) key
    	decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{
    		Name:           key.KeyID,
    		Ciphertext:     key.Ciphertext,
    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		response.DecryptionErr = err.Error()
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Aug 18 06:43:03 GMT 2024
    - 10.1K bytes
    - Click Count (0)
  3. internal/crypto/doc.go

    //
    // All objects are encrypted with an unique and randomly generated 'ObjectKey'.
    // The ObjectKey itself is never stored in plaintext. Instead it is only stored
    // in a sealed from. The sealed 'ObjectKey' is created by encrypting the 'ObjectKey'
    // with an unique key-encryption-key. Given the correct key-encryption-key the
    // sealed 'ObjectKey' can be unsealed and the object can be decrypted.
    //
    // ## SSE-C
    //
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 26 19:52:29 GMT 2022
    - 5K bytes
    - Click Count (0)
  4. internal/kms/conn.go

    	// The same context must be provided when the generated key
    	// should be decrypted. Therefore, it is the callers
    	// responsibility to remember the corresponding context for
    	// a particular DEK. The context may be nil.
    	GenerateKey(context.Context, *GenerateKeyRequest) (DEK, error)
    
    	// DecryptKey decrypts the ciphertext with the key referenced
    	// by the key ID. The context must match the context value
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Aug 18 06:43:03 GMT 2024
    - 5K bytes
    - Click Count (0)
  5. internal/config/crypto_test.go

    		}
    
    		plaintext, err := Decrypt(KMS, bytes.NewReader(data), test.Context)
    		if err != nil {
    			t.Fatalf("Test %d: failed to decrypt stream: %v", i, err)
    		}
    		data, err = io.ReadAll(plaintext)
    		if err != nil {
    			t.Fatalf("Test %d: failed to decrypt stream: %v", i, err)
    		}
    
    		if !bytes.Equal(data, test.Data) {
    			t.Fatalf("Test %d: decrypted data does not match original data", i)
    		}
    	}
    }
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 3.2K bytes
    - Click Count (0)
  6. docs/bucket/lifecycle/DESIGN.md

              "x-amz-restore": "ongoing-request=false, expiry-date=Sat, 27 Feb 2021 00:00:00 GMT",
    ...
    ```
    
    ### Encrypted/Object locked objects
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  7. cmd/object-api-datatypes.go

    // It will be decrypted if needed.
    func (o *ObjectInfo) ArchiveInfo(h http.Header) []byte {
    	if len(o.UserDefined) == 0 {
    		return nil
    	}
    	z, ok := o.UserDefined[archiveInfoMetadataKey]
    	if !ok {
    		return nil
    	}
    	data := []byte(z)
    	if v, ok := o.UserDefined[archiveTypeMetadataKey]; ok && v == archiveTypeEnc {
    		decrypted, err := o.metadataDecrypter(h)(archiveTypeEnc, data)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 21.2K bytes
    - Click Count (0)
  8. internal/config/certs.go

    	}
    
    	return x509Certs, nil
    }
    
    // LoadX509KeyPair - load an X509 key pair (private key , certificate)
    // from the provided paths. The private key may be encrypted and is
    // decrypted using the ENV_VAR: MINIO_CERT_PASSWD.
    func LoadX509KeyPair(certFile, keyFile string) (tls.Certificate, error) {
    	certPEMBlock, err := os.ReadFile(certFile)
    	if err != nil {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Aug 14 17:11:51 GMT 2024
    - 3.8K bytes
    - Click Count (0)
  9. internal/crypto/key.go

    	}
    	copy(sealedKey.Key[:], encryptedKey.Bytes())
    	return sealedKey
    }
    
    // Unseal decrypts a sealed key using the 256 bit external key. Since the sealed key
    // may be cryptographically bound to the object's path the same bucket/object as during sealing
    // must be provided. On success the ObjectKey contains the decrypted sealed key.
    func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri May 16 14:27:42 GMT 2025
    - 6.2K bytes
    - Click Count (0)
  10. internal/crypto/sse-c.go

    		return key, ErrCustomerKeyMD5Mismatch
    	}
    	copy(key[:], clientKey)
    	return key, nil
    }
    
    // UnsealObjectKey extracts and decrypts the sealed object key
    // from the metadata using the SSE-C client key of the HTTP headers
    // and returns the decrypted object key.
    func (s3 ssec) UnsealObjectKey(h http.Header, metadata map[string]string, bucket, object string) (key ObjectKey, err error) {
    	clientKey, err := s3.ParseHTTP(h)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 5.2K bytes
    - Click Count (0)
Back to Top