Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for SignV2 (0.04 sec)

  1. cmd/postpolicyform.go

    			if !condPassed {
    				return fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", op, policy.Key, policy.Value)
    			}
    		}
    		delete(checkHeader, formCanonicalName)
    	}
    	// For SignV2 - Signature/AWSAccessKeyId field will be ignored.
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		delete(checkHeader, xhttp.AmzSignatureV2)
    		for k := range checkHeader {
    			// case-insensitivity for AWSAccessKeyId
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Sep 23 19:35:41 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  2. cmd/signature-v4.go

    	return hex.EncodeToString(sumHMAC(signingKey, []byte(stringToSign)))
    }
    
    // Check to see if Policy is signed correctly.
    func doesPolicySignatureMatch(formValues http.Header) (auth.Credentials, APIErrorCode) {
    	// For SignV2 - Signature field will be valid
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		return doesPolicySignatureV2Match(formValues)
    	}
    	return doesPolicySignatureV4Match(formValues)
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu May 16 23:13:47 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  3. cmd/test-utils_test.go

    	req.URL.RawQuery += "&Signature=" + url.QueryEscape(signature)
    	return nil
    }
    
    // Sign given request using Signature V2.
    func signRequestV2(req *http.Request, accessKey, secretKey string) error {
    	signer.SignV2(*req, accessKey, secretKey, false)
    	return nil
    }
    
    // Sign given request using Signature V4.
    func signRequestV4(req *http.Request, accessKey, secretKey string) error {
    	// Get hashed payload.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 01 22:13:18 UTC 2024
    - 77K bytes
    - Viewed (0)
Back to top