- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for SignV2 (0.04 sec)
-
cmd/postpolicyform.go
if !condPassed { return fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", op, policy.Key, policy.Value) } } delete(checkHeader, formCanonicalName) } // For SignV2 - Signature/AWSAccessKeyId field will be ignored. if _, ok := formValues[xhttp.AmzSignatureV2]; ok { delete(checkHeader, xhttp.AmzSignatureV2) for k := range checkHeader { // case-insensitivity for AWSAccessKeyId
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Sep 23 19:35:41 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/signature-v4.go
return hex.EncodeToString(sumHMAC(signingKey, []byte(stringToSign))) } // Check to see if Policy is signed correctly. func doesPolicySignatureMatch(formValues http.Header) (auth.Credentials, APIErrorCode) { // For SignV2 - Signature field will be valid if _, ok := formValues[xhttp.AmzSignatureV2]; ok { return doesPolicySignatureV2Match(formValues) } return doesPolicySignatureV4Match(formValues) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/test-utils_test.go
req.URL.RawQuery += "&Signature=" + url.QueryEscape(signature) return nil } // Sign given request using Signature V2. func signRequestV2(req *http.Request, accessKey, secretKey string) error { signer.SignV2(*req, accessKey, secretKey, false) return nil } // Sign given request using Signature V4. func signRequestV4(req *http.Request, accessKey, secretKey string) error { // Get hashed payload.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 01 22:13:18 UTC 2024 - 77K bytes - Viewed (0)