Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for SignV2 (0.04 sec)

  1. cmd/postpolicyform.go

    				return fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", op, policy.Key, policy.Value)
    			}
    		}
    		delete(mustFindInPolicy, formCanonicalName)
    	}
    
    	// For SignV2 - Signature/AWSAccessKeyId fields do not need to be in the policy
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		delete(mustFindInPolicy, xhttp.AmzSignatureV2)
    		for k := range mustFindInPolicy {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  2. cmd/signature-v4.go

    	return hex.EncodeToString(sumHMAC(signingKey, []byte(stringToSign)))
    }
    
    // Check to see if Policy is signed correctly.
    func doesPolicySignatureMatch(formValues http.Header) (auth.Credentials, APIErrorCode) {
    	// For SignV2 - Signature field will be valid
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		return doesPolicySignatureV2Match(formValues)
    	}
    	return doesPolicySignatureV4Match(formValues)
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Dec 13 22:19:12 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  3. cmd/test-utils_test.go

    	req.URL.RawQuery += "&Signature=" + url.QueryEscape(signature)
    	return nil
    }
    
    // Sign given request using Signature V2.
    func signRequestV2(req *http.Request, accessKey, secretKey string) error {
    	signer.SignV2(*req, accessKey, secretKey, false)
    	return nil
    }
    
    // Sign given request using Signature V4.
    func signRequestV4(req *http.Request, accessKey, secretKey string) error {
    	// Get hashed payload.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 77K bytes
    - Viewed (0)
Back to top