AWS computes signatures based on the encoded data, which I believe to be the 
result of signature checking being in the wrong layer of the service 
architecture.  As a result they are sensitive to differences in hex digit 
capitalization, and to the precise set of reserved characters, which is not 
universally standardized.  Because xdmp:url-encode does not conform to their 
specifications, and may be subject to change, a new version was added to ensure 
compatibility.

I'm sorry to say there's no xdmp:hmac-sha1.  One of the benefits of adding 
undocumented functions to support specific features is a reduction in the cost 
of testing, documentation, and completeness. There has been discussion in the 
past of including a full suite of public crypto functions, wrapping more of 
what's already present in the OpenSSL library, but I don't believe there's a 
plan to do that at this time.  Add your voice to the RFE process if you crave 
this functionality.


Sam Neth
Lead Engineer
MarkLogic Corporation





On May 8, 2011, at 8:56 AM, Geert Josten wrote:

Hi,

Browsing through the MarkLogic built-in Modules in search for some modules I 
knew must be there, my eye was caught by the EC2 and AWS modules. Scanning 
through them I noticed the use of the following undocumented functions:

- xdmp:aws-url-encode
- xdmp:hmac-sha256

Can anyone explain in which way xdmp:aws-url-encode differs from 
xdmp:url-encode. And since there is an hmac-sha256 function, is there a 
hmac-sha1 function as well?

Kind regards,
Geert
_______________________________________________
General mailing list
General@developer.marklogic.com<mailto:General@developer.marklogic.com>
http://developer.marklogic.com/mailman/listinfo/general

_______________________________________________
General mailing list
General@developer.marklogic.com
http://developer.marklogic.com/mailman/listinfo/general

Reply via email to