检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For details, see section "Setting Encrypted Equality Query" in Feature Guide.
Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."
Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."
Actually, encrypted columns that depend on CEKs cannot be deleted. Examples 1 2 3 4 -- Delete a CEK. gaussdb=# DROP COLUMN ENCRYPTION KEY ImgCEK CASCADE; ERROR: cannot drop column setting: imgcek cascadely because encrypted column depend on it.
Actually, encrypted columns that depend on CEKs cannot be deleted. Examples 1 2 3 4 -- Delete a CEK object. gaussdb=# DROP COLUMN ENCRYPTION KEY ImgCEK CASCADE; ERROR: cannot drop column setting: imgcek cascadely because encrypted column depend on it.
When you create a foreign table, the AK value is encrypted and saved to the metadata table of the database.
When you create a foreign table, the AK value is encrypted and saved to the metadata table of the database.
Setting suggestion: If indexes of all encrypted tables need to be encrypted, enable this parameter. You do not need to manually set indexes to encrypted indexes.
Setting suggestion: If indexes of all encrypted tables need to be encrypted, enable this parameter. You do not need to manually set indexes to encrypted indexes.
The encrypted CMKs are different from those specified before RR encryption. SM algorithm constraints: SM2, SM3, and SM4 are Chinese national cryptography standards. To avoid legal risks, these algorithms must be used together.
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are Chinese cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are SM cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM algorithms are as follows: SM2, SM3, and SM4 are Chinese cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
If the password string has already been encrypted in the SHA256 format, it is stored encrypted as it was, regardless of whether ENCRYPTED or UNENCRYPTED is specified (since the system cannot decrypt the specified encrypted password string).