检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
CREATE CLIENT MASTER KEY Description The encrypted equality query feature adopts a multi-level encryption model. The master key encrypts the column key, and the column key encrypts data. This syntax is used to create a master key object.
For details, see section "Setting Encrypted Equality Query" in Feature Guide.
For details, see section "Setting Encrypted Equality Query" in Feature Guide.
Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.
Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.
Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."
Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."
Encryption and Decryption Functions AES_DECRYPT AES_DECRYPT(crypt_str, key_str[, init_vector][, kdf_name][, salt][, info | iterations]) Description: Based on AES algorithm, the encrypted string crypt_str is decrypted using the decryption password key_str, initialization vector init_vector
Actually, encrypted columns that depend on CEKs cannot be deleted. Examples 1 2 3 4 -- Delete a CEK. gaussdb=# DROP COLUMN ENCRYPTION KEY ImgCEK CASCADE; ERROR: cannot drop column setting: imgcek cascadely because encrypted column depend on it.
Actually, encrypted columns that depend on CEKs cannot be deleted. Examples 1 2 3 4 -- Delete a CEK object. gaussdb=# DROP COLUMN ENCRYPTION KEY ImgCEK CASCADE; ERROR: cannot drop column setting: imgcek cascadely because encrypted column depend on it.
When you create a foreign table, the AK value is encrypted and saved to the metadata table of the database.
When you create a foreign table, the AK value is encrypted and saved to the metadata table of the database.
Setting suggestion: If indexes of all encrypted tables need to be encrypted, enable this parameter. You do not need to manually set indexes to encrypted indexes.
Setting suggestion: If indexes of all encrypted tables need to be encrypted, enable this parameter. You do not need to manually set indexes to encrypted indexes.
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are SM cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
The encrypted CMKs are different from those specified before RR encryption. SM algorithm constraints: SM2, SM3, and SM4 are Chinese national cryptography standards. To avoid legal risks, these algorithms must be used together.