Re: [pgadmin-hackers] Client-side password encryption
От | Andrew Dunstan |
---|---|
Тема | Re: [pgadmin-hackers] Client-side password encryption |
Дата | |
Msg-id | 43AB3B7D.4000604@dunslane.net обсуждение исходный текст |
Ответ на | Re: [pgadmin-hackers] Client-side password encryption (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: [pgadmin-hackers] Client-side password encryption
|
Список | pgsql-hackers |
Tom Lane wrote: >Christopher Kings-Lynne <chriskl@familyhealth.com.au> writes: > > >>>So it appears that pg_md5_encrypt is not officially exported from libpq. >>>Does anyone see a problem with adding it to the export list and the >>>header file? >>> >>> > > > >>Is it different to normal md5? How is this helpful to the phpPgAdmin >>project? >> >> > >It would be better to export an API that is (a) less random (why one >input null-terminated and the other not?) and (b) less tightly tied >to MD5 --- the fact that the caller knows how long the result must be >is the main problem here. > >Something like > char *pg_gen_encrypted_passwd(const char *passwd, const char *user) >with malloc'd result (or NULL on failure) seems more future-proof. > > > > Where are we on this? In general I agree with Tom, but I have no time to do the work. Unless someone has an immediate implementation, I suggest that pro tem we add pg_md5_encrypt to src/interfaces/libpq/exports.txt, which is the minimum needed to unbreak Windows builds, while this gets sorted out properly. cheers andrew
В списке pgsql-hackers по дате отправления: