Re: Modern SHA2- based password hashes for pgcrypto
| От | Bernd Helmle |
|---|---|
| Тема | Re: Modern SHA2- based password hashes for pgcrypto |
| Дата | |
| Msg-id | aac1015d45ec98b2cf0ed1fdd2e05a2ee7b07736.camel@oopsware.de обсуждение |
| Ответ на | Re: Modern SHA2- based password hashes for pgcrypto (Daniel Gustafsson <daniel@yesql.se>) |
| Ответы |
Re: Modern SHA2- based password hashes for pgcrypto
|
| Список | pgsql-hackers |
Am Donnerstag, dem 02.01.2025 um 15:57 +0100 schrieb Daniel Gustafsson:
> > I adapted the code from the publicly available reference
> > implementation
> > at [1]. It's based on our existing OpenSSL infrastructure in
> > pgcrypto
> > and produces compatible password hashes with crypt() and "openssl
> > passwd" with "-5" and "-6" switches.
>
> Potentially daft question, but since we require OpenSSL to build
> pgcrypto, why
> do we need to include sha2 code instead of using the sha2
> implementation in
> libcrypto? How complicated would it be to use the OpenSSL API
> instead?
Not sure i got you, but i use OpenSSL and the SHA2 implementation
there. See the pgcrypto px_* API (px.h and openssl.c respectively) i am
using to create the digests.
Thanks,
Bernd
В списке pgsql-hackers по дате отправления: