| From: | Marko Kreen <marko(at)l-t(dot)ee> |
|---|---|
| To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
| Cc: | pgsql-hackers(at)postgresql(dot)org |
| Subject: | Re: 4 pgcrypto regressions failures - 1 unsolved |
| Date: | 2005-07-12 19:51:58 |
| Message-ID: | 20050712195158.GA5394@l-t.ee |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers pgsql-patches |
Seems like down mail server ate first mail.
Here it is again.
On Tue, Jul 12, 2005 at 12:51:44PM +0300, Marko Kreen wrote:
>
> Hopefully the last regression failure.
>
> - openssl.c used EVP_MAX_KEY_LENGTH / EVP_MAX_IV_LENGTH
> constants for buffers, which are small in case of
> OpenSSL 0.9.6x and internal AES. (I tested it with
> 0.9.7 only, so I didn't notice...)
> - Also I noticed that the wrapper macros for CBC mode
> do not update IV buffer.
> - As the previous mistake was not picked up by current
> regression tests, I added a 'longer than a block'
> test to all ciphers.
>
> --
> marko
| Attachment | Content-Type | Size |
|---|---|---|
| oldssl.fix.diff | text/plain | 10.0 KB |
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Tom Lane | 2005-07-12 20:29:09 | Re: 4 pgcrypto regressions failures - 1 unsolved |
| Previous Message | Mark Wong | 2005-07-12 19:47:17 | dbt2 & opteron performance |
| From | Date | Subject | |
|---|---|---|---|
| Next Message | David Fetter | 2005-07-12 20:01:56 | Re: [PATCHES] Doc patch: New PL/Perl Features |
| Previous Message | Andrew Dunstan | 2005-07-12 19:45:55 | Re: PL/Perl list value return causes segfault |