| From: | Michael Paquier <michael(at)paquier(dot)xyz> |
|---|---|
| To: | Alessandro Gherardi <alessandro(dot)gherardi(at)yahoo(dot)com> |
| Cc: | "pgsql-general(at)lists(dot)postgresql(dot)org" <pgsql-general(at)lists(dot)postgresql(dot)org> |
| Subject: | Re: scram-sha-256 authentication broken in FIPS mode |
| Date: | 2018-09-11 03:09:00 |
| Message-ID: | 20180911030900.GB27115@paquier.xyz |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-general |
On Tue, Sep 11, 2018 at 12:02:50PM +0900, Michael Paquier wrote:
> Hence, intrinsically, we are in contradiction with the upstream docs. I
> have worked on the problem with the patch, which works down to OpenSSL
> 0.9.8, and should fix your issue. This is based on what you sent
> previously, except that I was not able to apply what was sent, so I
> reworked the whole. Alessandro, does this fix your problems? I would
> like to apply that down to v10 where SCRAM has been introduced.
With the actual patch attached things are better. So here it is.
--
Michael
| Attachment | Content-Type | Size |
|---|---|---|
| 0001-Change-SHA-algorithms-to-use-EVP_CTX-from-OpenSSL.patch | text/x-diff | 3.6 KB |
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Lutz Gehlen | 2018-09-11 07:24:23 | Re: timestamp arithmetics in C function |
| Previous Message | Michael Paquier | 2018-09-11 03:02:50 | Re: scram-sha-256 authentication broken in FIPS mode |