| From: | Michael Paquier <michael(dot)paquier(at)gmail(dot)com> |
|---|---|
| To: | Heikki Linnakangas <hlinnaka(at)iki(dot)fi> |
| Cc: | Noah Misch <noah(at)leadboat(dot)com>, Robert Haas <robertmhaas(at)gmail(dot)com>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Jeff Janes <jeff(dot)janes(at)gmail(dot)com>, Joe Conway <mail(at)joeconway(dot)com>, pgsql-hackers <pgsql-hackers(at)postgresql(dot)org> |
| Subject: | Re: scram and \password |
| Date: | 2017-04-25 05:03:18 |
| Message-ID: | CAB7nPqQv9U+z9A2+6BBE_zH+S3kYy9RGhQpnjEhngpwYV+66XQ@mail.gmail.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On Sat, Apr 22, 2017 at 7:20 AM, Michael Paquier
<michael(dot)paquier(at)gmail(dot)com> wrote:
> Do we really want to add a new function or have a hard failure? Any
> application calling PQencryptPassword may trap itself silently if the
> server uses scram as hba key or if the default is switched to that,
> from this point of view extending the function makes sense as well.
Attached is a new patch set, taking into account the new format.
--
Michael
| Attachment | Content-Type | Size |
|---|---|---|
| 0001-Move-routine-to-build-SCRAM-verifier-into-src-common.patch | application/octet-stream | 11.1 KB |
| 0002-Refactor-frontend-side-random-number-generation.patch | application/octet-stream | 6.5 KB |
| 0003-Extend-PQencryptPassword-with-a-hashing-method.patch | application/octet-stream | 5.5 KB |
| 0004-Extend-psql-s-password-and-createuser-to-handle-SCRA.patch | application/octet-stream | 4.4 KB |
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Jason Petersen | 2017-04-25 05:18:47 | Re: Concurrent ALTER SEQUENCE RESTART Regression |
| Previous Message | Petr Jelinek | 2017-04-25 04:51:47 | Re: PG 10 release notes |