From: | Bernd Helmle <mailings(at)oopsware(dot)de> |
---|---|
To: | Daniel Gustafsson <daniel(at)yesql(dot)se> |
Cc: | PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Modern SHA2- based password hashes for pgcrypto |
Date: | 2025-01-02 15:17:40 |
Message-ID: | aac1015d45ec98b2cf0ed1fdd2e05a2ee7b07736.camel@oopsware.de |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Am Donnerstag, dem 02.01.2025 um 15:57 +0100 schrieb Daniel Gustafsson:
> > I adapted the code from the publicly available reference
> > implementation
> > at [1]. It's based on our existing OpenSSL infrastructure in
> > pgcrypto
> > and produces compatible password hashes with crypt() and "openssl
> > passwd" with "-5" and "-6" switches.
>
> Potentially daft question, but since we require OpenSSL to build
> pgcrypto, why
> do we need to include sha2 code instead of using the sha2
> implementation in
> libcrypto? How complicated would it be to use the OpenSSL API
> instead?
Not sure i got you, but i use OpenSSL and the SHA2 implementation
there. See the pgcrypto px_* API (px.h and openssl.c respectively) i am
using to create the digests.
Thanks,
Bernd
From | Date | Subject | |
---|---|---|---|
Next Message | Daniel Gustafsson | 2025-01-02 15:28:50 | Re: Modern SHA2- based password hashes for pgcrypto |
Previous Message | Daniel Gustafsson | 2025-01-02 14:57:49 | Re: Modern SHA2- based password hashes for pgcrypto |