remove internal support in pgcrypto?

From: Peter Eisentraut <peter(dot)eisentraut(at)enterprisedb(dot)com>
To: pgsql-hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: remove internal support in pgcrypto?
Date: 2021-08-24 09:13:44
Message-ID: 0b42f1df-8cba-6a30-77d7-acc241cc88c1@enterprisedb.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers


During the discussion on OpenSSL 3.0.0 support in pgcrypto [0], I
started to wonder whether the "internal" code variants in pgcrypto (the
ones that implement the ciphers themselves instead of using OpenSSL) are
more trouble than they are worth. As discussed there, keeping this adds
some amount of complexity in the code that could otherwise easily be
done away with.

Historically, this made some sense. OpenSSL support and pgcrypto came
into PostgreSQL at around the same time. So it was probably reasonable
for pgcrypto not to rely exclusively on OpenSSL being available. But
today, building PostgreSQL for production without some kind of SSL
support seems rare, and then nevertheless requiring cryptographic
hashing and encryption support from pgcrypto seems unreasonable.

So I'm tempted to suggest that we remove the built-in, non-OpenSSL
cipher and hash implementations in pgcrypto (basically INT_SRCS in
pgcrypto/Makefile), and then also pursue the simplifications in the
OpenSSL code paths described in [0].

Thoughts?

(Some thoughts from those pursuing NSS support would also be useful.)

[0]:
https://www.postgresql.org/message-id/b1a62889-bb45-e5e0-d138-7a370a0a334f@enterprisedb.com

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Julien Rouhaud 2021-08-24 09:19:43 Re: Per query FDW network stat collection
Previous Message Ilya Gladyshev 2021-08-24 09:12:38 Per query FDW network stat collection