From: | Michael Paquier <michael(dot)paquier(at)gmail(dot)com> |
---|---|
To: | Heikki Linnakangas <hlinnaka(at)iki(dot)fi> |
Cc: | Noah Misch <noah(at)leadboat(dot)com>, Robert Haas <robertmhaas(at)gmail(dot)com>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Jeff Janes <jeff(dot)janes(at)gmail(dot)com>, Joe Conway <mail(at)joeconway(dot)com>, pgsql-hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: scram and \password |
Date: | 2017-04-25 05:03:18 |
Message-ID: | CAB7nPqQv9U+z9A2+6BBE_zH+S3kYy9RGhQpnjEhngpwYV+66XQ@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Sat, Apr 22, 2017 at 7:20 AM, Michael Paquier
<michael(dot)paquier(at)gmail(dot)com> wrote:
> Do we really want to add a new function or have a hard failure? Any
> application calling PQencryptPassword may trap itself silently if the
> server uses scram as hba key or if the default is switched to that,
> from this point of view extending the function makes sense as well.
Attached is a new patch set, taking into account the new format.
--
Michael
Attachment | Content-Type | Size |
---|---|---|
0001-Move-routine-to-build-SCRAM-verifier-into-src-common.patch | application/octet-stream | 11.1 KB |
0002-Refactor-frontend-side-random-number-generation.patch | application/octet-stream | 6.5 KB |
0003-Extend-PQencryptPassword-with-a-hashing-method.patch | application/octet-stream | 5.5 KB |
0004-Extend-psql-s-password-and-createuser-to-handle-SCRA.patch | application/octet-stream | 4.4 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Jason Petersen | 2017-04-25 05:18:47 | Re: Concurrent ALTER SEQUENCE RESTART Regression |
Previous Message | Petr Jelinek | 2017-04-25 04:51:47 | Re: PG 10 release notes |