pgcrypto: add s2k-count

From: Jeff Janes <jeff(dot)janes(at)gmail(dot)com>
To: pgsql-hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: pgcrypto: add s2k-count
Date: 2016-02-10 05:44:04
Views: Raw Message | Whole Thread | Download mbox
Lists: pgsql-hackers

pgcrypto supports s2k-mode for key-stretching during symmetric
encryption, and even defaults to s2k-mode=3, which means configurable
iterations. But it doesn't support s2k-count to actually set those
iterations to be anything other than the default. If you are
interested in key-stretching, the default is not going to cut it.
(You could argue that pgp's s2k doesn't cut it either even at the max,
but at least we should offer the maximum that the pgp spec makes

This patch implements s2k-count as an option to pgp_sym_encrypt.

Demo (note the password is intentionally wrong in the last character):

select pgp_sym_decrypt(
ERROR: Wrong key or corrupt data
Time: 1.606 ms

select pgp_sym_decrypt(
ERROR: Wrong key or corrupt data
Time: 615.720 ms

I did not bump the extension version. I realized the migration file
would be empty, as there no change to SQL-level functionality (the new
s2k-count is parsed out of a string down in the C code). Since only
one version of contrib extensions binary object files are installed in
any given postgres installation, people using the newer binary gets
the feature even if they have not updated the extension version. So I
don't know if it makes sense to bump the version if people inherently
get the feature anyway.



Attachment Content-Type Size
pgp_s2k_count_v1.patch text/x-patch 10.0 KB


Browse pgsql-hackers by date

  From Date Subject
Next Message Michael Paquier 2016-02-10 06:13:53 Re: Support for N synchronous standby servers - take 2
Previous Message Michael Paquier 2016-02-10 05:39:32 Re: process type escape for log_line_prefix