Re: scram and \password

From: Michael Paquier <michael(dot)paquier(at)gmail(dot)com>
To: Heikki Linnakangas <hlinnaka(at)iki(dot)fi>
Cc: Noah Misch <noah(at)leadboat(dot)com>, Robert Haas <robertmhaas(at)gmail(dot)com>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Jeff Janes <jeff(dot)janes(at)gmail(dot)com>, Joe Conway <mail(at)joeconway(dot)com>, pgsql-hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: scram and \password
Date: 2017-04-25 05:03:18
Message-ID: CAB7nPqQv9U+z9A2+6BBE_zH+S3kYy9RGhQpnjEhngpwYV+66XQ@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Sat, Apr 22, 2017 at 7:20 AM, Michael Paquier
<michael(dot)paquier(at)gmail(dot)com> wrote:
> Do we really want to add a new function or have a hard failure? Any
> application calling PQencryptPassword may trap itself silently if the
> server uses scram as hba key or if the default is switched to that,
> from this point of view extending the function makes sense as well.

Attached is a new patch set, taking into account the new format.
--
Michael

Attachment Content-Type Size
0001-Move-routine-to-build-SCRAM-verifier-into-src-common.patch application/octet-stream 11.1 KB
0002-Refactor-frontend-side-random-number-generation.patch application/octet-stream 6.5 KB
0003-Extend-PQencryptPassword-with-a-hashing-method.patch application/octet-stream 5.5 KB
0004-Extend-psql-s-password-and-createuser-to-handle-SCRA.patch application/octet-stream 4.4 KB

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Jason Petersen 2017-04-25 05:18:47 Re: Concurrent ALTER SEQUENCE RESTART Regression
Previous Message Petr Jelinek 2017-04-25 04:51:47 Re: PG 10 release notes