mirror of
https://github.com/postgres/postgres.git
synced 2025-10-13 18:28:01 +03:00
Remove extra newlines at end and beginning of files, add missing newlines
at end of files.
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
/* $PostgreSQL: pgsql/contrib/pgcrypto/pgcrypto.sql.in,v 1.15 2007/11/13 04:24:28 momjian Exp $ */
|
||||
/* $PostgreSQL: pgsql/contrib/pgcrypto/pgcrypto.sql.in,v 1.16 2010/08/19 05:57:33 petere Exp $ */
|
||||
|
||||
-- Adjust this setting to control where the objects get created.
|
||||
SET search_path = public;
|
||||
@@ -200,4 +200,3 @@ CREATE OR REPLACE FUNCTION dearmor(text)
|
||||
RETURNS bytea
|
||||
AS 'MODULE_PATHNAME', 'pg_dearmor'
|
||||
LANGUAGE C IMMUTABLE STRICT;
|
||||
|
||||
|
@@ -1136,4 +1136,3 @@ static const u4byte rco_tab[10] = {
|
||||
0x00000001, 0x00000002, 0x00000004, 0x00000008, 0x00000010,
|
||||
0x00000020, 0x00000040, 0x00000080, 0x0000001b, 0x00000036
|
||||
};
|
||||
|
||||
|
@@ -29,4 +29,3 @@ select decrypt_iv(decode('50735067b073bb93', 'hex'), '0123456', 'abcd', '3des');
|
||||
-- long message
|
||||
select encode(encrypt('Lets try a longer message.', '0123456789012345678901', '3des'), 'hex');
|
||||
select decrypt(encrypt('Lets try a longer message.', '0123456789012345678901', '3des'), '0123456789012345678901', '3des');
|
||||
|
||||
|
@@ -90,4 +90,3 @@ select decrypt_iv(decode('95c7e89322525d59', 'hex'), '0123456', 'abcd', 'bf');
|
||||
-- long message
|
||||
select encode(encrypt('Lets try a longer message.', '0123456789', 'bf'), 'hex');
|
||||
select decrypt(encrypt('Lets try a longer message.', '0123456789', 'bf'), '0123456789', 'bf');
|
||||
|
||||
|
@@ -45,4 +45,3 @@ select decrypt_iv(decode('384a970695ce016a', 'hex'),
|
||||
-- long message
|
||||
select encode(encrypt('Lets try a longer message.', '0123456789', 'cast5'), 'hex');
|
||||
select decrypt(encrypt('Lets try a longer message.', '0123456789', 'cast5'), '0123456789', 'cast5');
|
||||
|
||||
|
@@ -15,4 +15,3 @@ SELECT res = crypt(data, res) AS "worked"
|
||||
FROM ctest;
|
||||
|
||||
DROP TABLE ctest;
|
||||
|
||||
|
@@ -15,4 +15,3 @@ SELECT res = crypt(data, res) AS "worked"
|
||||
FROM ctest;
|
||||
|
||||
DROP TABLE ctest;
|
||||
|
||||
|
@@ -15,4 +15,3 @@ SELECT res = crypt(data, res) AS "worked"
|
||||
FROM ctest;
|
||||
|
||||
DROP TABLE ctest;
|
||||
|
||||
|
@@ -15,4 +15,3 @@ SELECT res = crypt(data, res) AS "worked"
|
||||
FROM ctest;
|
||||
|
||||
DROP TABLE ctest;
|
||||
|
||||
|
@@ -27,4 +27,3 @@ select decrypt_iv(decode('50735067b073bb93', 'hex'), '0123456', 'abcd', 'des');
|
||||
-- long message
|
||||
select encode(encrypt('Lets try a longer message.', '01234567', 'des'), 'hex');
|
||||
select decrypt(encrypt('Lets try a longer message.', '01234567', 'des'), '01234567', 'des');
|
||||
|
||||
|
@@ -42,5 +42,3 @@ SELECT encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
|
||||
|
@@ -42,5 +42,3 @@ SELECT encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
|
||||
|
@@ -24,4 +24,3 @@ select gen_salt('foo');
|
||||
select digest('foo', 'foo');
|
||||
select hmac('foo', 'foo', 'foo');
|
||||
select encrypt('foo', 'foo', 'foo');
|
||||
|
||||
|
@@ -9,4 +9,3 @@ SELECT encode(digest('message digest', 'md5'), 'hex');
|
||||
SELECT encode(digest('abcdefghijklmnopqrstuvwxyz', 'md5'), 'hex');
|
||||
SELECT encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'md5'), 'hex');
|
||||
SELECT encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'md5'), 'hex');
|
||||
|
||||
|
@@ -28,4 +28,3 @@ select pgp_sym_decrypt(
|
||||
pgp_sym_encrypt('Secret message', 'key',
|
||||
'compress-algo=2, compress-level=0'),
|
||||
'key', 'expect-compress-algo=0');
|
||||
|
||||
|
@@ -1,3 +1 @@
|
||||
|
||||
-- no random source
|
||||
|
||||
|
@@ -95,4 +95,3 @@ select encode(digest(pgp_sym_decrypt(
|
||||
pgp_sym_encrypt(E'\r\n0\n1\r\r\n\n2\r', 'key', 'convert-crlf=1'),
|
||||
'key', 'convert-crlf=1'), 'sha1'), 'hex') as result,
|
||||
encode(digest(E'\r\n0\n1\r\r\n\n2\r', 'sha1'), 'hex') as expect;
|
||||
|
||||
|
@@ -20,4 +20,3 @@ select pgp_key_id(dearmor(seckey)) from keytbl where id=6;
|
||||
|
||||
select pgp_key_id(dearmor(data)) as data_key_id
|
||||
from encdata order by id;
|
||||
|
||||
|
@@ -1,3 +1 @@
|
||||
|
||||
-- no bignum support
|
||||
|
||||
|
@@ -546,4 +546,3 @@ from keytbl, encdata where keytbl.id=5 and encdata.id=1;
|
||||
-- password-protected secret key, right password
|
||||
select pgp_pub_decrypt(dearmor(data), dearmor(seckey), 'parool')
|
||||
from keytbl, encdata where keytbl.id=5 and encdata.id=1;
|
||||
|
||||
|
@@ -48,5 +48,3 @@ select pgp_pub_decrypt(
|
||||
pgp_pub_encrypt_bytea('Secret msg', dearmor(pubkey)),
|
||||
dearmor(seckey))
|
||||
from keytbl where keytbl.id=1;
|
||||
|
||||
|
||||
|
@@ -1,3 +1 @@
|
||||
|
||||
-- zlib is disabled
|
||||
|
||||
|
@@ -61,4 +61,3 @@ select decrypt_iv(decode('2c24cb7da91d6d5699801268b0f5adad', 'hex'),
|
||||
-- long message
|
||||
select encode(encrypt('Lets try a longer message.', '0123456789', 'aes'), 'hex');
|
||||
select decrypt(encrypt('Lets try a longer message.', '0123456789', 'aes'), '0123456789', 'aes');
|
||||
|
||||
|
@@ -9,4 +9,3 @@ SELECT encode(digest('message digest', 'sha1'), 'hex');
|
||||
SELECT encode(digest('abcdefghijklmnopqrstuvwxyz', 'sha1'), 'hex');
|
||||
SELECT encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'sha1'), 'hex');
|
||||
SELECT encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'sha1'), 'hex');
|
||||
|
||||
|
@@ -31,5 +31,3 @@ SELECT encode(digest('abc', 'sha512'), 'hex');
|
||||
SELECT encode(digest('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq', 'sha512'), 'hex');
|
||||
SELECT encode(digest('abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu', 'sha512'), 'hex');
|
||||
SELECT encode(digest('abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz', 'sha512'), 'hex');
|
||||
|
||||
|
||||
|
@@ -1,4 +1,4 @@
|
||||
/* $PostgreSQL: pgsql/contrib/pgcrypto/uninstall_pgcrypto.sql,v 1.4 2007/11/13 04:24:28 momjian Exp $ */
|
||||
/* $PostgreSQL: pgsql/contrib/pgcrypto/uninstall_pgcrypto.sql,v 1.5 2010/08/19 05:57:33 petere Exp $ */
|
||||
|
||||
-- Adjust this setting to control where the objects get dropped.
|
||||
SET search_path = public;
|
||||
@@ -43,4 +43,3 @@ DROP FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text);
|
||||
DROP FUNCTION pgp_key_id(bytea);
|
||||
DROP FUNCTION armor(bytea);
|
||||
DROP FUNCTION dearmor(text);
|
||||
|
||||
|
Reference in New Issue
Block a user