mirror of
https://github.com/postgres/postgres.git
synced 2025-07-27 12:41:57 +03:00
Add missing pgcrypto files.
This commit is contained in:
66
contrib/pgcrypto/sql/blowfish.sql
Normal file
66
contrib/pgcrypto/sql/blowfish.sql
Normal file
@ -0,0 +1,66 @@
|
||||
--
|
||||
-- Blowfish cipher
|
||||
--
|
||||
|
||||
-- some standard Blowfish testvalues
|
||||
select encode(encrypt(
|
||||
decode('0000000000000000', 'hex'),
|
||||
decode('0000000000000000', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('ffffffffffffffff', 'hex'),
|
||||
decode('ffffffffffffffff', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('1000000000000001', 'hex'),
|
||||
decode('3000000000000000', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('1111111111111111', 'hex'),
|
||||
decode('1111111111111111', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('0123456789abcdef', 'hex'),
|
||||
decode('fedcba9876543210', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('01a1d6d039776742', 'hex'),
|
||||
decode('fedcba9876543210', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('ffffffffffffffff', 'hex'),
|
||||
decode('0000000000000000', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
-- setkey
|
||||
select encode(encrypt(
|
||||
decode('fedcba9876543210', 'hex'),
|
||||
decode('f0e1d2c3b4a5968778695a4b3c2d1e0f', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
|
||||
-- with padding
|
||||
select encode(encrypt(
|
||||
decode('01234567890123456789', 'hex'),
|
||||
decode('33443344334433443344334433443344', 'hex'),
|
||||
'bf-ecb'), 'hex');
|
||||
|
||||
-- cbc
|
||||
|
||||
-- 28 bytes key
|
||||
select encode(encrypt(
|
||||
decode('6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5', 'hex'),
|
||||
decode('37363534333231204e6f77206973207468652074696d6520666f7220', 'hex'),
|
||||
'bf-cbc'), 'hex');
|
||||
|
||||
-- 29 bytes key
|
||||
select encode(encrypt(
|
||||
decode('6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc', 'hex'),
|
||||
decode('37363534333231204e6f77206973207468652074696d6520666f722000', 'hex'),
|
||||
'bf-cbc'), 'hex');
|
||||
|
17
contrib/pgcrypto/sql/crypt-blowfish.sql
Normal file
17
contrib/pgcrypto/sql/crypt-blowfish.sql
Normal file
@ -0,0 +1,17 @@
|
||||
--
|
||||
-- crypt() and gen_salt(): bcrypt
|
||||
--
|
||||
|
||||
select crypt('', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
|
||||
|
||||
select crypt('foox', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
|
||||
|
||||
create table ctest (data text, res text, salt text);
|
||||
insert into ctest values ('password', '', '');
|
||||
|
||||
update ctest set salt = gen_salt('bf', 8);
|
||||
update ctest set res = crypt(data, salt);
|
||||
select res = crypt(data, res) as "worked" from ctest;
|
||||
|
||||
drop table ctest;
|
||||
|
17
contrib/pgcrypto/sql/crypt-des.sql
Normal file
17
contrib/pgcrypto/sql/crypt-des.sql
Normal file
@ -0,0 +1,17 @@
|
||||
--
|
||||
-- crypt() and gen_salt(): crypt-des
|
||||
--
|
||||
|
||||
select crypt('', 'NB');
|
||||
|
||||
select crypt('foox', 'NB');
|
||||
|
||||
create table ctest (data text, res text, salt text);
|
||||
insert into ctest values ('password', '', '');
|
||||
|
||||
update ctest set salt = gen_salt('des');
|
||||
update ctest set res = crypt(data, salt);
|
||||
select res = crypt(data, res) as "worked" from ctest;
|
||||
|
||||
drop table ctest;
|
||||
|
17
contrib/pgcrypto/sql/crypt-md5.sql
Normal file
17
contrib/pgcrypto/sql/crypt-md5.sql
Normal file
@ -0,0 +1,17 @@
|
||||
--
|
||||
-- crypt() and gen_salt(): md5
|
||||
--
|
||||
|
||||
select crypt('', '$1$Szzz0yzz');
|
||||
|
||||
select crypt('foox', '$1$Szzz0yzz');
|
||||
|
||||
create table ctest (data text, res text, salt text);
|
||||
insert into ctest values ('password', '', '');
|
||||
|
||||
update ctest set salt = gen_salt('md5');
|
||||
update ctest set res = crypt(data, salt);
|
||||
select res = crypt(data, res) as "worked" from ctest;
|
||||
|
||||
drop table ctest;
|
||||
|
17
contrib/pgcrypto/sql/crypt-xdes.sql
Normal file
17
contrib/pgcrypto/sql/crypt-xdes.sql
Normal file
@ -0,0 +1,17 @@
|
||||
--
|
||||
-- crypt() and gen_salt(): extended des
|
||||
--
|
||||
|
||||
select crypt('', '_J9..j2zz');
|
||||
|
||||
select crypt('foox', '_J9..j2zz');
|
||||
|
||||
create table ctest (data text, res text, salt text);
|
||||
insert into ctest values ('password', '', '');
|
||||
|
||||
update ctest set salt = gen_salt('xdes', 1001);
|
||||
update ctest set res = crypt(data, salt);
|
||||
select res = crypt(data, res) as "worked" from ctest;
|
||||
|
||||
drop table ctest;
|
||||
|
46
contrib/pgcrypto/sql/hmac-md5.sql
Normal file
46
contrib/pgcrypto/sql/hmac-md5.sql
Normal file
@ -0,0 +1,46 @@
|
||||
--
|
||||
-- HMAC-MD5
|
||||
--
|
||||
|
||||
select encode(hmac(
|
||||
'Hi There',
|
||||
decode('0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 2
|
||||
select encode(hmac(
|
||||
'Jefe',
|
||||
'what do ya want for nothing?',
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 3
|
||||
select encode(hmac(
|
||||
decode('dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd', 'hex'),
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 4
|
||||
select encode(hmac(
|
||||
decode('cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd', 'hex'),
|
||||
decode('0102030405060708090a0b0c0d0e0f10111213141516171819', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 5
|
||||
select encode(hmac(
|
||||
'Test With Truncation',
|
||||
decode('0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 6
|
||||
select encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key - Hash Key First',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
-- 7
|
||||
select encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'md5'), 'hex');
|
||||
|
||||
|
46
contrib/pgcrypto/sql/hmac-sha1.sql
Normal file
46
contrib/pgcrypto/sql/hmac-sha1.sql
Normal file
@ -0,0 +1,46 @@
|
||||
--
|
||||
-- HMAC-MD5
|
||||
--
|
||||
|
||||
select encode(hmac(
|
||||
'Hi There',
|
||||
decode('0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 2
|
||||
select encode(hmac(
|
||||
'Jefe',
|
||||
'what do ya want for nothing?',
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 3
|
||||
select encode(hmac(
|
||||
decode('dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd', 'hex'),
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 4
|
||||
select encode(hmac(
|
||||
decode('cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd', 'hex'),
|
||||
decode('0102030405060708090a0b0c0d0e0f10111213141516171819', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 5
|
||||
select encode(hmac(
|
||||
'Test With Truncation',
|
||||
decode('0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 6
|
||||
select encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key - Hash Key First',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
-- 7
|
||||
select encode(hmac(
|
||||
'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data',
|
||||
decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'),
|
||||
'sha1'), 'hex');
|
||||
|
||||
|
12
contrib/pgcrypto/sql/init.sql
Normal file
12
contrib/pgcrypto/sql/init.sql
Normal file
@ -0,0 +1,12 @@
|
||||
--
|
||||
-- init pgcrypto
|
||||
--
|
||||
|
||||
\set ECHO none
|
||||
\i pgcrypto.sql
|
||||
\set ECHO all
|
||||
|
||||
-- check for encoding fn's
|
||||
select encode('foo', 'hex');
|
||||
select decode('666f6f', 'hex');
|
||||
|
12
contrib/pgcrypto/sql/md5.sql
Normal file
12
contrib/pgcrypto/sql/md5.sql
Normal file
@ -0,0 +1,12 @@
|
||||
--
|
||||
-- MD5 message digest
|
||||
--
|
||||
|
||||
select encode(digest('', 'md5'), 'hex');
|
||||
select encode(digest('a', 'md5'), 'hex');
|
||||
select encode(digest('abc', 'md5'), 'hex');
|
||||
select encode(digest('message digest', 'md5'), 'hex');
|
||||
select encode(digest('abcdefghijklmnopqrstuvwxyz', 'md5'), 'hex');
|
||||
select encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'md5'), 'hex');
|
||||
select encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'md5'), 'hex');
|
||||
|
43
contrib/pgcrypto/sql/rijndael.sql
Normal file
43
contrib/pgcrypto/sql/rijndael.sql
Normal file
@ -0,0 +1,43 @@
|
||||
--
|
||||
-- AES / Rijndael-128 cipher
|
||||
--
|
||||
|
||||
-- some standard Rijndael testvalues
|
||||
select encode(encrypt(
|
||||
decode('00112233445566778899aabbccddeeff', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f', 'hex'),
|
||||
'aes-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('00112233445566778899aabbccddeeff', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f1011121314151617', 'hex'),
|
||||
'aes-ecb/pad:none'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('00112233445566778899aabbccddeeff', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f', 'hex'),
|
||||
'aes-ecb/pad:none'), 'hex');
|
||||
|
||||
-- cbc
|
||||
select encode(encrypt(
|
||||
decode('00112233445566778899aabbccddeeff', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f', 'hex'),
|
||||
'aes-cbc/pad:none'), 'hex');
|
||||
|
||||
-- key padding
|
||||
|
||||
select encode(encrypt(
|
||||
decode('0011223344', 'hex'),
|
||||
decode('000102030405', 'hex'),
|
||||
'aes-cbc'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('0011223344', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f10111213', 'hex'),
|
||||
'aes-cbc'), 'hex');
|
||||
|
||||
select encode(encrypt(
|
||||
decode('0011223344', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b', 'hex'),
|
||||
'aes-cbc'), 'hex');
|
||||
|
12
contrib/pgcrypto/sql/sha1.sql
Normal file
12
contrib/pgcrypto/sql/sha1.sql
Normal file
@ -0,0 +1,12 @@
|
||||
--
|
||||
-- SHA1 message digest
|
||||
--
|
||||
|
||||
select encode(digest('', 'sha1'), 'hex');
|
||||
select encode(digest('a', 'sha1'), 'hex');
|
||||
select encode(digest('abc', 'sha1'), 'hex');
|
||||
select encode(digest('message digest', 'sha1'), 'hex');
|
||||
select encode(digest('abcdefghijklmnopqrstuvwxyz', 'sha1'), 'hex');
|
||||
select encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'sha1'), 'hex');
|
||||
select encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'sha1'), 'hex');
|
||||
|
Reference in New Issue
Block a user