mirror of
https://github.com/postgres/postgres.git
synced 2025-07-28 23:42:10 +03:00
pgcrypto update:
* test error handling * add tests for des, 3des, cast5 * add some tests to blowfish, rijndael * Makefile: ability to specify different tests for different crypto libraries, so we can skip des, 3des and cast5 for builtin. Marko Kreen
This commit is contained in:
26
contrib/pgcrypto/sql/3des.sql
Normal file
26
contrib/pgcrypto/sql/3des.sql
Normal file
@ -0,0 +1,26 @@
|
||||
--
|
||||
-- 3DES cipher
|
||||
--
|
||||
|
||||
-- test vector from somewhere
|
||||
SELECT encode(encrypt(
|
||||
decode('80 00 00 00 00 00 00 00', 'hex'),
|
||||
decode('01 01 01 01 01 01 01 01
|
||||
01 01 01 01 01 01 01 01
|
||||
01 01 01 01 01 01 01 01', 'hex'),
|
||||
'3des-ecb/pad:none'), 'hex');
|
||||
-- val 95 F8 A5 E5 DD 31 D9 00
|
||||
|
||||
select encode( encrypt('', 'foo', '3des'), 'hex');
|
||||
-- 10 bytes key
|
||||
select encode( encrypt('foo', '0123456789', '3des'), 'hex');
|
||||
-- 22 bytes key
|
||||
select encode( encrypt('foo', '0123456789012345678901', '3des'), 'hex');
|
||||
|
||||
-- decrypt
|
||||
select decrypt(encrypt('foo', '0123456', '3des'), '0123456', '3des');
|
||||
|
||||
-- iv
|
||||
select encode(encrypt_iv('foo', '0123456', 'abcd', '3des'), 'hex');
|
||||
select decrypt_iv(decode('df27c264fb24ed7a', 'hex'), '0123456', 'abcd', '3des');
|
||||
|
@ -64,3 +64,24 @@ decode('6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc', 'hex'
|
||||
decode('37363534333231204e6f77206973207468652074696d6520666f722000', 'hex'),
|
||||
'bf-cbc'), 'hex');
|
||||
|
||||
-- blowfish-448
|
||||
SELECT encode(encrypt(
|
||||
decode('fedcba9876543210', 'hex'),
|
||||
decode('f0e1d2c3b4a5968778695a4b3c2d1e0f001122334455667704689104c2fd3b2f584023641aba61761f1f1f1f0e0e0e0effffffffffffffff', 'hex'),
|
||||
'bf-ecb/pad:none'), 'hex');
|
||||
-- result: c04504012e4e1f53
|
||||
|
||||
-- empty data
|
||||
select encode( encrypt('', 'foo', 'bf'), 'hex');
|
||||
-- 10 bytes key
|
||||
select encode( encrypt('foo', '0123456789', 'bf'), 'hex');
|
||||
-- 22 bytes key
|
||||
select encode( encrypt('foo', '0123456789012345678901', 'bf'), 'hex');
|
||||
|
||||
-- decrypt
|
||||
select decrypt(encrypt('foo', '0123456', 'bf'), '0123456', 'bf');
|
||||
|
||||
-- iv
|
||||
select encode(encrypt_iv('foo', '0123456', 'abcd', 'bf'), 'hex');
|
||||
select decrypt_iv(decode('95c7e89322525d59', 'hex'), '0123456', 'abcd', 'bf');
|
||||
|
||||
|
42
contrib/pgcrypto/sql/cast5.sql
Normal file
42
contrib/pgcrypto/sql/cast5.sql
Normal file
@ -0,0 +1,42 @@
|
||||
--
|
||||
-- Cast5 cipher
|
||||
--
|
||||
|
||||
-- test vectors from RFC2144
|
||||
|
||||
-- 128 bit key
|
||||
SELECT encode(encrypt(
|
||||
decode('01 23 45 67 89 AB CD EF', 'hex'),
|
||||
decode('01 23 45 67 12 34 56 78 23 45 67 89 34 56 78 9A', 'hex'),
|
||||
'cast5-ecb/pad:none'), 'hex');
|
||||
-- result: 23 8B 4F E5 84 7E 44 B2
|
||||
|
||||
-- 80 bit key
|
||||
SELECT encode(encrypt(
|
||||
decode('01 23 45 67 89 AB CD EF', 'hex'),
|
||||
decode('01 23 45 67 12 34 56 78 23 45', 'hex'),
|
||||
'cast5-ecb/pad:none'), 'hex');
|
||||
-- result: EB 6A 71 1A 2C 02 27 1B
|
||||
|
||||
-- 40 bit key
|
||||
SELECT encode(encrypt(
|
||||
decode('01 23 45 67 89 AB CD EF', 'hex'),
|
||||
decode('01 23 45 67 12', 'hex'),
|
||||
'cast5-ecb/pad:none'), 'hex');
|
||||
-- result: 7A C8 16 D1 6E 9B 30 2E
|
||||
|
||||
-- cbc
|
||||
|
||||
-- empty data
|
||||
select encode( encrypt('', 'foo', 'cast5'), 'hex');
|
||||
-- 10 bytes key
|
||||
select encode( encrypt('foo', '0123456789', 'cast5'), 'hex');
|
||||
|
||||
-- decrypt
|
||||
select decrypt(encrypt('foo', '0123456', 'cast5'), '0123456', 'cast5');
|
||||
|
||||
-- iv
|
||||
select encode(encrypt_iv('foo', '0123456', 'abcd', 'cast5'), 'hex');
|
||||
select decrypt_iv(decode('384a970695ce016a', 'hex'),
|
||||
'0123456', 'abcd', 'cast5');
|
||||
|
24
contrib/pgcrypto/sql/des.sql
Normal file
24
contrib/pgcrypto/sql/des.sql
Normal file
@ -0,0 +1,24 @@
|
||||
--
|
||||
-- DES cipher
|
||||
--
|
||||
|
||||
-- no official test vectors atm
|
||||
|
||||
-- from blowfish.sql
|
||||
SELECT encode(encrypt(
|
||||
decode('0123456789abcdef', 'hex'),
|
||||
decode('fedcba9876543210', 'hex'),
|
||||
'des-ecb/pad:none'), 'hex');
|
||||
|
||||
-- empty data
|
||||
select encode( encrypt('', 'foo', 'des'), 'hex');
|
||||
-- 8 bytes key
|
||||
select encode( encrypt('foo', '01234589', 'des'), 'hex');
|
||||
|
||||
-- decrypt
|
||||
select decrypt(encrypt('foo', '0123456', 'des'), '0123456', 'des');
|
||||
|
||||
-- iv
|
||||
select encode(encrypt_iv('foo', '0123456', 'abcd', 'des'), 'hex');
|
||||
select decrypt_iv(decode('50735067b073bb93', 'hex'), '0123456', 'abcd', 'des');
|
||||
|
@ -10,3 +10,9 @@
|
||||
SELECT encode('foo', 'hex');
|
||||
SELECT decode('666f6f', 'hex');
|
||||
|
||||
-- check error handling
|
||||
select gen_salt('foo');
|
||||
select digest('foo', 'foo');
|
||||
select hmac('foo', 'foo', 'foo');
|
||||
select encrypt('foo', 'foo', 'foo');
|
||||
|
||||
|
@ -41,3 +41,18 @@ decode('0011223344', 'hex'),
|
||||
decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b', 'hex'),
|
||||
'aes-cbc'), 'hex');
|
||||
|
||||
-- empty data
|
||||
select encode( encrypt('', 'foo', 'aes'), 'hex');
|
||||
-- 10 bytes key
|
||||
select encode( encrypt('foo', '0123456789', 'aes'), 'hex');
|
||||
-- 22 bytes key
|
||||
select encode( encrypt('foo', '0123456789012345678901', 'aes'), 'hex');
|
||||
|
||||
-- decrypt
|
||||
select decrypt(encrypt('foo', '0123456', 'aes'), '0123456', 'aes');
|
||||
|
||||
-- iv
|
||||
select encode(encrypt_iv('foo', '0123456', 'abcd', 'aes'), 'hex');
|
||||
select decrypt_iv(decode('2c24cb7da91d6d5699801268b0f5adad', 'hex'),
|
||||
'0123456', 'abcd', 'aes');
|
||||
|
||||
|
Reference in New Issue
Block a user