mirror of
https://github.com/postgres/postgres.git
synced 2025-04-20 00:42:27 +03:00
This adapts the publicly available reference implementation on https://www.akkadia.org/drepper/SHA-crypt.txt and adds the new hash algorithms sha256crypt and sha512crypt to crypt() and gen_salt() respectively. Author: Bernd Helmle <mailings@oopsware.de> Reviewed-by: Japin Li <japinli@hotmail.com> Discussion: https://postgr.es/m/c763235a2757e2f5f9e3e27268b9028349cef659.camel@oopsware.de
100 lines
4.8 KiB
SQL
100 lines
4.8 KiB
SQL
--
|
|
-- crypt() and gensalt: sha256crypt, sha512crypt
|
|
--
|
|
|
|
-- $5$ is sha256crypt
|
|
SELECT crypt('', '$5$Szzz0yzz');
|
|
|
|
SELECT crypt('foox', '$5$Szzz0yzz');
|
|
|
|
CREATE TABLE ctest (data text, res text, salt text);
|
|
INSERT INTO ctest VALUES ('password', '', '');
|
|
|
|
-- generate a salt for sha256crypt, default rounds
|
|
UPDATE ctest SET salt = gen_salt('sha256crypt');
|
|
UPDATE ctest SET res = crypt(data, salt);
|
|
SELECT res = crypt(data, res) AS "worked"
|
|
FROM ctest;
|
|
|
|
-- generate a salt for sha256crypt, rounds 9999
|
|
UPDATE ctest SET salt = gen_salt('sha256crypt', 9999);
|
|
UPDATE ctest SET res = crypt(data, salt);
|
|
SELECT res = crypt(data, res) AS "worked"
|
|
FROM ctest;
|
|
|
|
-- should fail, below supported minimum rounds value
|
|
UPDATE ctest SET salt = gen_salt('sha256crypt', 10);
|
|
|
|
-- should fail, exceeds supported maximum rounds value
|
|
UPDATE ctest SET salt = gen_salt('sha256crypt', 1000000000);
|
|
|
|
TRUNCATE ctest;
|
|
|
|
-- $6$ is sha512crypt
|
|
SELECT crypt('', '$6$Szzz0yzz');
|
|
|
|
SELECT crypt('foox', '$6$Szzz0yzz');
|
|
|
|
INSERT INTO ctest VALUES ('password', '', '');
|
|
|
|
-- generate a salt for sha512crypt, default rounds
|
|
UPDATE ctest SET salt = gen_salt('sha512crypt');
|
|
UPDATE ctest SET res = crypt(data, salt);
|
|
SELECT res = crypt(data, res) AS "worked"
|
|
FROM ctest;
|
|
|
|
-- generate a salt for sha512crypt, rounds 9999
|
|
UPDATE ctest SET salt = gen_salt('sha512crypt', 9999);
|
|
UPDATE ctest SET res = crypt(data, salt);
|
|
SELECT res = crypt(data, res) AS "worked"
|
|
FROM ctest;
|
|
|
|
-- should fail, below supported minimum rounds value
|
|
UPDATE ctest SET salt = gen_salt('sha512crypt', 10);
|
|
|
|
-- should fail, exceeds supported maximum rounds value
|
|
UPDATE ctest SET salt = gen_salt('sha512crypt', 1000000000);
|
|
|
|
-- Extended tests taken from public domain code at
|
|
-- https://www.akkadia.org/drepper/SHA-crypt.txt
|
|
--
|
|
-- We adapt the tests defined there to make sure we are compatible with the reference
|
|
-- implementation.
|
|
|
|
-- This tests sha256crypt (magic byte $5$ with salt and rounds)
|
|
SELECT crypt('Hello world!', '$5$saltstring')
|
|
= '$5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5' AS result;
|
|
SELECT crypt('Hello world!', '$5$rounds=10000$saltstringsaltstring')
|
|
= '$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA' AS result;
|
|
SELECT crypt('This is just a test', '$5$rounds=5000$toolongsaltstring')
|
|
= '$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5' AS result;
|
|
SELECT crypt('a very much longer text to encrypt. This one even stretches over more'
|
|
'than one line.', '$5$rounds=1400$anotherlongsaltstring')
|
|
= '$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1' AS result;
|
|
SELECT crypt('we have a short salt string but not a short password', '$5$rounds=77777$short')
|
|
= '$5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/' AS result;
|
|
SELECT crypt('a short string', '$5$rounds=123456$asaltof16chars..')
|
|
= '$5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/cZKmF/wJvD' AS result;
|
|
SELECT crypt('the minimum number is still observed', '$5$rounds=10$roundstoolow')
|
|
= '$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC' AS result;
|
|
|
|
-- The following tests sha512crypt (magic byte $6$ with salt and rounds)
|
|
SELECT crypt('Hello world!', '$6$saltstring')
|
|
= '$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1' AS result;
|
|
SELECT crypt('Hello world!', '$6$rounds=10000$saltstringsaltstring')
|
|
= '$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v.' AS result;
|
|
SELECT crypt('This is just a test', '$6$rounds=5000$toolongsaltstring')
|
|
= '$6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQzQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0' AS result;
|
|
SELECT crypt('a very much longer text to encrypt. This one even stretches over more'
|
|
'than one line.', '$6$rounds=1400$anotherlongsaltstring')
|
|
= '$6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wPvMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1' AS result;
|
|
SELECT crypt('we have a short salt string but not a short password', '$6$rounds=77777$short')
|
|
= '$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0' AS result;
|
|
SELECT crypt('a short string', '$6$rounds=123456$asaltof16chars..')
|
|
= '$6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwcelCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1' AS result;
|
|
SELECT crypt('the minimum number is still observed', '$6$rounds=10$roundstoolow')
|
|
= '$6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1xhLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX.' AS result;
|
|
|
|
-- cleanup
|
|
DROP TABLE ctest;
|