mirror of
				https://github.com/postgres/postgres.git
				synced 2025-11-03 09:13:20 +03:00 
			
		
		
		
	This was from before the hex format was available in bytea. Now we can remove the extra explicit encoding/decoding calls and rely on the default output format. Discussion: https://www.postgresql.org/message-id/flat/17dcb4f7-7ac1-e2b6-d5f7-2dfba06cd9ee%40enterprisedb.com
		
			
				
	
	
		
			54 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			SQL
		
	
	
	
	
	
			
		
		
	
	
			54 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			SQL
		
	
	
	
	
	
--
 | 
						|
-- Blowfish cipher
 | 
						|
--
 | 
						|
 | 
						|
-- some standard Blowfish testvalues
 | 
						|
SELECT encrypt('\x0000000000000000', '\x0000000000000000', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\xffffffffffffffff', '\xffffffffffffffff', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\x1000000000000001', '\x3000000000000000', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\x1111111111111111', '\x1111111111111111', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\x0123456789abcdef', '\xfedcba9876543210', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\x01a1d6d039776742', '\xfedcba9876543210', 'bf-ecb/pad:none');
 | 
						|
SELECT encrypt('\xffffffffffffffff', '\x0000000000000000', 'bf-ecb/pad:none');
 | 
						|
 | 
						|
-- setkey
 | 
						|
SELECT encrypt('\xfedcba9876543210', '\xf0e1d2c3b4a5968778695a4b3c2d1e0f', 'bf-ecb/pad:none');
 | 
						|
 | 
						|
-- with padding
 | 
						|
SELECT encrypt('\x01234567890123456789', '\x33443344334433443344334433443344', 'bf-ecb');
 | 
						|
 | 
						|
-- cbc
 | 
						|
 | 
						|
-- 28 bytes key
 | 
						|
SELECT encrypt('\x6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5',
 | 
						|
               '\x37363534333231204e6f77206973207468652074696d6520666f7220',
 | 
						|
               'bf-cbc');
 | 
						|
 | 
						|
-- 29 bytes key
 | 
						|
SELECT encrypt('\x6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc',
 | 
						|
               '\x37363534333231204e6f77206973207468652074696d6520666f722000',
 | 
						|
               'bf-cbc');
 | 
						|
 | 
						|
-- blowfish-448
 | 
						|
SELECT encrypt('\xfedcba9876543210',
 | 
						|
               '\xf0e1d2c3b4a5968778695a4b3c2d1e0f001122334455667704689104c2fd3b2f584023641aba61761f1f1f1f0e0e0e0effffffffffffffff',
 | 
						|
               'bf-ecb/pad:none');
 | 
						|
 | 
						|
-- empty data
 | 
						|
select encrypt('', 'foo', 'bf');
 | 
						|
-- 10 bytes key
 | 
						|
select encrypt('foo', '0123456789', 'bf');
 | 
						|
-- 22 bytes key
 | 
						|
select encrypt('foo', '0123456789012345678901', 'bf');
 | 
						|
 | 
						|
-- decrypt
 | 
						|
select encode(decrypt(encrypt('foo', '0123456', 'bf'), '0123456', 'bf'), 'escape');
 | 
						|
 | 
						|
-- iv
 | 
						|
select encrypt_iv('foo', '0123456', 'abcd', 'bf');
 | 
						|
select encode(decrypt_iv('\x95c7e89322525d59', '0123456', 'abcd', 'bf'), 'escape');
 | 
						|
 | 
						|
-- long message
 | 
						|
select encrypt('Lets try a longer message.', '0123456789', 'bf');
 | 
						|
select encode(decrypt(encrypt('Lets try a longer message.', '0123456789', 'bf'), '0123456789', 'bf'), 'escape');
 |