On Tue, 2006-07-11 at 15:57 -0400, Marko Kreen wrote:
> Few cleanups and couple of new things:
>
> - add SHA2 algorithm to older OpenSSL
> - add BIGNUM math to have public-key cryptography work
>on non-OpenSSL build.
> - gen_random_bytes() function
I'll apply this shortly.
To -patches, wo
Zdenek Kotala <[EMAIL PROTECTED]> writes:
> I created new regression test for check SET and RESET commands and
> configuration subsystem.
Does this actually accomplish anything? The checks that retail SETs
and RESETs work seem redundant with numerous existing tests. The SELECT
from pg_settings
'k, isn't the Reply-To header part of an RFC somewhere? Or is it really
an optional thing for an MUA to follow?
On Tue, 11 Jul 2006, Joshua D. Drake wrote:
On Tuesday 11 July 2006 18:20, Marc G. Fournier wrote:
checking ot make sure it works and gives the right answer ...
Kmail ignores i
Joe Conway wrote:
I just noticed this warning:
gcc -O -Wall -Wmissing-prototypes -Wpointer-arith -Winline
-Wdeclaration-after-statement -Wendif-labels -fno-strict-aliasing -g
-pthread -D_REENTRANT -D_THREAD_SAFE -D_POSIX_PTHREAD_SEMANTICS -fpic
-DFRONTEND -I. -I../../../src/include -D_GNU_SO
On Tuesday 11 July 2006 18:20, Marc G. Fournier wrote:
> checking ot make sure it works and gives the right answer ...
Kmail ignores it
>
>
> Marc G. Fournier Hub.Org Networking Services (http://www.hub.org)
> Email . [EMAIL PROTECTED] MSN . [EMAIL PROT
checking ot make sure it works and gives the right answer ...
Marc G. Fournier Hub.Org Networking Services (http://www.hub.org)
Email . [EMAIL PROTECTED] MSN . [EMAIL PROTECTED]
Yahoo . yscrappy Skype: hub.orgICQ . 7615664
--
Hi,
Hannu Krossing asked me about his patch to ignore transactions running
VACUUM LAZY in other vacuum transactions. I attach a version of the
patch updated to the current sources.
Just to remind what this is about: the point of the patch is to be able
to run more than one VACUUM LAZY simultaneo
Marko Kreen wrote:
> I happened to compile entab once again and found couple problems:
>
> - halt.c did not include stdlib.h, thus missed exit() prototype
> - Makefile ignores BINDIR for install.
> - Makefile calls install with user/group args, thus failing for regular
> user.
Applied, thanks.
I have made the changes appropriately. The regression tests passed.
Since I do not have enough resources, I could not test for a large number.
It works for a small table. If anybody tests for int8 value, it is
appreciated.
Also, it gives the following error msg, when the input exceeds the int8
l
In PGP public key tests, the password-encrypted secret
key happened to be encrypted with CAST5 instead of AES.
As OpenSSL has CAST5 always available I did not notice
it before.
Re-encrypt the key with AES.
Index: pgsql/contrib/pgcrypto/expected/pgp-pubkey-decrypt.out
SHA224 is cut-down SHA256 with different init vector,
let the sha2.c provide it also.
New revision of DSA standard includes SHA224, thus also upcoming
update to RFC2440 (OpenPGP).
Therefore, it is good to have it available.
Index: pgsql/contrib/pgcrypto/sha2.c
==
Following patch provides function gen_random_bytes() to SQL-level,
that uses internal strong random number generator to generate
a bytea value.
I've looked at server-managed-encryption-keys that seems new trend
in commercial databases. I don't think such functionality has a
place in pgcrypto, but
Function DES_ecb3_encrypt has unstable signature in OpenSSL.
Different versions of OpenSSL have different argument types
and it is not possible to pick right types by OpenSSL version.
Following patch silents compiler by forcing argument to (void *).
Index: pgsql/contrib/pgcrypto/openssl.c
==
Few cleanups and couple of new things:
- add SHA2 algorithm to older OpenSSL
- add BIGNUM math to have public-key cryptography work
on non-OpenSSL build.
- gen_random_bytes() function
The status of SHA2 algoritms and public-key encryption
can now be changed to 'always available.'
That make
I'd like to promote SHA2 algortihms (SHA224/256/384/512)
to "always available" status. Problem is that OpenSSL
only provides them from version 0.9.8. Considering
that 0.9.7 has not yet replaced 0.9.6, the 0.9.8 version
won't be generally available for long time.
Following patch splits support fo
On Marko Kreen's detailed suggestion, I've implemented a restartable
recovery mode for archive recovery (aka PITR). Restart points are known
as recovery checkpoints and are normally taken every 100 checkpoints in
the log to ensure good recovery performance.
An additional mode
standby_mode
* Use Fortuna for pseudo-random bytes too, as those need to
be high-quality also. OpenSSL internally acts same way.
* Clarify add_entropy logic - before first reseed get_rand_pool()
will return only 0, so make it explicit.
* On reseeding on first request, don't check if the pool#0 is
fille
I happened to compile entab once again and found couple problems:
- halt.c did not include stdlib.h, thus missed exit() prototype
- Makefile ignores BINDIR for install.
- Makefile calls install with user/group args, thus failing for regular user.
this fixes them.
--
marko
Index: src/tools/entab
Uninstall script for pgcrypto.
Index: pgsql/contrib/pgcrypto/Makefile
===
*** pgsql.orig/contrib/pgcrypto/Makefile
--- pgsql/contrib/pgcrypto/Makefile
*** MODULE_big = pgcrypto
*** 35,40
--- 35,41
OBJS
misc.c annoys me and creates unnecesary inter-dependencies just
for sharing a couple of bytes. This patch splits it out
to crypt-md5.c and crypt-des.c
Please do 'cvs remove misc.c' after applying this patch.
Index: pgsql/contrib/pgcrypto/Makefile
=
James Gates <[EMAIL PROTECTED]> writes:
> This change has no impact unless the "--with-krb5" option is used with
> "configure". If the option *is* used, configure will now only search for
> function krb5_sendauth(), instead of looking for both krb5_encrypt() and
> krb5_sendauth().
Applied to HE
Hi,
We came up with this patch in response to a problem reported to us by a
client. They had a query which took an unacceptably long time to respond
to a cancel request (SIGINT). The client uses 8.1.4, so the patch is
against that.
Their work_mem setting was rather large (100). We determined
22 matches
Mail list logo