Re: pgcrypto: fix for broken solaris openssl, v03
| От | Zdenek Kotala |
|---|---|
| Тема | Re: pgcrypto: fix for broken solaris openssl, v03 |
| Дата | |
| Msg-id | 46FE705A.8050704@sun.com обсуждение исходный текст |
| Ответ на | pgcrypto: fix for broken solaris openssl, v03 ("Marko Kreen" <markokr@gmail.com>) |
| Список | pgsql-patches |
Marko Kreen wrote:
> solaris openssl refuses to handle keys longer than 128bits.
>
> * aes will crash on longer keys
> * blowfish will silently cut the key which can result
> data corruption
>
> to fix it:
>
> - test errors from AES functions
> - bf errors cannot be tested, do test encryption
> - change aes compat macros to static function so they
> can return values
>
Tested on Solaris Nevada and works fine.
> More general appriaches that also fix the problems are:
>
> - test all ciphers on first use and test fails then disable
> completely. This is nice as it could detect much braded range
> of errors.
>
> Problem with this approach is that its too big overhead for small
> gain, as it cannot still 100% guarantee that everything is working
> correctly.
>
> - Use EVP functions for encryption as they have better error
> handling. So crippled openssl can report via regular means
> that something is not supported.
+1 for EVP solution.
Thank you very much
Zdenek
В списке pgsql-patches по дате отправления: