Re: [HACKERS] SCRAM salt length

Поиск
Список
Период
Сортировка
От Michael Paquier
Тема Re: [HACKERS] SCRAM salt length
Дата
Msg-id CAB7nPqR63o2Xvr7LqYXE6HyfKRKQ3KqMg7z0Zh5EbeiKKSfa2w@mail.gmail.com
обсуждение исходный текст
Ответ на Re: [HACKERS] SCRAM salt length  (Heikki Linnakangas <hlinnaka@iki.fi>)
Список pgsql-hackers
On Thu, Aug 17, 2017 at 10:21 PM, Heikki Linnakangas <hlinnaka@iki.fi> wrote:
> On 08/17/2017 05:42 AM, Michael Paquier wrote:
>> That's now or never.
>
> Not really. That constant is just the default to use when creating new
> password verifiers, but the code can handle any salt length, and different
> verifiers can have different lengths.

Indeed, fuzzy memory here. I thought that parse_scram_verifier()
checked the salt length with the default value, but that's not the
case. Perhaps at some point in the development there was a check of
this kind..
-- 
Michael



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Peter Eisentraut
Дата:
Сообщение: Re: [HACKERS] SCRAM salt length
Следующее
От: Amit Kapila
Дата:
Сообщение: Re: [HACKERS] [BUGS] [postgresql 10 beta3] unrecognized node type: 90