Re: PG14: Avoid checking output-buffer-length for every encoded byte during pg_hex_encode
Вложения
В списке pgsql-hackers по дате отправления:
| От | Michael Paquier |
|---|---|
| Тема | Re: PG14: Avoid checking output-buffer-length for every encoded byte during pg_hex_encode |
| Дата | |
| Msg-id | YRswUUro+PzK52Q3@paquier.xyz обсуждение исходный текст |
| Ответ на | Re: PG14: Avoid checking output-buffer-length for every encoded byte during pg_hex_encode (Ranier Vilela <ranier.vf@gmail.com>) |
| Ответы |
Re: PG14: Avoid checking output-buffer-length for every encoded byte during pg_hex_encode
|
| Список | pgsql-hackers |
On Mon, Aug 16, 2021 at 02:06:31PM -0300, Ranier Vilela wrote: > uint64 and size_t in 64 bits are equivalents. > uint64 and size_t in 32 bits can be weird, but anyway size_t at 32 bits can > handle 1GB. There is usually a reason why things are done as they are, so before suggesting changing something I would advise to read the threads that created those changes more carefully because they could be mentioned. In this case, we are talking about aef8948, and this part of its related thread: https://www.postgresql.org/message-id/20210105034739.GG7432@momjian.us > base64.c can be made in another patch. This file is a set of code paths used by authentication and SCRAM, it will never get as hot as the code paths that Hans has reported as these are one-time operations. Please note as well cfc40d3 for the reasons why things are handled this way. We absolutely have to use safe routines here. -- Michael
В списке pgsql-hackers по дате отправления:
Сайт использует файлы cookie для корректной работы и повышения удобства. Нажимая кнопку «Принять» или продолжая пользоваться сайтом, вы соглашаетесь на их использование в соответствии с Политикой в отношении обработки cookie ООО «ППГ», в том числе на передачу данных из файлов cookie сторонним статистическим и рекламным службам. Вы можете управлять настройками cookie через параметры вашего браузера