diff options
| author | Bruce Momjian <bruce@momjian.us> | 2001-10-01 16:12:23 +0000 |
|---|---|---|
| committer | Bruce Momjian <bruce@momjian.us> | 2001-10-01 16:12:23 +0000 |
| commit | 43cadb9231d9a3c56371fbdafacbebde24fdf3c9 (patch) | |
| tree | 10e69ffa456abdc0d227071ec1f21da7d76fe3c5 /contrib/pgcrypto/sql | |
| parent | 998cebc4dbe837b8766cdaf913462058db2ced27 (diff) | |
Add missing pgcrypto files.
Diffstat (limited to 'contrib/pgcrypto/sql')
| -rw-r--r-- | contrib/pgcrypto/sql/blowfish.sql | 66 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/crypt-blowfish.sql | 17 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/crypt-des.sql | 17 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/crypt-md5.sql | 17 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/crypt-xdes.sql | 17 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/hmac-md5.sql | 46 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/hmac-sha1.sql | 46 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/init.sql | 12 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/md5.sql | 12 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/rijndael.sql | 43 | ||||
| -rw-r--r-- | contrib/pgcrypto/sql/sha1.sql | 12 |
11 files changed, 305 insertions, 0 deletions
diff --git a/contrib/pgcrypto/sql/blowfish.sql b/contrib/pgcrypto/sql/blowfish.sql new file mode 100644 index 00000000000..e1fa7b1f495 --- /dev/null +++ b/contrib/pgcrypto/sql/blowfish.sql @@ -0,0 +1,66 @@ +-- +-- Blowfish cipher +-- + +-- some standard Blowfish testvalues +select encode(encrypt( +decode('0000000000000000', 'hex'), +decode('0000000000000000', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('ffffffffffffffff', 'hex'), +decode('ffffffffffffffff', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('1000000000000001', 'hex'), +decode('3000000000000000', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('1111111111111111', 'hex'), +decode('1111111111111111', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('0123456789abcdef', 'hex'), +decode('fedcba9876543210', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('01a1d6d039776742', 'hex'), +decode('fedcba9876543210', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('ffffffffffffffff', 'hex'), +decode('0000000000000000', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +-- setkey +select encode(encrypt( +decode('fedcba9876543210', 'hex'), +decode('f0e1d2c3b4a5968778695a4b3c2d1e0f', 'hex'), +'bf-ecb/pad:none'), 'hex'); + +-- with padding +select encode(encrypt( +decode('01234567890123456789', 'hex'), +decode('33443344334433443344334433443344', 'hex'), +'bf-ecb'), 'hex'); + +-- cbc + +-- 28 bytes key +select encode(encrypt( +decode('6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5', 'hex'), +decode('37363534333231204e6f77206973207468652074696d6520666f7220', 'hex'), +'bf-cbc'), 'hex'); + +-- 29 bytes key +select encode(encrypt( +decode('6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc', 'hex'), +decode('37363534333231204e6f77206973207468652074696d6520666f722000', 'hex'), +'bf-cbc'), 'hex'); + diff --git a/contrib/pgcrypto/sql/crypt-blowfish.sql b/contrib/pgcrypto/sql/crypt-blowfish.sql new file mode 100644 index 00000000000..6b82fdff633 --- /dev/null +++ b/contrib/pgcrypto/sql/crypt-blowfish.sql @@ -0,0 +1,17 @@ +-- +-- crypt() and gen_salt(): bcrypt +-- + +select crypt('', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O'); + +select crypt('foox', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O'); + +create table ctest (data text, res text, salt text); +insert into ctest values ('password', '', ''); + +update ctest set salt = gen_salt('bf', 8); +update ctest set res = crypt(data, salt); +select res = crypt(data, res) as "worked" from ctest; + +drop table ctest; + diff --git a/contrib/pgcrypto/sql/crypt-des.sql b/contrib/pgcrypto/sql/crypt-des.sql new file mode 100644 index 00000000000..2a2fbfb36c5 --- /dev/null +++ b/contrib/pgcrypto/sql/crypt-des.sql @@ -0,0 +1,17 @@ +-- +-- crypt() and gen_salt(): crypt-des +-- + +select crypt('', 'NB'); + +select crypt('foox', 'NB'); + +create table ctest (data text, res text, salt text); +insert into ctest values ('password', '', ''); + +update ctest set salt = gen_salt('des'); +update ctest set res = crypt(data, salt); +select res = crypt(data, res) as "worked" from ctest; + +drop table ctest; + diff --git a/contrib/pgcrypto/sql/crypt-md5.sql b/contrib/pgcrypto/sql/crypt-md5.sql new file mode 100644 index 00000000000..8ef8dbae0ff --- /dev/null +++ b/contrib/pgcrypto/sql/crypt-md5.sql @@ -0,0 +1,17 @@ +-- +-- crypt() and gen_salt(): md5 +-- + +select crypt('', '$1$Szzz0yzz'); + +select crypt('foox', '$1$Szzz0yzz'); + +create table ctest (data text, res text, salt text); +insert into ctest values ('password', '', ''); + +update ctest set salt = gen_salt('md5'); +update ctest set res = crypt(data, salt); +select res = crypt(data, res) as "worked" from ctest; + +drop table ctest; + diff --git a/contrib/pgcrypto/sql/crypt-xdes.sql b/contrib/pgcrypto/sql/crypt-xdes.sql new file mode 100644 index 00000000000..6fd85b929a6 --- /dev/null +++ b/contrib/pgcrypto/sql/crypt-xdes.sql @@ -0,0 +1,17 @@ +-- +-- crypt() and gen_salt(): extended des +-- + +select crypt('', '_J9..j2zz'); + +select crypt('foox', '_J9..j2zz'); + +create table ctest (data text, res text, salt text); +insert into ctest values ('password', '', ''); + +update ctest set salt = gen_salt('xdes', 1001); +update ctest set res = crypt(data, salt); +select res = crypt(data, res) as "worked" from ctest; + +drop table ctest; + diff --git a/contrib/pgcrypto/sql/hmac-md5.sql b/contrib/pgcrypto/sql/hmac-md5.sql new file mode 100644 index 00000000000..d3cd1f649d2 --- /dev/null +++ b/contrib/pgcrypto/sql/hmac-md5.sql @@ -0,0 +1,46 @@ +-- +-- HMAC-MD5 +-- + +select encode(hmac( +'Hi There', +decode('0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b', 'hex'), +'md5'), 'hex'); + +-- 2 +select encode(hmac( +'Jefe', +'what do ya want for nothing?', +'md5'), 'hex'); + +-- 3 +select encode(hmac( +decode('dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd', 'hex'), +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'md5'), 'hex'); + +-- 4 +select encode(hmac( +decode('cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd', 'hex'), +decode('0102030405060708090a0b0c0d0e0f10111213141516171819', 'hex'), +'md5'), 'hex'); + +-- 5 +select encode(hmac( +'Test With Truncation', +decode('0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c', 'hex'), +'md5'), 'hex'); + +-- 6 +select encode(hmac( +'Test Using Larger Than Block-Size Key - Hash Key First', +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'md5'), 'hex'); + +-- 7 +select encode(hmac( +'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data', +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'md5'), 'hex'); + + diff --git a/contrib/pgcrypto/sql/hmac-sha1.sql b/contrib/pgcrypto/sql/hmac-sha1.sql new file mode 100644 index 00000000000..f08c4389634 --- /dev/null +++ b/contrib/pgcrypto/sql/hmac-sha1.sql @@ -0,0 +1,46 @@ +-- +-- HMAC-MD5 +-- + +select encode(hmac( +'Hi There', +decode('0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b', 'hex'), +'sha1'), 'hex'); + +-- 2 +select encode(hmac( +'Jefe', +'what do ya want for nothing?', +'sha1'), 'hex'); + +-- 3 +select encode(hmac( +decode('dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd', 'hex'), +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'sha1'), 'hex'); + +-- 4 +select encode(hmac( +decode('cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd', 'hex'), +decode('0102030405060708090a0b0c0d0e0f10111213141516171819', 'hex'), +'sha1'), 'hex'); + +-- 5 +select encode(hmac( +'Test With Truncation', +decode('0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c', 'hex'), +'sha1'), 'hex'); + +-- 6 +select encode(hmac( +'Test Using Larger Than Block-Size Key - Hash Key First', +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'sha1'), 'hex'); + +-- 7 +select encode(hmac( +'Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data', +decode('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'hex'), +'sha1'), 'hex'); + + diff --git a/contrib/pgcrypto/sql/init.sql b/contrib/pgcrypto/sql/init.sql new file mode 100644 index 00000000000..8bddb737734 --- /dev/null +++ b/contrib/pgcrypto/sql/init.sql @@ -0,0 +1,12 @@ +-- +-- init pgcrypto +-- + +\set ECHO none +\i pgcrypto.sql +\set ECHO all + +-- check for encoding fn's +select encode('foo', 'hex'); +select decode('666f6f', 'hex'); + diff --git a/contrib/pgcrypto/sql/md5.sql b/contrib/pgcrypto/sql/md5.sql new file mode 100644 index 00000000000..78e4cfee0f1 --- /dev/null +++ b/contrib/pgcrypto/sql/md5.sql @@ -0,0 +1,12 @@ +-- +-- MD5 message digest +-- + +select encode(digest('', 'md5'), 'hex'); +select encode(digest('a', 'md5'), 'hex'); +select encode(digest('abc', 'md5'), 'hex'); +select encode(digest('message digest', 'md5'), 'hex'); +select encode(digest('abcdefghijklmnopqrstuvwxyz', 'md5'), 'hex'); +select encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'md5'), 'hex'); +select encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'md5'), 'hex'); + diff --git a/contrib/pgcrypto/sql/rijndael.sql b/contrib/pgcrypto/sql/rijndael.sql new file mode 100644 index 00000000000..fbacdc6dfce --- /dev/null +++ b/contrib/pgcrypto/sql/rijndael.sql @@ -0,0 +1,43 @@ +-- +-- AES / Rijndael-128 cipher +-- + +-- some standard Rijndael testvalues +select encode(encrypt( +decode('00112233445566778899aabbccddeeff', 'hex'), +decode('000102030405060708090a0b0c0d0e0f', 'hex'), +'aes-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('00112233445566778899aabbccddeeff', 'hex'), +decode('000102030405060708090a0b0c0d0e0f1011121314151617', 'hex'), +'aes-ecb/pad:none'), 'hex'); + +select encode(encrypt( +decode('00112233445566778899aabbccddeeff', 'hex'), +decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f', 'hex'), +'aes-ecb/pad:none'), 'hex'); + +-- cbc +select encode(encrypt( +decode('00112233445566778899aabbccddeeff', 'hex'), +decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f', 'hex'), +'aes-cbc/pad:none'), 'hex'); + +-- key padding + +select encode(encrypt( +decode('0011223344', 'hex'), +decode('000102030405', 'hex'), +'aes-cbc'), 'hex'); + +select encode(encrypt( +decode('0011223344', 'hex'), +decode('000102030405060708090a0b0c0d0e0f10111213', 'hex'), +'aes-cbc'), 'hex'); + +select encode(encrypt( +decode('0011223344', 'hex'), +decode('000102030405060708090a0b0c0d0e0f101112131415161718191a1b', 'hex'), +'aes-cbc'), 'hex'); + diff --git a/contrib/pgcrypto/sql/sha1.sql b/contrib/pgcrypto/sql/sha1.sql new file mode 100644 index 00000000000..11ee5426cb4 --- /dev/null +++ b/contrib/pgcrypto/sql/sha1.sql @@ -0,0 +1,12 @@ +-- +-- SHA1 message digest +-- + +select encode(digest('', 'sha1'), 'hex'); +select encode(digest('a', 'sha1'), 'hex'); +select encode(digest('abc', 'sha1'), 'hex'); +select encode(digest('message digest', 'sha1'), 'hex'); +select encode(digest('abcdefghijklmnopqrstuvwxyz', 'sha1'), 'hex'); +select encode(digest('ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789', 'sha1'), 'hex'); +select encode(digest('12345678901234567890123456789012345678901234567890123456789012345678901234567890', 'sha1'), 'hex'); + |
