postgresql/contrib/pgcrypto/expected
Noah Misch 1d812c8b05 pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory.  For existing salt-induced error conditions, emit a
message saying as much.  Back-patch to 9.0 (all supported versions).

Josh Kupershmidt

Security: CVE-2015-5288
2015-10-05 10:06:29 -04:00
..
3des.out
blowfish.out
cast5.out
crypt-blowfish.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
crypt-des.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
crypt-md5.out
crypt-xdes.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
des.out
hmac-md5.out
hmac-sha1.out
init.out
md5.out
pgp-armor.out Add functions for dealing with PGP armor header lines to pgcrypto. 2014-10-01 16:03:39 +03:00
pgp-compression.out
pgp-decrypt.out pgcrypto: Report errant decryption as "Wrong key or corrupt data". 2015-05-18 10:02:31 -04:00
pgp-encrypt-DISABLED.out
pgp-encrypt.out
pgp-info.out Fix buffer overrun after incomplete read in pullf_read_max(). 2015-02-02 10:00:45 -05:00
pgp-pubkey-decrypt.out pgcrypto: Report errant decryption as "Wrong key or corrupt data". 2015-05-18 10:02:31 -04:00
pgp-pubkey-DISABLED.out
pgp-pubkey-encrypt.out
pgp-zlib-DISABLED.out
rijndael.out
sha1.out
sha2.out