postgresql/contrib/pgcrypto/expected
Heikki Linnakangas bf723a274c Forbid gen_random_uuid() with --disable-strong-random
Previously, gen_random_uuid() would fall back to a weak random number
generator, unlike gen_random_bytes() which would just fail. And this was
not made very clear in the docs. For consistency, also make
gen_random_uuid() fail outright, if compiled with --disable-strong-random.

Re-word the error message you get with --disable-strong-random. It is also
used by pgp functions that require random salts, and now also
gen_random_uuid().

Reported by Radek Slupik.

Discussion: https://www.postgresql.org/message-id/20170101232054.10135.50528@wrigleys.postgresql.org
2017-07-03 12:10:11 +03:00
..
3des.out
blowfish.out
cast5.out
crypt-blowfish.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
crypt-des.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
crypt-md5.out
crypt-xdes.out pgcrypto: Detect and report too-short crypt() salts. 2015-10-05 10:06:29 -04:00
des.out
hmac-md5.out
hmac-sha1.out
init.out
md5.out
pgp-armor.out
pgp-compression.out
pgp-compression_1.out Forbid gen_random_uuid() with --disable-strong-random 2017-07-03 12:10:11 +03:00
pgp-decrypt.out pgcrypto: Report errant decryption as "Wrong key or corrupt data". 2015-05-18 10:02:31 -04:00
pgp-decrypt_1.out Forbid gen_random_uuid() with --disable-strong-random 2017-07-03 12:10:11 +03:00
pgp-encrypt.out pgcrypto: support changing S2K iteration count 2016-03-09 14:31:07 -03:00
pgp-encrypt_1.out Forbid gen_random_uuid() with --disable-strong-random 2017-07-03 12:10:11 +03:00
pgp-info.out Fix buffer overrun after incomplete read in pullf_read_max(). 2015-02-02 10:00:45 -05:00
pgp-pubkey-decrypt.out pgcrypto: Report errant decryption as "Wrong key or corrupt data". 2015-05-18 10:02:31 -04:00
pgp-pubkey-encrypt.out
pgp-pubkey-encrypt_1.out Forbid gen_random_uuid() with --disable-strong-random 2017-07-03 12:10:11 +03:00
pgp-zlib-DISABLED.out
rijndael.out
sha1.out
sha2.out