summaryrefslogtreecommitdiffstats
path: root/contrib/pgcrypto/expected/crypt-xdes.out
blob: 8cf907512f6f7fbbc219788b5fbb862774ac5707 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
--
-- crypt() and gen_salt(): extended des
--
SELECT crypt('', '_J9..j2zz');
        crypt         
----------------------
 _J9..j2zzR/nIRDK3pPc
(1 row)

SELECT crypt('foox', '_J9..j2zz');
        crypt         
----------------------
 _J9..j2zzAYKMvO2BYRY
(1 row)

-- check XDES handling of keys longer than 8 chars
SELECT crypt('longlongpassword', '_J9..j2zz');
        crypt         
----------------------
 _J9..j2zz4BeseiQNwUg
(1 row)

-- error, salt too short
SELECT crypt('foox', '_J9..BWH');
ERROR:  invalid salt
-- error, count specified in the second argument is 0
SELECT crypt('password', '_........');
ERROR:  crypt(3) returned NULL
-- error, count will wind up still being 0 due to invalid encoding
-- of the count: only chars ``./0-9A-Za-z' are valid
SELECT crypt('password', '_..!!!!!!');
ERROR:  crypt(3) returned NULL
-- count should be non-zero here, will work
SELECT crypt('password', '_/!!!!!!!');
        crypt         
----------------------
 _/!!!!!!!zqM49hRzxko
(1 row)

CREATE TABLE ctest (data text, res text, salt text);
INSERT INTO ctest VALUES ('password', '', '');
UPDATE ctest SET salt = gen_salt('xdes', 1001);
UPDATE ctest SET res = crypt(data, salt);
SELECT res = crypt(data, res) AS "worked"
FROM ctest;
 worked 
--------
 t
(1 row)

DROP TABLE ctest;