From: Bruce Momjian Date: Tue, 8 Oct 2013 16:25:18 +0000 (-0400) Subject: docs: clarify references to md5 hash and md5 crypt in pgcrypto docs X-Git-Tag: REL9_3_2~76 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=ac9558c2fd18faf4f107bb66ee03bad85593e287;p=postgresql docs: clarify references to md5 hash and md5 crypt in pgcrypto docs Backpatch to 9.3.X. Suggestion from Richard Neill --- diff --git a/doc/src/sgml/pgcrypto.sgml b/doc/src/sgml/pgcrypto.sgml index a0eead7b84..976c7db130 100644 --- a/doc/src/sgml/pgcrypto.sgml +++ b/doc/src/sgml/pgcrypto.sgml @@ -95,8 +95,8 @@ hmac(data bytea, key text, type text) returns bytea - The algorithms in crypt() differ from usual hashing algorithms - like MD5 or SHA1 in the following respects: + The algorithms in crypt() differ from the usual + MD5 or SHA1 hashing algorithms in the following respects: @@ -142,6 +142,7 @@ hmac(data bytea, key text, type text) returns bytea Max Password Length Adaptive? Salt Bits + Output length Description @@ -151,6 +152,7 @@ hmac(data bytea, key text, type text) returns bytea 72 yes 128 + 60 Blowfish-based, variant 2a @@ -158,6 +160,7 @@ hmac(data bytea, key text, type text) returns bytea unlimited no 48 + 34 MD5-based crypt @@ -165,6 +168,7 @@ hmac(data bytea, key text, type text) returns bytea 8 yes 24 + 20 Extended DES @@ -172,6 +176,7 @@ hmac(data bytea, key text, type text) returns bytea 8 no 12 + 13 Original UNIX crypt @@ -205,7 +210,7 @@ UPDATE ... SET pswhash = crypt('new password', gen_salt('md5')); Example of authentication: -SELECT pswhash = crypt('entered password', pswhash) FROM ... ; +SELECT (pswhash = crypt('entered password', pswhash)) AS pswmatch FROM ... ; This returns true if the entered password is correct. @@ -353,7 +358,7 @@ gen_salt(type text [, iter_count integer ]) returns text 12 years - md5 + md5 hash 2345086 1 day 3 years @@ -380,7 +385,7 @@ gen_salt(type text [, iter_count integer ]) returns text - md5 numbers are from mdcrack 1.2. + md5 hash numbers are from mdcrack 1.2. @@ -1343,7 +1348,7 @@ gen_random_bytes(count integer) returns bytea OpenBSD sys/crypto - MD5 and SHA1 + MD5 hash and SHA1 WIDE Project KAME kame/sys/crypto