Add key management system
This adds a key management system that stores (currently) two data encryption keys of length 128, 192, or 256 bits. The data keys are AES256 encrypted using a key encryption key, and validated via GCM cipher mode. A command to obtain the key encryption key must be specified at initdb time, and will be run at every database server start. New parameters allow a file descriptor open to the terminal to be passed. pg_upgrade support has also been added. Discussion: https://postgr.es/m/CA+fd4k7q5o6Nc_AaX6BcYM9yqTbC6_pnH-6nSD=54Zp6NBQTCQ@mail.gmail.com Discussion: https://postgr.es/m/20201202213814.GG20285@momjian.us Author: Masahiko Sawada, me, Stephen Frost
Showing
src/backend/crypto/Makefile
0 → 100644
src/backend/crypto/kmgr.c
0 → 100644
This diff is collapsed.
src/common/cipher.c
0 → 100644
src/common/cipher_openssl.c
0 → 100644
src/common/kmgr_utils.c
0 → 100644
This diff is collapsed.
src/include/common/cipher.h
0 → 100644
src/include/crypto/kmgr.h
0 → 100644
Please register or sign in to comment