mirror of
https://github.com/postgres/postgres.git
synced 2025-12-24 06:01:07 +03:00
Add timingsafe_bcmp(), for constant-time memory comparison
timingsafe_bcmp() should be used instead of memcmp() or a naive for-loop, when comparing passwords or secret tokens, to avoid leaking information about the secret token by timing. This commit just introduces the function but does not change any existing code to use it yet. Co-authored-by: Jelte Fennema-Nio <github-tech@jeltef.nl> Discussion: https://www.postgresql.org/message-id/7b86da3b-9356-4e50-aa1b-56570825e234@iki.fi
This commit is contained in:
@@ -1805,7 +1805,7 @@ AC_CHECK_DECLS(posix_fadvise, [], [], [#include <fcntl.h>])
|
||||
]) # fi
|
||||
|
||||
AC_CHECK_DECLS(fdatasync, [], [], [#include <unistd.h>])
|
||||
AC_CHECK_DECLS([strlcat, strlcpy, strnlen, strsep])
|
||||
AC_CHECK_DECLS([strlcat, strlcpy, strnlen, strsep, timingsafe_bcmp])
|
||||
|
||||
# We can't use AC_CHECK_FUNCS to detect these functions, because it
|
||||
# won't handle deployment target restrictions on macOS
|
||||
@@ -1826,6 +1826,7 @@ AC_REPLACE_FUNCS(m4_normalize([
|
||||
strlcpy
|
||||
strnlen
|
||||
strsep
|
||||
timingsafe_bcmp
|
||||
]))
|
||||
|
||||
AC_REPLACE_FUNCS(pthread_barrier_wait)
|
||||
|
||||
Reference in New Issue
Block a user