mirror of
https://github.com/postgres/postgres.git
synced 2025-08-30 06:01:21 +03:00
Support OpenSSL 1.1.0 in 9.3 and 9.2.
This commit back-patches the equivalent of the 9.5-branch commitse2838c580
and48e5ba61e
, so that we can work with OpenSSL 1.1.0 in all supported branches. Original patches by Andreas Karlsson and Heikki Linnakangas, back-patching work by Andreas Karlsson. Patch: https://postgr.es/m/0c817abb-3f7d-20fb-583a-58f7593a0bea@proxel.se Discussion: https://postgr.es/m/5129.1492293840@sss.pgh.pa.us
This commit is contained in:
@@ -66,7 +66,7 @@
|
||||
#ifdef USE_SSL
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/dh.h>
|
||||
#if SSLEAY_VERSION_NUMBER >= 0x0907000L
|
||||
#if OPENSSL_VERSION_NUMBER >= 0x0907000L
|
||||
#include <openssl/conf.h>
|
||||
#endif
|
||||
#endif /* USE_SSL */
|
||||
@@ -80,6 +80,7 @@
|
||||
|
||||
static DH *load_dh_file(int keylength);
|
||||
static DH *load_dh_buffer(const char *, size_t);
|
||||
static DH *generate_dh_parameters(int prime_len, int generator);
|
||||
static DH *tmp_dh_cb(SSL *s, int is_export, int keylength);
|
||||
static int verify_cb(int, X509_STORE_CTX *);
|
||||
static void info_cb(const SSL *ssl, int type, int args);
|
||||
@@ -476,8 +477,7 @@ wloop:
|
||||
* to retry; do we need to adopt their logic for that?
|
||||
*/
|
||||
|
||||
static bool my_bio_initialized = false;
|
||||
static BIO_METHOD my_bio_methods;
|
||||
static BIO_METHOD *my_bio_methods = NULL;
|
||||
|
||||
static int
|
||||
my_sock_read(BIO *h, char *buf, int size)
|
||||
@@ -488,7 +488,7 @@ my_sock_read(BIO *h, char *buf, int size)
|
||||
|
||||
if (buf != NULL)
|
||||
{
|
||||
res = recv(h->num, buf, size, 0);
|
||||
res = recv(BIO_get_fd(h, NULL), buf, size, 0);
|
||||
BIO_clear_retry_flags(h);
|
||||
if (res <= 0)
|
||||
{
|
||||
@@ -510,7 +510,7 @@ my_sock_write(BIO *h, const char *buf, int size)
|
||||
{
|
||||
int res = 0;
|
||||
|
||||
res = send(h->num, buf, size, 0);
|
||||
res = send(BIO_get_fd(h, NULL), buf, size, 0);
|
||||
BIO_clear_retry_flags(h);
|
||||
if (res <= 0)
|
||||
{
|
||||
@@ -526,14 +526,41 @@ my_sock_write(BIO *h, const char *buf, int size)
|
||||
static BIO_METHOD *
|
||||
my_BIO_s_socket(void)
|
||||
{
|
||||
if (!my_bio_initialized)
|
||||
if (!my_bio_methods)
|
||||
{
|
||||
memcpy(&my_bio_methods, BIO_s_socket(), sizeof(BIO_METHOD));
|
||||
my_bio_methods.bread = my_sock_read;
|
||||
my_bio_methods.bwrite = my_sock_write;
|
||||
my_bio_initialized = true;
|
||||
BIO_METHOD *biom = (BIO_METHOD *) BIO_s_socket();
|
||||
#ifdef HAVE_BIO_METH_NEW
|
||||
int my_bio_index;
|
||||
|
||||
my_bio_index = BIO_get_new_index();
|
||||
if (my_bio_index == -1)
|
||||
return NULL;
|
||||
my_bio_methods = BIO_meth_new(my_bio_index, "PostgreSQL backend socket");
|
||||
if (!my_bio_methods)
|
||||
return NULL;
|
||||
if (!BIO_meth_set_write(my_bio_methods, my_sock_write) ||
|
||||
!BIO_meth_set_read(my_bio_methods, my_sock_read) ||
|
||||
!BIO_meth_set_gets(my_bio_methods, BIO_meth_get_gets(biom)) ||
|
||||
!BIO_meth_set_puts(my_bio_methods, BIO_meth_get_puts(biom)) ||
|
||||
!BIO_meth_set_ctrl(my_bio_methods, BIO_meth_get_ctrl(biom)) ||
|
||||
!BIO_meth_set_create(my_bio_methods, BIO_meth_get_create(biom)) ||
|
||||
!BIO_meth_set_destroy(my_bio_methods, BIO_meth_get_destroy(biom)) ||
|
||||
!BIO_meth_set_callback_ctrl(my_bio_methods, BIO_meth_get_callback_ctrl(biom)))
|
||||
{
|
||||
BIO_meth_free(my_bio_methods);
|
||||
my_bio_methods = NULL;
|
||||
return NULL;
|
||||
}
|
||||
#else
|
||||
my_bio_methods = malloc(sizeof(BIO_METHOD));
|
||||
if (!my_bio_methods)
|
||||
return NULL;
|
||||
memcpy(my_bio_methods, biom, sizeof(BIO_METHOD));
|
||||
my_bio_methods->bread = my_sock_read;
|
||||
my_bio_methods->bwrite = my_sock_write;
|
||||
#endif
|
||||
}
|
||||
return &my_bio_methods;
|
||||
return my_bio_methods;
|
||||
}
|
||||
|
||||
/* This should exactly match openssl's SSL_set_fd except for using my BIO */
|
||||
@@ -541,9 +568,16 @@ static int
|
||||
my_SSL_set_fd(SSL *s, int fd)
|
||||
{
|
||||
int ret = 0;
|
||||
BIO *bio = NULL;
|
||||
BIO *bio;
|
||||
BIO_METHOD *bio_method;
|
||||
|
||||
bio = BIO_new(my_BIO_s_socket());
|
||||
bio_method = my_BIO_s_socket();
|
||||
if (bio_method == NULL)
|
||||
{
|
||||
SSLerr(SSL_F_SSL_SET_FD, ERR_R_BUF_LIB);
|
||||
goto err;
|
||||
}
|
||||
bio = BIO_new(bio_method);
|
||||
|
||||
if (bio == NULL)
|
||||
{
|
||||
@@ -642,6 +676,31 @@ load_dh_buffer(const char *buffer, size_t len)
|
||||
return dh;
|
||||
}
|
||||
|
||||
/*
|
||||
* Generate DH parameters.
|
||||
*
|
||||
* Last resort if we can't load precomputed nor hardcoded
|
||||
* parameters.
|
||||
*/
|
||||
static DH *
|
||||
generate_dh_parameters(int prime_len, int generator)
|
||||
{
|
||||
#if (OPENSSL_VERSION_NUMBER >= 0x0090800fL)
|
||||
DH *dh;
|
||||
|
||||
if ((dh = DH_new()) == NULL)
|
||||
return NULL;
|
||||
|
||||
if (DH_generate_parameters_ex(dh, prime_len, generator, NULL))
|
||||
return dh;
|
||||
|
||||
DH_free(dh);
|
||||
return NULL;
|
||||
#else
|
||||
return DH_generate_parameters(prime_len, generator, NULL, NULL);
|
||||
#endif
|
||||
}
|
||||
|
||||
/*
|
||||
* Generate an ephemeral DH key. Because this can take a long
|
||||
* time to compute, we can use precomputed parameters of the
|
||||
@@ -711,7 +770,7 @@ tmp_dh_cb(SSL *s, int is_export, int keylength)
|
||||
ereport(DEBUG2,
|
||||
(errmsg_internal("DH: generating parameters (%d bits)",
|
||||
keylength)));
|
||||
r = DH_generate_parameters(keylength, DH_GENERATOR_2, NULL, NULL);
|
||||
r = generate_dh_parameters(keylength, DH_GENERATOR_2);
|
||||
}
|
||||
|
||||
return r;
|
||||
@@ -790,11 +849,15 @@ initialize_SSL(void)
|
||||
|
||||
if (!SSL_context)
|
||||
{
|
||||
#ifdef HAVE_OPENSSL_INIT_SSL
|
||||
OPENSSL_init_ssl(OPENSSL_INIT_LOAD_CONFIG, NULL);
|
||||
#else
|
||||
#if SSLEAY_VERSION_NUMBER >= 0x0907000L
|
||||
OPENSSL_config(NULL);
|
||||
#endif
|
||||
SSL_library_init();
|
||||
SSL_load_error_strings();
|
||||
#endif
|
||||
|
||||
/*
|
||||
* We use SSLv23_method() because it can negotiate use of the highest
|
||||
|
Reference in New Issue
Block a user