mirror of
https://github.com/postgres/postgres.git
synced 2025-06-03 01:21:48 +03:00
This is similar to b69aba7, except that this completes the work for HMAC with a new routine called pg_hmac_error() that would provide more context about the type of error that happened during a HMAC computation: - The fallback HMAC implementation in hmac.c relies on cryptohashes, so in some code paths it is necessary to return back the error generated by cryptohashes. - For the OpenSSL implementation (hmac_openssl.c), the logic is very similar to cryptohash_openssl.c, where the error context comes from OpenSSL if one of its internal routines failed, with different error codes if something internal to hmac_openssl.c failed or was incorrect. Any in-core code paths that use the centralized HMAC interface are related to SCRAM, for errors that are unlikely going to happen, with only SHA-256. It would be possible to see errors when computing some HMACs with MD5 for example and OpenSSL FIPS enabled, and this commit would help in reporting the correct errors but nothing in core uses that. So, at the end, no backpatch to v14 is done, at least for now. Errors in SCRAM related to the computation of the server key, stored key, etc. need to pass down the potential error context string across more layers of their respective call stacks for the frontend and the backend, so each surrounding routine is adapted for this purpose. Reviewed-by: Sergey Shinderuk Discussion: https://postgr.es/m/Yd0N9tSAIIkFd+qi@paquier.xyz
331 lines
6.8 KiB
C
331 lines
6.8 KiB
C
/*-------------------------------------------------------------------------
|
|
*
|
|
* hmac.c
|
|
* Implements Keyed-Hashing for Message Authentication (HMAC)
|
|
*
|
|
* Fallback implementation of HMAC, as specified in RFC 2104.
|
|
*
|
|
* Portions Copyright (c) 1996-2022, PostgreSQL Global Development Group
|
|
* Portions Copyright (c) 1994, Regents of the University of California
|
|
*
|
|
* IDENTIFICATION
|
|
* src/common/hmac.c
|
|
*
|
|
*-------------------------------------------------------------------------
|
|
*/
|
|
|
|
#ifndef FRONTEND
|
|
#include "postgres.h"
|
|
#else
|
|
#include "postgres_fe.h"
|
|
#endif
|
|
|
|
#include "common/cryptohash.h"
|
|
#include "common/hmac.h"
|
|
#include "common/md5.h"
|
|
#include "common/sha1.h"
|
|
#include "common/sha2.h"
|
|
|
|
/*
|
|
* In backend, use palloc/pfree to ease the error handling. In frontend,
|
|
* use malloc to be able to return a failure status back to the caller.
|
|
*/
|
|
#ifndef FRONTEND
|
|
#define ALLOC(size) palloc(size)
|
|
#define FREE(ptr) pfree(ptr)
|
|
#else
|
|
#define ALLOC(size) malloc(size)
|
|
#define FREE(ptr) free(ptr)
|
|
#endif
|
|
|
|
/* Set of error states */
|
|
typedef enum pg_hmac_errno
|
|
{
|
|
PG_HMAC_ERROR_NONE = 0,
|
|
PG_HMAC_ERROR_OOM,
|
|
PG_HMAC_ERROR_INTERNAL
|
|
} pg_hmac_errno;
|
|
|
|
/* Internal pg_hmac_ctx structure */
|
|
struct pg_hmac_ctx
|
|
{
|
|
pg_cryptohash_ctx *hash;
|
|
pg_cryptohash_type type;
|
|
pg_hmac_errno error;
|
|
const char *errreason;
|
|
int block_size;
|
|
int digest_size;
|
|
|
|
/*
|
|
* Use the largest block size among supported options. This wastes some
|
|
* memory but simplifies the allocation logic.
|
|
*/
|
|
uint8 k_ipad[PG_SHA512_BLOCK_LENGTH];
|
|
uint8 k_opad[PG_SHA512_BLOCK_LENGTH];
|
|
};
|
|
|
|
#define HMAC_IPAD 0x36
|
|
#define HMAC_OPAD 0x5C
|
|
|
|
/*
|
|
* pg_hmac_create
|
|
*
|
|
* Allocate a hash context. Returns NULL on failure for an OOM. The
|
|
* backend issues an error, without returning.
|
|
*/
|
|
pg_hmac_ctx *
|
|
pg_hmac_create(pg_cryptohash_type type)
|
|
{
|
|
pg_hmac_ctx *ctx;
|
|
|
|
ctx = ALLOC(sizeof(pg_hmac_ctx));
|
|
if (ctx == NULL)
|
|
return NULL;
|
|
memset(ctx, 0, sizeof(pg_hmac_ctx));
|
|
ctx->type = type;
|
|
ctx->error = PG_HMAC_ERROR_NONE;
|
|
ctx->errreason = NULL;
|
|
|
|
/*
|
|
* Initialize the context data. This requires to know the digest and
|
|
* block lengths, that depend on the type of hash used.
|
|
*/
|
|
switch (type)
|
|
{
|
|
case PG_MD5:
|
|
ctx->digest_size = MD5_DIGEST_LENGTH;
|
|
ctx->block_size = MD5_BLOCK_SIZE;
|
|
break;
|
|
case PG_SHA1:
|
|
ctx->digest_size = SHA1_DIGEST_LENGTH;
|
|
ctx->block_size = SHA1_BLOCK_SIZE;
|
|
break;
|
|
case PG_SHA224:
|
|
ctx->digest_size = PG_SHA224_DIGEST_LENGTH;
|
|
ctx->block_size = PG_SHA224_BLOCK_LENGTH;
|
|
break;
|
|
case PG_SHA256:
|
|
ctx->digest_size = PG_SHA256_DIGEST_LENGTH;
|
|
ctx->block_size = PG_SHA256_BLOCK_LENGTH;
|
|
break;
|
|
case PG_SHA384:
|
|
ctx->digest_size = PG_SHA384_DIGEST_LENGTH;
|
|
ctx->block_size = PG_SHA384_BLOCK_LENGTH;
|
|
break;
|
|
case PG_SHA512:
|
|
ctx->digest_size = PG_SHA512_DIGEST_LENGTH;
|
|
ctx->block_size = PG_SHA512_BLOCK_LENGTH;
|
|
break;
|
|
}
|
|
|
|
ctx->hash = pg_cryptohash_create(type);
|
|
if (ctx->hash == NULL)
|
|
{
|
|
explicit_bzero(ctx, sizeof(pg_hmac_ctx));
|
|
FREE(ctx);
|
|
return NULL;
|
|
}
|
|
|
|
return ctx;
|
|
}
|
|
|
|
/*
|
|
* pg_hmac_init
|
|
*
|
|
* Initialize a HMAC context. Returns 0 on success, -1 on failure.
|
|
*/
|
|
int
|
|
pg_hmac_init(pg_hmac_ctx *ctx, const uint8 *key, size_t len)
|
|
{
|
|
int i;
|
|
int digest_size;
|
|
int block_size;
|
|
uint8 *shrinkbuf = NULL;
|
|
|
|
if (ctx == NULL)
|
|
return -1;
|
|
|
|
digest_size = ctx->digest_size;
|
|
block_size = ctx->block_size;
|
|
|
|
memset(ctx->k_opad, HMAC_OPAD, ctx->block_size);
|
|
memset(ctx->k_ipad, HMAC_IPAD, ctx->block_size);
|
|
|
|
/*
|
|
* If the key is longer than the block size, pass it through the hash once
|
|
* to shrink it down.
|
|
*/
|
|
if (len > block_size)
|
|
{
|
|
pg_cryptohash_ctx *hash_ctx;
|
|
|
|
/* temporary buffer for one-time shrink */
|
|
shrinkbuf = ALLOC(digest_size);
|
|
if (shrinkbuf == NULL)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_OOM;
|
|
return -1;
|
|
}
|
|
memset(shrinkbuf, 0, digest_size);
|
|
|
|
hash_ctx = pg_cryptohash_create(ctx->type);
|
|
if (hash_ctx == NULL)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_OOM;
|
|
FREE(shrinkbuf);
|
|
return -1;
|
|
}
|
|
|
|
if (pg_cryptohash_init(hash_ctx) < 0 ||
|
|
pg_cryptohash_update(hash_ctx, key, len) < 0 ||
|
|
pg_cryptohash_final(hash_ctx, shrinkbuf, digest_size) < 0)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_INTERNAL;
|
|
ctx->errreason = pg_cryptohash_error(hash_ctx);
|
|
pg_cryptohash_free(hash_ctx);
|
|
FREE(shrinkbuf);
|
|
return -1;
|
|
}
|
|
|
|
key = shrinkbuf;
|
|
len = digest_size;
|
|
pg_cryptohash_free(hash_ctx);
|
|
}
|
|
|
|
for (i = 0; i < len; i++)
|
|
{
|
|
ctx->k_ipad[i] ^= key[i];
|
|
ctx->k_opad[i] ^= key[i];
|
|
}
|
|
|
|
/* tmp = H(K XOR ipad, text) */
|
|
if (pg_cryptohash_init(ctx->hash) < 0 ||
|
|
pg_cryptohash_update(ctx->hash, ctx->k_ipad, ctx->block_size) < 0)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_INTERNAL;
|
|
ctx->errreason = pg_cryptohash_error(ctx->hash);
|
|
if (shrinkbuf)
|
|
FREE(shrinkbuf);
|
|
return -1;
|
|
}
|
|
|
|
if (shrinkbuf)
|
|
FREE(shrinkbuf);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* pg_hmac_update
|
|
*
|
|
* Update a HMAC context. Returns 0 on success, -1 on failure.
|
|
*/
|
|
int
|
|
pg_hmac_update(pg_hmac_ctx *ctx, const uint8 *data, size_t len)
|
|
{
|
|
if (ctx == NULL)
|
|
return -1;
|
|
|
|
if (pg_cryptohash_update(ctx->hash, data, len) < 0)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_INTERNAL;
|
|
ctx->errreason = pg_cryptohash_error(ctx->hash);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* pg_hmac_final
|
|
*
|
|
* Finalize a HMAC context. Returns 0 on success, -1 on failure.
|
|
*/
|
|
int
|
|
pg_hmac_final(pg_hmac_ctx *ctx, uint8 *dest, size_t len)
|
|
{
|
|
uint8 *h;
|
|
|
|
if (ctx == NULL)
|
|
return -1;
|
|
|
|
h = ALLOC(ctx->digest_size);
|
|
if (h == NULL)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_OOM;
|
|
return -1;
|
|
}
|
|
memset(h, 0, ctx->digest_size);
|
|
|
|
if (pg_cryptohash_final(ctx->hash, h, ctx->digest_size) < 0)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_INTERNAL;
|
|
ctx->errreason = pg_cryptohash_error(ctx->hash);
|
|
FREE(h);
|
|
return -1;
|
|
}
|
|
|
|
/* H(K XOR opad, tmp) */
|
|
if (pg_cryptohash_init(ctx->hash) < 0 ||
|
|
pg_cryptohash_update(ctx->hash, ctx->k_opad, ctx->block_size) < 0 ||
|
|
pg_cryptohash_update(ctx->hash, h, ctx->digest_size) < 0 ||
|
|
pg_cryptohash_final(ctx->hash, dest, len) < 0)
|
|
{
|
|
ctx->error = PG_HMAC_ERROR_INTERNAL;
|
|
ctx->errreason = pg_cryptohash_error(ctx->hash);
|
|
FREE(h);
|
|
return -1;
|
|
}
|
|
|
|
FREE(h);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* pg_hmac_free
|
|
*
|
|
* Free a HMAC context.
|
|
*/
|
|
void
|
|
pg_hmac_free(pg_hmac_ctx *ctx)
|
|
{
|
|
if (ctx == NULL)
|
|
return;
|
|
|
|
pg_cryptohash_free(ctx->hash);
|
|
explicit_bzero(ctx, sizeof(pg_hmac_ctx));
|
|
FREE(ctx);
|
|
}
|
|
|
|
/*
|
|
* pg_hmac_error
|
|
*
|
|
* Returns a static string providing details about an error that happened
|
|
* during a HMAC computation.
|
|
*/
|
|
const char *
|
|
pg_hmac_error(pg_hmac_ctx *ctx)
|
|
{
|
|
if (ctx == NULL)
|
|
return _("out of memory");
|
|
|
|
/*
|
|
* If a reason is provided, rely on it, else fallback to any error code
|
|
* set.
|
|
*/
|
|
if (ctx->errreason)
|
|
return ctx->errreason;
|
|
|
|
switch (ctx->error)
|
|
{
|
|
case PG_HMAC_ERROR_NONE:
|
|
return _("success");
|
|
case PG_HMAC_ERROR_INTERNAL:
|
|
return _("internal error");
|
|
case PG_HMAC_ERROR_OOM:
|
|
return _("out of memory");
|
|
}
|
|
|
|
Assert(false); /* cannot be reached */
|
|
return _("success");
|
|
}
|