mirror of https://github.com/postgres/postgres
timingsafe_bcmp() should be used instead of memcmp() or a naive for-loop, when comparing passwords or secret tokens, to avoid leaking information about the secret token by timing. This commit just introduces the function but does not change any existing code to use it yet. Co-authored-by: Jelte Fennema-Nio <github-tech@jeltef.nl> Discussion: https://www.postgresql.org/message-id/7b86da3b-9356-4e50-aa1b-56570825e234@iki.fipull/210/head
parent
85d799ba8a
commit
09be391126
@ -0,0 +1,43 @@ |
||||
/*
|
||||
* src/port/timingsafe_bcmp.c |
||||
* |
||||
* $OpenBSD: timingsafe_bcmp.c,v 1.3 2015/08/31 02:53:57 guenther Exp $ |
||||
*/ |
||||
|
||||
/*
|
||||
* Copyright (c) 2010 Damien Miller. All rights reserved. |
||||
* |
||||
* Permission to use, copy, modify, and distribute this software for any |
||||
* purpose with or without fee is hereby granted, provided that the above |
||||
* copyright notice and this permission notice appear in all copies. |
||||
* |
||||
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
||||
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
||||
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
||||
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
||||
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
||||
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
||||
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
||||
*/ |
||||
|
||||
#include "c.h" |
||||
|
||||
#ifdef USE_SSL |
||||
#include <openssl/crypto.h> |
||||
#endif |
||||
|
||||
int |
||||
timingsafe_bcmp(const void *b1, const void *b2, size_t n) |
||||
{ |
||||
#ifdef USE_SSL |
||||
return CRYPTO_memcmp(b1, b2, n); |
||||
#else |
||||
const unsigned char *p1 = b1, |
||||
*p2 = b2; |
||||
int ret = 0; |
||||
|
||||
for (; n > 0; n--) |
||||
ret |= *p1++ ^ *p2++; |
||||
return (ret != 0); |
||||
#endif |
||||
} |
Loading…
Reference in new issue