60#include <openssl/ssl.h>
61#include <openssl/conf.h>
63#include <openssl/engine.h>
65#include <openssl/x509v3.h>
68static int verify_cb(
int ok, X509_STORE_CTX *ctx);
70 ASN1_STRING *name_entry,
73 ASN1_OCTET_STRING *addr_entry,
99 if (
conn->ssl == NULL)
121 int result_errno = 0;
139 n = SSL_read(
conn->ssl, ptr,
len);
140 err = SSL_get_error(
conn->ssl, n);
150 ecode = (
err != SSL_ERROR_NONE || n < 0) ? ERR_get_error() : 0;
158 "SSL_read failed but did not provide error information\n");
163 case SSL_ERROR_WANT_READ:
166 case SSL_ERROR_WANT_WRITE:
175 case SSL_ERROR_SYSCALL:
179 if (result_errno == EPIPE ||
182 "\tThis probably means the server terminated abnormally\n"
183 "\tbefore or while processing the request.");
187 sebuf,
sizeof(sebuf)));
208 case SSL_ERROR_ZERO_RETURN:
236 return SSL_pending(
conn->ssl) > 0;
243 int result_errno = 0;
250 n = SSL_write(
conn->ssl, ptr,
len);
251 err = SSL_get_error(
conn->ssl, n);
252 ecode = (
err != SSL_ERROR_NONE || n < 0) ? ERR_get_error() : 0;
260 "SSL_write failed but did not provide error information\n");
265 case SSL_ERROR_WANT_READ:
273 case SSL_ERROR_WANT_WRITE:
276 case SSL_ERROR_SYSCALL:
286 if (result_errno == EPIPE || result_errno ==
ECONNRESET)
288 "\tThis probably means the server terminated abnormally\n"
289 "\tbefore or while processing the request.");
293 sebuf,
sizeof(sebuf)));
314 case SSL_ERROR_ZERO_RETURN:
343 const EVP_MD *algo_type;
344 unsigned char hash[EVP_MAX_MD_SIZE];
345 unsigned int hash_size;
354 peer_cert =
conn->peer;
361#if HAVE_X509_GET_SIGNATURE_INFO
362 if (!X509_get_signature_info(peer_cert, &algo_nid, NULL, NULL, NULL))
364 if (!OBJ_find_sigid_algs(X509_get_signature_nid(peer_cert),
382 algo_type = EVP_sha256();
385 algo_type = EVP_get_digestbynid(algo_nid);
386 if (algo_type == NULL)
389 OBJ_nid2sn(algo_nid));
395 if (!X509_digest(peer_cert, algo_type,
hash, &hash_size))
402 cert_hash =
malloc(hash_size);
403 if (cert_hash == NULL)
408 memcpy(cert_hash,
hash, hash_size);
435#ifdef HAVE_SSL_CTX_SET_CERT_CB
446cert_cb(SSL *ssl,
void *
arg)
453 if (SSL_get_certificate(ssl))
474 const unsigned char *namedata;
477 if (name_entry == NULL)
486 namedata = ASN1_STRING_get0_data(name_entry);
487 len = ASN1_STRING_length(name_entry);
500 ASN1_OCTET_STRING *addr_entry,
504 const unsigned char *addrdata;
507 if (addr_entry == NULL)
517 addrdata = ASN1_STRING_get0_data(addr_entry);
518 len = ASN1_STRING_length(addr_entry);
526 struct in_addr dummy4;
528 struct in6_addr dummy6;
533 || (inet_pton(AF_INET6, host, &dummy6) == 1)
548 STACK_OF(GENERAL_NAME) * peer_san;
553 bool check_cn =
true;
578 host_type = GEN_IPADD;
586 peer_san = (STACK_OF(GENERAL_NAME) *)
587 X509_get_ext_d2i(
conn->peer, NID_subject_alt_name, NULL, NULL);
591 int san_len = sk_GENERAL_NAME_num(peer_san);
593 for (
i = 0;
i < san_len;
i++)
595 const GENERAL_NAME *
name = sk_GENERAL_NAME_value(peer_san,
i);
596 char *alt_name = NULL;
598 if (
name->type == host_type)
607 if (
name->type == GEN_DNS)
614 else if (
name->type == GEN_IPADD)
625 *first_name = alt_name;
640 sk_GENERAL_NAME_pop_free(peer_san, GENERAL_NAME_free);
653 X509_NAME *subject_name;
655 subject_name = X509_get_subject_name(
conn->peer);
656 if (subject_name != NULL)
660 cn_index = X509_NAME_get_index_by_NID(subject_name,
664 char *common_name = NULL;
668 X509_NAME_ENTRY_get_data(X509_NAME_get_entry(subject_name, cn_index)),
674 *first_name = common_name;
688#ifdef HAVE_SSL_CTX_SET_KEYLOG_CALLBACK
698SSL_CTX_keylog_cb(
const SSL *ssl,
const char *line)
708 old_umask = umask(077);
720 rc =
write(
fd, line, strlen(line));
761 have_homedir =
false;
799#ifdef HAVE_SSL_CTX_SET_CERT_CB
805 SSL_CTX_set_options(
SSL_context, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
815 if (ssl_min_ver == -1)
823 if (!SSL_CTX_set_min_proto_version(
SSL_context, ssl_min_ver))
841 if (ssl_max_ver == -1)
849 if (!SSL_CTX_set_max_proto_version(
SSL_context, ssl_max_ver))
864 SSL_CTX_set_mode(
SSL_context, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
873 else if (have_homedir)
874 snprintf(fnbuf,
sizeof(fnbuf),
"%s/%s", homedir, ROOT_CERT_FILE);
878 if (strcmp(fnbuf,
"system") == 0)
887 if (SSL_CTX_set_default_verify_paths(
SSL_context) != 1)
897 have_rootcert =
true;
899 else if (fnbuf[0] !=
'\0' &&
904 if (SSL_CTX_load_verify_locations(
SSL_context, fnbuf, NULL) != 1)
915 if ((cvstore = SSL_CTX_get_cert_store(
SSL_context)) != NULL)
926 if (!fname && !dname && have_homedir)
928 snprintf(fnbuf,
sizeof(fnbuf),
"%s/%s", homedir, ROOT_CRL_FILE);
933 if ((fname || dname) &&
934 X509_STORE_load_locations(cvstore, fname, dname) == 1)
936 X509_STORE_set_flags(cvstore,
937 X509_V_FLAG_CRL_CHECK | X509_V_FLAG_CRL_CHECK_ALL);
943 have_rootcert =
true;
959 if (fnbuf[0] ==
'\0')
961 "Either provide the file, use the system's trusted roots with sslrootcert=system, or change sslmode to disable server certificate verification.");
964 "Either provide the file, use the system's trusted roots with sslrootcert=system, or change sslmode to disable server certificate verification.", fnbuf);
968 have_rootcert =
false;
974 else if (have_homedir)
975 snprintf(fnbuf,
sizeof(fnbuf),
"%s/%s", homedir, USER_CERT_FILE);
984 else if (fnbuf[0] ==
'\0')
989 else if (
stat(fnbuf, &
buf) != 0)
996 if (errno != ENOENT && errno != ENOTDIR)
999 fnbuf,
strerror_r(errno, sebuf,
sizeof(sebuf)));
1012 if (SSL_CTX_use_certificate_chain_file(
SSL_context, fnbuf) != 1)
1035 !SSL_set_app_data(
conn->ssl,
conn) ||
1049#ifdef HAVE_SSL_CTX_SET_KEYLOG_CALLBACK
1050 SSL_CTX_set_keylog_callback(
SSL_context, SSL_CTX_keylog_cb);
1052#ifdef LIBRESSL_VERSION_NUMBER
1078 if (host && host[0] &&
1079 !(strspn(host,
"0123456789.") == strlen(host) ||
1082 if (SSL_set_tlsext_host_name(
conn->ssl, host) != 1)
1117#ifdef USE_SSL_ENGINE
1129 if (engine_str == NULL)
1136 engine_colon = strchr(engine_str,
':');
1138 *engine_colon =
'\0';
1141 conn->engine = ENGINE_by_id(engine_str);
1142 if (
conn->engine == NULL)
1153 if (ENGINE_init(
conn->engine) == 0)
1160 ENGINE_free(
conn->engine);
1161 conn->engine = NULL;
1166 pkey = ENGINE_load_private_key(
conn->engine, engine_colon,
1173 engine_colon, engine_str,
err);
1175 ENGINE_finish(
conn->engine);
1176 ENGINE_free(
conn->engine);
1177 conn->engine = NULL;
1181 if (SSL_use_PrivateKey(
conn->ssl, pkey) != 1)
1186 engine_colon, engine_str,
err);
1188 ENGINE_finish(
conn->engine);
1189 ENGINE_free(
conn->engine);
1190 conn->engine = NULL;
1207 else if (have_homedir)
1210 snprintf(fnbuf,
sizeof(fnbuf),
"%s/%s", homedir, USER_KEY_FILE);
1215 if (have_cert && fnbuf[0] !=
'\0')
1221 if (errno == ENOENT)
1260#if !defined(WIN32) && !defined(__CYGWIN__)
1261 if (
buf.st_uid == 0 ?
1266 "private key file \"%s\" has group or world access; file must have permissions u=rw (0600) or less if owned by the current user, or permissions u=rw,g=r (0640) or less if owned by root",
1272 if (SSL_use_PrivateKey_file(
conn->ssl, fnbuf, SSL_FILETYPE_PEM) != 1)
1288 if (SSL_use_PrivateKey_file(
conn->ssl, fnbuf, SSL_FILETYPE_ASN1) != 1)
1302 SSL_check_private_key(
conn->ssl) != 1)
1323 SSL_set_options(
conn->ssl, SSL_OP_NO_COMPRESSION);
1325 SSL_clear_options(
conn->ssl, SSL_OP_NO_COMPRESSION);
1340 r = SSL_connect(
conn->ssl);
1344 int err = SSL_get_error(
conn->ssl, r);
1345 unsigned long ecode;
1347 ecode = ERR_get_error();
1350 case SSL_ERROR_WANT_READ:
1353 case SSL_ERROR_WANT_WRITE:
1356 case SSL_ERROR_SYSCALL:
1359 unsigned long vcode;
1361 vcode = SSL_get_verify_result(
conn->ssl);
1372 if (save_errno == 0 &&
1373 vcode == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY &&
1376 X509_verify_cert_error_string(vcode));
1377 else if (r == -1 && save_errno != 0)
1391 switch (ERR_GET_REASON(ecode))
1407 case SSL_R_NO_PROTOCOLS_AVAILABLE:
1408 case SSL_R_UNSUPPORTED_PROTOCOL:
1409 case SSL_R_BAD_PROTOCOL_VERSION_NUMBER:
1410 case SSL_R_UNKNOWN_PROTOCOL:
1411 case SSL_R_UNKNOWN_SSL_VERSION:
1412 case SSL_R_UNSUPPORTED_SSL_VERSION:
1413 case SSL_R_WRONG_SSL_VERSION:
1414 case SSL_R_WRONG_VERSION_NUMBER:
1415 case SSL_R_TLSV1_ALERT_PROTOCOL_VERSION:
1416#ifdef SSL_R_VERSION_TOO_HIGH
1417 case SSL_R_VERSION_TOO_HIGH:
1418 case SSL_R_VERSION_TOO_LOW:
1423 MIN_OPENSSL_TLS_VERSION,
1426 MAX_OPENSSL_TLS_VERSION);
1445 const unsigned char *selected;
1448 SSL_get0_alpn_selected(
conn->ssl, &selected, &
len);
1450 if (selected == NULL)
1476 conn->peer = SSL_get_peer_certificate(
conn->ssl);
1477 if (
conn->peer == NULL)
1510 SSL_shutdown(
conn->ssl);
1511 SSL_free(
conn->ssl);
1519 X509_free(
conn->peer);
1523#ifdef USE_SSL_ENGINE
1526 ENGINE_finish(
conn->engine);
1527 ENGINE_free(
conn->engine);
1528 conn->engine = NULL;
1545static char ssl_nomem[] =
"out of memory allocating error description";
1547#define SSL_ERR_LEN 128
1552 const char *errreason;
1563 errreason = ERR_reason_error_string(ecode);
1564 if (errreason != NULL)
1578#ifdef SSL_AD_NO_APPLICATION_PROTOCOL
1579 if (ERR_GET_LIB(ecode) == ERR_LIB_SSL &&
1580 ERR_GET_REASON(ecode) == SSL_AD_REASON_OFFSET + SSL_AD_NO_APPLICATION_PROTOCOL)
1594#ifdef ERR_SYSTEM_ERROR
1595 if (ERR_SYSTEM_ERROR(ecode))
1634 if (strcmp(struct_name,
"OpenSSL") == 0)
1642 static const char *
const openssl_attrs[] = {
1651 static const char *
const empty_attrs[] = {NULL};
1656 return openssl_attrs;
1660 if (
conn->ssl == NULL)
1663 return openssl_attrs;
1672 if (strcmp(attribute_name,
"library") == 0)
1678 if (
conn->ssl == NULL)
1681 if (strcmp(attribute_name,
"library") == 0)
1684 if (strcmp(attribute_name,
"key_bits") == 0)
1686 static char sslbits_str[12];
1689 SSL_get_cipher_bits(
conn->ssl, &sslbits);
1690 snprintf(sslbits_str,
sizeof(sslbits_str),
"%d", sslbits);
1694 if (strcmp(attribute_name,
"cipher") == 0)
1695 return SSL_get_cipher(
conn->ssl);
1697 if (strcmp(attribute_name,
"compression") == 0)
1698 return SSL_get_current_compression(
conn->ssl) ?
"on" :
"off";
1700 if (strcmp(attribute_name,
"protocol") == 0)
1701 return SSL_get_version(
conn->ssl);
1703 if (strcmp(attribute_name,
"alpn") == 0)
1705 const unsigned char *
data;
1707 static char alpn_str[256];
1711 if (
data == NULL ||
len == 0 ||
len >
sizeof(alpn_str) - 1)
1740 BIO_clear_retry_flags(h);
1750#if defined(EWOULDBLOCK) && (!defined(EAGAIN) || (EWOULDBLOCK != EAGAIN))
1754 BIO_set_retry_read(h);
1774 BIO_clear_retry_flags(h);
1783#if defined(EWOULDBLOCK) && (!defined(EAGAIN) || (EWOULDBLOCK != EAGAIN))
1787 BIO_set_retry_write(h);
1816 case BIO_CTRL_FLUSH:
1842 my_bio_index = BIO_get_new_index();
1843 if (my_bio_index == -1)
1845 my_bio_index |= BIO_TYPE_SOURCE_SINK;
1846 res = BIO_meth_new(my_bio_index,
"libpq socket");
1877 BIO_METHOD *bio_method;
1880 if (bio_method == NULL)
1883 bio = BIO_new(bio_method);
1887 BIO_set_data(bio,
conn);
1888 BIO_set_init(bio, 1);
1890 SSL_set_bio(
conn->ssl, bio, bio);
1907 buf[size - 1] =
'\0';
1959 return TLS1_VERSION;
1961#ifdef TLS1_1_VERSION
1963 return TLS1_1_VERSION;
1966#ifdef TLS1_2_VERSION
1968 return TLS1_2_VERSION;
1971#ifdef TLS1_3_VERSION
1973 return TLS1_3_VERSION;
static SSL_CTX * SSL_context
#define fprintf(file, fmt, msg)
void err(int eval, const char *fmt,...)
bool pqGetHomeDirectory(char *buf, int bufsize)
void libpq_append_conn_error(PGconn *conn, const char *fmt,...)
int pq_verify_peer_name_matches_certificate_name(PGconn *conn, const char *namedata, size_t namelen, char **store_name)
int pq_verify_peer_name_matches_certificate_ip(PGconn *conn, const unsigned char *ipdata, size_t iplen, char **store_name)
bool pq_verify_peer_name_matches_certificate(PGconn *conn)
static BIO_METHOD * pgconn_bio_method_ptr
static int ssl_protocol_version_to_openssl(const char *protocol)
void * PQgetssl(PGconn *conn)
static void SSLerrfree(char *buf)
PQsslKeyPassHook_OpenSSL_type PQgetSSLKeyPassHook_OpenSSL(void)
void * PQsslStruct(PGconn *conn, const char *struct_name)
int pgtls_verify_peer_name_matches_certificate_guts(PGconn *conn, int *names_examined, char **first_name)
PostgresPollingStatusType pgtls_open_client(PGconn *conn)
bool pgtls_read_pending(PGconn *conn)
int PQdefaultSSLKeyPassHook_OpenSSL(char *buf, int size, PGconn *conn)
static int pgconn_bio_read(BIO *h, char *buf, int size)
static int openssl_verify_peer_name_matches_certificate_name(PGconn *conn, ASN1_STRING *name_entry, char **store_name)
ssize_t pgtls_read(PGconn *conn, void *ptr, size_t len)
static long pgconn_bio_ctrl(BIO *h, int cmd, long num, void *ptr)
static int pgconn_bio_write(BIO *h, const char *buf, int size)
ssize_t pgtls_write(PGconn *conn, const void *ptr, size_t len)
static PQsslKeyPassHook_OpenSSL_type PQsslKeyPassHook
char * pgtls_get_peer_certificate_hash(PGconn *conn, size_t *len)
const char * PQsslAttribute(PGconn *conn, const char *attribute_name)
static int initialize_SSL(PGconn *conn)
static pthread_mutex_t ssl_config_mutex
static int verify_cb(int ok, X509_STORE_CTX *ctx)
static int PQssl_passwd_cb(char *buf, int size, int rwflag, void *userdata)
static char * SSLerrmessage(unsigned long ecode)
static int openssl_verify_peer_name_matches_certificate_ip(PGconn *conn, ASN1_OCTET_STRING *addr_entry, char **store_name)
static PostgresPollingStatusType open_client_SSL(PGconn *conn)
static unsigned char alpn_protos[]
static int ssl_set_pgconn_bio(PGconn *conn)
void pgtls_close(PGconn *conn)
const char *const * PQsslAttributeNames(PGconn *conn)
void PQsetSSLKeyPassHook_OpenSSL(PQsslKeyPassHook_OpenSSL_type hook)
static BIO_METHOD * pgconn_bio_method(void)
static bool is_ip_address(const char *host)
ssize_t pqsecure_raw_read(PGconn *conn, void *ptr, size_t len)
ssize_t pqsecure_raw_write(PGconn *conn, const void *ptr, size_t len)
Assert(PointerIsAligned(start, uint64))
int(* PQsslKeyPassHook_OpenSSL_type)(char *buf, int size, PGconn *conn)
PostgresPollingStatusType
#define SOCK_ERRNO_SET(e)
#define PG_STRERROR_R_BUFLEN
int pg_strcasecmp(const char *s1, const char *s2)
int inet_aton(const char *cp, struct in_addr *addr)
char * pg_strerror(int errnum)
size_t strlcpy(char *dst, const char *src, size_t siz)
#define PG_ALPN_PROTOCOL_VECTOR
void appendPQExpBufferStr(PQExpBuffer str, const char *data)
static int fd(const char *x, int i)
int pthread_mutex_unlock(pthread_mutex_t *mp)
int pthread_mutex_lock(pthread_mutex_t *mp)
#define PTHREAD_MUTEX_INITIALIZER
static unsigned hash(unsigned *uv, int n)
char * ssl_max_protocol_version
char * ssl_min_protocol_version
PQExpBufferData errorMessage
bool ssl_handshake_started