summaryrefslogtreecommitdiff
path: root/src/include/libpq/crypt.h
diff options
context:
space:
mode:
authorNathan Bossart <nathan@postgresql.org>2024-10-07 10:56:16 -0500
committerNathan Bossart <nathan@postgresql.org>2024-10-07 10:56:16 -0500
commit8275325a06ed91c053e046422a193dc6d56a70c5 (patch)
treea93c19d78485bb1202206b6925f28e81f01f4496 /src/include/libpq/crypt.h
parent022564f60ca5cade8fd663906f3ee514573b4b5e (diff)
Restrict password hash length.
Commit 6aa44060a3 removed pg_authid's TOAST table because the only varlena column is rolpassword, which cannot be de-TOASTed during authentication because we haven't selected a database yet and cannot read pg_class. Since that change, attempts to set password hashes that require out-of-line storage will fail with a "row is too big" error. This error message might be confusing to users. This commit places a limit on the length of password hashes so that attempts to set long password hashes will fail with a more user-friendly error. The chosen limit of 512 bytes should be sufficient to avoid "row is too big" errors independent of BLCKSZ, but it should also be lenient enough for all reasonable use-cases (or at least all the use-cases we could imagine). Reviewed-by: Tom Lane, Jonathan Katz, Michael Paquier, Jacob Champion Discussion: https://postgr.es/m/89e8649c-eb74-db25-7945-6d6b23992394%40gmail.com
Diffstat (limited to 'src/include/libpq/crypt.h')
-rw-r--r--src/include/libpq/crypt.h10
1 files changed, 10 insertions, 0 deletions
diff --git a/src/include/libpq/crypt.h b/src/include/libpq/crypt.h
index f744de4d202..0bb44004353 100644
--- a/src/include/libpq/crypt.h
+++ b/src/include/libpq/crypt.h
@@ -16,6 +16,16 @@
#include "datatype/timestamp.h"
/*
+ * Valid password hashes may be very long, but we don't want to store anything
+ * that might need out-of-line storage, since de-TOASTing won't work during
+ * authentication because we haven't selected a database yet and cannot read
+ * pg_class. 512 bytes should be more than enough for all practical use, and
+ * our own password encryption routines should never produce hashes longer than
+ * this.
+ */
+#define MAX_ENCRYPTED_PASSWORD_LEN (512)
+
+/*
* Types of password hashes or secrets.
*
* Plaintext passwords can be passed in by the user, in a CREATE/ALTER USER