2005-07-19 01:17:12 +08:00
|
|
|
pgcrypto - cryptographic functions for PostgreSQL
|
|
|
|
=================================================
|
2006-09-06 05:26:48 +08:00
|
|
|
Marko Kreen <markokr@gmail.com>
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
// Note: this document is in asciidoc format.
|
|
|
|
|
2001-01-24 11:46:16 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
1. Installation
|
|
|
|
-----------------
|
2001-01-24 11:46:16 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Run following commands:
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
make
|
|
|
|
make install
|
|
|
|
make installcheck
|
2001-09-23 12:12:44 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
The `make installcheck` command is important. It runs regression tests
|
|
|
|
for the module. They make sure the functions here produce correct
|
|
|
|
results.
|
2001-09-23 12:12:44 +08:00
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
Next, to put the functions into a particular database, run the commands in
|
|
|
|
file pgcrypto.sql, which has been installed into the shared files directory.
|
|
|
|
|
|
|
|
Example using psql:
|
|
|
|
|
|
|
|
psql -d DBNAME -f pgcrypto.sql
|
|
|
|
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
2. Notes
|
|
|
|
----------
|
2001-10-01 06:18:29 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
2.1. Configuration
|
|
|
|
~~~~~~~~~~~~~~~~~~~~
|
2001-10-01 06:18:29 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
pgcrypto configures itself according to the findings of main PostgreSQL
|
|
|
|
`configure` script. The options that affect it are `--with-zlib` and
|
|
|
|
`--with-openssl`.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2006-07-20 01:05:50 +08:00
|
|
|
When compiled with zlib, PGP encryption functions are able to
|
|
|
|
compress data before encrypting.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2006-07-20 01:05:50 +08:00
|
|
|
When compiled with OpenSSL there will be more algorithms available.
|
|
|
|
Also public-key encryption functions will be faster as OpenSSL
|
|
|
|
has more optimized BIGNUM functions.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2006-07-20 01:05:50 +08:00
|
|
|
Summary of functionality with and without OpenSSL:
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
`----------------------------`---------`------------
|
|
|
|
Functionality built-in OpenSSL
|
|
|
|
----------------------------------------------------
|
|
|
|
MD5 yes yes
|
|
|
|
SHA1 yes yes
|
2006-07-13 12:15:25 +08:00
|
|
|
SHA224/256/384/512 yes yes (3)
|
2005-07-19 01:17:12 +08:00
|
|
|
Any other digest algo no yes (1)
|
|
|
|
Blowfish yes yes
|
|
|
|
AES yes yes (2)
|
|
|
|
DES/3DES/CAST5 no yes
|
|
|
|
Raw encryption yes yes
|
|
|
|
PGP Symmetric encryption yes yes
|
2006-07-13 12:15:25 +08:00
|
|
|
PGP Public-Key encryption yes yes
|
2005-07-19 01:17:12 +08:00
|
|
|
----------------------------------------------------
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
1. Any digest algorithm OpenSSL supports is automatically picked up.
|
|
|
|
This is not possible with ciphers, which need to be supported
|
|
|
|
explicitly.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
2. AES is included in OpenSSL since version 0.9.7. If pgcrypto is
|
|
|
|
compiled against older version, it will use built-in AES code,
|
|
|
|
so it has AES always available.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
3. SHA2 algorithms were added to OpenSSL in version 0.9.8. For
|
|
|
|
older versions, pgcrypto will use built-in code.
|
|
|
|
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
2.2. NULL handling
|
|
|
|
~~~~~~~~~~~~~~~~~~~~
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
As standard in SQL, all functions return NULL, if any of the arguments
|
|
|
|
are NULL. This may create security risks on careless usage.
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2001-03-17 01:42:56 +08:00
|
|
|
|
2006-09-06 05:26:48 +08:00
|
|
|
2.3. Security
|
2005-07-19 01:17:12 +08:00
|
|
|
~~~~~~~~~~~~~~~
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
All the functions here run inside database server. That means that all
|
|
|
|
the data and passwords move between pgcrypto and client application in
|
|
|
|
clear-text. Thus you must:
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
1. Connect locally or use SSL connections.
|
|
|
|
2. Trust both system and database administrator.
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
If you cannot, then better do crypto inside client application.
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
3. General hashing
|
|
|
|
--------------------
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
3.1. digest(data, type)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
digest(data text, type text) RETURNS bytea
|
|
|
|
digest(data bytea, type text) RETURNS bytea
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Type is here the algorithm to use. Standard algorithms are `md5` and
|
|
|
|
`sha1`, although there may be more supported, depending on build
|
|
|
|
options.
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Returns binary hash.
|
Major pgcrypto changes:
of password-based encryption from RFC2440 (OpenPGP).
The goal of this code is to be more featureful encryption solution
than current encrypt(), which only functionality is running cipher
over data.
Compared to encrypt(), pgp_encrypt() does following:
* It uses the equvialent of random Inital Vector to get cipher
into random state before it processes user data
* Stores SHA-1 of the data into result so any modification
will be detected.
* Remembers if data was text or binary - thus it can decrypt
to/from text data. This was a major nuisance for encrypt().
* Stores info about used algorithms with result, so user needs
not remember them - more user friendly!
* Uses String2Key algorithms (similar to crypt()) with random salt
to generate full-length binary key to be used for encrypting.
* Uses standard format for data - you can feed it to GnuPG, if needed.
Optional features (off by default):
* Can use separate session key - user data will be encrypted
with totally random key, which will be encrypted with S2K
generated key and attached to result.
* Data compression with zlib.
* Can convert between CRLF<->LF line-endings - to get fully
RFC2440-compliant behaviour. This is off by default as
pgcrypto does not know the line-endings of user data.
Interface is simple:
pgp_encrypt(data text, key text) returns bytea
pgp_decrypt(data text, key text) returns text
pgp_encrypt_bytea(data bytea, key text) returns bytea
pgp_decrypt_bytea(data bytea, key text) returns bytea
To change parameters (cipher, compression, mdc):
pgp_encrypt(data text, key text, parms text) returns bytea
pgp_decrypt(data text, key text, parms text) returns text
pgp_encrypt_bytea(data bytea, key text, parms text) returns bytea
pgp_decrypt_bytea(data bytea, key text, parms text) returns bytea
Parameter names I lifted from gpg:
pgp_encrypt('message', 'key', 'compress-algo=1,cipher-algo=aes256')
For text data, pgp_encrypt simply encrypts the PostgreSQL internal data.
This maps to RFC2440 data type 't' - 'extenally specified encoding'.
But this may cause problems if data is dumped and reloaded into database
which as different internal encoding. My next goal is to implement data
type 'u' - which means data is in UTF-8 encoding by converting internal
encoding to UTF-8 and back. And there wont be any compatibility
problems with current code, I think its ok to submit this without UTF-8
encoding by converting internal encoding to UTF-8 and back. And there
wont be any compatibility problems with current code, I think its ok to
submit this without UTF-8 support.
Here is v4 of PGP encrypt. This depends on previously sent
Fortuna-patch, as it uses the px_add_entropy function.
- New function: pgp_key_id() for finding key id's.
- Add SHA1 of user data and key into RNG pools. We need to get
randomness from somewhere, and it is in user best interests
to contribute.
- Regenerate pgp-armor test for SQL_ASCII database.
- Cleanup the key handling so that the pubkey support is less
hackish.
Marko Kreen
2005-07-10 11:57:55 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
If you want hexadecimal string, use `encode()` on result. Example:
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
CREATE OR REPLACE FUNCTION sha1(bytea) RETURNS text AS $$
|
|
|
|
SELECT encode(digest($1, 'sha1'), 'hex')
|
|
|
|
$$ LANGUAGE SQL STRICT IMMUTABLE;
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
3.2. hmac(data, key, type)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
hmac(data text, key text, type text) RETURNS bytea
|
|
|
|
hmac(data bytea, key text, type text) RETURNS bytea
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Calculates Hashed MAC over data. `type` is the same as in `digest()`.
|
|
|
|
If the key is larger than hash block size it will first hashed and the
|
|
|
|
hash will be used as key.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
It is similar to digest() but the hash can be recalculated only knowing
|
|
|
|
the key. This avoids the scenario of someone altering data and also
|
|
|
|
changing the hash.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Returns binary hash.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
4. Password hashing
|
|
|
|
---------------------
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
The functions `crypt()` and `gen_salt()` are specifically designed
|
|
|
|
for hashing passwords. `crypt()` does the hashing and `gen_salt()`
|
|
|
|
prepares algorithm parameters for it.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
The algorithms in `crypt()` differ from usual hashing algorithms like
|
|
|
|
MD5 or SHA1 in following respects:
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
1. They are slow. As the amount of data is so small, this is only
|
|
|
|
way to make brute-forcing passwords hard.
|
|
|
|
2. Include random 'salt' with result, so that users having same
|
2005-11-03 10:54:07 +08:00
|
|
|
password would have different crypted passwords. This is also
|
2005-07-19 01:17:12 +08:00
|
|
|
additional defense against reversing the algorithm.
|
|
|
|
3. Include algorithm type in the result, so passwords hashed with
|
|
|
|
different algorithms can co-exist.
|
|
|
|
4. Some of them are adaptive - that means after computers get
|
|
|
|
faster, you can tune the algorithm to be slower, without
|
|
|
|
introducing incompatibility with existing passwords.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Supported algorithms:
|
|
|
|
`------`-------------`---------`----------`---------------------------
|
|
|
|
Type Max password Adaptive Salt bits Description
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
`bf` 72 yes 128 Blowfish-based, variant 2a
|
|
|
|
`md5` unlimited no 48 md5-based crypt()
|
|
|
|
`xdes` 8 yes 24 Extended DES
|
|
|
|
`des` 8 no 12 Original UNIX crypt
|
|
|
|
----------------------------------------------------------------------
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
4.1. crypt(password, salt)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
crypt(password text, salt text) RETURNS text
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Calculates UN*X crypt(3) style hash of password. When storing new
|
|
|
|
password, you need to use function `gen_salt()` to generate new salt.
|
|
|
|
When checking password you should use existing hash as salt.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Example - setting new password:
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
UPDATE .. SET pswhash = crypt('new password', gen_salt('md5'));
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Example - authentication:
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
SELECT pswhash = crypt('entered password', pswhash) WHERE .. ;
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
returns true or false whether the entered password is correct.
|
|
|
|
It also can return NULL if `pswhash` field is NULL.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
4.2. gen_salt(type)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
gen_salt(type text) RETURNS text
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
Generates a new random salt for usage in `crypt()`. For adaptible
|
|
|
|
algorithms, it uses the default iteration count.
|
|
|
|
|
|
|
|
Accepted types are: `des`, `xdes`, `md5` and `bf`.
|
|
|
|
|
|
|
|
|
|
|
|
4.3. gen_salt(type, rounds)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
gen_salt(type text, rounds integer) RETURNS text
|
|
|
|
|
|
|
|
Same as above, but lets user specify iteration count for some
|
|
|
|
algorithms. The higher the count, the more time it takes to hash
|
2005-11-03 10:54:07 +08:00
|
|
|
the password and therefore the more time to break it. Although with
|
2005-07-19 01:17:12 +08:00
|
|
|
too high count the time to calculate a hash may be several years
|
|
|
|
- which is somewhat impractical.
|
|
|
|
|
|
|
|
Number is algorithm specific:
|
|
|
|
|
|
|
|
`-----'---------'-----'----------
|
|
|
|
type default min max
|
|
|
|
---------------------------------
|
|
|
|
`xdes` 725 1 16777215
|
|
|
|
`bf` 6 4 31
|
|
|
|
---------------------------------
|
|
|
|
|
|
|
|
In case of xdes there is a additional limitation that the count must be
|
|
|
|
a odd number.
|
|
|
|
|
|
|
|
Notes:
|
|
|
|
|
|
|
|
- Original DES crypt was designed to have the speed of 4 hashes per
|
2005-11-03 10:54:07 +08:00
|
|
|
second on the hardware of that time.
|
|
|
|
- Slower than 4 hashes per second would probably dampen usability.
|
|
|
|
- Faster than 100 hashes per second is probably too fast.
|
2005-07-19 01:17:12 +08:00
|
|
|
- See next section about possible values for `crypt-bf`.
|
|
|
|
|
|
|
|
|
|
|
|
4.4. Comparison of crypt and regular hashes
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Here is a table that should give overview of relative slowness
|
|
|
|
of different hashing algorithms.
|
|
|
|
|
|
|
|
* The goal is to crack a 8-character password, which consists:
|
2005-11-03 10:54:07 +08:00
|
|
|
1. Only of lowercase letters
|
2005-07-19 01:17:12 +08:00
|
|
|
2. Numbers, lower- and uppercase letters.
|
|
|
|
* The table below shows how much time it would take to try all
|
|
|
|
combinations of characters.
|
|
|
|
* The `crypt-bf` is featured in several settings - the number
|
|
|
|
after slash is the `rounds` parameter of `gen_salt()`.
|
|
|
|
|
|
|
|
`------------'----------'--------------'--------------------
|
|
|
|
Algorithm Hashes/sec Chars: [a-z] Chars: [A-Za-z0-9]
|
|
|
|
------------------------------------------------------------
|
|
|
|
crypt-bf/8 28 246 years 251322 years
|
|
|
|
crypt-bf/7 57 121 years 123457 years
|
|
|
|
crypt-bf/6 112 62 years 62831 years
|
|
|
|
crypt-bf/5 211 33 years 33351 years
|
|
|
|
crypt-md5 2681 2.6 years 2625 years
|
|
|
|
crypt-des 362837 7 days 19 years
|
|
|
|
sha1 590223 4 days 12 years
|
|
|
|
md5 2345086 1 day 3 years
|
|
|
|
------------------------------------------------------------
|
|
|
|
|
|
|
|
* The machine used is 1.5GHz Pentium 4.
|
|
|
|
* crypt-des and crypt-md5 algorithm numbers are taken from
|
|
|
|
John the Ripper v1.6.38 `-test` output.
|
|
|
|
* MD5 numbers are from mdcrack 1.2.
|
|
|
|
* SHA1 numbers are from lcrack-20031130-beta.
|
|
|
|
* `crypt-bf` numbers are taken using simple program that loops
|
|
|
|
over 1000 8-character passwords. That way I can show the speed with
|
|
|
|
different number of rounds. For reference: `john -test` shows 213
|
|
|
|
loops/sec for crypt-bf/5. (The small difference in results is in
|
|
|
|
accordance to the fact that the `crypt-bf` implementation in pgcrypto
|
|
|
|
is same one that is used in John the Ripper.)
|
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
Note that "try all combinations" is not a realistic exercise.
|
2005-07-19 01:17:12 +08:00
|
|
|
Usually password cracking is done with the help of dictionaries, which
|
|
|
|
contain both regular words and various mutations of them. So, even
|
2005-11-03 10:54:07 +08:00
|
|
|
somewhat word-like passwords could be cracked much faster than the above
|
2005-07-19 01:17:12 +08:00
|
|
|
numbers suggest, and a 6-character non-word like password may escape
|
2005-11-03 10:54:07 +08:00
|
|
|
cracking. Or not.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5. PGP encryption
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
The functions here implement the encryption part of OpenPGP (RFC2440)
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
standard. Supported are both symmetric-key and public-key encryption.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5.1. Overview
|
|
|
|
~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Encrypted PGP message consists of 2 packets:
|
|
|
|
|
|
|
|
- Packet for session key - either symmetric- or public-key encrypted.
|
|
|
|
- Packet for session-key encrypted data.
|
|
|
|
|
|
|
|
When encrypting with password:
|
|
|
|
|
|
|
|
1. Given password is hashed using String2Key (S2K) algorithm. This
|
|
|
|
is rather similar to `crypt()` algorithm - purposefully slow
|
2005-11-03 10:54:07 +08:00
|
|
|
and with random salt - but it produces a full-length binary key.
|
2005-07-19 01:17:12 +08:00
|
|
|
2. If separate session key is requested, new random key will be
|
|
|
|
generated. Otherwise S2K key will be used directly as session key.
|
|
|
|
3. If S2K key is to be used directly, then only S2K settings will be put
|
|
|
|
into session key packet. Otherwise session key will be encrypted with
|
|
|
|
S2K key and put into session key packet.
|
|
|
|
|
|
|
|
When encrypting with public key:
|
|
|
|
|
|
|
|
1. New random session key is generated.
|
|
|
|
2. It is encrypted using public key and put into session key packet.
|
|
|
|
|
|
|
|
Now common part, the session-key encrypted data packet:
|
|
|
|
|
|
|
|
1. Optional data-manipulation: compression, conversion to UTF-8,
|
|
|
|
conversion of line-endings.
|
|
|
|
2. Data is prefixed with block of random bytes. This is equal
|
|
|
|
to using random IV.
|
|
|
|
3. A SHA1 hash of random prefix and data is appended.
|
|
|
|
4. All this is encrypted with session key.
|
|
|
|
|
|
|
|
|
|
|
|
5.2. pgp_sym_encrypt(data, psw)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
pgp_sym_encrypt(data text, psw text [, options text] ) RETURNS bytea
|
|
|
|
pgp_sym_encrypt_bytea(data bytea, psw text [, options text] ) RETURNS bytea
|
|
|
|
|
|
|
|
Return a symmetric-key encrypted PGP message.
|
|
|
|
|
2006-08-05 08:29:11 +08:00
|
|
|
Options are described in section 5.8.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5.3. pgp_sym_decrypt(msg, psw)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
pgp_sym_decrypt(msg bytea, psw text [, options text] ) RETURNS text
|
|
|
|
pgp_sym_decrypt_bytea(msg bytea, psw text [, options text] ) RETURNS bytea
|
|
|
|
|
|
|
|
Decrypt a symmetric-key encrypted PGP message.
|
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
Decrypting bytea data with `pgp_sym_decrypt` is disallowed.
|
|
|
|
This is to avoid outputting invalid character data. Decrypting
|
|
|
|
originally textual data with `pgp_sym_decrypt_bytea` is fine.
|
|
|
|
|
2006-08-05 08:29:11 +08:00
|
|
|
Options are described in section 5.8.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5.4. pgp_pub_encrypt(data, pub_key)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
pgp_pub_encrypt(data text, key bytea [, options text] ) RETURNS bytea
|
|
|
|
pgp_pub_encrypt_bytea(data bytea, key bytea [, options text] ) RETURNS bytea
|
|
|
|
|
|
|
|
Encrypt data with a public key. Giving this function a secret key will
|
|
|
|
produce a error.
|
|
|
|
|
2006-08-05 08:29:11 +08:00
|
|
|
Options are described in section 5.8.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5.5. pgp_pub_decrypt(msg, sec_key [, psw])
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
pgp_pub_decrypt(msg bytea, key bytea [, psw text [, options text]] ) \
|
|
|
|
RETURNS text
|
|
|
|
pgp_pub_decrypt_bytea(msg bytea, key bytea [,psw text [, options text]] ) \
|
|
|
|
RETURNS bytea
|
|
|
|
|
|
|
|
Decrypt a public-key encrypted message with secret key. If the secret
|
|
|
|
key is password-protected, you must give the password in `psw`. If
|
|
|
|
there is no password, but you want to specify option for function, you
|
|
|
|
need to give empty password.
|
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
Decrypting bytea data with `pgp_pub_decrypt` is disallowed.
|
|
|
|
This is to avoid outputting invalid character data. Decrypting
|
|
|
|
originally textual data with `pgp_pub_decrypt_bytea` is fine.
|
|
|
|
|
2006-08-05 08:29:11 +08:00
|
|
|
Options are described in section 5.8.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
5.6. pgp_key_id(key / msg)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
pgp_key_id(key or msg bytea) RETURNS text
|
|
|
|
|
|
|
|
It shows you either key ID if given PGP public or secret key. Or it
|
2005-11-03 10:54:07 +08:00
|
|
|
gives the key ID that was used for encrypting the data, if given
|
2005-07-19 01:17:12 +08:00
|
|
|
encrypted message.
|
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
It can return 2 special key IDs:
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
SYMKEY::
|
|
|
|
The data is encrypted with symmetric key.
|
|
|
|
|
|
|
|
ANYKEY::
|
|
|
|
The data is public-key encrypted, but the key ID is cleared.
|
|
|
|
That means you need to try all your secret keys on it to see
|
|
|
|
which one decrypts it. pgcrypto itself does not produce such
|
|
|
|
messages.
|
|
|
|
|
|
|
|
Note that different keys may have same ID. This is rare but normal
|
|
|
|
event. Client application should then try to decrypt with each one,
|
|
|
|
to see which fits - like handling ANYKEY.
|
|
|
|
|
|
|
|
|
|
|
|
5.7. armor / dearmor
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
armor(data bytea) RETURNS text
|
|
|
|
dearmor(data text) RETURNS bytea
|
|
|
|
|
|
|
|
Those wrap/unwrap data into PGP Ascii Armor which is basically Base64
|
|
|
|
with CRC and additional formatting.
|
|
|
|
|
|
|
|
|
|
|
|
5.8. Options for PGP functions
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
Options are named to be similar to GnuPG. Values should be given after
|
|
|
|
an equal sign; separate options from each other with commas. Example:
|
2005-07-19 01:17:12 +08:00
|
|
|
|
2006-07-20 01:05:50 +08:00
|
|
|
pgp_sym_encrypt(data, psw, 'compress-algo=1, cipher-algo=aes256')
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
All of the options except `convert-crlf` apply only to encrypt
|
|
|
|
functions. Decrypt functions get the parameters from PGP data.
|
|
|
|
|
|
|
|
Most interesting options are probably `compression-algo` and
|
|
|
|
`unicode-mode`. The rest should have reasonable defaults.
|
|
|
|
|
|
|
|
|
|
|
|
cipher-algo::
|
|
|
|
What cipher algorithm to use.
|
|
|
|
|
|
|
|
Values: bf, aes128, aes192, aes256 (OpenSSL-only: `3des`, `cast5`)
|
|
|
|
Default: aes128
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt
|
|
|
|
|
|
|
|
compress-algo::
|
|
|
|
Which compression algorithm to use. Needs building with zlib.
|
|
|
|
|
|
|
|
Values:
|
|
|
|
0 - no compression
|
|
|
|
1 - ZIP compression
|
|
|
|
2 - ZLIB compression [=ZIP plus meta-data and block-CRC's]
|
|
|
|
Default: 0
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt
|
|
|
|
|
|
|
|
compress-level::
|
|
|
|
How much to compress. Bigger level compresses smaller but is slower.
|
|
|
|
0 disables compression.
|
|
|
|
|
|
|
|
Values: 0, 1-9
|
|
|
|
Default: 6
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt
|
|
|
|
|
|
|
|
convert-crlf::
|
|
|
|
Whether to convert `\n` into `\r\n` when encrypting and `\r\n` to `\n`
|
|
|
|
when decrypting. RFC2440 specifies that text data should be stored
|
|
|
|
using `\r\n` line-feeds. Use this to get fully RFC-compliant
|
|
|
|
behavior.
|
|
|
|
|
|
|
|
Values: 0, 1
|
|
|
|
Default: 0
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt, pgp_sym_decrypt, pgp_pub_decrypt
|
|
|
|
|
|
|
|
disable-mdc::
|
2005-11-03 10:54:07 +08:00
|
|
|
Do not protect data with SHA-1. Only good reason to use this
|
2005-07-19 01:17:12 +08:00
|
|
|
option is to achieve compatibility with ancient PGP products, as the
|
|
|
|
SHA-1 protected packet is from upcoming update to RFC2440. (Currently
|
|
|
|
at version RFC2440bis-14.) Recent gnupg.org and pgp.com software
|
|
|
|
supports it fine.
|
|
|
|
|
|
|
|
Values: 0, 1
|
|
|
|
Default: 0
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt
|
|
|
|
|
|
|
|
enable-session-key::
|
|
|
|
Use separate session key. Public-key encryption always uses separate
|
|
|
|
session key, this is for symmetric-key encryption, which by default
|
|
|
|
uses S2K directly.
|
|
|
|
|
|
|
|
Values: 0, 1
|
|
|
|
Default: 0
|
|
|
|
Applies: pgp_sym_encrypt
|
|
|
|
|
|
|
|
s2k-mode::
|
|
|
|
Which S2K algorithm to use.
|
|
|
|
|
|
|
|
Values:
|
2005-11-03 10:54:07 +08:00
|
|
|
0 - Without salt. Dangerous!
|
2005-07-19 01:17:12 +08:00
|
|
|
1 - With salt but with fixed iteration count.
|
|
|
|
3 - Variable iteration count.
|
|
|
|
Default: 3
|
|
|
|
Applies: pgp_sym_encrypt
|
|
|
|
|
|
|
|
s2k-digest-algo::
|
|
|
|
Which digest algorithm to use in S2K calculation.
|
|
|
|
|
|
|
|
Values: md5, sha1
|
|
|
|
Default: sha1
|
|
|
|
Applies: pgp_sym_encrypt
|
|
|
|
|
|
|
|
s2k-cipher-algo::
|
|
|
|
Which cipher to use for encrypting separate session key.
|
|
|
|
|
|
|
|
Values: bf, aes, aes128, aes192, aes256
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
Default: use cipher-algo.
|
2005-07-19 01:17:12 +08:00
|
|
|
Applies: pgp_sym_encrypt
|
|
|
|
|
|
|
|
unicode-mode::
|
|
|
|
Whether to convert textual data from database internal encoding to
|
|
|
|
UTF-8 and back. If your database already is UTF-8, no conversion will
|
|
|
|
be done, only the data will be tagged as UTF-8. Without this option
|
|
|
|
it will not be.
|
|
|
|
|
|
|
|
Values: 0, 1
|
|
|
|
Default: 0
|
|
|
|
Applies: pgp_sym_encrypt, pgp_pub_encrypt
|
|
|
|
|
|
|
|
|
|
|
|
5.9. Generating keys with GnuPG
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Generate a new key:
|
|
|
|
|
|
|
|
gpg --gen-key
|
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
The preferred key type is "DSA and Elgamal".
|
|
|
|
|
|
|
|
For RSA encryption you must create either DSA or RSA sign-only key
|
|
|
|
as master and then add RSA encryption subkey with `gpg --edit-key`.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
List keys:
|
|
|
|
|
|
|
|
gpg --list-secret-keys
|
|
|
|
|
|
|
|
Export ascii-armored public key:
|
|
|
|
|
|
|
|
gpg -a --export KEYID > public.key
|
|
|
|
|
|
|
|
Export ascii-armored secret key:
|
|
|
|
|
|
|
|
gpg -a --export-secret-keys KEYID > secret.key
|
|
|
|
|
2005-11-03 10:54:07 +08:00
|
|
|
You need to use `dearmor()` on them before giving them to
|
2005-07-19 01:17:12 +08:00
|
|
|
pgp_pub_* functions. Or if you can handle binary data, you can drop
|
|
|
|
"-a" from gpg.
|
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
For more details see `man gpg`, http://www.gnupg.org/gph/en/manual.html[
|
|
|
|
The GNU Privacy Handbook] and other docs on http://www.gnupg.org[] site.
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
5.10. Limitations of PGP code
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
- No support for signing. That also means that it is not checked
|
|
|
|
whether the encryption subkey belongs to master key.
|
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
- No support for encryption key as master key. As such practice
|
|
|
|
is generally discouraged, it should not be a problem.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
- No support for several subkeys. This may seem like a problem, as this
|
|
|
|
is common practice. On the other hand, you should not use your regular
|
|
|
|
GPG/PGP keys with pgcrypto, but create new ones, as the usage scenario
|
|
|
|
is rather different.
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
|
|
|
|
6. Raw encryption
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
Those functions only run a cipher over data, they don't have any advanced
|
2006-07-20 01:05:50 +08:00
|
|
|
features of PGP encryption. Therefore they have some major problems:
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
1. They use user key directly as cipher key.
|
|
|
|
2. They don't provide any integrity checking, to see
|
|
|
|
if the encrypted data was modified.
|
|
|
|
3. They expect that users manage all encryption parameters
|
|
|
|
themselves, even IV.
|
|
|
|
4. They don't handle text.
|
|
|
|
|
|
|
|
So, with the introduction of PGP encryption, usage of raw
|
|
|
|
encryption functions is discouraged.
|
|
|
|
|
|
|
|
|
|
|
|
encrypt(data bytea, key bytea, type text) RETURNS bytea
|
|
|
|
decrypt(data bytea, key bytea, type text) RETURNS bytea
|
|
|
|
|
|
|
|
encrypt_iv(data bytea, key bytea, iv bytea, type text) RETURNS bytea
|
|
|
|
decrypt_iv(data bytea, key bytea, iv bytea, type text) RETURNS bytea
|
|
|
|
|
|
|
|
Encrypt/decrypt data with cipher, padding data if needed.
|
|
|
|
|
|
|
|
`type` parameter description in pseudo-noteup:
|
|
|
|
|
|
|
|
algo ['-' mode] ['/pad:' padding]
|
|
|
|
|
|
|
|
Supported algorithms:
|
|
|
|
|
|
|
|
* `bf` - Blowfish
|
|
|
|
* `aes` - AES (Rijndael-128)
|
|
|
|
|
|
|
|
Modes:
|
|
|
|
|
|
|
|
* `cbc` - next block depends on previous. (default)
|
2005-11-03 10:54:07 +08:00
|
|
|
* `ecb` - each block is encrypted separately.
|
2005-07-19 01:17:12 +08:00
|
|
|
(for testing only)
|
|
|
|
|
|
|
|
Padding:
|
|
|
|
|
|
|
|
* `pkcs` - data may be any length (default)
|
|
|
|
* `none` - data must be multiple of cipher block size.
|
|
|
|
|
|
|
|
IV is initial value for mode, defaults to all zeroes. It is ignored for
|
|
|
|
ECB. It is clipped or padded with zeroes if not exactly block size.
|
|
|
|
|
|
|
|
So, example:
|
|
|
|
|
|
|
|
encrypt(data, 'fooz', 'bf')
|
|
|
|
|
|
|
|
is equal to
|
|
|
|
|
|
|
|
encrypt(data, 'fooz', 'bf-cbc/pad:pkcs')
|
|
|
|
|
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
7. Random bytes
|
|
|
|
-----------------
|
|
|
|
|
|
|
|
gen_random_bytes(count integer)
|
|
|
|
|
|
|
|
Returns `count` cryptographically strong random bytes as bytea value.
|
|
|
|
There can be maximally 1024 bytes extracted at a time. This is to avoid
|
|
|
|
draining the randomness generator pool.
|
|
|
|
|
|
|
|
|
|
|
|
8. Credits
|
2005-07-19 01:17:12 +08:00
|
|
|
------------
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
I have used code from following sources:
|
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
`--------------------`-------------------------`-------------------------------
|
2005-07-19 01:17:12 +08:00
|
|
|
Algorithm Author Source origin
|
2006-07-13 12:15:25 +08:00
|
|
|
-------------------------------------------------------------------------------
|
2005-07-19 01:17:12 +08:00
|
|
|
DES crypt() David Burren and others FreeBSD libcrypt
|
|
|
|
MD5 crypt() Poul-Henning Kamp FreeBSD libcrypt
|
|
|
|
Blowfish crypt() Solar Designer www.openwall.com
|
|
|
|
Blowfish cipher Niels Provos OpenBSD sys/crypto
|
|
|
|
Rijndael cipher Brian Gladman OpenBSD sys/crypto
|
|
|
|
MD5 and SHA1 WIDE Project KAME kame/sys/crypto
|
|
|
|
SHA256/384/512 Aaron D. Gifford OpenBSD sys/crypto
|
2006-07-13 12:15:25 +08:00
|
|
|
BIGNUM math Michael J. Fromberger dartmouth.edu/~sting/sw/imath
|
|
|
|
-------------------------------------------------------------------------------
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
9. Legalese
|
2005-07-19 01:17:12 +08:00
|
|
|
-------------
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
* I owe a beer to Poul-Henning.
|
/contrib/pgcrypto:
* remove support for encode() as it is in main tree now
* remove krb5.c
* new 'PX library' architecture
* remove BSD license from my code to let the general
PostgreSQL one to apply
* md5, sha1: ANSIfy, use const where appropriate
* various other formatting and clarity changes
* hmac()
* UN*X-like crypt() - system or internal crypt
* Internal crypt: DES, Extended DES, MD5, Blowfish
crypt-des.c, crypt-md5.c from FreeBSD
crypt-blowfish.c from Solar Designer
* gen_salt() for crypt() - Blowfish, MD5, DES, Extended DES
* encrypt(), decrypt(), encrypt_iv(), decrypt_iv()
* Cipher support in mhash.c, openssl.c
* internal: Blowfish, Rijndael-128 ciphers
* blf.[ch], rijndael.[ch] from OpenBSD
* there will be generated file rijndael-tbl.inc.
Marko Kreen
2001-08-21 08:42:41 +08:00
|
|
|
* This product includes software developed by Niels Provos.
|
2001-03-17 01:42:56 +08:00
|
|
|
|
2000-10-31 21:11:28 +08:00
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
10. References/Links
|
|
|
|
----------------------
|
2005-07-19 01:17:12 +08:00
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
10.1. Useful reading
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
2005-07-19 01:17:12 +08:00
|
|
|
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
http://www.gnupg.org/gph/en/manual.html[]::
|
|
|
|
The GNU Privacy Handbook
|
|
|
|
|
2005-07-19 01:17:12 +08:00
|
|
|
http://www.openwall.com/crypt/[]::
|
|
|
|
Describes the crypt-blowfish algorithm.
|
|
|
|
|
|
|
|
http://www.stack.nl/~galactus/remailers/passphrase-faq.html[]::
|
|
|
|
How to choose good password.
|
|
|
|
|
|
|
|
http://world.std.com/~reinhold/diceware.html[]::
|
|
|
|
Interesting idea for picking passwords.
|
|
|
|
|
|
|
|
http://www.interhack.net/people/cmcurtin/snake-oil-faq.html[]::
|
|
|
|
Describes good and bad cryptography.
|
|
|
|
|
|
|
|
|
2006-07-13 12:15:25 +08:00
|
|
|
10.2. Technical references
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
2005-07-19 01:17:12 +08:00
|
|
|
|
|
|
|
http://www.ietf.org/rfc/rfc2440.txt[]::
|
|
|
|
OpenPGP message format
|
|
|
|
|
|
|
|
http://www.imc.org/draft-ietf-openpgp-rfc2440bis[]::
|
|
|
|
New version of RFC2440.
|
|
|
|
|
|
|
|
http://www.ietf.org/rfc/rfc1321.txt[]::
|
|
|
|
The MD5 Message-Digest Algorithm
|
|
|
|
|
|
|
|
http://www.ietf.org/rfc/rfc2104.txt[]::
|
|
|
|
HMAC: Keyed-Hashing for Message Authentication
|
|
|
|
|
|
|
|
http://www.usenix.org/events/usenix99/provos.html[]::
|
|
|
|
Comparison of crypt-des, crypt-md5 and bcrypt algorithms.
|
|
|
|
|
|
|
|
http://csrc.nist.gov/cryptval/des.htm[]::
|
|
|
|
Standards for DES, 3DES and AES.
|
|
|
|
|
|
|
|
http://en.wikipedia.org/wiki/Fortuna_(PRNG)[]::
|
|
|
|
Description of Fortuna CSPRNG.
|
|
|
|
|
|
|
|
http://jlcooke.ca/random/[]::
|
|
|
|
Jean-Luc Cooke Fortuna-based /dev/random driver for Linux.
|
|
|
|
|
|
|
|
http://www.cs.ut.ee/~helger/crypto/[]::
|
|
|
|
Collection of cryptology pointers.
|
The large one adds support for RSA keys and reorganizes
the pubkey functions a bit. The actual RSA-specific code
there is tiny, most of the patch consists of reorg of the
pubkey code, as lots of it was written as elgamal-only.
---------------------------------------------------------------------------
The SHLIB section was copy-pasted from somewhere and contains
several unnecessary libs. This cleans it up a bit.
-lcrypt
we don't use system crypt()
-lssl, -lssleay32
no SSL here
-lz in win32 section
already added on previous line
-ldes
The chance anybody has it is pretty low.
And the chance pgcrypto works with it is even lower.
Also trim the win32 section.
---------------------------------------------------------------------------
It is already disabled in Makefile, remove code too.
---------------------------------------------------------------------------
I was bit hasty making the random exponent 'k' a prime. Further researh
shows that Elgamal encryption has no specific needs in respect to k,
any random number is fine.
It is bit different for signing, there it needs to be 'relatively prime'
to p - 1, that means GCD(k, p-1) == 1, which is also a lot lighter than
full primality. As we don't do signing, this can be ignored.
This brings major speedup to Elgamal encryption.
---------------------------------------------------------------------------
o pgp_mpi_free: Accept NULLs
o pgp_mpi_cksum: result should be 16bit
o Remove function name from error messages - to be similar to other
SQL functions, and it does not match anyway the called function
o remove couple junk lines
---------------------------------------------------------------------------
o Support for RSA encryption
o Big reorg to better separate generic and algorithm-specific code.
o Regression tests for RSA.
---------------------------------------------------------------------------
o Tom stuck a CVS id into file. I doubt the usefulness of it,
but if it needs to be in the file then rather at the end.
Also tag it as comment for asciidoc.
o Mention bytea vs. text difference
o Couple clarifications
---------------------------------------------------------------------------
There is a choice whether to update it with pgp functions or
remove it. I decided to remove it, updating is pointless.
I've tried to keep the core of pgcrypto relatively independent
from main PostgreSQL, to make it easy to use externally if needed,
and that is good. Eg. that made development of PGP functions much
nicer.
But I have no plans to release it as generic library, so keeping such
doc
up-to-date is waste of time. If anyone is interested in using it in
other products, he can probably bother to read the source too.
Commented source is another thing - I'll try to make another pass
over code to see if there is anything non-obvious that would need
more comments.
---------------------------------------------------------------------------
Marko Kreen
2005-08-13 10:06:21 +08:00
|
|
|
|
|
|
|
|
2006-09-06 05:26:48 +08:00
|
|
|
// $PostgreSQL: pgsql/contrib/pgcrypto/README.pgcrypto,v 1.18 2006/09/05 21:26:48 tgl Exp $
|