mirror of
				https://github.com/MariaDB/server.git
				synced 2025-11-04 12:56:14 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			207 lines
		
	
	
	
		
			5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			207 lines
		
	
	
	
		
			5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
/* Copyright (c) 2002, 2012, eperi GmbH.
 | 
						|
 | 
						|
 This program is free software; you can redistribute it and/or modify
 | 
						|
 it under the terms of the GNU General Public License as published by
 | 
						|
 the Free Software Foundation; version 2 of the License.
 | 
						|
 | 
						|
 This program is distributed in the hope that it will be useful,
 | 
						|
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
 GNU General Public License for more details.
 | 
						|
 | 
						|
 You should have received a copy of the GNU General Public License
 | 
						|
 along with this program; if not, write to the Free Software
 | 
						|
 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1335  USA */
 | 
						|
 | 
						|
#include <my_global.h>
 | 
						|
#include <typelib.h>
 | 
						|
#include "parser.h"
 | 
						|
#include <mysql/plugin_encryption.h>
 | 
						|
#include <string.h>
 | 
						|
 | 
						|
static char* filename;
 | 
						|
static char* filekey;
 | 
						|
static unsigned long encryption_algorithm;
 | 
						|
 | 
						|
static const char *encryption_algorithm_names[]=
 | 
						|
{
 | 
						|
  "aes_cbc",
 | 
						|
#ifdef HAVE_EncryptAes128Ctr
 | 
						|
  "aes_ctr",
 | 
						|
#endif
 | 
						|
  0
 | 
						|
};
 | 
						|
 | 
						|
static TYPELIB encryption_algorithm_typelib=
 | 
						|
{
 | 
						|
  array_elements(encryption_algorithm_names)-1,"",
 | 
						|
  encryption_algorithm_names, NULL
 | 
						|
};
 | 
						|
 | 
						|
 | 
						|
static MYSQL_SYSVAR_STR(filename, filename,
 | 
						|
  PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
 | 
						|
  "Path and name of the key file.",
 | 
						|
  NULL, NULL, "");
 | 
						|
 | 
						|
static MYSQL_SYSVAR_STR(filekey, filekey,
 | 
						|
  PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
 | 
						|
  "Key to encrypt / decrypt the keyfile.",
 | 
						|
  NULL, NULL, "");
 | 
						|
 | 
						|
#ifdef HAVE_EncryptAes128Ctr
 | 
						|
#define recommendation  ", aes_ctr is the recommended one"
 | 
						|
#else
 | 
						|
#define recommendation  ""
 | 
						|
#endif
 | 
						|
static MYSQL_SYSVAR_ENUM(encryption_algorithm, encryption_algorithm,
 | 
						|
  PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
 | 
						|
  "Encryption algorithm to use" recommendation ".",
 | 
						|
  NULL, NULL, 0, &encryption_algorithm_typelib);
 | 
						|
 | 
						|
static struct st_mysql_sys_var* settings[] = {
 | 
						|
  MYSQL_SYSVAR(filename),
 | 
						|
  MYSQL_SYSVAR(filekey),
 | 
						|
  MYSQL_SYSVAR(encryption_algorithm),
 | 
						|
  NULL
 | 
						|
};
 | 
						|
 | 
						|
std::map<unsigned int,keyentry> keys;
 | 
						|
 | 
						|
static keyentry *get_key(unsigned int key_id)
 | 
						|
{
 | 
						|
  keyentry &key= keys[key_id];
 | 
						|
  if (key.id == 0)
 | 
						|
    return 0;
 | 
						|
  return &key;
 | 
						|
}
 | 
						|
 | 
						|
/* the version is always the same, no automatic key rotation */
 | 
						|
static unsigned int get_latest_version(uint key_id)
 | 
						|
{
 | 
						|
  return  get_key(key_id) ? 1 : ENCRYPTION_KEY_VERSION_INVALID;
 | 
						|
}
 | 
						|
 | 
						|
static unsigned int get_key_from_key_file(unsigned int key_id,
 | 
						|
       unsigned int key_version, unsigned char* dstbuf, unsigned *buflen)
 | 
						|
{
 | 
						|
  if (key_version != 1)
 | 
						|
    return ENCRYPTION_KEY_VERSION_INVALID;
 | 
						|
 | 
						|
  keyentry* entry = get_key(key_id);
 | 
						|
 | 
						|
  if (entry == NULL)
 | 
						|
    return ENCRYPTION_KEY_VERSION_INVALID;
 | 
						|
 | 
						|
  if (*buflen < entry->length)
 | 
						|
  {
 | 
						|
    *buflen= entry->length;
 | 
						|
    return ENCRYPTION_KEY_BUFFER_TOO_SMALL;
 | 
						|
  }
 | 
						|
 | 
						|
  *buflen= entry->length;
 | 
						|
  if (dstbuf)
 | 
						|
    memcpy(dstbuf, entry->key, entry->length);
 | 
						|
 | 
						|
  return 0;
 | 
						|
}
 | 
						|
 | 
						|
// let's simplify the condition below
 | 
						|
#ifndef HAVE_EncryptAes128Gcm
 | 
						|
#define MY_AES_GCM MY_AES_CTR
 | 
						|
#ifndef HAVE_EncryptAes128Ctr
 | 
						|
#define MY_AES_CTR MY_AES_CBC
 | 
						|
#endif
 | 
						|
#endif
 | 
						|
 | 
						|
static inline enum my_aes_mode mode(int flags)
 | 
						|
{
 | 
						|
  /*
 | 
						|
    If encryption_algorithm is AES_CTR then
 | 
						|
      if no-padding, use AES_CTR
 | 
						|
      else use AES_GCM (like CTR but appends a "checksum" block)
 | 
						|
    else
 | 
						|
      use AES_CBC
 | 
						|
  */
 | 
						|
  if (encryption_algorithm)
 | 
						|
    if (flags & ENCRYPTION_FLAG_NOPAD)
 | 
						|
      return MY_AES_CTR;
 | 
						|
    else
 | 
						|
      return MY_AES_GCM;
 | 
						|
  else
 | 
						|
    return MY_AES_CBC;
 | 
						|
}
 | 
						|
 | 
						|
static int ctx_init(void *ctx, const unsigned char* key, unsigned int klen,
 | 
						|
                    const unsigned char* iv, unsigned int ivlen, int flags,
 | 
						|
                    unsigned int key_id, unsigned int key_version)
 | 
						|
{
 | 
						|
  return my_aes_crypt_init(ctx, mode(flags), flags, key, klen, iv, ivlen);
 | 
						|
}
 | 
						|
 | 
						|
static int ctx_update(void *ctx, const unsigned char *src, unsigned int slen,
 | 
						|
  unsigned char *dst, unsigned int *dlen)
 | 
						|
{
 | 
						|
  return my_aes_crypt_update(ctx, src, slen, dst, dlen);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static int ctx_finish(void *ctx, unsigned char *dst, unsigned int *dlen)
 | 
						|
{
 | 
						|
  return my_aes_crypt_finish(ctx, dst, dlen);
 | 
						|
}
 | 
						|
 | 
						|
static unsigned int get_length(unsigned int slen, unsigned int key_id,
 | 
						|
                               unsigned int key_version)
 | 
						|
{
 | 
						|
  return my_aes_get_size(mode(0), slen);
 | 
						|
}
 | 
						|
 | 
						|
static uint ctx_size(uint, uint)
 | 
						|
{
 | 
						|
  return my_aes_ctx_size(mode(0));
 | 
						|
}
 | 
						|
 | 
						|
struct st_mariadb_encryption file_key_management_plugin= {
 | 
						|
  MariaDB_ENCRYPTION_INTERFACE_VERSION,
 | 
						|
  get_latest_version,
 | 
						|
  get_key_from_key_file,
 | 
						|
  ctx_size,
 | 
						|
  ctx_init,
 | 
						|
  ctx_update,
 | 
						|
  ctx_finish,
 | 
						|
  get_length
 | 
						|
};
 | 
						|
 | 
						|
static int file_key_management_plugin_init(void *p)
 | 
						|
{
 | 
						|
  Parser parser(filename, filekey);
 | 
						|
  return parser.parse(&keys);
 | 
						|
}
 | 
						|
 | 
						|
static int file_key_management_plugin_deinit(void *p)
 | 
						|
{
 | 
						|
  keys.clear();
 | 
						|
  return 0;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
  Plugin library descriptor
 | 
						|
*/
 | 
						|
maria_declare_plugin(file_key_management)
 | 
						|
{
 | 
						|
  MariaDB_ENCRYPTION_PLUGIN,
 | 
						|
  &file_key_management_plugin,
 | 
						|
  "file_key_management",
 | 
						|
  "Denis Endro eperi GmbH",
 | 
						|
  "File-based key management plugin",
 | 
						|
  PLUGIN_LICENSE_GPL,
 | 
						|
  file_key_management_plugin_init,
 | 
						|
  file_key_management_plugin_deinit,
 | 
						|
  0x0100 /* 1.0 */,
 | 
						|
  NULL,	/* status variables */
 | 
						|
  settings,
 | 
						|
  "1.0",
 | 
						|
  MariaDB_PLUGIN_MATURITY_STABLE
 | 
						|
}
 | 
						|
maria_declare_plugin_end;
 |