mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 03:52:35 +01:00
66b9a9409c
Instead of encrypt(src, dst, key, iv) that encrypts all data in one go, now we have encrypt_init(key,iv), encrypt_update(src,dst), and encrypt_finish(dst). This also causes collateral changes in the internal my_crypt.cc encryption functions and in the encryption service. There are wrappers to provide the old all-at-once encryption functionality. But binlog events are often written piecewise, they'll need the new api.
91 lines
2.7 KiB
C
91 lines
2.7 KiB
C
/*
|
|
Copyright (c) 2014 Google Inc.
|
|
Copyright (c) 2014, 2015 MariaDB Corporation
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
|
|
|
|
#ifndef MY_CRYPT_INCLUDED
|
|
#define MY_CRYPT_INCLUDED
|
|
|
|
#include <my_global.h>
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
/* return values from my_aes_encrypt/my_aes_decrypt functions */
|
|
#define MY_AES_OK 0
|
|
#define MY_AES_BAD_DATA -100
|
|
#define MY_AES_OPENSSL_ERROR -101
|
|
#define MY_AES_BAD_KEYSIZE -102
|
|
|
|
/* The block size for all supported algorithms */
|
|
#define MY_AES_BLOCK_SIZE 16
|
|
|
|
/* The max key length of all supported algorithms */
|
|
#define MY_AES_MAX_KEY_LENGTH 32
|
|
|
|
#define MY_AES_CTX_SIZE 512
|
|
|
|
enum my_aes_mode {
|
|
MY_AES_ECB, MY_AES_CBC
|
|
#ifdef HAVE_EncryptAes128Ctr
|
|
, MY_AES_CTR
|
|
#endif
|
|
#ifdef HAVE_EncryptAes128Gcm
|
|
, MY_AES_GCM
|
|
#endif
|
|
};
|
|
|
|
int my_aes_crypt_init(void *ctx, enum my_aes_mode mode, int flags,
|
|
const unsigned char* key, unsigned int klen,
|
|
const unsigned char* iv, unsigned int ivlen);
|
|
int my_aes_crypt_update(void *ctx, const uchar *src, uint slen,
|
|
uchar *dst, uint *dlen);
|
|
int my_aes_crypt_finish(void *ctx, uchar *dst, uint *dlen);
|
|
int my_aes_crypt(enum my_aes_mode mode, int flags,
|
|
const uchar *src, uint slen, uchar *dst, uint *dlen,
|
|
const uchar *key, uint klen, const uchar *iv, uint ivlen);
|
|
|
|
/*
|
|
calculate the length of the cyphertext from the length of the plaintext
|
|
for different AES encryption modes with padding enabled.
|
|
Without padding (ENCRYPTION_FLAG_NOPAD) cyphertext has the same length
|
|
as the plaintext
|
|
*/
|
|
static inline uint my_aes_get_size(enum my_aes_mode mode __attribute__((unused)), uint source_length)
|
|
{
|
|
#ifdef HAVE_EncryptAes128Ctr
|
|
if (mode == MY_AES_CTR)
|
|
return source_length;
|
|
#ifdef HAVE_EncryptAes128Gcm
|
|
if (mode == MY_AES_GCM)
|
|
return source_length + MY_AES_BLOCK_SIZE;
|
|
#endif
|
|
#endif
|
|
return (source_length / MY_AES_BLOCK_SIZE + 1) * MY_AES_BLOCK_SIZE;
|
|
}
|
|
|
|
static inline uint my_aes_ctx_size(enum my_aes_mode mode __attribute__((unused)))
|
|
{
|
|
return MY_AES_CTX_SIZE;
|
|
}
|
|
|
|
int my_random_bytes(uchar* buf, int num);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif /* MY_CRYPT_INCLUDED */
|