1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
|
/* Copyright (c) 2002, 2012, eperi GmbH.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1335 USA */
#include <my_global.h>
#include <typelib.h>
#include "parser.h"
#include <mysql/plugin_encryption.h>
#include <string.h>
static char* filename;
static char* filekey;
static unsigned long encryption_algorithm;
static const char *encryption_algorithm_names[]=
{
"aes_cbc",
#ifdef HAVE_EncryptAes128Ctr
"aes_ctr",
#endif
0
};
static TYPELIB encryption_algorithm_typelib=
{
array_elements(encryption_algorithm_names)-1,"",
encryption_algorithm_names, NULL
};
static MYSQL_SYSVAR_STR(filename, filename,
PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
"Path and name of the key file.",
NULL, NULL, "");
static MYSQL_SYSVAR_STR(filekey, filekey,
PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
"Key to encrypt / decrypt the keyfile.",
NULL, NULL, "");
#ifdef HAVE_EncryptAes128Ctr
#define recommendation ", aes_ctr is the recommended one"
#else
#define recommendation ""
#endif
static MYSQL_SYSVAR_ENUM(encryption_algorithm, encryption_algorithm,
PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY,
"Encryption algorithm to use" recommendation ".",
NULL, NULL, 0, &encryption_algorithm_typelib);
static struct st_mysql_sys_var* settings[] = {
MYSQL_SYSVAR(filename),
MYSQL_SYSVAR(filekey),
MYSQL_SYSVAR(encryption_algorithm),
NULL
};
std::map<unsigned int,keyentry> keys;
static keyentry *get_key(unsigned int key_id)
{
keyentry &key= keys[key_id];
if (key.id == 0)
return 0;
return &key;
}
/* the version is always the same, no automatic key rotation */
static unsigned int get_latest_version(uint key_id)
{
return get_key(key_id) ? 1 : ENCRYPTION_KEY_VERSION_INVALID;
}
static unsigned int get_key_from_key_file(unsigned int key_id,
unsigned int key_version, unsigned char* dstbuf, unsigned *buflen)
{
if (key_version != 1)
return ENCRYPTION_KEY_VERSION_INVALID;
keyentry* entry = get_key(key_id);
if (entry == NULL)
return ENCRYPTION_KEY_VERSION_INVALID;
if (*buflen < entry->length)
{
*buflen= entry->length;
return ENCRYPTION_KEY_BUFFER_TOO_SMALL;
}
*buflen= entry->length;
if (dstbuf)
memcpy(dstbuf, entry->key, entry->length);
return 0;
}
// let's simplify the condition below
#ifndef HAVE_EncryptAes128Gcm
#define MY_AES_GCM MY_AES_CTR
#ifndef HAVE_EncryptAes128Ctr
#define MY_AES_CTR MY_AES_CBC
#endif
#endif
static inline enum my_aes_mode mode(int flags)
{
/*
If encryption_algorithm is AES_CTR then
if no-padding, use AES_CTR
else use AES_GCM (like CTR but appends a "checksum" block)
else
use AES_CBC
*/
if (encryption_algorithm)
if (flags & ENCRYPTION_FLAG_NOPAD)
return MY_AES_CTR;
else
return MY_AES_GCM;
else
return MY_AES_CBC;
}
static int ctx_init(void *ctx, const unsigned char* key, unsigned int klen,
const unsigned char* iv, unsigned int ivlen, int flags,
unsigned int key_id, unsigned int key_version)
{
return my_aes_crypt_init(ctx, mode(flags), flags, key, klen, iv, ivlen);
}
static int ctx_update(void *ctx, const unsigned char *src, unsigned int slen,
unsigned char *dst, unsigned int *dlen)
{
return my_aes_crypt_update(ctx, src, slen, dst, dlen);
}
static int ctx_finish(void *ctx, unsigned char *dst, unsigned int *dlen)
{
return my_aes_crypt_finish(ctx, dst, dlen);
}
static unsigned int get_length(unsigned int slen, unsigned int key_id,
unsigned int key_version)
{
return my_aes_get_size(mode(0), slen);
}
static uint ctx_size(uint, uint)
{
return my_aes_ctx_size(mode(0));
}
struct st_mariadb_encryption file_key_management_plugin= {
MariaDB_ENCRYPTION_INTERFACE_VERSION,
get_latest_version,
get_key_from_key_file,
ctx_size,
ctx_init,
ctx_update,
ctx_finish,
get_length
};
static int file_key_management_plugin_init(void *p)
{
Parser parser(filename, filekey);
return parser.parse(&keys);
}
static int file_key_management_plugin_deinit(void *p)
{
keys.clear();
return 0;
}
/*
Plugin library descriptor
*/
maria_declare_plugin(file_key_management)
{
MariaDB_ENCRYPTION_PLUGIN,
&file_key_management_plugin,
"file_key_management",
"Denis Endro eperi GmbH",
"File-based key management plugin",
PLUGIN_LICENSE_GPL,
file_key_management_plugin_init,
file_key_management_plugin_deinit,
0x0100 /* 1.0 */,
NULL, /* status variables */
settings,
"1.0",
MariaDB_PLUGIN_MATURITY_STABLE
}
maria_declare_plugin_end;
|