/* Copyright (c) 2002, 2012, eperi GmbH. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ #include "parser.h" #include #include static char* filename; static char* filekey; static unsigned long encryption_algorithm; static const char *encryption_algorithm_names[]= { "aes_cbc", #ifdef HAVE_EncryptAes128Ctr "aes_ctr", #endif 0 }; static TYPELIB encryption_algorithm_typelib= { array_elements(encryption_algorithm_names)-1,"", encryption_algorithm_names, NULL }; static MYSQL_SYSVAR_STR(filename, filename, PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY, "Path and name of the key file.", NULL, NULL, ""); static MYSQL_SYSVAR_STR(filekey, filekey, PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY, "Key to encrypt / decrypt the keyfile.", NULL, NULL, ""); #ifdef HAVE_EncryptAes128Ctr #define recommendation ", aes_ctr is the recommended one" #else #define recommendation "" #endif static MYSQL_SYSVAR_ENUM(encryption_algorithm, encryption_algorithm, PLUGIN_VAR_RQCMDARG | PLUGIN_VAR_READONLY, "Encryption algorithm to use" recommendation ".", NULL, NULL, 0, &encryption_algorithm_typelib); static struct st_mysql_sys_var* settings[] = { MYSQL_SYSVAR(filename), MYSQL_SYSVAR(filekey), MYSQL_SYSVAR(encryption_algorithm), NULL }; Dynamic_array keys(static_cast(0)); static keyentry *get_key(unsigned int key_id) { keyentry *a= keys.front(), *b= keys.back() + 1, *c; while (b - a > 1) { c= a + (b - a)/2; if (c->id == key_id) return c; else if (c->id < key_id) a= c; else b= c; } return a->id == key_id ? a : 0; } /* the version is always the same, no automatic key rotation */ static unsigned int get_latest_version(uint key_id) { return get_key(key_id) ? 1 : ENCRYPTION_KEY_VERSION_INVALID; } static unsigned int get_key_from_key_file(unsigned int key_id, unsigned int key_version, unsigned char* dstbuf, unsigned *buflen) { if (key_version != 1) return ENCRYPTION_KEY_VERSION_INVALID; keyentry* entry = get_key(key_id); if (entry == NULL) return ENCRYPTION_KEY_VERSION_INVALID; if (*buflen < entry->length) { *buflen= entry->length; return ENCRYPTION_KEY_BUFFER_TOO_SMALL; } *buflen= entry->length; if (dstbuf) memcpy(dstbuf, entry->key, entry->length); return 0; } // let's simplify the condition below #ifndef HAVE_EncryptAes128Gcm #define MY_AES_GCM MY_AES_CTR #ifndef HAVE_EncryptAes128Ctr #define MY_AES_CTR MY_AES_CBC #endif #endif static inline enum my_aes_mode mode(int flags) { /* If encryption_algorithm is AES_CTR then if no-padding, use AES_CTR else use AES_GCM (like CTR but appends a "checksum" block) else use AES_CBC */ if (encryption_algorithm) if (flags & ENCRYPTION_FLAG_NOPAD) return MY_AES_CTR; else return MY_AES_GCM; else return MY_AES_CBC; } static int ctx_init(void *ctx, const unsigned char* key, unsigned int klen, const unsigned char* iv, unsigned int ivlen, int flags, unsigned int key_id, unsigned int key_version) { return my_aes_crypt_init(ctx, mode(flags), flags, key, klen, iv, ivlen); } static unsigned int get_length(unsigned int slen, unsigned int key_id, unsigned int key_version) { return my_aes_get_size(mode(0), slen); } struct st_mariadb_encryption file_key_management_plugin= { MariaDB_ENCRYPTION_INTERFACE_VERSION, get_latest_version, get_key_from_key_file, (uint (*)(unsigned int, unsigned int))my_aes_ctx_size, ctx_init, my_aes_crypt_update, my_aes_crypt_finish, get_length }; static int file_key_management_plugin_init(void *p) { Parser parser(filename, filekey); return parser.parse(&keys); } static int file_key_management_plugin_deinit(void *p) { keys.free_memory(); return 0; } /* Plugin library descriptor */ maria_declare_plugin(file_key_management) { MariaDB_ENCRYPTION_PLUGIN, &file_key_management_plugin, "file_key_management", "Denis Endro eperi GmbH", "File-based key management plugin", PLUGIN_LICENSE_GPL, file_key_management_plugin_init, file_key_management_plugin_deinit, 0x0100 /* 1.0 */, NULL, /* status variables */ settings, "1.0", MariaDB_PLUGIN_MATURITY_STABLE } maria_declare_plugin_end;