encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
- -- aes_decrypt_mysql(string, key, block_mode[, init_vector, AAD])
-- The MySQL-compatitable encryption, only ecb, cbc, cfb1, cfb8, cfb128 and ofb modes are supported,
-- just like for MySQL
-- https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html#function_aes-encrypt
-- https://dev.mysql.com/doc/refman/8.0/en/server-system-variables.html#sysvar_block_encryption_mode
-- Please note that for keys that exceed mode-specific length, keys are folded in a MySQL-specific way,
-- meaning that whole key is used, but effective key length is still determined by mode.
-- when key doesn't exceed the default mode length, ecryption result equals with AES_encypt()
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - --
-- error cases
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - --
SELECT aes_decrypt_mysql ( ) ; - - { serverError 42 } not enough arguments
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' ) ; - - { serverError 42 } not enough arguments
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' ) ; - - { serverError 42 } not enough arguments
-- Mode
SELECT aes_decrypt_mysql ( 789 , ' text ' , ' key ' ) ; - - { serverError 43 } bad mode type
SELECT aes_decrypt_mysql ( ' blah blah blah ' , ' text ' , ' key ' ) ; -- {serverError 36} garbage mode value
SELECT aes_decrypt_mysql ( ' des-ede3-ecb ' , ' text ' , ' key ' ) ; -- {serverError 36} bad mode value of valid cipher name
SELECT aes_decrypt_mysql ( ' aes-128-gcm ' , ' text ' , ' key ' ) ; -- {serverError 36} mode is not supported by _mysql-functions
SELECT decrypt ( 789 , ' text ' , ' key ' ) ; - - { serverError 43 } bad mode type
SELECT decrypt ( ' blah blah blah ' , ' text ' , ' key ' ) ; -- {serverError 36} garbage mode value
SELECT decrypt ( ' des-ede3-ecb ' , ' text ' , ' key ' ) ; -- {serverError 36} bad mode value of valid cipher name
-- Key
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' , 456 ) ; - - { serverError 43 } bad key type
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' , ' key ' ) ; -- {serverError 36} key is too short
SELECT decrypt ( ' aes-128-ecb ' , ' text ' ) ; - - { serverError 42 } key is missing
SELECT decrypt ( ' aes-128-ecb ' , ' text ' , 456 ) ; - - { serverError 43 } bad key type
SELECT decrypt ( ' aes-128-ecb ' , ' text ' , ' key ' ) ; -- {serverError 36} key is too short
SELECT decrypt ( ' aes-128-ecb ' , ' text ' , ' keykeykeykeykeykeykeykeykeykeykeykey ' ) ; -- {serverError 36} key is to long
-- IV
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' , ' key ' , 1011 ) ; - - { serverError 43 } bad IV type 6
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' , ' key ' , ' iv ' ) ; - - { serverError 36 } IV is too short 4
SELECT decrypt ( ' aes-128-cbc ' , ' text ' , ' keykeykeykeykeyk ' , 1011 ) ; - - { serverError 43 } bad IV type 1
SELECT decrypt ( ' aes-128-cbc ' , ' text ' , ' keykeykeykeykeyk ' , ' iviviviviviviviviviviviviviviviviviviviviv ' ) ; - - { serverError 36 } IV is too long 3
SELECT decrypt ( ' aes-128-cbc ' , ' text ' , ' keykeykeykeykeyk ' , ' iv ' ) ; - - { serverError 36 } IV is too short 2
- - AAD
SELECT aes_decrypt_mysql ( ' aes-128-ecb ' , ' text ' , ' key ' , ' IV ' , 1213 ) ; - - { serverError 42 } too many arguments
SELECT decrypt ( ' aes-128-ecb ' , ' text ' , ' key ' , ' IV ' , 1213 ) ; - - { serverError 43 } bad AAD type
SELECT decrypt ( ' aes-128-gcm ' , ' text ' , ' key ' , ' IV ' , 1213 ) ; - - { serverError 43 } bad AAD type
2020-10-13 14:49:03 +00:00
-- Invalid ciphertext should cause an error or produce garbage
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
SELECT ignore ( decrypt ( ' aes-128-ecb ' , ' hello there ' , ' 1111111111111111 ' ) ) ; -- {serverError 454} 1
SELECT ignore ( decrypt ( ' aes-128-cbc ' , ' hello there ' , ' 1111111111111111 ' ) ) ; -- {serverError 454} 2
SELECT ignore ( decrypt ( ' aes-128-cfb1 ' , ' hello there ' , ' 1111111111111111 ' ) ) ; -- GIGO
SELECT ignore ( decrypt ( ' aes-128-ofb ' , ' hello there ' , ' 1111111111111111 ' ) ) ; -- GIGO
SELECT ignore ( decrypt ( ' aes-128-ctr ' , ' hello there ' , ' 1111111111111111 ' ) ) ; -- GIGO
SELECT decrypt ( ' aes-128-ctr ' , ' ' , ' 1111111111111111 ' ) = = ' ' ;
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - --
-- Validate against predefined ciphertext,plaintext,key and IV for MySQL compatibility mode
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - --
CREATE TABLE encryption_test
(
input String ,
key String DEFAULT unhex ( ' fb9958e2e897ef3fdb49067b51a24af645b3626eed2f9ea1dc7fd4dd71b7e38f9a68db2a3184f952382c783785f9d77bf923577108a88adaacae5c141b1576b0 ' ) ,
2020-10-13 14:49:03 +00:00
iv String DEFAULT unhex ( ' 8CA3554377DFF8A369BC50A89780DD85 ' ) ,
key32 String DEFAULT substring ( key , 1 , 32 ) ,
key24 String DEFAULT substring ( key , 1 , 24 ) ,
key16 String DEFAULT substring ( key , 1 , 16 )
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
) Engine = Memory ;
INSERT INTO encryption_test ( input )
VALUES ( ' ' ) , ( ' text ' ) , ( ' What Is ClickHouse? ClickHouse is a column-oriented database management system (DBMS) for online analytical processing of queries (OLAP). ' ) ;
2020-10-13 14:49:03 +00:00
SELECT ' MySQL-compatitable mode, with key folding, no length checks, etc. ' ;
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
SELECT ' aes-128-cbc ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cbc ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cbc ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb1 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb1 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb1 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb8 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb8 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb8 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb128 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb128 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb128 ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
2020-10-13 14:49:03 +00:00
SELECT ' aes-128-ecb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-ecb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-ecb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
SELECT ' aes-128-ofb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-ofb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-ofb ' as mode , aes_decrypt_mysql ( mode , aes_encrypt_mysql ( mode , input , key , iv ) , key , iv ) = = input FROM encryption_test ;
2020-10-13 14:49:03 +00:00
SELECT ' Strict mode without key folding and proper key and iv lengths checks. ' ;
SELECT ' aes-128-cbc ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cbc ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cbc ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb1 ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb1 ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb1 ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb8 ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb8 ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb8 ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-cfb128 ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-cfb128 ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-cfb128 ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-ctr ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-ctr ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-ctr ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
SELECT ' aes-128-ecb ' as mode , decrypt ( mode , encrypt ( mode , input , key16 ) , key16 ) = = input FROM encryption_test ;
SELECT ' aes-192-ecb ' as mode , decrypt ( mode , encrypt ( mode , input , key24 ) , key24 ) = = input FROM encryption_test ;
SELECT ' aes-256-ecb ' as mode , decrypt ( mode , encrypt ( mode , input , key32 ) , key32 ) = = input FROM encryption_test ;
SELECT ' aes-128-ofb ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-ofb ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-ofb ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
SELECT ' GCM mode with IV ' ;
2020-10-13 14:49:03 +00:00
SELECT ' aes-128-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv ) , key16 , iv ) = = input FROM encryption_test ;
SELECT ' aes-192-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv ) , key24 , iv ) = = input FROM encryption_test ;
SELECT ' aes-256-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv ) , key32 , iv ) = = input FROM encryption_test ;
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
SELECT ' GCM mode with IV and AAD ' ;
2020-10-13 14:49:03 +00:00
SELECT ' aes-128-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key16 , iv , ' AAD ' ) , key16 , iv , ' AAD ' ) = = input FROM encryption_test ;
SELECT ' aes-192-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key24 , iv , ' AAD ' ) , key24 , iv , ' AAD ' ) = = input FROM encryption_test ;
SELECT ' aes-256-gcm ' as mode , decrypt ( mode , encrypt ( mode , input , key32 , iv , ' AAD ' ) , key32 , iv , ' AAD ' ) = = input FROM encryption_test ;
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-06-16 09:22:55 +00:00
-- based on https://github.com/openssl/openssl/blob/master/demos/evp/aesgcm.c#L20
WITH
unhex ( ' eebc1f57487f51921c0465665f8ae6d1658bb26de6f8a069a3520293a572078f ' ) as key ,
unhex ( ' 67ba0510262ae487d737ee6298f77e0c ' ) as tag ,
unhex ( ' 99aa3e68ed8173a0eed06684 ' ) as iv ,
unhex ( ' f56e87055bc32d0eeb31b2eacc2bf2a5 ' ) as plaintext ,
unhex ( ' 4d23c3cec334b49bdb370c437fec78de ' ) as aad ,
unhex ( ' f7264413a84c0e7cd536867eb9f21736 ' ) as ciphertext
SELECT
hex ( decrypt ( ' aes-256-gcm ' , concat ( ciphertext , tag ) , key , iv , aad ) ) as plaintext_actual ,
plaintext_actual = hex ( plaintext ) ;
2020-11-11 15:29:36 +00:00
DROP TABLE encryption_test ;