mirror of
https://github.com/ClickHouse/ClickHouse.git
synced 2024-12-14 10:22:10 +00:00
70d1adfe4b
* save format string for NetException * format exceptions * format exceptions 2 * format exceptions 3 * format exceptions 4 * format exceptions 5 * format exceptions 6 * fix * format exceptions 7 * format exceptions 8 * Update MergeTreeIndexGin.cpp * Update AggregateFunctionMap.cpp * Update AggregateFunctionMap.cpp * fix
421 lines
14 KiB
C++
421 lines
14 KiB
C++
#include <IO/FileEncryptionCommon.h>
|
|
|
|
#if USE_SSL
|
|
#include <IO/ReadBuffer.h>
|
|
#include <IO/ReadHelpers.h>
|
|
#include <IO/WriteBuffer.h>
|
|
#include <IO/WriteHelpers.h>
|
|
#include <Common/SipHash.h>
|
|
#include <Common/safe_cast.h>
|
|
|
|
#include <boost/algorithm/string/predicate.hpp>
|
|
#include <cassert>
|
|
#include <random>
|
|
|
|
|
|
namespace DB
|
|
{
|
|
|
|
namespace ErrorCodes
|
|
{
|
|
extern const int BAD_ARGUMENTS;
|
|
extern const int DATA_ENCRYPTION_ERROR;
|
|
}
|
|
|
|
namespace FileEncryption
|
|
{
|
|
|
|
namespace
|
|
{
|
|
const EVP_CIPHER * getCipher(Algorithm algorithm)
|
|
{
|
|
switch (algorithm)
|
|
{
|
|
case Algorithm::AES_128_CTR: return EVP_aes_128_ctr();
|
|
case Algorithm::AES_192_CTR: return EVP_aes_192_ctr();
|
|
case Algorithm::AES_256_CTR: return EVP_aes_256_ctr();
|
|
}
|
|
throw Exception(
|
|
ErrorCodes::BAD_ARGUMENTS,
|
|
"Encryption algorithm {} is not supported, specify one of the following: aes_128_ctr, aes_192_ctr, aes_256_ctr",
|
|
static_cast<int>(algorithm));
|
|
}
|
|
|
|
void checkKeySize(const EVP_CIPHER * evp_cipher, size_t key_size)
|
|
{
|
|
if (!key_size)
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Encryption key must not be empty");
|
|
size_t expected_key_size = static_cast<size_t>(EVP_CIPHER_key_length(evp_cipher));
|
|
if (key_size != expected_key_size)
|
|
throw Exception(
|
|
ErrorCodes::BAD_ARGUMENTS,
|
|
"Got an encryption key with unexpected size {}, the size should be {}",
|
|
key_size, expected_key_size);
|
|
}
|
|
|
|
void checkInitVectorSize(const EVP_CIPHER * evp_cipher)
|
|
{
|
|
size_t expected_iv_length = static_cast<size_t>(EVP_CIPHER_iv_length(evp_cipher));
|
|
if (InitVector::kSize != expected_iv_length)
|
|
throw Exception(
|
|
ErrorCodes::DATA_ENCRYPTION_ERROR,
|
|
"Got an initialization vector with unexpected size {}, the size should be {}",
|
|
InitVector::kSize,
|
|
expected_iv_length);
|
|
}
|
|
|
|
constexpr const size_t kBlockSize = 16;
|
|
|
|
size_t blockOffset(size_t pos) { return pos % kBlockSize; }
|
|
size_t blocks(size_t pos) { return pos / kBlockSize; }
|
|
|
|
size_t partBlockSize(size_t size, size_t off)
|
|
{
|
|
assert(off < kBlockSize);
|
|
/// write the part as usual block
|
|
if (off == 0)
|
|
return 0;
|
|
return off + size <= kBlockSize ? size : (kBlockSize - off) % kBlockSize;
|
|
}
|
|
|
|
size_t encryptBlocks(EVP_CIPHER_CTX * evp_ctx, const char * data, size_t size, WriteBuffer & out)
|
|
{
|
|
const uint8_t * in = reinterpret_cast<const uint8_t *>(data);
|
|
size_t in_size = 0;
|
|
size_t out_size = 0;
|
|
|
|
while (in_size < size)
|
|
{
|
|
out.nextIfAtEnd();
|
|
|
|
size_t part_size = std::min(size - in_size, out.available());
|
|
part_size = std::min<size_t>(part_size, INT_MAX);
|
|
|
|
uint8_t * ciphertext = reinterpret_cast<uint8_t *>(out.position());
|
|
int ciphertext_size = 0;
|
|
if (!EVP_EncryptUpdate(evp_ctx, ciphertext, &ciphertext_size, &in[in_size], static_cast<int>(part_size)))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to encrypt");
|
|
|
|
in_size += part_size;
|
|
if (ciphertext_size)
|
|
{
|
|
out.position() += ciphertext_size;
|
|
out_size += ciphertext_size;
|
|
}
|
|
}
|
|
|
|
return out_size;
|
|
}
|
|
|
|
size_t encryptBlockWithPadding(EVP_CIPHER_CTX * evp_ctx, const char * data, size_t size, size_t pad_left, WriteBuffer & out)
|
|
{
|
|
assert((size <= kBlockSize) && (size + pad_left <= kBlockSize));
|
|
uint8_t padded_data[kBlockSize] = {};
|
|
memcpy(&padded_data[pad_left], data, size);
|
|
size_t padded_data_size = pad_left + size;
|
|
|
|
uint8_t ciphertext[kBlockSize];
|
|
int ciphertext_size = 0;
|
|
if (!EVP_EncryptUpdate(evp_ctx, ciphertext, &ciphertext_size, padded_data, safe_cast<int>(padded_data_size)))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to encrypt");
|
|
|
|
if (!ciphertext_size)
|
|
return 0;
|
|
|
|
if (static_cast<size_t>(ciphertext_size) < pad_left)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Unexpected size of encrypted data: {} < {}", ciphertext_size, pad_left);
|
|
|
|
uint8_t * ciphertext_begin = &ciphertext[pad_left];
|
|
ciphertext_size -= pad_left;
|
|
out.write(reinterpret_cast<const char *>(ciphertext_begin), ciphertext_size);
|
|
return ciphertext_size;
|
|
}
|
|
|
|
size_t encryptFinal(EVP_CIPHER_CTX * evp_ctx, WriteBuffer & out)
|
|
{
|
|
uint8_t ciphertext[kBlockSize];
|
|
int ciphertext_size = 0;
|
|
if (!EVP_EncryptFinal_ex(evp_ctx,
|
|
ciphertext, &ciphertext_size))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to finalize encrypting");
|
|
if (ciphertext_size)
|
|
out.write(reinterpret_cast<const char *>(ciphertext), ciphertext_size);
|
|
return ciphertext_size;
|
|
}
|
|
|
|
size_t decryptBlocks(EVP_CIPHER_CTX * evp_ctx, const char * data, size_t size, char * out)
|
|
{
|
|
const uint8_t * in = reinterpret_cast<const uint8_t *>(data);
|
|
uint8_t * plaintext = reinterpret_cast<uint8_t *>(out);
|
|
int plaintext_size = 0;
|
|
if (!EVP_DecryptUpdate(evp_ctx, plaintext, &plaintext_size, in, safe_cast<int>(size)))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to decrypt");
|
|
return plaintext_size;
|
|
}
|
|
|
|
size_t decryptBlockWithPadding(EVP_CIPHER_CTX * evp_ctx, const char * data, size_t size, size_t pad_left, char * out)
|
|
{
|
|
assert((size <= kBlockSize) && (size + pad_left <= kBlockSize));
|
|
uint8_t padded_data[kBlockSize] = {};
|
|
memcpy(&padded_data[pad_left], data, size);
|
|
size_t padded_data_size = pad_left + size;
|
|
uint8_t plaintext[kBlockSize];
|
|
int plaintext_size = 0;
|
|
if (!EVP_DecryptUpdate(evp_ctx, plaintext, &plaintext_size, padded_data, safe_cast<int>(padded_data_size)))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to decrypt");
|
|
|
|
if (!plaintext_size)
|
|
return 0;
|
|
|
|
if (static_cast<size_t>(plaintext_size) < pad_left)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Unexpected size of decrypted data: {} < {}", plaintext_size, pad_left);
|
|
|
|
const uint8_t * plaintext_begin = &plaintext[pad_left];
|
|
plaintext_size -= pad_left;
|
|
memcpy(out, plaintext_begin, plaintext_size);
|
|
return plaintext_size;
|
|
}
|
|
|
|
size_t decryptFinal(EVP_CIPHER_CTX * evp_ctx, char * out)
|
|
{
|
|
uint8_t plaintext[kBlockSize];
|
|
int plaintext_size = 0;
|
|
if (!EVP_DecryptFinal_ex(evp_ctx, plaintext, &plaintext_size))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to finalize decrypting");
|
|
if (plaintext_size)
|
|
memcpy(out, plaintext, plaintext_size);
|
|
return plaintext_size;
|
|
}
|
|
|
|
constexpr const char kHeaderSignature[] = "ENC";
|
|
constexpr const UInt16 kHeaderCurrentVersion = 1;
|
|
}
|
|
|
|
|
|
String toString(Algorithm algorithm)
|
|
{
|
|
switch (algorithm)
|
|
{
|
|
case Algorithm::AES_128_CTR: return "aes_128_ctr";
|
|
case Algorithm::AES_192_CTR: return "aes_192_ctr";
|
|
case Algorithm::AES_256_CTR: return "aes_256_ctr";
|
|
}
|
|
throw Exception(
|
|
ErrorCodes::BAD_ARGUMENTS,
|
|
"Encryption algorithm {} is not supported, specify one of the following: aes_128_ctr, aes_192_ctr, aes_256_ctr",
|
|
static_cast<int>(algorithm));
|
|
}
|
|
|
|
void parseFromString(Algorithm & algorithm, const String & str)
|
|
{
|
|
if (boost::iequals(str, "aes_128_ctr"))
|
|
algorithm = Algorithm::AES_128_CTR;
|
|
else if (boost::iequals(str, "aes_192_ctr"))
|
|
algorithm = Algorithm::AES_192_CTR;
|
|
else if (boost::iequals(str, "aes_256_ctr"))
|
|
algorithm = Algorithm::AES_256_CTR;
|
|
else
|
|
throw Exception(
|
|
ErrorCodes::BAD_ARGUMENTS,
|
|
"Encryption algorithm '{}' is not supported, specify one of the following: aes_128_ctr, aes_192_ctr, aes_256_ctr",
|
|
str);
|
|
}
|
|
|
|
void checkKeySize(Algorithm algorithm, size_t key_size) { checkKeySize(getCipher(algorithm), key_size); }
|
|
|
|
|
|
String InitVector::toString() const
|
|
{
|
|
static_assert(sizeof(counter) == InitVector::kSize);
|
|
WriteBufferFromOwnString out;
|
|
writeBinaryBigEndian(counter, out);
|
|
return std::move(out.str());
|
|
}
|
|
|
|
InitVector InitVector::fromString(const String & str)
|
|
{
|
|
if (str.length() != InitVector::kSize)
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Expected iv with size {}, got iv with size {}", InitVector::kSize, str.length());
|
|
ReadBufferFromMemory in{str.data(), str.length()};
|
|
UInt128 counter;
|
|
readBinaryBigEndian(counter, in);
|
|
return InitVector{counter};
|
|
}
|
|
|
|
void InitVector::read(ReadBuffer & in)
|
|
{
|
|
readBinaryBigEndian(counter, in);
|
|
}
|
|
|
|
void InitVector::write(WriteBuffer & out) const
|
|
{
|
|
writeBinaryBigEndian(counter, out);
|
|
}
|
|
|
|
InitVector InitVector::random()
|
|
{
|
|
std::random_device rd;
|
|
std::mt19937 gen{rd()};
|
|
std::uniform_int_distribution<UInt128::base_type> dis;
|
|
UInt128 counter;
|
|
for (auto & i : counter.items)
|
|
i = dis(gen);
|
|
return InitVector{counter};
|
|
}
|
|
|
|
|
|
Encryptor::Encryptor(Algorithm algorithm_, const String & key_, const InitVector & iv_)
|
|
: key(key_)
|
|
, init_vector(iv_)
|
|
, evp_cipher(getCipher(algorithm_))
|
|
{
|
|
checkKeySize(evp_cipher, key.size());
|
|
checkInitVectorSize(evp_cipher);
|
|
}
|
|
|
|
void Encryptor::encrypt(const char * data, size_t size, WriteBuffer & out)
|
|
{
|
|
if (!size)
|
|
return;
|
|
|
|
auto current_iv = (init_vector + blocks(offset)).toString();
|
|
|
|
auto evp_ctx_ptr = std::unique_ptr<EVP_CIPHER_CTX, decltype(&::EVP_CIPHER_CTX_free)>(EVP_CIPHER_CTX_new(), &EVP_CIPHER_CTX_free);
|
|
auto * evp_ctx = evp_ctx_ptr.get();
|
|
|
|
if (!EVP_EncryptInit_ex(evp_ctx, evp_cipher, nullptr, nullptr, nullptr))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to initialize encryption context with cipher");
|
|
|
|
if (!EVP_EncryptInit_ex(evp_ctx, nullptr, nullptr,
|
|
reinterpret_cast<const uint8_t*>(key.c_str()), reinterpret_cast<const uint8_t*>(current_iv.c_str())))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to set key and IV for encryption");
|
|
|
|
size_t in_size = 0;
|
|
size_t out_size = 0;
|
|
|
|
auto off = blockOffset(offset);
|
|
if (off)
|
|
{
|
|
size_t in_part_size = partBlockSize(size, off);
|
|
size_t out_part_size = encryptBlockWithPadding(evp_ctx, &data[in_size], in_part_size, off, out);
|
|
in_size += in_part_size;
|
|
out_size += out_part_size;
|
|
}
|
|
|
|
if (in_size < size)
|
|
{
|
|
size_t in_part_size = size - in_size;
|
|
size_t out_part_size = encryptBlocks(evp_ctx, &data[in_size], in_part_size, out);
|
|
in_size += in_part_size;
|
|
out_size += out_part_size;
|
|
}
|
|
|
|
out_size += encryptFinal(evp_ctx, out);
|
|
|
|
if (out_size != in_size)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Only part of the data was encrypted");
|
|
offset += in_size;
|
|
}
|
|
|
|
void Encryptor::decrypt(const char * data, size_t size, char * out)
|
|
{
|
|
if (!size)
|
|
return;
|
|
|
|
auto current_iv = (init_vector + blocks(offset)).toString();
|
|
|
|
auto evp_ctx_ptr = std::unique_ptr<EVP_CIPHER_CTX, decltype(&::EVP_CIPHER_CTX_free)>(EVP_CIPHER_CTX_new(), &EVP_CIPHER_CTX_free);
|
|
auto * evp_ctx = evp_ctx_ptr.get();
|
|
|
|
if (!EVP_DecryptInit_ex(evp_ctx, evp_cipher, nullptr, nullptr, nullptr))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to initialize decryption context with cipher");
|
|
|
|
if (!EVP_DecryptInit_ex(evp_ctx, nullptr, nullptr,
|
|
reinterpret_cast<const uint8_t*>(key.c_str()), reinterpret_cast<const uint8_t*>(current_iv.c_str())))
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Failed to set key and IV for decryption");
|
|
|
|
size_t in_size = 0;
|
|
size_t out_size = 0;
|
|
|
|
auto off = blockOffset(offset);
|
|
if (off)
|
|
{
|
|
size_t in_part_size = partBlockSize(size, off);
|
|
size_t out_part_size = decryptBlockWithPadding(evp_ctx, &data[in_size], in_part_size, off, &out[out_size]);
|
|
in_size += in_part_size;
|
|
out_size += out_part_size;
|
|
}
|
|
|
|
if (in_size < size)
|
|
{
|
|
size_t in_part_size = size - in_size;
|
|
size_t out_part_size = decryptBlocks(evp_ctx, &data[in_size], in_part_size, &out[out_size]);
|
|
in_size += in_part_size;
|
|
out_size += out_part_size;
|
|
}
|
|
|
|
out_size += decryptFinal(evp_ctx, &out[out_size]);
|
|
|
|
if (out_size != in_size)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Only part of the data was decrypted");
|
|
offset += in_size;
|
|
}
|
|
|
|
|
|
void Header::read(ReadBuffer & in)
|
|
{
|
|
constexpr size_t header_signature_size = std::size(kHeaderSignature) - 1;
|
|
char signature[std::size(kHeaderSignature)] = {};
|
|
in.readStrict(signature, header_signature_size);
|
|
if (strcmp(signature, kHeaderSignature) != 0)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Wrong signature, this is not an encrypted file");
|
|
|
|
UInt16 version;
|
|
readPODBinary(version, in);
|
|
if (version != kHeaderCurrentVersion)
|
|
throw Exception(ErrorCodes::DATA_ENCRYPTION_ERROR, "Version {} of the header is not supported", version);
|
|
|
|
UInt16 algorithm_u16;
|
|
readPODBinary(algorithm_u16, in);
|
|
algorithm = static_cast<Algorithm>(algorithm_u16);
|
|
|
|
readPODBinary(key_id, in);
|
|
readPODBinary(key_hash, in);
|
|
init_vector.read(in);
|
|
|
|
constexpr size_t reserved_size = kSize - header_signature_size - sizeof(version) - sizeof(algorithm_u16) - sizeof(key_id) - sizeof(key_hash) - InitVector::kSize;
|
|
static_assert(reserved_size < kSize);
|
|
in.ignore(reserved_size);
|
|
}
|
|
|
|
void Header::write(WriteBuffer & out) const
|
|
{
|
|
constexpr size_t header_signature_size = std::size(kHeaderSignature) - 1;
|
|
out.write(kHeaderSignature, header_signature_size);
|
|
|
|
UInt16 version = kHeaderCurrentVersion;
|
|
writePODBinary(version, out);
|
|
|
|
UInt16 algorithm_u16 = static_cast<UInt16>(algorithm);
|
|
writePODBinary(algorithm_u16, out);
|
|
|
|
writePODBinary(key_id, out);
|
|
writePODBinary(key_hash, out);
|
|
init_vector.write(out);
|
|
|
|
constexpr size_t reserved_size = kSize - header_signature_size - sizeof(version) - sizeof(algorithm_u16) - sizeof(key_id) - sizeof(key_hash) - InitVector::kSize;
|
|
static_assert(reserved_size < kSize);
|
|
char reserved_zero_bytes[reserved_size] = {};
|
|
out.write(reserved_zero_bytes, reserved_size);
|
|
}
|
|
|
|
UInt8 calculateKeyHash(const String & key)
|
|
{
|
|
return static_cast<UInt8>(sipHash64(key.data(), key.size())) & 0x0F;
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
#endif
|