1 | /* Copyright (C) 2015 MariaDB |
2 | |
3 | This program is free software; you can redistribute it and/or modify |
4 | it under the terms of the GNU General Public License as published by |
5 | the Free Software Foundation; version 2 of the License. |
6 | |
7 | This program is distributed in the hope that it will be useful, |
8 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
9 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
10 | GNU General Public License for more details. |
11 | |
12 | You should have received a copy of the GNU General Public License |
13 | along with this program; if not, write to the Free Software |
14 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA */ |
15 | |
16 | #include <my_global.h> |
17 | #include <my_sys.h> |
18 | #include <my_crypt.h> |
19 | #include <tap.h> |
20 | |
21 | /*** tweaks and stubs for encryption code to compile ***************/ |
22 | #define KEY_SIZE (128/8) |
23 | |
24 | my_bool encrypt_tmp_files; |
25 | int init_io_cache_encryption(); |
26 | |
27 | uint encryption_key_get_latest_version_func(uint) |
28 | { |
29 | return 1; |
30 | } |
31 | |
32 | uint encryption_key_id_exists_func(uint) |
33 | { |
34 | return 1; |
35 | } |
36 | |
37 | uint encryption_key_version_exists_func(uint, uint) |
38 | { |
39 | return 1; |
40 | } |
41 | |
42 | uint encryption_key_get_func(uint, uint, uchar* key, uint* size) |
43 | { |
44 | if (*size < KEY_SIZE) |
45 | { |
46 | *size= KEY_SIZE; |
47 | return ENCRYPTION_KEY_BUFFER_TOO_SMALL; |
48 | } |
49 | memset(key, KEY_SIZE, *size= KEY_SIZE); |
50 | return 0; |
51 | } |
52 | |
53 | #ifdef HAVE_EncryptAes128Gcm |
54 | enum my_aes_mode aes_mode= MY_AES_GCM; |
55 | #else |
56 | enum my_aes_mode aes_mode= MY_AES_CBC; |
57 | #endif |
58 | |
59 | int encryption_ctx_init_func(void *ctx, const unsigned char* key, unsigned int klen, |
60 | const unsigned char* iv, unsigned int ivlen, |
61 | int flags, unsigned int key_id, |
62 | unsigned int key_version) |
63 | { |
64 | return my_aes_crypt_init(ctx, aes_mode, flags, key, klen, iv, ivlen); |
65 | } |
66 | |
67 | uint encryption_encrypted_length_func(unsigned int slen, unsigned int key_id, unsigned int key_version) |
68 | { |
69 | return my_aes_get_size(aes_mode, slen); |
70 | } |
71 | |
72 | struct encryption_service_st encryption_handler= |
73 | { |
74 | encryption_key_get_latest_version_func, |
75 | encryption_key_get_func, |
76 | (uint (*)(unsigned int, unsigned int))my_aes_ctx_size, |
77 | encryption_ctx_init_func, |
78 | my_aes_crypt_update, |
79 | my_aes_crypt_finish, |
80 | encryption_encrypted_length_func |
81 | }; |
82 | |
83 | void sql_print_information(const char *format, ...) |
84 | { |
85 | } |
86 | |
87 | void sql_print_error(const char *format, ...) |
88 | { |
89 | } |
90 | |
91 | /*** end of encryption tweaks and stubs ****************************/ |
92 | |
93 | IO_CACHE info; |
94 | #define CACHE_SIZE 16384 |
95 | |
96 | #define INFO_TAIL ", pos_in_file = %llu, pos_in_mem = %lu", \ |
97 | info.pos_in_file, (ulong) ((info.type == READ_CACHE ? info.read_pos : info.write_pos) - info.request_pos) |
98 | |
99 | #define FILL 0x5A |
100 | |
101 | int data_bad(const uchar *buf, size_t len) |
102 | { |
103 | const uchar *end= buf + len; |
104 | while (buf < end) |
105 | if (*buf++ != FILL) |
106 | return 1; |
107 | return 0; |
108 | } |
109 | |
110 | void temp_io_cache() |
111 | { |
112 | int res; |
113 | uchar buf[CACHE_SIZE + 200]; |
114 | memset(buf, FILL, sizeof(buf)); |
115 | |
116 | diag("temp io_cache with%s encryption" , encrypt_tmp_files?"" :"out" ); |
117 | |
118 | init_io_cache_encryption(); |
119 | |
120 | res= open_cached_file(&info, 0, 0, CACHE_SIZE, 0); |
121 | ok(res == 0, "open_cached_file" INFO_TAIL); |
122 | |
123 | res= my_b_write(&info, buf, 100); |
124 | ok(res == 0 && info.pos_in_file == 0, "small write" INFO_TAIL ); |
125 | |
126 | res= my_b_write(&info, buf, sizeof(buf)); |
127 | ok(res == 0 && info.pos_in_file == CACHE_SIZE, "large write" INFO_TAIL); |
128 | |
129 | res= reinit_io_cache(&info, WRITE_CACHE, 250, 0, 0); |
130 | ok(res == 0, "reinit with rewind" INFO_TAIL); |
131 | |
132 | res= my_b_write(&info, buf, sizeof(buf)); |
133 | ok(res == 0, "large write" INFO_TAIL); |
134 | |
135 | res= my_b_flush_io_cache(&info, 1); |
136 | ok(res == 0, "flush" INFO_TAIL); |
137 | |
138 | res= reinit_io_cache(&info, READ_CACHE, 0, 0, 0); |
139 | ok(res == 0, "reinit READ_CACHE" INFO_TAIL); |
140 | |
141 | res= (int)my_pread(info.file, buf, 50, 50, MYF(MY_NABP)); |
142 | ok(res == 0 && data_bad(buf, 50) == encrypt_tmp_files, |
143 | "file must be %sreadable" , encrypt_tmp_files ?"un" :"" ); |
144 | |
145 | res= my_b_read(&info, buf, 50) || data_bad(buf, 50); |
146 | ok(res == 0 && info.pos_in_file == 0, "small read" INFO_TAIL); |
147 | |
148 | res= my_b_read(&info, buf, sizeof(buf)) || data_bad(buf, sizeof(buf)); |
149 | ok(res == 0 && info.pos_in_file == CACHE_SIZE, "large read" INFO_TAIL); |
150 | |
151 | close_cached_file(&info); |
152 | } |
153 | |
154 | void mdev9044() |
155 | { |
156 | int res; |
157 | uchar buf[CACHE_SIZE + 200]; |
158 | |
159 | diag("MDEV-9044 Binlog corruption in Galera" ); |
160 | |
161 | res= open_cached_file(&info, 0, 0, CACHE_SIZE, 0); |
162 | ok(res == 0, "open_cached_file" INFO_TAIL); |
163 | |
164 | res= my_b_write(&info, USTRING_WITH_LEN("first write\0" )); |
165 | ok(res == 0, "first write" INFO_TAIL); |
166 | |
167 | res= my_b_flush_io_cache(&info, 1); |
168 | ok(res == 0, "flush" INFO_TAIL); |
169 | |
170 | res= reinit_io_cache(&info, WRITE_CACHE, 0, 0, 0); |
171 | ok(res == 0, "reinit WRITE_CACHE" INFO_TAIL); |
172 | |
173 | res= my_b_write(&info, USTRING_WITH_LEN("second write\0" )); |
174 | ok(res == 0, "second write" INFO_TAIL ); |
175 | |
176 | res= reinit_io_cache(&info, READ_CACHE, 0, 0, 0); |
177 | ok(res == 0, "reinit READ_CACHE" INFO_TAIL); |
178 | |
179 | res= (int)my_b_fill(&info); |
180 | ok(res == 0, "fill" INFO_TAIL); |
181 | |
182 | res= reinit_io_cache(&info, READ_CACHE, 0, 0, 0); |
183 | ok(res == 0, "reinit READ_CACHE" INFO_TAIL); |
184 | |
185 | res= my_b_read(&info, buf, sizeof(buf)); |
186 | ok(res == 1 && strcmp((char*)buf, "second write" ) == 0, "read '%s'" , buf); |
187 | |
188 | close_cached_file(&info); |
189 | } |
190 | |
191 | int main(int argc __attribute__((unused)),char *argv[]) |
192 | { |
193 | MY_INIT(argv[0]); |
194 | plan(29); |
195 | |
196 | /* temp files with and without encryption */ |
197 | encrypt_tmp_files= 1; |
198 | temp_io_cache(); |
199 | |
200 | encrypt_tmp_files= 0; |
201 | temp_io_cache(); |
202 | |
203 | /* regression tests */ |
204 | mdev9044(); |
205 | |
206 | my_end(0); |
207 | return exit_status(); |
208 | } |
209 | |
210 | |