/** * Copyright (C) 2019-present MongoDB, Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the Server Side Public License, version 1, * as published by MongoDB, Inc. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * Server Side Public License for more details. * * You should have received a copy of the Server Side Public License * along with this program. If not, see * . * * As a special exception, the copyright holders give permission to link the * code of portions of this program with the OpenSSL library under certain * conditions as described in each individual source file and distribute * linked combinations including the program with the OpenSSL library. You * must comply with the Server Side Public License in all respects for * all of the code used other than as permitted herein. If you modify file(s) * with this exception, you may extend this exception to your version of the * file(s), but you are not obligated to do so. If you do not wish to do so, * delete this exception statement from your version. If you delete this * exception statement from all source files in the program, then also delete * it in the license file. */ #include "mongo/platform/basic.h" #include #include #include #include #include "mongo/base/init.h" #include "mongo/base/status.h" #include "mongo/crypto/symmetric_crypto.h" #include "mongo/crypto/symmetric_key.h" #include "mongo/platform/random.h" #include "mongo/util/assert_util.h" #include "mongo/util/str.h" namespace mongo { namespace crypto { namespace { template class SymmetricImplApple : public Parent { public: SymmetricImplApple(const SymmetricKey& key, aesMode mode, const uint8_t* iv, size_t ivLen) : _ctx(nullptr, CCCryptorRelease) { static_assert( std::is_same::value || std::is_same::value, "SymmetricImplApple must inherit from SymmetricEncryptor or SymmetricDecryptor"); uassert(ErrorCodes::UnsupportedFormat, "Native crypto on this platform only supports AES256-CBC", mode == aesMode::cbc); // Note: AES256 uses a 256byte keysize, // but is still functionally a 128bit block algorithm. // Therefore we expect a 128 bit block length. uassert(ErrorCodes::BadValue, str::stream() << "Invalid ivlen for selected algorithm, expected " << kCCBlockSizeAES128 << ", got " << ivLen, ivLen == kCCBlockSizeAES128); CCCryptorRef context = nullptr; constexpr auto op = std::is_same::value ? kCCEncrypt : kCCDecrypt; const auto status = CCCryptorCreate(op, kCCAlgorithmAES, kCCOptionPKCS7Padding, key.getKey(), key.getKeySize(), iv, &context); uassert(ErrorCodes::UnknownError, str::stream() << "CCCryptorCreate failure: " << status, status == kCCSuccess); _ctx.reset(context); } StatusWith update(const uint8_t* in, size_t inLen, uint8_t* out, size_t outLen) final { size_t outUsed = 0; const auto status = CCCryptorUpdate(_ctx.get(), in, inLen, out, outLen, &outUsed); if (status != kCCSuccess) { return Status(ErrorCodes::UnknownError, str::stream() << "Unable to perform CCCryptorUpdate: " << status); } return outUsed; } Status addAuthenticatedData(const uint8_t* in, size_t inLen) final { fassert(51128, inLen == 0); return Status::OK(); } StatusWith finalize(uint8_t* out, size_t outLen) final { size_t outUsed = 0; const auto status = CCCryptorFinal(_ctx.get(), out, outLen, &outUsed); if (status != kCCSuccess) { return Status(ErrorCodes::UnknownError, str::stream() << "Unable to perform CCCryptorFinal: " << status); } return outUsed; } private: std::unique_ptr<_CCCryptor, decltype(&CCCryptorRelease)> _ctx; }; class SymmetricEncryptorApple : public SymmetricImplApple { public: using SymmetricImplApple::SymmetricImplApple; StatusWith finalizeTag(uint8_t* out, size_t outLen) final { // CBC only, no tag to create. return 0; } }; class SymmetricDecryptorApple : public SymmetricImplApple { public: using SymmetricImplApple::SymmetricImplApple; Status updateTag(const uint8_t* tag, size_t tagLen) final { // CBC only, no tag to verify. if (tagLen > 0) { return {ErrorCodes::BadValue, "Unexpected tag for non-gcm cipher"}; } return Status::OK(); } }; } // namespace std::set getSupportedSymmetricAlgorithms() { return {aes256CBCName}; } Status engineRandBytes(uint8_t* buffer, size_t len) { auto result = SecRandomCopyBytes(kSecRandomDefault, len, buffer); if (result != errSecSuccess) { return {ErrorCodes::UnknownError, str::stream() << "Failed generating random bytes: " << result}; } else { return Status::OK(); } } StatusWith> SymmetricEncryptor::create(const SymmetricKey& key, aesMode mode, const uint8_t* iv, size_t ivLen) try { std::unique_ptr encryptor = std::make_unique(key, mode, iv, ivLen); return std::move(encryptor); } catch (const DBException& e) { return e.toStatus(); } StatusWith> SymmetricDecryptor::create(const SymmetricKey& key, aesMode mode, const uint8_t* iv, size_t ivLen) try { std::unique_ptr decryptor = std::make_unique(key, mode, iv, ivLen); return std::move(decryptor); } catch (const DBException& e) { return e.toStatus(); } } // namespace crypto } // namespace mongo