/Users/deen/code/yugabyte-db/src/yb/encryption/encrypted_file.cc
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright (c) YugaByte, Inc. |
2 | | // |
3 | | // Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except |
4 | | // in compliance with the License. You may obtain a copy of the License at |
5 | | // |
6 | | // http://www.apache.org/licenses/LICENSE-2.0 |
7 | | // |
8 | | // Unless required by applicable law or agreed to in writing, software distributed under the License |
9 | | // is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express |
10 | | // or implied. See the License for the specific language governing permissions and limitations |
11 | | // under the License. |
12 | | // |
13 | | |
14 | | #include "yb/encryption/encrypted_file.h" |
15 | | |
16 | | #include "yb/encryption/cipher_stream.h" |
17 | | #include "yb/encryption/cipher_stream_fwd.h" |
18 | | #include "yb/encryption/header_manager.h" |
19 | | #include "yb/encryption/encryption_util.h" |
20 | | |
21 | | #include "yb/util/env.h" |
22 | | #include "yb/util/cast.h" |
23 | | #include "yb/util/flag_tags.h" |
24 | | |
25 | | DEFINE_bool(encryption_counter_overflow_read_path_workaround, true, |
26 | | "Enable a read-path workaround for the encryption counter overflow bug #3707. " |
27 | | "This is enabled by default and could be disabled to reproduce the bug in testing."); |
28 | | TAG_FLAG(encryption_counter_overflow_read_path_workaround, advanced); |
29 | | TAG_FLAG(encryption_counter_overflow_read_path_workaround, hidden); |
30 | | |
31 | | namespace yb { |
32 | | namespace encryption { |
33 | | |
34 | | Status EncryptedRandomAccessFile::Create( |
35 | | std::unique_ptr<RandomAccessFile>* result, HeaderManager* header_manager, |
36 | 320k | std::unique_ptr<RandomAccessFile> underlying) { |
37 | 320k | return CreateRandomAccessFile<EncryptedRandomAccessFile, uint8_t>( |
38 | 320k | result, header_manager, std::move(underlying)); |
39 | 320k | } |
40 | | |
41 | | Status EncryptedRandomAccessFile::ReadInternal( |
42 | | uint64_t offset, |
43 | | size_t n, |
44 | | Slice* result, |
45 | | char* scratch, |
46 | 100k | EncryptionOverflowWorkaround counter_overflow_workaround) const { |
47 | 100k | if (!scratch) { |
48 | 0 | return STATUS(InvalidArgument, "scratch argument is null."); |
49 | 0 | } |
50 | 100k | uint8_t* buf = static_cast<uint8_t*>(EncryptionBuffer::Get()->GetBuffer(n)); |
51 | 100k | RETURN_NOT_OK(RandomAccessFileWrapper::Read(offset + header_size_, n, result, buf)); |
52 | 100k | RETURN_NOT_OK(stream_->Decrypt(offset, *result, scratch, counter_overflow_workaround)); |
53 | 100k | *result = Slice(scratch, result->size()); |
54 | 100k | return Status::OK(); |
55 | 100k | } |
56 | | |
57 | | Status EncryptedRandomAccessFile::Read( |
58 | 11 | uint64_t offset, size_t n, Slice* result, uint8_t* scratch) const { |
59 | 11 | return ReadInternal(offset, n, result, to_char_ptr(scratch), |
60 | 11 | EncryptionOverflowWorkaround::kFalse); |
61 | 11 | } |
62 | | |
63 | | Status EncryptedRandomAccessFile::ReadAndValidate( |
64 | 100k | uint64_t offset, size_t n, Slice* result, char* scratch, const ReadValidator& validator) { |
65 | 100k | if (!FLAGS_encryption_counter_overflow_read_path_workaround || |
66 | 100k | stream_->UseOpensslCompatibleCounterOverflow()) { |
67 | 50.1k | RETURN_NOT_OK(ReadInternal(offset, n, result, scratch, EncryptionOverflowWorkaround::kFalse)); |
68 | 50.1k | return validator.Validate(*result); |
69 | 50.1k | } |
70 | | |
71 | 50.1k | Status status_without_workaround; |
72 | 50.1k | for (auto counter_overflow_workaround : EncryptionOverflowWorkaround::kValues) { |
73 | 50.1k | RETURN_NOT_OK(ReadInternal(offset, n, result, scratch, counter_overflow_workaround)); |
74 | | |
75 | 50.1k | Status validation_status = validator.Validate(*result); |
76 | 50.1k | if (!counter_overflow_workaround) { |
77 | 50.1k | status_without_workaround = validation_status; |
78 | 50.1k | } |
79 | | |
80 | 50.1k | if (validation_status.ok()) { |
81 | 50.1k | if (counter_overflow_workaround) { |
82 | 24 | num_overflow_workarounds_.fetch_add(1, std::memory_order_relaxed); |
83 | 24 | } |
84 | 50.1k | return Status::OK(); |
85 | 50.1k | } |
86 | 50.1k | } |
87 | 0 | return status_without_workaround; |
88 | 50.1k | } |
89 | | |
90 | 4 | Result<uint64_t> EncryptedRandomAccessFile::Size() const { |
91 | 4 | return VERIFY_RESULT(RandomAccessFileWrapper::Size()) - header_size_; |
92 | 4 | } |
93 | | |
94 | | } // namespace encryption |
95 | | } // namespace yb |