parquet-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From mdee...@apache.org
Subject [parquet-cpp] branch master updated: PARQUET-1301: [C++] Crypto package in parquet-cpp
Date Sat, 04 Aug 2018 22:40:57 GMT
This is an automated email from the ASF dual-hosted git repository.

mdeepak pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/parquet-cpp.git


The following commit(s) were added to refs/heads/master by this push:
     new 63f41b0  PARQUET-1301: [C++] Crypto package in parquet-cpp
63f41b0 is described below

commit 63f41b00bddecb172bd5b3aa0366b4653f498811
Author: Gidon Gershinsky <gidon@il.ibm.com>
AuthorDate: Sat Aug 4 18:40:49 2018 -0400

    PARQUET-1301: [C++] Crypto package in parquet-cpp
    
    Author: Gidon Gershinsky <gidon@il.ibm.com>
    
    Closes #464 from ggershinsky/p1301-crypto-package and squashes the following commits:
    
    42fe125 [Gidon Gershinsky] post-review changes
    ad17fbe [Gidon Gershinsky] fix lint issues
    b5e40b1 [Gidon Gershinsky] post-review changes
    20b496f [Gidon Gershinsky] EncryptionProperties input and other review changes
    35a4830 [Gidon Gershinsky] fix import order
    b3affc5 [Gidon Gershinsky] change import order
    fc5d77d [Gidon Gershinsky] version fix
    a11507e [Gidon Gershinsky] 2nd cipher + review comments
    63fa9a3 [Gidon Gershinsky] version fix
    8e384d4 [Gidon Gershinsky] The C++ implementation of basic AES-GCM encryption and decryption
---
 src/parquet/types.h        |   8 +
 src/parquet/util/crypto.cc | 369 +++++++++++++++++++++++++++++++++++++++++++++
 src/parquet/util/crypto.h  |  44 ++++++
 3 files changed, 421 insertions(+)

diff --git a/src/parquet/types.h b/src/parquet/types.h
index 0f4cfc2..aec9965 100644
--- a/src/parquet/types.h
+++ b/src/parquet/types.h
@@ -113,6 +113,14 @@ struct Compression {
   enum type { UNCOMPRESSED, SNAPPY, GZIP, LZO, BROTLI, LZ4, ZSTD };
 };
 
+struct Encryption {
+  enum type {
+    AES_GCM_V1 = 0,
+    AES_GCM_CTR_V1 = 1
+  };
+};
+
+
 // parquet::PageType
 struct PageType {
   enum type { DATA_PAGE, INDEX_PAGE, DICTIONARY_PAGE, DATA_PAGE_V2 };
diff --git a/src/parquet/util/crypto.cc b/src/parquet/util/crypto.cc
new file mode 100644
index 0000000..59383d1
--- /dev/null
+++ b/src/parquet/util/crypto.cc
@@ -0,0 +1,369 @@
+// Licensed to the Apache Software Foundation (ASF) under one
+// or more contributor license agreements.  See the NOTICE file
+// distributed with this work for additional information
+// regarding copyright ownership.  The ASF licenses this file
+// to you under the Apache License, Version 2.0 (the
+// "License"); you may not use this file except in compliance
+// with the License.  You may obtain a copy of the License at
+//
+//   http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing,
+// software distributed under the License is distributed on an
+// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+// KIND, either express or implied.  See the License for the
+// specific language governing permissions and limitations
+// under the License.
+
+#include "parquet/util/crypto.h"
+#include <openssl/aes.h>
+#include <openssl/evp.h>
+#include <openssl/rand.h>
+#include <algorithm>
+#include <iostream>
+#include <memory>
+#include <sstream>
+#include <string>
+#include "parquet/exception.h"
+
+using parquet::ParquetException;
+
+namespace parquet_encryption {
+
+constexpr int aesGcm = 0;
+constexpr int aesCtr = 1;
+constexpr int encryptType = 0;
+constexpr int decryptType = 1;
+constexpr int gcmTagLen = 16;
+constexpr int gcmIvLen = 12;
+constexpr int ctrIvLen = 16;
+constexpr int rndMaxBytes = 32;
+
+#define ENCRYPT_INIT(CTX, ALG)                                        \
+  if (1 != EVP_EncryptInit_ex(CTX, ALG, nullptr, nullptr, nullptr)) { \
+    throw ParquetException("Couldn't init ALG encryption");           \
+  }
+
+#define DECRYPT_INIT(CTX, ALG)                                        \
+  if (1 != EVP_DecryptInit_ex(CTX, ALG, nullptr, nullptr, nullptr)) { \
+    throw ParquetException("Couldn't init ALG decryption");           \
+  }
+
+class EvpCipher {
+ public:
+  explicit EvpCipher(int cipher, int key_len, int type) {
+    ctx_ = nullptr;
+
+    if (aesGcm != cipher && aesCtr != cipher) {
+      std::stringstream ss;
+      ss << "Wrong cipher: " << cipher;
+      throw ParquetException(ss.str());
+    }
+
+    if (16 != key_len && 24 != key_len && 32 != key_len) {
+      std::stringstream ss;
+      ss << "Wrong key length: " << key_len;
+      throw ParquetException(ss.str());
+    }
+
+    if (encryptType != type && decryptType != type) {
+      std::stringstream ss;
+      ss << "Wrong cipher type: " << type;
+      throw ParquetException(ss.str());
+    }
+
+    ctx_ = EVP_CIPHER_CTX_new();
+    if (nullptr == ctx_) {
+      throw ParquetException("Couldn't init cipher context");
+    }
+
+    if (aesGcm == cipher) {
+      // Init AES-GCM with specified key length
+      if (16 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_128_gcm());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_128_gcm());
+        }
+      } else if (24 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_192_gcm());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_192_gcm());
+        }
+      } else if (32 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_256_gcm());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_256_gcm());
+        }
+      }
+    } else {
+      // Init AES-CTR with specified key length
+      if (16 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_128_ctr());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_128_ctr());
+        }
+      } else if (24 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_192_ctr());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_192_ctr());
+        }
+      } else if (32 == key_len) {
+        if (encryptType == type) {
+          ENCRYPT_INIT(ctx_, EVP_aes_256_ctr());
+        } else {
+          DECRYPT_INIT(ctx_, EVP_aes_256_ctr());
+        }
+      }
+    }
+  }
+
+  EVP_CIPHER_CTX* get() { return ctx_; }
+
+  ~EvpCipher() {
+    if (nullptr != ctx_) {
+      EVP_CIPHER_CTX_free(ctx_);
+    }
+  }
+
+ private:
+  EVP_CIPHER_CTX* ctx_;
+};
+
+int gcm_encrypt(const uint8_t* plaintext, int plaintext_len, uint8_t* key, int key_len,
+                uint8_t* aad, int aad_len, uint8_t* ciphertext) {
+  int len;
+  int ciphertext_len;
+
+  uint8_t tag[gcmTagLen];
+  memset(tag, 0, gcmTagLen);
+  uint8_t iv[gcmIvLen];
+  memset(iv, 0, gcmIvLen);
+
+  // Random IV
+  RAND_load_file("/dev/urandom", rndMaxBytes);
+  RAND_bytes(iv, sizeof(iv));
+
+  // Init cipher context
+  EvpCipher cipher(aesGcm, key_len, encryptType);
+
+  // Setting key and IV
+  if (1 != EVP_EncryptInit_ex(cipher.get(), nullptr, nullptr, key, iv)) {
+    throw ParquetException("Couldn't set key and IV");
+  }
+
+  // Setting additional authenticated data
+  if ((nullptr != aad) &&
+      (1 != EVP_EncryptUpdate(cipher.get(), nullptr, &len, aad, aad_len))) {
+    throw ParquetException("Couldn't set AAD");
+  }
+
+  // Encryption
+  if (1 != EVP_EncryptUpdate(cipher.get(), ciphertext + gcmIvLen, &len, plaintext,
+                             plaintext_len)) {
+    throw ParquetException("Failed encryption update");
+  }
+
+  ciphertext_len = len;
+
+  // Finalization
+  if (1 != EVP_EncryptFinal_ex(cipher.get(), ciphertext + gcmIvLen + len, &len)) {
+    throw ParquetException("Failed encryption finalization");
+  }
+
+  ciphertext_len += len;
+
+  // Getting the tag
+  if (1 != EVP_CIPHER_CTX_ctrl(cipher.get(), EVP_CTRL_GCM_GET_TAG, gcmTagLen, tag)) {
+    throw ParquetException("Couldn't get AES-GCM tag");
+  }
+
+  // Copying the IV and tag to ciphertext
+  std::copy(iv, iv + gcmIvLen, ciphertext);
+  std::copy(tag, tag + gcmTagLen, ciphertext + gcmIvLen + ciphertext_len);
+
+  return gcmIvLen + ciphertext_len + gcmTagLen;
+}
+
+int ctr_encrypt(const uint8_t* plaintext, int plaintext_len, uint8_t* key, int key_len,
+                uint8_t* ciphertext) {
+  int len;
+  int ciphertext_len;
+
+  uint8_t iv[ctrIvLen];
+  memset(iv, 0, ctrIvLen);
+
+  // Random IV
+  RAND_load_file("/dev/urandom", rndMaxBytes);
+  RAND_bytes(iv, sizeof(iv));
+
+  // Init cipher context
+  EvpCipher cipher(aesCtr, key_len, encryptType);
+
+  // Setting key and IV
+  if (1 != EVP_EncryptInit_ex(cipher.get(), nullptr, nullptr, key, iv)) {
+    throw ParquetException("Couldn't set key and IV");
+  }
+
+  // Encryption
+  if (1 != EVP_EncryptUpdate(cipher.get(), ciphertext + ctrIvLen, &len, plaintext,
+                             plaintext_len)) {
+    throw ParquetException("Failed encryption update");
+  }
+
+  ciphertext_len = len;
+
+  // Finalization
+  if (1 != EVP_EncryptFinal_ex(cipher.get(), ciphertext + ctrIvLen + len, &len)) {
+    throw ParquetException("Failed encryption finalization");
+  }
+
+  ciphertext_len += len;
+
+  // Copying the IV ciphertext
+  std::copy(iv, iv + ctrIvLen, ciphertext);
+
+  return ctrIvLen + ciphertext_len;
+}
+
+int Encrypt(Encryption::type alg_id, bool metadata, const uint8_t* plaintext,
+            int plaintext_len, uint8_t* key, int key_len, uint8_t* aad, int aad_len,
+            uint8_t* ciphertext) {
+  if (Encryption::AES_GCM_V1 != alg_id && Encryption::AES_GCM_CTR_V1 != alg_id) {
+    std::stringstream ss;
+    ss << "Crypto algorithm " << alg_id << " is not supported";
+    throw ParquetException(ss.str());
+  }
+
+  if (metadata || (Encryption::AES_GCM_V1 == alg_id)) {
+    return gcm_encrypt(plaintext, plaintext_len, key, key_len, aad, aad_len, ciphertext);
+  }
+
+  // Data (page) encryption with AES_GCM_CTR_V1
+  return ctr_encrypt(plaintext, plaintext_len, key, key_len, ciphertext);
+}
+
+int Encrypt(std::shared_ptr<EncryptionProperties> encryption_props, bool metadata,
+            const uint8_t* plaintext, int plaintext_len, uint8_t* ciphertext) {
+  return Encrypt(encryption_props->algorithm(), metadata, plaintext, plaintext_len,
+                 encryption_props->key_bytes(), encryption_props->key_length(),
+                 encryption_props->aad_bytes(), encryption_props->aad_length(),
+                 ciphertext);
+}
+
+int gcm_decrypt(const uint8_t* ciphertext, int ciphertext_len, uint8_t* key, int key_len,
+                uint8_t* aad, int aad_len, uint8_t* plaintext) {
+  int len;
+  int plaintext_len;
+
+  uint8_t tag[gcmTagLen];
+  memset(tag, 0, gcmTagLen);
+  uint8_t iv[gcmIvLen];
+  memset(iv, 0, gcmIvLen);
+
+  // Extracting IV and tag
+  std::copy(ciphertext, ciphertext + gcmIvLen, iv);
+  std::copy(ciphertext + ciphertext_len - gcmTagLen, ciphertext + ciphertext_len, tag);
+
+  // Init cipher context
+  EvpCipher cipher(aesGcm, key_len, decryptType);
+
+  // Setting key and IV
+  if (1 != EVP_DecryptInit_ex(cipher.get(), nullptr, nullptr, key, iv)) {
+    throw ParquetException("Couldn't set key and IV");
+  }
+
+  // Setting additional authenticated data
+  if ((nullptr != aad) &&
+      (1 != EVP_DecryptUpdate(cipher.get(), nullptr, &len, aad, aad_len))) {
+    throw ParquetException("Couldn't set AAD");
+  }
+
+  // Decryption
+  if (!EVP_DecryptUpdate(cipher.get(), plaintext, &len, ciphertext + gcmIvLen,
+                         ciphertext_len - gcmIvLen - gcmTagLen)) {
+    throw ParquetException("Failed decryption update");
+  }
+
+  plaintext_len = len;
+
+  // Checking the tag (authentication)
+  if (!EVP_CIPHER_CTX_ctrl(cipher.get(), EVP_CTRL_GCM_SET_TAG, gcmTagLen, tag)) {
+    throw ParquetException("Failed authentication");
+  }
+
+  // Finalization
+  if (1 != EVP_DecryptFinal_ex(cipher.get(), plaintext + len, &len)) {
+    throw ParquetException("Failed decryption finalization");
+  }
+
+  plaintext_len += len;
+  return plaintext_len;
+}
+
+int ctr_decrypt(const uint8_t* ciphertext, int ciphertext_len, uint8_t* key, int key_len,
+                uint8_t* plaintext) {
+  int len;
+  int plaintext_len;
+
+  uint8_t iv[ctrIvLen];
+  memset(iv, 0, ctrIvLen);
+
+  // Extracting IV and tag
+  std::copy(ciphertext, ciphertext + ctrIvLen, iv);
+
+  // Init cipher context
+  EvpCipher cipher(aesCtr, key_len, decryptType);
+
+  // Setting key and IV
+  if (1 != EVP_DecryptInit_ex(cipher.get(), nullptr, nullptr, key, iv)) {
+    throw ParquetException("Couldn't set key and IV");
+  }
+
+  // Decryption
+  if (!EVP_DecryptUpdate(cipher.get(), plaintext, &len, ciphertext + ctrIvLen,
+                         ciphertext_len - ctrIvLen)) {
+    throw ParquetException("Failed decryption update");
+  }
+
+  plaintext_len = len;
+
+  // Finalization
+  if (1 != EVP_DecryptFinal_ex(cipher.get(), plaintext + len, &len)) {
+    throw ParquetException("Failed decryption finalization");
+  }
+
+  plaintext_len += len;
+  return plaintext_len;
+}
+
+int Decrypt(Encryption::type alg_id, bool metadata, const uint8_t* ciphertext,
+            int ciphertext_len, uint8_t* key, int key_len, uint8_t* aad, int aad_len,
+            uint8_t* plaintext) {
+  if (Encryption::AES_GCM_V1 != alg_id && Encryption::AES_GCM_CTR_V1 != alg_id) {
+    std::stringstream ss;
+    ss << "Crypto algorithm " << alg_id << " is not supported";
+    throw ParquetException(ss.str());
+  }
+
+  if (metadata || (Encryption::AES_GCM_V1 == alg_id)) {
+    return gcm_decrypt(ciphertext, ciphertext_len, key, key_len, aad, aad_len, plaintext);
+  }
+
+  // Data (page) decryption with AES_GCM_CTR_V1
+  return ctr_decrypt(ciphertext, ciphertext_len, key, key_len, plaintext);
+}
+
+int Decrypt(std::shared_ptr<EncryptionProperties> encryption_props, bool metadata,
+            const uint8_t* ciphertext, int ciphertext_len, uint8_t* plaintext) {
+  return Decrypt(encryption_props->algorithm(), metadata, ciphertext, ciphertext_len,
+                 encryption_props->key_bytes(), encryption_props->key_length(),
+                 encryption_props->aad_bytes(), encryption_props->aad_length(),
+                 plaintext);
+}
+
+}  // namespace parquet_encryption
diff --git a/src/parquet/util/crypto.h b/src/parquet/util/crypto.h
new file mode 100644
index 0000000..d3beb10
--- /dev/null
+++ b/src/parquet/util/crypto.h
@@ -0,0 +1,44 @@
+// Licensed to the Apache Software Foundation (ASF) under one
+// or more contributor license agreements.  See the NOTICE file
+// distributed with this work for additional information
+// regarding copyright ownership.  The ASF licenses this file
+// to you under the Apache License, Version 2.0 (the
+// "License"); you may not use this file except in compliance
+// with the License.  You may obtain a copy of the License at
+//
+//   http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing,
+// software distributed under the License is distributed on an
+// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+// KIND, either express or implied.  See the License for the
+// specific language governing permissions and limitations
+// under the License.
+
+#ifndef PARQUET_UTIL_CRYPTO_H
+#define PARQUET_UTIL_CRYPTO_H
+
+#include "parquet/properties.h"
+#include "parquet/types.h"
+
+using parquet::Encryption;
+using parquet::EncryptionProperties;
+
+namespace parquet_encryption {
+
+int Encrypt(Encryption::type alg_id, bool metadata, const uint8_t* plaintext,
+            int plaintext_len, uint8_t* key, int key_len, uint8_t* aad, int aad_len,
+            uint8_t* ciphertext);
+
+int Encrypt(std::shared_ptr<EncryptionProperties> encryption_props, bool metadata,
+            const uint8_t* plaintext, int plaintext_len, uint8_t* ciphertext);
+
+int Decrypt(Encryption::type alg_id, bool metadata, const uint8_t* ciphertext,
+            int ciphertext_len, uint8_t* key, int key_len, uint8_t* aad, int aad_len,
+            uint8_t* plaintext);
+
+int Decrypt(std::shared_ptr<EncryptionProperties> encryption_props, bool metadata,
+            const uint8_t* ciphertext, int ciphertext_len, uint8_t* plaintext);
+}  // namespace parquet_encryption
+
+#endif  // PARQUET_UTIL_CRYPTO_H


Mime
View raw message