blob: 0b4cda65e022d8cda4ac7cc4f12cd038acc9060d [file] [log] [blame]
Ken Sumrall8f869aa2010-12-03 03:47:09 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17/* This structure starts 16,384 bytes before the end of a hardware
Ken Sumrall160b4d62013-04-22 12:15:39 -070018 * partition that is encrypted, or in a separate partition. It's location
19 * is specified by a property set in init.<device>.rc.
20 * The structure allocates 48 bytes for a key, but the real key size is
21 * specified in the struct. Currently, the code is hardcoded to use 128
22 * bit keys.
23 * The fields after salt are only valid in rev 1.1 and later stuctures.
Ken Sumrall8f869aa2010-12-03 03:47:09 -080024 * Obviously, the filesystem does not include the last 16 kbytes
Ken Sumrall160b4d62013-04-22 12:15:39 -070025 * of the partition if the crypt_mnt_ftr lives at the end of the
26 * partition.
Ken Sumrall8f869aa2010-12-03 03:47:09 -080027 */
28
Ken Sumrall160b4d62013-04-22 12:15:39 -070029#include <cutils/properties.h>
Paul Lawrence87999172014-02-20 12:21:31 -080030#include <openssl/sha.h>
Ken Sumrall160b4d62013-04-22 12:15:39 -070031
Kenny Rootc96a5f82013-06-14 12:08:28 -070032/* The current cryptfs version */
33#define CURRENT_MAJOR_VERSION 1
Paul Lawrencef4faa572014-01-29 13:31:03 -080034#define CURRENT_MINOR_VERSION 3
Kenny Rootc96a5f82013-06-14 12:08:28 -070035
Ken Sumrall8f869aa2010-12-03 03:47:09 -080036#define CRYPT_FOOTER_OFFSET 0x4000
Ken Sumrall160b4d62013-04-22 12:15:39 -070037#define CRYPT_FOOTER_TO_PERSIST_OFFSET 0x1000
38#define CRYPT_PERSIST_DATA_SIZE 0x1000
Ken Sumrall8f869aa2010-12-03 03:47:09 -080039
40#define MAX_CRYPTO_TYPE_NAME_LEN 64
41
Ken Sumrall160b4d62013-04-22 12:15:39 -070042#define MAX_KEY_LEN 48
Ken Sumralle8744072011-01-18 22:01:55 -080043#define SALT_LEN 16
Paul Lawrenced0c7b172014-08-08 14:28:10 -070044#define SCRYPT_LEN 32
Ken Sumralle8744072011-01-18 22:01:55 -080045
Ken Sumrall8f869aa2010-12-03 03:47:09 -080046/* definitions of flags in the structure below */
47#define CRYPT_MNT_KEY_UNENCRYPTED 0x1 /* The key for the partition is not encrypted. */
Paul Lawrence6bfed202014-07-28 12:47:22 -070048#define CRYPT_ENCRYPTION_IN_PROGRESS 0x2 /* Encryption partially completed,
49 encrypted_upto valid*/
50#define CRYPT_INCONSISTENT_STATE 0x4 /* Set when starting encryption, clear when
51 exit cleanly, either through success or
52 correctly marked partial encryption */
Ken Sumrall8f869aa2010-12-03 03:47:09 -080053
Paul Lawrencef4faa572014-01-29 13:31:03 -080054/* Allowed values for type in the structure below */
55#define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
56 * Must be zero to be compatible with pre-L
57 * devices where type is always password.*/
58#define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
59 * password */
60#define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
61#define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
62#define CRYPT_TYPE_MAX_TYPE 3 /* type cannot be larger than this value */
63
Ken Sumrall8f869aa2010-12-03 03:47:09 -080064#define CRYPT_MNT_MAGIC 0xD0B5B1C4
Ken Sumrall160b4d62013-04-22 12:15:39 -070065#define PERSIST_DATA_MAGIC 0xE950CD44
Ken Sumrall8f869aa2010-12-03 03:47:09 -080066
Kenny Rootc4c70f12013-06-14 12:11:38 -070067#define SCRYPT_PROP "ro.crypto.scrypt_params"
68#define SCRYPT_DEFAULTS { 15, 3, 1 }
69
70/* Key Derivation Function algorithms */
71#define KDF_PBKDF2 1
72#define KDF_SCRYPT 2
Paul Lawrence69f4ebd2014-04-14 12:17:14 -070073#define KDF_SCRYPT_KEYMASTER 3
74
75/* Maximum allowed keymaster blob size. */
76#define KEYMASTER_BLOB_SIZE 2048
Kenny Rootc4c70f12013-06-14 12:11:38 -070077
Mark Salyzyn3e971272014-01-21 13:27:04 -080078/* __le32 and __le16 defined in system/extras/ext4_utils/ext4_utils.h */
Kenny Rootc4c70f12013-06-14 12:11:38 -070079#define __le8 unsigned char
Ken Sumrall8f869aa2010-12-03 03:47:09 -080080
81struct crypt_mnt_ftr {
Paul Lawrencef4faa572014-01-29 13:31:03 -080082 __le32 magic; /* See above */
Ken Sumrall8f869aa2010-12-03 03:47:09 -080083 __le16 major_version;
84 __le16 minor_version;
Paul Lawrencef4faa572014-01-29 13:31:03 -080085 __le32 ftr_size; /* in bytes, not including key following */
86 __le32 flags; /* See above */
87 __le32 keysize; /* in bytes */
88 __le32 crypt_type; /* how master_key is encrypted. Must be a
89 * CRYPT_TYPE_XXX value */
Ken Sumrall8f869aa2010-12-03 03:47:09 -080090 __le64 fs_size; /* Size of the encrypted fs, in 512 byte sectors */
91 __le32 failed_decrypt_count; /* count of # of failed attempts to decrypt and
Paul Lawrence87999172014-02-20 12:21:31 -080092 mount, set to 0 on successful mount */
Ken Sumrall8f869aa2010-12-03 03:47:09 -080093 unsigned char crypto_type_name[MAX_CRYPTO_TYPE_NAME_LEN]; /* The type of encryption
Paul Lawrence87999172014-02-20 12:21:31 -080094 needed to decrypt this
95 partition, null terminated */
Ken Sumrall160b4d62013-04-22 12:15:39 -070096 __le32 spare2; /* ignored */
97 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */
98 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */
99 __le64 persist_data_offset[2]; /* Absolute offset to both copies of crypt_persist_data
100 * on device with that info, either the footer of the
101 * real_blkdevice or the metadata partition. */
102
103 __le32 persist_data_size; /* The number of bytes allocated to each copy of the
104 * persistent data table*/
Kenny Rootc4c70f12013-06-14 12:11:38 -0700105
106 __le8 kdf_type; /* The key derivation function used. */
107
108 /* scrypt parameters. See www.tarsnap.com/scrypt/scrypt.pdf */
109 __le8 N_factor; /* (1 << N) */
110 __le8 r_factor; /* (1 << r) */
111 __le8 p_factor; /* (1 << p) */
Paul Lawrence87999172014-02-20 12:21:31 -0800112 __le64 encrypted_upto; /* If we are in state CRYPT_ENCRYPTION_IN_PROGRESS and
113 we have to stop (e.g. power low) this is the last
114 encrypted 512 byte sector.*/
115 __le8 hash_first_block[SHA256_DIGEST_LENGTH]; /* When CRYPT_ENCRYPTION_IN_PROGRESS
116 set, hash of first block, used
117 to validate before continuing*/
Paul Lawrence69f4ebd2014-04-14 12:17:14 -0700118
Paul Lawrenced0c7b172014-08-08 14:28:10 -0700119 /* key_master key, used to sign the derived key which is then used to generate
120 * the intermediate key
Paul Lawrence69f4ebd2014-04-14 12:17:14 -0700121 * This key should be used for no other purposes! We use this key to sign unpadded
122 * data, which is acceptable but only if the key is not reused elsewhere. */
123 __le8 keymaster_blob[KEYMASTER_BLOB_SIZE];
124 __le32 keymaster_blob_size;
Paul Lawrenced0c7b172014-08-08 14:28:10 -0700125
126 /* Store scrypt of salted intermediate key. When decryption fails, we can
127 check if this matches, and if it does, we know that the problem is with the
128 drive, and there is no point in asking the user for more passwords.
129
130 Note that if any part of this structure is corrupt, this will not match and
131 we will continue to believe the user entered the wrong password. In that
132 case the only solution is for the user to enter a password enough times to
133 force a wipe.
134
135 Note also that there is no need to worry about migration. If this data is
136 wrong, we simply won't recognise a right password, and will continue to
137 prompt. On the first password change, this value will be populated and
138 then we will be OK.
139 */
140 unsigned char scrypted_intermediate_key[SCRYPT_LEN];
Ken Sumrall160b4d62013-04-22 12:15:39 -0700141};
142
143/* Persistant data that should be available before decryption.
144 * Things like airplane mode, locale and timezone are kept
145 * here and can be retrieved by the CryptKeeper UI to properly
146 * configure the phone before asking for the password
147 * This is only valid if the major and minor version above
148 * is set to 1.1 or higher.
149 *
150 * This is a 4K structure. There are 2 copies, and the code alternates
151 * writing one and then clearing the previous one. The reading
152 * code reads the first valid copy it finds, based on the magic number.
153 * The absolute offset to the first of the two copies is kept in rev 1.1
154 * and higher crypt_mnt_ftr structures.
155 */
156struct crypt_persist_entry {
157 char key[PROPERTY_KEY_MAX];
158 char val[PROPERTY_VALUE_MAX];
159};
160
161/* Should be exactly 4K in size */
162struct crypt_persist_data {
163 __le32 persist_magic;
164 __le32 persist_valid_entries;
165 __le32 persist_spare[30];
166 struct crypt_persist_entry persist_entry[0];
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800167};
168
Ken Sumrall29d8da82011-05-18 17:20:07 -0700169struct volume_info {
170 unsigned int size;
171 unsigned int flags;
172 struct crypt_mnt_ftr crypt_ftr;
173 char mnt_point[256];
174 char blk_dev[256];
175 char crypto_blkdev[256];
176 char label[256];
177};
Jeff Sharkeyba6ae8d2013-07-15 18:14:25 -0700178#define VOL_NONREMOVABLE 0x1
179#define VOL_ENCRYPTABLE 0x2
180#define VOL_PRIMARY 0x4
181#define VOL_PROVIDES_ASEC 0x8
Ken Sumrall29d8da82011-05-18 17:20:07 -0700182
JP Abgrall502dc742013-11-01 13:06:20 -0700183#define DATA_MNT_POINT "/data"
184
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800185#ifdef __cplusplus
186extern "C" {
187#endif
Kenny Rootc4c70f12013-06-14 12:11:38 -0700188
Paul Lawrence69f4ebd2014-04-14 12:17:14 -0700189 typedef int (*kdf_func)(const char *passwd, const unsigned char *salt,
Paul Lawrence13486032014-02-03 13:28:11 -0800190 unsigned char *ikey, void *params);
Kenny Rootc4c70f12013-06-14 12:11:38 -0700191
Ken Sumrall7f7dbaa2011-02-01 15:46:41 -0800192 int cryptfs_crypto_complete(void);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800193 int cryptfs_check_passwd(char *pw);
Ken Sumrall3ad90722011-10-04 20:38:29 -0700194 int cryptfs_verify_passwd(char *newpw);
Ken Sumrall6864b7e2011-01-14 15:20:02 -0800195 int cryptfs_restart(void);
Paul Lawrence45f10532014-04-04 18:11:56 +0000196 int cryptfs_enable(char *flag, int type, char *passwd, int allow_reboot);
Paul Lawrence13486032014-02-03 13:28:11 -0800197 int cryptfs_changepw(int type, const char *newpw);
198 int cryptfs_enable_default(char *flag, int allow_reboot);
Ken Sumrall29d8da82011-05-18 17:20:07 -0700199 int cryptfs_setup_volume(const char *label, int major, int minor,
200 char *crypto_dev_path, unsigned int max_pathlen,
201 int *new_major, int *new_minor);
Ken Sumrall0b8b5972011-08-31 16:14:23 -0700202 int cryptfs_revert_volume(const char *label);
Ken Sumrall160b4d62013-04-22 12:15:39 -0700203 int cryptfs_getfield(char *fieldname, char *value, int len);
204 int cryptfs_setfield(char *fieldname, char *value);
Paul Lawrencef4faa572014-01-29 13:31:03 -0800205 int cryptfs_mount_default_encrypted(void);
206 int cryptfs_get_password_type(void);
Paul Lawrence399317e2014-03-10 13:20:50 -0700207 char* cryptfs_get_password(void);
208 void cryptfs_clear_password(void);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800209#ifdef __cplusplus
210}
211#endif
212