blob: c5258f24221549a2d7ef8e48cbe473c99027c986 [file] [log] [blame]
Michael Halcrow9bd82122015-04-11 07:48:01 -04001/*
2 * linux/fs/ext4/ext4_crypto.h
3 *
4 * Copyright (C) 2015, Google, Inc.
5 *
6 * This contains encryption header content for ext4
7 *
8 * Written by Michael Halcrow, 2015.
9 */
10
11#ifndef _EXT4_CRYPTO_H
12#define _EXT4_CRYPTO_H
13
14#include <linux/fs.h>
15
16#define EXT4_KEY_DESCRIPTOR_SIZE 8
17
18/* Policy provided via an ioctl on the topmost directory */
19struct ext4_encryption_policy {
20 char version;
21 char contents_encryption_mode;
22 char filenames_encryption_mode;
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040023 char flags;
Michael Halcrow9bd82122015-04-11 07:48:01 -040024 char master_key_descriptor[EXT4_KEY_DESCRIPTOR_SIZE];
25} __attribute__((__packed__));
26
27#define EXT4_ENCRYPTION_CONTEXT_FORMAT_V1 1
28#define EXT4_KEY_DERIVATION_NONCE_SIZE 16
29
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040030#define EXT4_POLICY_FLAGS_PAD_4 0x00
31#define EXT4_POLICY_FLAGS_PAD_8 0x01
32#define EXT4_POLICY_FLAGS_PAD_16 0x02
33#define EXT4_POLICY_FLAGS_PAD_32 0x03
34#define EXT4_POLICY_FLAGS_PAD_MASK 0x03
35#define EXT4_POLICY_FLAGS_VALID 0x03
36
Michael Halcrow9bd82122015-04-11 07:48:01 -040037/**
38 * Encryption context for inode
39 *
40 * Protector format:
41 * 1 byte: Protector format (1 = this version)
42 * 1 byte: File contents encryption mode
43 * 1 byte: File names encryption mode
44 * 1 byte: Reserved
45 * 8 bytes: Master Key descriptor
46 * 16 bytes: Encryption Key derivation nonce
47 */
48struct ext4_encryption_context {
49 char format;
50 char contents_encryption_mode;
51 char filenames_encryption_mode;
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040052 char flags;
Michael Halcrow9bd82122015-04-11 07:48:01 -040053 char master_key_descriptor[EXT4_KEY_DESCRIPTOR_SIZE];
54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE];
55} __attribute__((__packed__));
56
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040057/* Encryption parameters */
58#define EXT4_XTS_TWEAK_SIZE 16
59#define EXT4_AES_128_ECB_KEY_SIZE 16
60#define EXT4_AES_256_GCM_KEY_SIZE 32
61#define EXT4_AES_256_CBC_KEY_SIZE 32
62#define EXT4_AES_256_CTS_KEY_SIZE 32
63#define EXT4_AES_256_XTS_KEY_SIZE 64
64#define EXT4_MAX_KEY_SIZE 64
65
Michael Halcrow88bd6cc2015-04-12 00:55:06 -040066#define EXT4_KEY_DESC_PREFIX "ext4:"
67#define EXT4_KEY_DESC_PREFIX_SIZE 5
68
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040069/* This is passed in from userspace into the kernel keyring */
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040070struct ext4_encryption_key {
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040071 __u32 mode;
72 char raw[EXT4_MAX_KEY_SIZE];
73 __u32 size;
74} __attribute__((__packed__));
75
76struct ext4_crypt_info {
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040077 unsigned char ci_size;
Theodore Ts'ob7236e22015-05-18 13:17:47 -040078 char ci_data_mode;
79 char ci_filename_mode;
80 char ci_flags;
81 struct crypto_ablkcipher *ci_ctfm;
82 struct key *ci_keyring_key;
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040083 char ci_raw[EXT4_MAX_KEY_SIZE];
Theodore Ts'ob7236e22015-05-18 13:17:47 -040084 char ci_master_key[EXT4_KEY_DESCRIPTOR_SIZE];
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040085};
86
87#define EXT4_CTX_REQUIRES_FREE_ENCRYPT_FL 0x00000001
88#define EXT4_BOUNCE_PAGE_REQUIRES_FREE_ENCRYPT_FL 0x00000002
Theodore Ts'o614def72015-05-31 13:31:34 -040089#define EXT4_WRITE_PATH_FL 0x00000004
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040090
91struct ext4_crypto_ctx {
92 struct crypto_tfm *tfm; /* Crypto API context */
Theodore Ts'o614def72015-05-31 13:31:34 -040093 union {
94 struct {
95 struct page *bounce_page; /* Ciphertext page */
96 struct page *control_page; /* Original page */
97 } w;
98 struct {
99 struct bio *bio;
100 struct work_struct work;
101 } r;
102 struct list_head free_list; /* Free list */
103 };
104 char flags; /* Flags */
105 char mode; /* Encryption mode for tfm */
Michael Halcrowb30ab0e2015-04-12 00:43:56 -0400106};
107
108struct ext4_completion_result {
109 struct completion completion;
110 int res;
111};
112
113#define DECLARE_EXT4_COMPLETION_RESULT(ecr) \
114 struct ext4_completion_result ecr = { \
115 COMPLETION_INITIALIZER((ecr).completion), 0 }
116
117static inline int ext4_encryption_key_size(int mode)
118{
119 switch (mode) {
120 case EXT4_ENCRYPTION_MODE_AES_256_XTS:
121 return EXT4_AES_256_XTS_KEY_SIZE;
122 case EXT4_ENCRYPTION_MODE_AES_256_GCM:
123 return EXT4_AES_256_GCM_KEY_SIZE;
124 case EXT4_ENCRYPTION_MODE_AES_256_CBC:
125 return EXT4_AES_256_CBC_KEY_SIZE;
126 case EXT4_ENCRYPTION_MODE_AES_256_CTS:
127 return EXT4_AES_256_CTS_KEY_SIZE;
128 default:
129 BUG();
130 }
131 return 0;
132}
133
Michael Halcrowd5d0e8c2015-04-12 00:56:17 -0400134#define EXT4_FNAME_NUM_SCATTER_ENTRIES 4
135#define EXT4_CRYPTO_BLOCK_SIZE 16
136#define EXT4_FNAME_CRYPTO_DIGEST_SIZE 32
137
138struct ext4_str {
139 unsigned char *name;
140 u32 len;
141};
142
Theodore Ts'of348c252015-04-16 01:55:00 -0400143/**
144 * For encrypted symlinks, the ciphertext length is stored at the beginning
145 * of the string in little-endian format.
146 */
147struct ext4_encrypted_symlink_data {
148 __le16 len;
149 char encrypted_path[1];
150} __attribute__((__packed__));
151
152/**
153 * This function is used to calculate the disk space required to
154 * store a filename of length l in encrypted symlink format.
155 */
156static inline u32 encrypted_symlink_data_len(u32 l)
157{
158 if (l < EXT4_CRYPTO_BLOCK_SIZE)
159 l = EXT4_CRYPTO_BLOCK_SIZE;
160 return (l + sizeof(struct ext4_encrypted_symlink_data) - 1);
161}
162
Michael Halcrow9bd82122015-04-11 07:48:01 -0400163#endif /* _EXT4_CRYPTO_H */