blob: 34e0d2455881022423314108143002a129028b4b [file] [log] [blame]
Michael Halcrow9bd82122015-04-11 07:48:01 -04001/*
2 * linux/fs/ext4/ext4_crypto.h
3 *
4 * Copyright (C) 2015, Google, Inc.
5 *
6 * This contains encryption header content for ext4
7 *
8 * Written by Michael Halcrow, 2015.
9 */
10
11#ifndef _EXT4_CRYPTO_H
12#define _EXT4_CRYPTO_H
13
14#include <linux/fs.h>
15
16#define EXT4_KEY_DESCRIPTOR_SIZE 8
17
18/* Policy provided via an ioctl on the topmost directory */
19struct ext4_encryption_policy {
20 char version;
21 char contents_encryption_mode;
22 char filenames_encryption_mode;
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040023 char flags;
Michael Halcrow9bd82122015-04-11 07:48:01 -040024 char master_key_descriptor[EXT4_KEY_DESCRIPTOR_SIZE];
25} __attribute__((__packed__));
26
27#define EXT4_ENCRYPTION_CONTEXT_FORMAT_V1 1
28#define EXT4_KEY_DERIVATION_NONCE_SIZE 16
29
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040030#define EXT4_POLICY_FLAGS_PAD_4 0x00
31#define EXT4_POLICY_FLAGS_PAD_8 0x01
32#define EXT4_POLICY_FLAGS_PAD_16 0x02
33#define EXT4_POLICY_FLAGS_PAD_32 0x03
34#define EXT4_POLICY_FLAGS_PAD_MASK 0x03
35#define EXT4_POLICY_FLAGS_VALID 0x03
36
Michael Halcrow9bd82122015-04-11 07:48:01 -040037/**
38 * Encryption context for inode
39 *
40 * Protector format:
41 * 1 byte: Protector format (1 = this version)
42 * 1 byte: File contents encryption mode
43 * 1 byte: File names encryption mode
44 * 1 byte: Reserved
45 * 8 bytes: Master Key descriptor
46 * 16 bytes: Encryption Key derivation nonce
47 */
48struct ext4_encryption_context {
49 char format;
50 char contents_encryption_mode;
51 char filenames_encryption_mode;
Theodore Ts'oa44cd7a2015-05-01 16:56:50 -040052 char flags;
Michael Halcrow9bd82122015-04-11 07:48:01 -040053 char master_key_descriptor[EXT4_KEY_DESCRIPTOR_SIZE];
54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE];
55} __attribute__((__packed__));
56
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040057/* Encryption parameters */
58#define EXT4_XTS_TWEAK_SIZE 16
59#define EXT4_AES_128_ECB_KEY_SIZE 16
60#define EXT4_AES_256_GCM_KEY_SIZE 32
61#define EXT4_AES_256_CBC_KEY_SIZE 32
62#define EXT4_AES_256_CTS_KEY_SIZE 32
63#define EXT4_AES_256_XTS_KEY_SIZE 64
64#define EXT4_MAX_KEY_SIZE 64
65
Michael Halcrow88bd6cc2015-04-12 00:55:06 -040066#define EXT4_KEY_DESC_PREFIX "ext4:"
67#define EXT4_KEY_DESC_PREFIX_SIZE 5
68
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040069/* This is passed in from userspace into the kernel keyring */
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040070struct ext4_encryption_key {
Theodore Ts'oe2881b1b2015-05-18 13:16:47 -040071 __u32 mode;
72 char raw[EXT4_MAX_KEY_SIZE];
73 __u32 size;
74} __attribute__((__packed__));
75
76struct ext4_crypt_info {
Theodore Ts'ob7236e22015-05-18 13:17:47 -040077 char ci_data_mode;
78 char ci_filename_mode;
79 char ci_flags;
80 struct crypto_ablkcipher *ci_ctfm;
81 struct key *ci_keyring_key;
Theodore Ts'ob7236e22015-05-18 13:17:47 -040082 char ci_master_key[EXT4_KEY_DESCRIPTOR_SIZE];
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040083};
84
85#define EXT4_CTX_REQUIRES_FREE_ENCRYPT_FL 0x00000001
86#define EXT4_BOUNCE_PAGE_REQUIRES_FREE_ENCRYPT_FL 0x00000002
Theodore Ts'o614def72015-05-31 13:31:34 -040087#define EXT4_WRITE_PATH_FL 0x00000004
Michael Halcrowb30ab0e2015-04-12 00:43:56 -040088
89struct ext4_crypto_ctx {
Theodore Ts'o614def72015-05-31 13:31:34 -040090 union {
91 struct {
92 struct page *bounce_page; /* Ciphertext page */
93 struct page *control_page; /* Original page */
94 } w;
95 struct {
96 struct bio *bio;
97 struct work_struct work;
98 } r;
99 struct list_head free_list; /* Free list */
100 };
101 char flags; /* Flags */
102 char mode; /* Encryption mode for tfm */
Michael Halcrowb30ab0e2015-04-12 00:43:56 -0400103};
104
105struct ext4_completion_result {
106 struct completion completion;
107 int res;
108};
109
110#define DECLARE_EXT4_COMPLETION_RESULT(ecr) \
111 struct ext4_completion_result ecr = { \
112 COMPLETION_INITIALIZER((ecr).completion), 0 }
113
114static inline int ext4_encryption_key_size(int mode)
115{
116 switch (mode) {
117 case EXT4_ENCRYPTION_MODE_AES_256_XTS:
118 return EXT4_AES_256_XTS_KEY_SIZE;
119 case EXT4_ENCRYPTION_MODE_AES_256_GCM:
120 return EXT4_AES_256_GCM_KEY_SIZE;
121 case EXT4_ENCRYPTION_MODE_AES_256_CBC:
122 return EXT4_AES_256_CBC_KEY_SIZE;
123 case EXT4_ENCRYPTION_MODE_AES_256_CTS:
124 return EXT4_AES_256_CTS_KEY_SIZE;
125 default:
126 BUG();
127 }
128 return 0;
129}
130
Michael Halcrowd5d0e8c2015-04-12 00:56:17 -0400131#define EXT4_FNAME_NUM_SCATTER_ENTRIES 4
132#define EXT4_CRYPTO_BLOCK_SIZE 16
133#define EXT4_FNAME_CRYPTO_DIGEST_SIZE 32
134
135struct ext4_str {
136 unsigned char *name;
137 u32 len;
138};
139
Theodore Ts'of348c252015-04-16 01:55:00 -0400140/**
141 * For encrypted symlinks, the ciphertext length is stored at the beginning
142 * of the string in little-endian format.
143 */
144struct ext4_encrypted_symlink_data {
145 __le16 len;
146 char encrypted_path[1];
147} __attribute__((__packed__));
148
149/**
150 * This function is used to calculate the disk space required to
151 * store a filename of length l in encrypted symlink format.
152 */
153static inline u32 encrypted_symlink_data_len(u32 l)
154{
155 if (l < EXT4_CRYPTO_BLOCK_SIZE)
156 l = EXT4_CRYPTO_BLOCK_SIZE;
157 return (l + sizeof(struct ext4_encrypted_symlink_data) - 1);
158}
159
Michael Halcrow9bd82122015-04-11 07:48:01 -0400160#endif /* _EXT4_CRYPTO_H */