blob: a1d5021c31ef8f494b5ae96cd4e2129976e43ef3 [file] [log] [blame]
Theodore Ts'o3325bea2016-11-26 20:32:46 -05001/*
2 * fscrypt_private.h
3 *
4 * Copyright (C) 2015, Google, Inc.
5 *
6 * This contains encryption key functions.
7 *
8 * Written by Michael Halcrow, Ildar Muslukhov, and Uday Savagaonkar, 2015.
9 */
10
11#ifndef _FSCRYPT_PRIVATE_H
12#define _FSCRYPT_PRIVATE_H
13
Eric Biggers46f47e42017-01-24 10:58:06 -080014#include <linux/fscrypt_supp.h>
Daniel Walterb7e7cf72017-06-19 09:27:58 +020015#include <crypto/hash.h>
Theodore Ts'o3325bea2016-11-26 20:32:46 -050016
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050017/* Encryption parameters */
Daniel Walterb7e7cf72017-06-19 09:27:58 +020018#define FS_IV_SIZE 16
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050019#define FS_AES_128_ECB_KEY_SIZE 16
Daniel Walterb7e7cf72017-06-19 09:27:58 +020020#define FS_AES_128_CBC_KEY_SIZE 16
21#define FS_AES_128_CTS_KEY_SIZE 16
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050022#define FS_AES_256_GCM_KEY_SIZE 32
23#define FS_AES_256_CBC_KEY_SIZE 32
24#define FS_AES_256_CTS_KEY_SIZE 32
25#define FS_AES_256_XTS_KEY_SIZE 64
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050026
27#define FS_KEY_DERIVATION_NONCE_SIZE 16
28
29/**
30 * Encryption context for inode
31 *
32 * Protector format:
33 * 1 byte: Protector format (1 = this version)
34 * 1 byte: File contents encryption mode
35 * 1 byte: File names encryption mode
36 * 1 byte: Flags
37 * 8 bytes: Master Key descriptor
38 * 16 bytes: Encryption Key derivation nonce
39 */
40struct fscrypt_context {
41 u8 format;
42 u8 contents_encryption_mode;
43 u8 filenames_encryption_mode;
44 u8 flags;
45 u8 master_key_descriptor[FS_KEY_DESCRIPTOR_SIZE];
46 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE];
47} __packed;
48
49#define FS_ENCRYPTION_CONTEXT_FORMAT_V1 1
50
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050051/*
52 * A pointer to this structure is stored in the file system's in-core
53 * representation of an inode.
54 */
55struct fscrypt_info {
56 u8 ci_data_mode;
57 u8 ci_filename_mode;
58 u8 ci_flags;
59 struct crypto_skcipher *ci_ctfm;
Daniel Walterb7e7cf72017-06-19 09:27:58 +020060 struct crypto_cipher *ci_essiv_tfm;
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050061 u8 ci_master_key[FS_KEY_DESCRIPTOR_SIZE];
62};
63
Richard Weinberger58ae7462016-12-19 12:25:32 +010064typedef enum {
65 FS_DECRYPT = 0,
66 FS_ENCRYPT,
67} fscrypt_direction_t;
68
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050069#define FS_CTX_REQUIRES_FREE_ENCRYPT_FL 0x00000001
David Gstir6a34e4d2016-12-06 23:53:58 +010070#define FS_CTX_HAS_BOUNCE_BUFFER_FL 0x00000002
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050071
72struct fscrypt_completion_result {
73 struct completion completion;
74 int res;
75};
76
77#define DECLARE_FS_COMPLETION_RESULT(ecr) \
78 struct fscrypt_completion_result ecr = { \
Richard Weinbergerb14c8e62017-02-01 21:32:09 +010079 COMPLETION_INITIALIZER_ONSTACK((ecr).completion), 0 }
Theodore Ts'occ4e0df2016-11-26 22:05:18 -050080
81
Theodore Ts'ob98701df2016-11-26 20:43:09 -050082/* crypto.c */
Richard Weinberger58ae7462016-12-19 12:25:32 +010083extern int fscrypt_initialize(unsigned int cop_flags);
84extern struct workqueue_struct *fscrypt_read_workqueue;
85extern int fscrypt_do_page_crypto(const struct inode *inode,
86 fscrypt_direction_t rw, u64 lblk_num,
87 struct page *src_page,
88 struct page *dest_page,
89 unsigned int len, unsigned int offs,
90 gfp_t gfp_flags);
91extern struct page *fscrypt_alloc_bounce_page(struct fscrypt_ctx *ctx,
92 gfp_t gfp_flags);
Theodore Ts'ob98701df2016-11-26 20:43:09 -050093
Daniel Walterb7e7cf72017-06-19 09:27:58 +020094/* keyinfo.c */
95extern void __exit fscrypt_essiv_cleanup(void);
96
Theodore Ts'o3325bea2016-11-26 20:32:46 -050097#endif /* _FSCRYPT_PRIVATE_H */