ecryptfs.h 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. #ifndef _LINUX_ECRYPTFS_H
  2. #define _LINUX_ECRYPTFS_H
  3. /* Version verification for shared data structures w/ userspace */
  4. #define ECRYPTFS_VERSION_MAJOR 0x00
  5. #define ECRYPTFS_VERSION_MINOR 0x04
  6. #define ECRYPTFS_SUPPORTED_FILE_VERSION 0x03
  7. /* These flags indicate which features are supported by the kernel
  8. * module; userspace tools such as the mount helper read
  9. * ECRYPTFS_VERSIONING_MASK from a sysfs handle in order to determine
  10. * how to behave. */
  11. #define ECRYPTFS_VERSIONING_PASSPHRASE 0x00000001
  12. #define ECRYPTFS_VERSIONING_PUBKEY 0x00000002
  13. #define ECRYPTFS_VERSIONING_PLAINTEXT_PASSTHROUGH 0x00000004
  14. #define ECRYPTFS_VERSIONING_POLICY 0x00000008
  15. #define ECRYPTFS_VERSIONING_XATTR 0x00000010
  16. #define ECRYPTFS_VERSIONING_MULTKEY 0x00000020
  17. #define ECRYPTFS_VERSIONING_DEVMISC 0x00000040
  18. #define ECRYPTFS_VERSIONING_HMAC 0x00000080
  19. #define ECRYPTFS_VERSIONING_FILENAME_ENCRYPTION 0x00000100
  20. #define ECRYPTFS_VERSIONING_GCM 0x00000200
  21. #define ECRYPTFS_VERSIONING_MASK (ECRYPTFS_VERSIONING_PASSPHRASE \
  22. | ECRYPTFS_VERSIONING_PLAINTEXT_PASSTHROUGH \
  23. | ECRYPTFS_VERSIONING_PUBKEY \
  24. | ECRYPTFS_VERSIONING_XATTR \
  25. | ECRYPTFS_VERSIONING_MULTKEY \
  26. | ECRYPTFS_VERSIONING_DEVMISC \
  27. | ECRYPTFS_VERSIONING_FILENAME_ENCRYPTION)
  28. #define ECRYPTFS_MAX_PASSWORD_LENGTH 64
  29. #define ECRYPTFS_MAX_PASSPHRASE_BYTES ECRYPTFS_MAX_PASSWORD_LENGTH
  30. #define ECRYPTFS_SALT_SIZE 8
  31. #define ECRYPTFS_SALT_SIZE_HEX (ECRYPTFS_SALT_SIZE*2)
  32. /* The original signature size is only for what is stored on disk; all
  33. * in-memory representations are expanded hex, so it better adapted to
  34. * be passed around or referenced on the command line */
  35. #define ECRYPTFS_SIG_SIZE 8
  36. #define ECRYPTFS_SIG_SIZE_HEX (ECRYPTFS_SIG_SIZE*2)
  37. #define ECRYPTFS_PASSWORD_SIG_SIZE ECRYPTFS_SIG_SIZE_HEX
  38. #define ECRYPTFS_MAX_KEY_BYTES 64
  39. #define ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES 512
  40. #define ECRYPTFS_FILE_VERSION 0x03
  41. #define ECRYPTFS_MAX_PKI_NAME_BYTES 16
  42. #define RFC2440_CIPHER_DES3_EDE 0x02
  43. #define RFC2440_CIPHER_CAST_5 0x03
  44. #define RFC2440_CIPHER_BLOWFISH 0x04
  45. #define RFC2440_CIPHER_AES_128 0x07
  46. #define RFC2440_CIPHER_AES_192 0x08
  47. #define RFC2440_CIPHER_AES_256 0x09
  48. #define RFC2440_CIPHER_TWOFISH 0x0a
  49. #define RFC2440_CIPHER_CAST_6 0x0b
  50. #define RFC2440_CIPHER_RSA 0x01
  51. /**
  52. * For convenience, we may need to pass around the encrypted session
  53. * key between kernel and userspace because the authentication token
  54. * may not be extractable. For example, the TPM may not release the
  55. * private key, instead requiring the encrypted data and returning the
  56. * decrypted data.
  57. */
  58. struct ecryptfs_session_key {
  59. #define ECRYPTFS_USERSPACE_SHOULD_TRY_TO_DECRYPT 0x00000001
  60. #define ECRYPTFS_USERSPACE_SHOULD_TRY_TO_ENCRYPT 0x00000002
  61. #define ECRYPTFS_CONTAINS_DECRYPTED_KEY 0x00000004
  62. #define ECRYPTFS_CONTAINS_ENCRYPTED_KEY 0x00000008
  63. u32 flags;
  64. u32 encrypted_key_size;
  65. u32 decrypted_key_size;
  66. u8 encrypted_key[ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES];
  67. u8 decrypted_key[ECRYPTFS_MAX_KEY_BYTES];
  68. };
  69. struct ecryptfs_password {
  70. u32 password_bytes;
  71. s32 hash_algo;
  72. u32 hash_iterations;
  73. u32 session_key_encryption_key_bytes;
  74. #define ECRYPTFS_PERSISTENT_PASSWORD 0x01
  75. #define ECRYPTFS_SESSION_KEY_ENCRYPTION_KEY_SET 0x02
  76. u32 flags;
  77. /* Iterated-hash concatenation of salt and passphrase */
  78. u8 session_key_encryption_key[ECRYPTFS_MAX_KEY_BYTES];
  79. u8 signature[ECRYPTFS_PASSWORD_SIG_SIZE + 1];
  80. /* Always in expanded hex */
  81. u8 salt[ECRYPTFS_SALT_SIZE];
  82. };
  83. enum ecryptfs_token_types {ECRYPTFS_PASSWORD, ECRYPTFS_PRIVATE_KEY};
  84. struct ecryptfs_private_key {
  85. u32 key_size;
  86. u32 data_len;
  87. u8 signature[ECRYPTFS_PASSWORD_SIG_SIZE + 1];
  88. char pki_type[ECRYPTFS_MAX_PKI_NAME_BYTES + 1];
  89. u8 data[];
  90. };
  91. /* May be a password or a private key */
  92. struct ecryptfs_auth_tok {
  93. u16 version; /* 8-bit major and 8-bit minor */
  94. u16 token_type;
  95. #define ECRYPTFS_ENCRYPT_ONLY 0x00000001
  96. u32 flags;
  97. struct ecryptfs_session_key session_key;
  98. u8 reserved[32];
  99. union {
  100. struct ecryptfs_password password;
  101. struct ecryptfs_private_key private_key;
  102. } token;
  103. } __attribute__ ((packed));
  104. #endif /* _LINUX_ECRYPTFS_H */