1 /* 2 * QEMU Crypto block device encryption 3 * 4 * Copyright (c) 2015-2016 Red Hat, Inc. 5 * 6 * This library is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU Lesser General Public 8 * License as published by the Free Software Foundation; either 9 * version 2.1 of the License, or (at your option) any later version. 10 * 11 * This library is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 14 * Lesser General Public License for more details. 15 * 16 * You should have received a copy of the GNU Lesser General Public 17 * License along with this library; if not, see <http://www.gnu.org/licenses/>. 18 * 19 */ 20 21 #ifndef QCRYPTO_BLOCK_H 22 #define QCRYPTO_BLOCK_H 23 24 #include "crypto/cipher.h" 25 #include "crypto/ivgen.h" 26 27 typedef struct QCryptoBlock QCryptoBlock; 28 29 /* See also QCryptoBlockFormat, QCryptoBlockCreateOptions 30 * and QCryptoBlockOpenOptions in qapi/crypto.json */ 31 32 typedef int (*QCryptoBlockReadFunc)(QCryptoBlock *block, 33 size_t offset, 34 uint8_t *buf, 35 size_t buflen, 36 void *opaque, 37 Error **errp); 38 39 typedef int (*QCryptoBlockInitFunc)(QCryptoBlock *block, 40 size_t headerlen, 41 void *opaque, 42 Error **errp); 43 44 typedef int (*QCryptoBlockWriteFunc)(QCryptoBlock *block, 45 size_t offset, 46 const uint8_t *buf, 47 size_t buflen, 48 void *opaque, 49 Error **errp); 50 51 /** 52 * qcrypto_block_has_format: 53 * @format: the encryption format 54 * @buf: the data from head of the volume 55 * @len: the length of @buf in bytes 56 * 57 * Given @len bytes of data from the head of a storage volume 58 * in @buf, probe to determine if the volume has the encryption 59 * format specified in @format. 60 * 61 * Returns: true if the data in @buf matches @format 62 */ 63 bool qcrypto_block_has_format(QCryptoBlockFormat format, 64 const uint8_t *buf, 65 size_t buflen); 66 67 typedef enum { 68 QCRYPTO_BLOCK_OPEN_NO_IO = (1 << 0), 69 QCRYPTO_BLOCK_OPEN_DETACHED = (1 << 1), 70 } QCryptoBlockOpenFlags; 71 72 /** 73 * qcrypto_block_open: 74 * @options: the encryption options 75 * @optprefix: name prefix for options 76 * @readfunc: callback for reading data from the volume 77 * @opaque: data to pass to @readfunc 78 * @flags: bitmask of QCryptoBlockOpenFlags values 79 * @errp: pointer to a NULL-initialized error object 80 * 81 * Create a new block encryption object for an existing 82 * storage volume encrypted with format identified by 83 * the parameters in @options. 84 * 85 * This will use @readfunc to initialize the encryption 86 * context based on the volume header(s), extracting the 87 * master key(s) as required. 88 * 89 * If @flags contains QCRYPTO_BLOCK_OPEN_NO_IO then 90 * the open process will be optimized to skip any parts 91 * that are only required to perform I/O. In particular 92 * this would usually avoid the need to decrypt any 93 * master keys. The only thing that can be done with 94 * the resulting QCryptoBlock object would be to query 95 * metadata such as the payload offset. There will be 96 * no cipher or ivgen objects available. 97 * 98 * If @flags contains QCRYPTO_BLOCK_OPEN_DETACHED then 99 * the open process will be optimized to skip the LUKS 100 * payload overlap check. 101 * 102 * If any part of initializing the encryption context 103 * fails an error will be returned. This could be due 104 * to the volume being in the wrong format, a cipher 105 * or IV generator algorithm that is not supported, 106 * or incorrect passphrases. 107 * 108 * Returns: a block encryption format, or NULL on error 109 */ 110 QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options, 111 const char *optprefix, 112 QCryptoBlockReadFunc readfunc, 113 void *opaque, 114 unsigned int flags, 115 Error **errp); 116 117 typedef enum { 118 QCRYPTO_BLOCK_CREATE_DETACHED = (1 << 0), 119 } QCryptoBlockCreateFlags; 120 121 /** 122 * qcrypto_block_create: 123 * @options: the encryption options 124 * @optprefix: name prefix for options 125 * @initfunc: callback for initializing volume header 126 * @writefunc: callback for writing data to the volume header 127 * @opaque: data to pass to @initfunc and @writefunc 128 * @flags: bitmask of QCryptoBlockCreateFlags values 129 * @errp: pointer to a NULL-initialized error object 130 * 131 * Create a new block encryption object for initializing 132 * a storage volume to be encrypted with format identified 133 * by the parameters in @options. 134 * 135 * This method will allocate space for a new volume header 136 * using @initfunc and then write header data using @writefunc, 137 * generating new master keys, etc as required. Any existing 138 * data present on the volume will be irrevocably destroyed. 139 * 140 * If @flags contains QCRYPTO_BLOCK_CREATE_DETACHED then 141 * the open process will set the payload_offset_sector to 0 142 * to specify the starting point for the read/write of a 143 * detached LUKS header image. 144 * 145 * If any part of initializing the encryption context 146 * fails an error will be returned. This could be due 147 * to the volume being in the wrong format, a cipher 148 * or IV generator algorithm that is not supported, 149 * or incorrect passphrases. 150 * 151 * Returns: a block encryption format, or NULL on error 152 */ 153 QCryptoBlock *qcrypto_block_create(QCryptoBlockCreateOptions *options, 154 const char *optprefix, 155 QCryptoBlockInitFunc initfunc, 156 QCryptoBlockWriteFunc writefunc, 157 void *opaque, 158 unsigned int flags, 159 Error **errp); 160 161 /** 162 * qcrypto_block_amend_options: 163 * @block: the block encryption object 164 * 165 * @readfunc: callback for reading data from the volume header 166 * @writefunc: callback for writing data to the volume header 167 * @opaque: data to pass to @readfunc and @writefunc 168 * @options: the new/amended encryption options 169 * @force: hint for the driver to allow unsafe operation 170 * @errp: error pointer 171 * 172 * Changes the crypto options of the encryption format 173 * 174 */ 175 int qcrypto_block_amend_options(QCryptoBlock *block, 176 QCryptoBlockReadFunc readfunc, 177 QCryptoBlockWriteFunc writefunc, 178 void *opaque, 179 QCryptoBlockAmendOptions *options, 180 bool force, 181 Error **errp); 182 183 184 /** 185 * qcrypto_block_calculate_payload_offset: 186 * @create_opts: the encryption options 187 * @optprefix: name prefix for options 188 * @len: output for number of header bytes before payload 189 * @errp: pointer to a NULL-initialized error object 190 * 191 * Calculate the number of header bytes before the payload in an encrypted 192 * storage volume. The header is an area before the payload that is reserved 193 * for encryption metadata. 194 * 195 * Returns: true on success, false on error 196 */ 197 bool 198 qcrypto_block_calculate_payload_offset(QCryptoBlockCreateOptions *create_opts, 199 const char *optprefix, 200 size_t *len, 201 Error **errp); 202 203 204 /** 205 * qcrypto_block_get_info: 206 * @block: the block encryption object 207 * @errp: pointer to a NULL-initialized error object 208 * 209 * Get information about the configuration options for the 210 * block encryption object. This includes details such as 211 * the cipher algorithms, modes, and initialization vector 212 * generators. 213 * 214 * Returns: a block encryption info object, or NULL on error 215 */ 216 QCryptoBlockInfo *qcrypto_block_get_info(QCryptoBlock *block, 217 Error **errp); 218 219 /** 220 * @qcrypto_block_decrypt: 221 * @block: the block encryption object 222 * @offset: the position at which @iov was read 223 * @buf: the buffer to decrypt 224 * @len: the length of @buf in bytes 225 * @errp: pointer to a NULL-initialized error object 226 * 227 * Decrypt @len bytes of cipher text in @buf, writing 228 * plain text back into @buf. @len and @offset must be 229 * a multiple of the encryption format sector size. 230 * 231 * Returns 0 on success, -1 on failure 232 */ 233 int qcrypto_block_decrypt(QCryptoBlock *block, 234 uint64_t offset, 235 uint8_t *buf, 236 size_t len, 237 Error **errp); 238 239 /** 240 * @qcrypto_block_encrypt: 241 * @block: the block encryption object 242 * @offset: the position at which @iov will be written 243 * @buf: the buffer to decrypt 244 * @len: the length of @buf in bytes 245 * @errp: pointer to a NULL-initialized error object 246 * 247 * Encrypt @len bytes of plain text in @buf, writing 248 * cipher text back into @buf. @len and @offset must be 249 * a multiple of the encryption format sector size. 250 * 251 * Returns 0 on success, -1 on failure 252 */ 253 int qcrypto_block_encrypt(QCryptoBlock *block, 254 uint64_t offset, 255 uint8_t *buf, 256 size_t len, 257 Error **errp); 258 259 /** 260 * qcrypto_block_get_cipher: 261 * @block: the block encryption object 262 * 263 * Get the cipher to use for payload encryption 264 * 265 * Returns: the cipher object 266 */ 267 QCryptoCipher *qcrypto_block_get_cipher(QCryptoBlock *block); 268 269 /** 270 * qcrypto_block_get_ivgen: 271 * @block: the block encryption object 272 * 273 * Get the initialization vector generator to use for 274 * payload encryption 275 * 276 * Returns: the IV generator object 277 */ 278 QCryptoIVGen *qcrypto_block_get_ivgen(QCryptoBlock *block); 279 280 281 /** 282 * qcrypto_block_get_kdf_hash: 283 * @block: the block encryption object 284 * 285 * Get the hash algorithm used with the key derivation 286 * function 287 * 288 * Returns: the hash algorithm 289 */ 290 QCryptoHashAlgo qcrypto_block_get_kdf_hash(QCryptoBlock *block); 291 292 /** 293 * qcrypto_block_get_payload_offset: 294 * @block: the block encryption object 295 * 296 * Get the offset to the payload indicated by the 297 * encryption header, in bytes. 298 * 299 * Returns: the payload offset in bytes 300 */ 301 uint64_t qcrypto_block_get_payload_offset(QCryptoBlock *block); 302 303 /** 304 * qcrypto_block_get_sector_size: 305 * @block: the block encryption object 306 * 307 * Get the size of sectors used for payload encryption. A new 308 * IV is used at the start of each sector. The encryption 309 * sector size is not required to match the sector size of the 310 * underlying storage. For example LUKS will always use a 512 311 * byte sector size, even if the volume is on a disk with 4k 312 * sectors. 313 * 314 * Returns: the sector in bytes 315 */ 316 uint64_t qcrypto_block_get_sector_size(QCryptoBlock *block); 317 318 /** 319 * qcrypto_block_free: 320 * @block: the block encryption object 321 * 322 * Release all resources associated with the encryption 323 * object 324 */ 325 void qcrypto_block_free(QCryptoBlock *block); 326 327 G_DEFINE_AUTOPTR_CLEANUP_FUNC(QCryptoBlock, qcrypto_block_free) 328 329 #endif /* QCRYPTO_BLOCK_H */ 330