aboutsummaryrefslogtreecommitdiffstats
path: root/fs/ecryptfs/crypto.c
diff options
context:
space:
mode:
Diffstat (limited to 'fs/ecryptfs/crypto.c')
-rw-r--r--fs/ecryptfs/crypto.c433
1 files changed, 433 insertions, 0 deletions
diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c
index c9839df37c7d..18c78abba683 100644
--- a/fs/ecryptfs/crypto.c
+++ b/fs/ecryptfs/crypto.c
@@ -1721,6 +1721,98 @@ out:
1721} 1721}
1722 1722
1723/** 1723/**
1724 * ecryptfs_encrypt_filename - encrypt filename
1725 *
1726 * CBC-encrypts the filename. We do not want to encrypt the same
1727 * filename with the same key and IV, which may happen with hard
1728 * links, so we prepend random bits to each filename.
1729 *
1730 * Returns zero on success; non-zero otherwise
1731 */
1732static int
1733ecryptfs_encrypt_filename(struct ecryptfs_filename *filename,
1734 struct ecryptfs_crypt_stat *crypt_stat,
1735 struct ecryptfs_mount_crypt_stat *mount_crypt_stat)
1736{
1737 int rc = 0;
1738
1739 filename->encrypted_filename = NULL;
1740 filename->encrypted_filename_size = 0;
1741 if ((crypt_stat && (crypt_stat->flags & ECRYPTFS_ENCFN_USE_MOUNT_FNEK))
1742 || (mount_crypt_stat && (mount_crypt_stat->flags
1743 & ECRYPTFS_GLOBAL_ENCFN_USE_MOUNT_FNEK))) {
1744 size_t packet_size;
1745 size_t remaining_bytes;
1746
1747 rc = ecryptfs_write_tag_70_packet(
1748 NULL, NULL,
1749 &filename->encrypted_filename_size,
1750 mount_crypt_stat, NULL,
1751 filename->filename_size);
1752 if (rc) {
1753 printk(KERN_ERR "%s: Error attempting to get packet "
1754 "size for tag 72; rc = [%d]\n", __func__,
1755 rc);
1756 filename->encrypted_filename_size = 0;
1757 goto out;
1758 }
1759 filename->encrypted_filename =
1760 kmalloc(filename->encrypted_filename_size, GFP_KERNEL);
1761 if (!filename->encrypted_filename) {
1762 printk(KERN_ERR "%s: Out of memory whilst attempting "
1763 "to kmalloc [%Zd] bytes\n", __func__,
1764 filename->encrypted_filename_size);
1765 rc = -ENOMEM;
1766 goto out;
1767 }
1768 remaining_bytes = filename->encrypted_filename_size;
1769 rc = ecryptfs_write_tag_70_packet(filename->encrypted_filename,
1770 &remaining_bytes,
1771 &packet_size,
1772 mount_crypt_stat,
1773 filename->filename,
1774 filename->filename_size);
1775 if (rc) {
1776 printk(KERN_ERR "%s: Error attempting to generate "
1777 "tag 70 packet; rc = [%d]\n", __func__,
1778 rc);
1779 kfree(filename->encrypted_filename);
1780 filename->encrypted_filename = NULL;
1781 filename->encrypted_filename_size = 0;
1782 goto out;
1783 }
1784 filename->encrypted_filename_size = packet_size;
1785 } else {
1786 printk(KERN_ERR "%s: No support for requested filename "
1787 "encryption method in this release\n", __func__);
1788 rc = -ENOTSUPP;
1789 goto out;
1790 }
1791out:
1792 return rc;
1793}
1794
1795static int ecryptfs_copy_filename(char **copied_name, size_t *copied_name_size,
1796 const char *name, size_t name_size)
1797{
1798 int rc = 0;
1799
1800 (*copied_name) = kmalloc((name_size + 2), GFP_KERNEL);
1801 if (!(*copied_name)) {
1802 rc = -ENOMEM;
1803 goto out;
1804 }
1805 memcpy((void *)(*copied_name), (void *)name, name_size);
1806 (*copied_name)[(name_size)] = '\0'; /* Only for convenience
1807 * in printing out the
1808 * string in debug
1809 * messages */
1810 (*copied_name_size) = (name_size + 1);
1811out:
1812 return rc;
1813}
1814
1815/**
1724 * ecryptfs_process_key_cipher - Perform key cipher initialization. 1816 * ecryptfs_process_key_cipher - Perform key cipher initialization.
1725 * @key_tfm: Crypto context for key material, set by this function 1817 * @key_tfm: Crypto context for key material, set by this function
1726 * @cipher_name: Name of the cipher 1818 * @cipher_name: Name of the cipher
@@ -1911,3 +2003,344 @@ out:
1911 mutex_unlock(&key_tfm_list_mutex); 2003 mutex_unlock(&key_tfm_list_mutex);
1912 return rc; 2004 return rc;
1913} 2005}
2006
2007/* 64 characters forming a 6-bit target field */
2008static unsigned char *portable_filename_chars = ("-.0123456789ABCD"
2009 "EFGHIJKLMNOPQRST"
2010 "UVWXYZabcdefghij"
2011 "klmnopqrstuvwxyz");
2012
2013/* We could either offset on every reverse map or just pad some 0x00's
2014 * at the front here */
2015static unsigned char filename_rev_map[] = {
2016 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 7 */
2017 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 15 */
2018 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 23 */
2019 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 31 */
2020 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 39 */
2021 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, /* 47 */
2022 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, /* 55 */
2023 0x0A, 0x0B, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* 63 */
2024 0x00, 0x0C, 0x0D, 0x0E, 0x0F, 0x10, 0x11, 0x12, /* 71 */
2025 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1A, /* 79 */
2026 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20, 0x21, 0x22, /* 87 */
2027 0x23, 0x24, 0x25, 0x00, 0x00, 0x00, 0x00, 0x00, /* 95 */
2028 0x00, 0x26, 0x27, 0x28, 0x29, 0x2A, 0x2B, 0x2C, /* 103 */
2029 0x2D, 0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, /* 111 */
2030 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A, 0x3B, 0x3C, /* 119 */
2031 0x3D, 0x3E, 0x3F
2032};
2033
2034/**
2035 * ecryptfs_encode_for_filename
2036 * @dst: Destination location for encoded filename
2037 * @dst_size: Size of the encoded filename in bytes
2038 * @src: Source location for the filename to encode
2039 * @src_size: Size of the source in bytes
2040 */
2041void ecryptfs_encode_for_filename(unsigned char *dst, size_t *dst_size,
2042 unsigned char *src, size_t src_size)
2043{
2044 size_t num_blocks;
2045 size_t block_num = 0;
2046 size_t dst_offset = 0;
2047 unsigned char last_block[3];
2048
2049 if (src_size == 0) {
2050 (*dst_size) = 0;
2051 goto out;
2052 }
2053 num_blocks = (src_size / 3);
2054 if ((src_size % 3) == 0) {
2055 memcpy(last_block, (&src[src_size - 3]), 3);
2056 } else {
2057 num_blocks++;
2058 last_block[2] = 0x00;
2059 switch (src_size % 3) {
2060 case 1:
2061 last_block[0] = src[src_size - 1];
2062 last_block[1] = 0x00;
2063 break;
2064 case 2:
2065 last_block[0] = src[src_size - 2];
2066 last_block[1] = src[src_size - 1];
2067 }
2068 }
2069 (*dst_size) = (num_blocks * 4);
2070 if (!dst)
2071 goto out;
2072 while (block_num < num_blocks) {
2073 unsigned char *src_block;
2074 unsigned char dst_block[4];
2075
2076 if (block_num == (num_blocks - 1))
2077 src_block = last_block;
2078 else
2079 src_block = &src[block_num * 3];
2080 dst_block[0] = ((src_block[0] >> 2) & 0x3F);
2081 dst_block[1] = (((src_block[0] << 4) & 0x30)
2082 | ((src_block[1] >> 4) & 0x0F));
2083 dst_block[2] = (((src_block[1] << 2) & 0x3C)
2084 | ((src_block[2] >> 6) & 0x03));
2085 dst_block[3] = (src_block[2] & 0x3F);
2086 dst[dst_offset++] = portable_filename_chars[dst_block[0]];
2087 dst[dst_offset++] = portable_filename_chars[dst_block[1]];
2088 dst[dst_offset++] = portable_filename_chars[dst_block[2]];
2089 dst[dst_offset++] = portable_filename_chars[dst_block[3]];
2090 block_num++;
2091 }
2092out:
2093 return;
2094}
2095
2096int ecryptfs_decode_from_filename(unsigned char *dst, size_t *dst_size,
2097 const unsigned char *src, size_t src_size)
2098{
2099 u8 current_bit_offset = 0;
2100 size_t src_byte_offset = 0;
2101 size_t dst_byte_offset = 0;
2102 int rc = 0;
2103
2104 if (dst == NULL) {
2105 /* Not exact; conservatively long */
2106 (*dst_size) = (((src_size + 1) * 3) / 4);
2107 goto out;
2108 }
2109 while (src_byte_offset < src_size) {
2110 unsigned char src_byte =
2111 filename_rev_map[(int)src[src_byte_offset]];
2112
2113 switch (current_bit_offset) {
2114 case 0:
2115 dst[dst_byte_offset] = (src_byte << 2);
2116 current_bit_offset = 6;
2117 break;
2118 case 6:
2119 dst[dst_byte_offset++] |= (src_byte >> 4);
2120 dst[dst_byte_offset] = ((src_byte & 0xF)
2121 << 4);
2122 current_bit_offset = 4;
2123 break;
2124 case 4:
2125 dst[dst_byte_offset++] |= (src_byte >> 2);
2126 dst[dst_byte_offset] = (src_byte << 6);
2127 current_bit_offset = 2;
2128 break;
2129 case 2:
2130 dst[dst_byte_offset++] |= (src_byte);
2131 dst[dst_byte_offset] = 0;
2132 current_bit_offset = 0;
2133 break;
2134 }
2135 src_byte_offset++;
2136 }
2137 (*dst_size) = dst_byte_offset;
2138out:
2139 return rc;
2140}
2141
2142/**
2143 * ecryptfs_encrypt_and_encode_filename - converts a plaintext file name to cipher text
2144 * @crypt_stat: The crypt_stat struct associated with the file anem to encode
2145 * @name: The plaintext name
2146 * @length: The length of the plaintext
2147 * @encoded_name: The encypted name
2148 *
2149 * Encrypts and encodes a filename into something that constitutes a
2150 * valid filename for a filesystem, with printable characters.
2151 *
2152 * We assume that we have a properly initialized crypto context,
2153 * pointed to by crypt_stat->tfm.
2154 *
2155 * Returns zero on success; non-zero on otherwise
2156 */
2157int ecryptfs_encrypt_and_encode_filename(
2158 char **encoded_name,
2159 size_t *encoded_name_size,
2160 struct ecryptfs_crypt_stat *crypt_stat,
2161 struct ecryptfs_mount_crypt_stat *mount_crypt_stat,
2162 const char *name, size_t name_size)
2163{
2164 size_t encoded_name_no_prefix_size;
2165 int rc = 0;
2166
2167 (*encoded_name) = NULL;
2168 (*encoded_name_size) = 0;
2169 if ((crypt_stat && (crypt_stat->flags & ECRYPTFS_ENCRYPT_FILENAMES))
2170 || (mount_crypt_stat && (mount_crypt_stat->flags
2171 & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES))) {
2172 struct ecryptfs_filename *filename;
2173
2174 filename = kzalloc(sizeof(*filename), GFP_KERNEL);
2175 if (!filename) {
2176 printk(KERN_ERR "%s: Out of memory whilst attempting "
2177 "to kzalloc [%d] bytes\n", __func__,
2178 sizeof(*filename));
2179 rc = -ENOMEM;
2180 goto out;
2181 }
2182 filename->filename = (char *)name;
2183 filename->filename_size = name_size;
2184 rc = ecryptfs_encrypt_filename(filename, crypt_stat,
2185 mount_crypt_stat);
2186 if (rc) {
2187 printk(KERN_ERR "%s: Error attempting to encrypt "
2188 "filename; rc = [%d]\n", __func__, rc);
2189 kfree(filename);
2190 goto out;
2191 }
2192 ecryptfs_encode_for_filename(
2193 NULL, &encoded_name_no_prefix_size,
2194 filename->encrypted_filename,
2195 filename->encrypted_filename_size);
2196 if ((crypt_stat && (crypt_stat->flags
2197 & ECRYPTFS_ENCFN_USE_MOUNT_FNEK))
2198 || (mount_crypt_stat
2199 && (mount_crypt_stat->flags
2200 & ECRYPTFS_GLOBAL_ENCFN_USE_MOUNT_FNEK)))
2201 (*encoded_name_size) =
2202 (ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE
2203 + encoded_name_no_prefix_size);
2204 else
2205 (*encoded_name_size) =
2206 (ECRYPTFS_FEK_ENCRYPTED_FILENAME_PREFIX_SIZE
2207 + encoded_name_no_prefix_size);
2208 (*encoded_name) = kmalloc((*encoded_name_size) + 1, GFP_KERNEL);
2209 if (!(*encoded_name)) {
2210 printk(KERN_ERR "%s: Out of memory whilst attempting "
2211 "to kzalloc [%d] bytes\n", __func__,
2212 (*encoded_name_size));
2213 rc = -ENOMEM;
2214 kfree(filename->encrypted_filename);
2215 kfree(filename);
2216 goto out;
2217 }
2218 if ((crypt_stat && (crypt_stat->flags
2219 & ECRYPTFS_ENCFN_USE_MOUNT_FNEK))
2220 || (mount_crypt_stat
2221 && (mount_crypt_stat->flags
2222 & ECRYPTFS_GLOBAL_ENCFN_USE_MOUNT_FNEK))) {
2223 memcpy((*encoded_name),
2224 ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX,
2225 ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE);
2226 ecryptfs_encode_for_filename(
2227 ((*encoded_name)
2228 + ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE),
2229 &encoded_name_no_prefix_size,
2230 filename->encrypted_filename,
2231 filename->encrypted_filename_size);
2232 (*encoded_name_size) =
2233 (ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE
2234 + encoded_name_no_prefix_size);
2235 (*encoded_name)[(*encoded_name_size)] = '\0';
2236 (*encoded_name_size)++;
2237 } else {
2238 rc = -ENOTSUPP;
2239 }
2240 if (rc) {
2241 printk(KERN_ERR "%s: Error attempting to encode "
2242 "encrypted filename; rc = [%d]\n", __func__,
2243 rc);
2244 kfree((*encoded_name));
2245 (*encoded_name) = NULL;
2246 (*encoded_name_size) = 0;
2247 }
2248 kfree(filename->encrypted_filename);
2249 kfree(filename);
2250 } else {
2251 rc = ecryptfs_copy_filename(encoded_name,
2252 encoded_name_size,
2253 name, name_size);
2254 }
2255out:
2256 return rc;
2257}
2258
2259/**
2260 * ecryptfs_decode_and_decrypt_filename - converts the encoded cipher text name to decoded plaintext
2261 * @plaintext_name: The plaintext name
2262 * @plaintext_name_size: The plaintext name size
2263 * @ecryptfs_dir_dentry: eCryptfs directory dentry
2264 * @name: The filename in cipher text
2265 * @name_size: The cipher text name size
2266 *
2267 * Decrypts and decodes the filename.
2268 *
2269 * Returns zero on error; non-zero otherwise
2270 */
2271int ecryptfs_decode_and_decrypt_filename(char **plaintext_name,
2272 size_t *plaintext_name_size,
2273 struct dentry *ecryptfs_dir_dentry,
2274 const char *name, size_t name_size)
2275{
2276 char *decoded_name;
2277 size_t decoded_name_size;
2278 size_t packet_size;
2279 int rc = 0;
2280
2281 if ((name_size > ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE)
2282 && (strncmp(name, ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX,
2283 ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE) == 0)) {
2284 struct ecryptfs_mount_crypt_stat *mount_crypt_stat =
2285 &ecryptfs_superblock_to_private(
2286 ecryptfs_dir_dentry->d_sb)->mount_crypt_stat;
2287 const char *orig_name = name;
2288 size_t orig_name_size = name_size;
2289
2290 name += ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE;
2291 name_size -= ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE;
2292 rc = ecryptfs_decode_from_filename(NULL, &decoded_name_size,
2293 name, name_size);
2294 if (rc) {
2295 printk(KERN_ERR "%s: Error attempting to decode "
2296 "filename; rc = [%d]\n", __func__, rc);
2297 rc = ecryptfs_copy_filename(plaintext_name,
2298 plaintext_name_size,
2299 orig_name, orig_name_size);
2300 goto out;
2301 }
2302 decoded_name = kmalloc(decoded_name_size, GFP_KERNEL);
2303 if (!decoded_name) {
2304 printk(KERN_ERR "%s: Out of memory whilst attempting "
2305 "to kmalloc [%Zd] bytes\n", __func__,
2306 decoded_name_size);
2307 rc = -ENOMEM;
2308 goto out;
2309 }
2310 rc = ecryptfs_decode_from_filename(decoded_name,
2311 &decoded_name_size,
2312 name, name_size);
2313 if (rc) {
2314 printk(KERN_ERR "%s: Error attempting to decode "
2315 "filename; rc = [%d]\n", __func__, rc);
2316 rc = ecryptfs_copy_filename(plaintext_name,
2317 plaintext_name_size,
2318 orig_name, orig_name_size);
2319 goto out_free;
2320 }
2321 rc = ecryptfs_parse_tag_70_packet(plaintext_name,
2322 plaintext_name_size,
2323 &packet_size,
2324 mount_crypt_stat,
2325 decoded_name,
2326 decoded_name_size);
2327 if (rc) {
2328 printk(KERN_INFO "%s: Could not parse tag 70 packet "
2329 "from filename; copying through filename "
2330 "as-is\n", __func__);
2331 rc = ecryptfs_copy_filename(plaintext_name,
2332 plaintext_name_size,
2333 orig_name, orig_name_size);
2334 goto out_free;
2335 }
2336 } else {
2337 rc = ecryptfs_copy_filename(plaintext_name,
2338 plaintext_name_size,
2339 name, name_size);
2340 goto out;
2341 }
2342out_free:
2343 kfree(decoded_name);
2344out:
2345 return rc;
2346}