xref: /OK3568_Linux_fs/kernel/include/uapi/linux/fscrypt.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * fscrypt user API
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * These ioctls can be used on filesystems that support fscrypt.  See the
6*4882a593Smuzhiyun  * "User API" section of Documentation/filesystems/fscrypt.rst.
7*4882a593Smuzhiyun  */
8*4882a593Smuzhiyun #ifndef _UAPI_LINUX_FSCRYPT_H
9*4882a593Smuzhiyun #define _UAPI_LINUX_FSCRYPT_H
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #include <linux/ioctl.h>
12*4882a593Smuzhiyun #include <linux/types.h>
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun /* Encryption policy flags */
15*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAGS_PAD_4		0x00
16*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAGS_PAD_8		0x01
17*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAGS_PAD_16		0x02
18*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAGS_PAD_32		0x03
19*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAGS_PAD_MASK		0x03
20*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAG_DIRECT_KEY		0x04
21*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64	0x08
22*4882a593Smuzhiyun #define FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32	0x10
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun /* Encryption algorithms */
25*4882a593Smuzhiyun #define FSCRYPT_MODE_AES_256_XTS		1
26*4882a593Smuzhiyun #define FSCRYPT_MODE_AES_256_CTS		4
27*4882a593Smuzhiyun #define FSCRYPT_MODE_AES_128_CBC		5
28*4882a593Smuzhiyun #define FSCRYPT_MODE_AES_128_CTS		6
29*4882a593Smuzhiyun #define FSCRYPT_MODE_ADIANTUM			9
30*4882a593Smuzhiyun /* If adding a mode number > 9, update FSCRYPT_MODE_MAX in fscrypt_private.h */
31*4882a593Smuzhiyun 
32*4882a593Smuzhiyun /*
33*4882a593Smuzhiyun  * Legacy policy version; ad-hoc KDF and no key verification.
34*4882a593Smuzhiyun  * For new encrypted directories, use fscrypt_policy_v2 instead.
35*4882a593Smuzhiyun  *
36*4882a593Smuzhiyun  * Careful: the .version field for this is actually 0, not 1.
37*4882a593Smuzhiyun  */
38*4882a593Smuzhiyun #define FSCRYPT_POLICY_V1		0
39*4882a593Smuzhiyun #define FSCRYPT_KEY_DESCRIPTOR_SIZE	8
40*4882a593Smuzhiyun struct fscrypt_policy_v1 {
41*4882a593Smuzhiyun 	__u8 version;
42*4882a593Smuzhiyun 	__u8 contents_encryption_mode;
43*4882a593Smuzhiyun 	__u8 filenames_encryption_mode;
44*4882a593Smuzhiyun 	__u8 flags;
45*4882a593Smuzhiyun 	__u8 master_key_descriptor[FSCRYPT_KEY_DESCRIPTOR_SIZE];
46*4882a593Smuzhiyun };
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun /*
49*4882a593Smuzhiyun  * Process-subscribed "logon" key description prefix and payload format.
50*4882a593Smuzhiyun  * Deprecated; prefer FS_IOC_ADD_ENCRYPTION_KEY instead.
51*4882a593Smuzhiyun  */
52*4882a593Smuzhiyun #define FSCRYPT_KEY_DESC_PREFIX		"fscrypt:"
53*4882a593Smuzhiyun #define FSCRYPT_KEY_DESC_PREFIX_SIZE	8
54*4882a593Smuzhiyun #define FSCRYPT_MAX_KEY_SIZE		64
55*4882a593Smuzhiyun struct fscrypt_key {
56*4882a593Smuzhiyun 	__u32 mode;
57*4882a593Smuzhiyun 	__u8 raw[FSCRYPT_MAX_KEY_SIZE];
58*4882a593Smuzhiyun 	__u32 size;
59*4882a593Smuzhiyun };
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun /*
62*4882a593Smuzhiyun  * New policy version with HKDF and key verification (recommended).
63*4882a593Smuzhiyun  */
64*4882a593Smuzhiyun #define FSCRYPT_POLICY_V2		2
65*4882a593Smuzhiyun #define FSCRYPT_KEY_IDENTIFIER_SIZE	16
66*4882a593Smuzhiyun struct fscrypt_policy_v2 {
67*4882a593Smuzhiyun 	__u8 version;
68*4882a593Smuzhiyun 	__u8 contents_encryption_mode;
69*4882a593Smuzhiyun 	__u8 filenames_encryption_mode;
70*4882a593Smuzhiyun 	__u8 flags;
71*4882a593Smuzhiyun 	__u8 __reserved[4];
72*4882a593Smuzhiyun 	__u8 master_key_identifier[FSCRYPT_KEY_IDENTIFIER_SIZE];
73*4882a593Smuzhiyun };
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun /* Struct passed to FS_IOC_GET_ENCRYPTION_POLICY_EX */
76*4882a593Smuzhiyun struct fscrypt_get_policy_ex_arg {
77*4882a593Smuzhiyun 	__u64 policy_size; /* input/output */
78*4882a593Smuzhiyun 	union {
79*4882a593Smuzhiyun 		__u8 version;
80*4882a593Smuzhiyun 		struct fscrypt_policy_v1 v1;
81*4882a593Smuzhiyun 		struct fscrypt_policy_v2 v2;
82*4882a593Smuzhiyun 	} policy; /* output */
83*4882a593Smuzhiyun };
84*4882a593Smuzhiyun 
85*4882a593Smuzhiyun /*
86*4882a593Smuzhiyun  * v1 policy keys are specified by an arbitrary 8-byte key "descriptor",
87*4882a593Smuzhiyun  * matching fscrypt_policy_v1::master_key_descriptor.
88*4882a593Smuzhiyun  */
89*4882a593Smuzhiyun #define FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR	1
90*4882a593Smuzhiyun 
91*4882a593Smuzhiyun /*
92*4882a593Smuzhiyun  * v2 policy keys are specified by a 16-byte key "identifier" which the kernel
93*4882a593Smuzhiyun  * calculates as a cryptographic hash of the key itself,
94*4882a593Smuzhiyun  * matching fscrypt_policy_v2::master_key_identifier.
95*4882a593Smuzhiyun  */
96*4882a593Smuzhiyun #define FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER	2
97*4882a593Smuzhiyun 
98*4882a593Smuzhiyun /*
99*4882a593Smuzhiyun  * Specifies a key, either for v1 or v2 policies.  This doesn't contain the
100*4882a593Smuzhiyun  * actual key itself; this is just the "name" of the key.
101*4882a593Smuzhiyun  */
102*4882a593Smuzhiyun struct fscrypt_key_specifier {
103*4882a593Smuzhiyun 	__u32 type;	/* one of FSCRYPT_KEY_SPEC_TYPE_* */
104*4882a593Smuzhiyun 	__u32 __reserved;
105*4882a593Smuzhiyun 	union {
106*4882a593Smuzhiyun 		__u8 __reserved[32]; /* reserve some extra space */
107*4882a593Smuzhiyun 		__u8 descriptor[FSCRYPT_KEY_DESCRIPTOR_SIZE];
108*4882a593Smuzhiyun 		__u8 identifier[FSCRYPT_KEY_IDENTIFIER_SIZE];
109*4882a593Smuzhiyun 	} u;
110*4882a593Smuzhiyun };
111*4882a593Smuzhiyun 
112*4882a593Smuzhiyun /*
113*4882a593Smuzhiyun  * Payload of Linux keyring key of type "fscrypt-provisioning", referenced by
114*4882a593Smuzhiyun  * fscrypt_add_key_arg::key_id as an alternative to fscrypt_add_key_arg::raw.
115*4882a593Smuzhiyun  */
116*4882a593Smuzhiyun struct fscrypt_provisioning_key_payload {
117*4882a593Smuzhiyun 	__u32 type;
118*4882a593Smuzhiyun 	__u32 __reserved;
119*4882a593Smuzhiyun 	__u8 raw[];
120*4882a593Smuzhiyun };
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun /* Struct passed to FS_IOC_ADD_ENCRYPTION_KEY */
123*4882a593Smuzhiyun struct fscrypt_add_key_arg {
124*4882a593Smuzhiyun 	struct fscrypt_key_specifier key_spec;
125*4882a593Smuzhiyun 	__u32 raw_size;
126*4882a593Smuzhiyun 	__u32 key_id;
127*4882a593Smuzhiyun 	__u32 __reserved[7];
128*4882a593Smuzhiyun 	/* N.B.: "temporary" flag, not reserved upstream */
129*4882a593Smuzhiyun #define __FSCRYPT_ADD_KEY_FLAG_HW_WRAPPED		0x00000001
130*4882a593Smuzhiyun 	__u32 __flags;
131*4882a593Smuzhiyun 	__u8 raw[];
132*4882a593Smuzhiyun };
133*4882a593Smuzhiyun 
134*4882a593Smuzhiyun /* Struct passed to FS_IOC_REMOVE_ENCRYPTION_KEY */
135*4882a593Smuzhiyun struct fscrypt_remove_key_arg {
136*4882a593Smuzhiyun 	struct fscrypt_key_specifier key_spec;
137*4882a593Smuzhiyun #define FSCRYPT_KEY_REMOVAL_STATUS_FLAG_FILES_BUSY	0x00000001
138*4882a593Smuzhiyun #define FSCRYPT_KEY_REMOVAL_STATUS_FLAG_OTHER_USERS	0x00000002
139*4882a593Smuzhiyun 	__u32 removal_status_flags;	/* output */
140*4882a593Smuzhiyun 	__u32 __reserved[5];
141*4882a593Smuzhiyun };
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun /* Struct passed to FS_IOC_GET_ENCRYPTION_KEY_STATUS */
144*4882a593Smuzhiyun struct fscrypt_get_key_status_arg {
145*4882a593Smuzhiyun 	/* input */
146*4882a593Smuzhiyun 	struct fscrypt_key_specifier key_spec;
147*4882a593Smuzhiyun 	__u32 __reserved[6];
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	/* output */
150*4882a593Smuzhiyun #define FSCRYPT_KEY_STATUS_ABSENT		1
151*4882a593Smuzhiyun #define FSCRYPT_KEY_STATUS_PRESENT		2
152*4882a593Smuzhiyun #define FSCRYPT_KEY_STATUS_INCOMPLETELY_REMOVED	3
153*4882a593Smuzhiyun 	__u32 status;
154*4882a593Smuzhiyun #define FSCRYPT_KEY_STATUS_FLAG_ADDED_BY_SELF   0x00000001
155*4882a593Smuzhiyun 	__u32 status_flags;
156*4882a593Smuzhiyun 	__u32 user_count;
157*4882a593Smuzhiyun 	__u32 __out_reserved[13];
158*4882a593Smuzhiyun };
159*4882a593Smuzhiyun 
160*4882a593Smuzhiyun #define FS_IOC_SET_ENCRYPTION_POLICY		_IOR('f', 19, struct fscrypt_policy_v1)
161*4882a593Smuzhiyun #define FS_IOC_GET_ENCRYPTION_PWSALT		_IOW('f', 20, __u8[16])
162*4882a593Smuzhiyun #define FS_IOC_GET_ENCRYPTION_POLICY		_IOW('f', 21, struct fscrypt_policy_v1)
163*4882a593Smuzhiyun #define FS_IOC_GET_ENCRYPTION_POLICY_EX		_IOWR('f', 22, __u8[9]) /* size + version */
164*4882a593Smuzhiyun #define FS_IOC_ADD_ENCRYPTION_KEY		_IOWR('f', 23, struct fscrypt_add_key_arg)
165*4882a593Smuzhiyun #define FS_IOC_REMOVE_ENCRYPTION_KEY		_IOWR('f', 24, struct fscrypt_remove_key_arg)
166*4882a593Smuzhiyun #define FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS	_IOWR('f', 25, struct fscrypt_remove_key_arg)
167*4882a593Smuzhiyun #define FS_IOC_GET_ENCRYPTION_KEY_STATUS	_IOWR('f', 26, struct fscrypt_get_key_status_arg)
168*4882a593Smuzhiyun #define FS_IOC_GET_ENCRYPTION_NONCE		_IOR('f', 27, __u8[16])
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun /**********************************************************************/
171*4882a593Smuzhiyun 
172*4882a593Smuzhiyun /* old names; don't add anything new here! */
173*4882a593Smuzhiyun #ifndef __KERNEL__
174*4882a593Smuzhiyun #define fscrypt_policy			fscrypt_policy_v1
175*4882a593Smuzhiyun #define FS_KEY_DESCRIPTOR_SIZE		FSCRYPT_KEY_DESCRIPTOR_SIZE
176*4882a593Smuzhiyun #define FS_POLICY_FLAGS_PAD_4		FSCRYPT_POLICY_FLAGS_PAD_4
177*4882a593Smuzhiyun #define FS_POLICY_FLAGS_PAD_8		FSCRYPT_POLICY_FLAGS_PAD_8
178*4882a593Smuzhiyun #define FS_POLICY_FLAGS_PAD_16		FSCRYPT_POLICY_FLAGS_PAD_16
179*4882a593Smuzhiyun #define FS_POLICY_FLAGS_PAD_32		FSCRYPT_POLICY_FLAGS_PAD_32
180*4882a593Smuzhiyun #define FS_POLICY_FLAGS_PAD_MASK	FSCRYPT_POLICY_FLAGS_PAD_MASK
181*4882a593Smuzhiyun #define FS_POLICY_FLAG_DIRECT_KEY	FSCRYPT_POLICY_FLAG_DIRECT_KEY
182*4882a593Smuzhiyun #define FS_POLICY_FLAGS_VALID		0x07	/* contains old flags only */
183*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_INVALID	0	/* never used */
184*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_256_XTS	FSCRYPT_MODE_AES_256_XTS
185*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_256_GCM	2	/* never used */
186*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_256_CBC	3	/* never used */
187*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_256_CTS	FSCRYPT_MODE_AES_256_CTS
188*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_128_CBC	FSCRYPT_MODE_AES_128_CBC
189*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_AES_128_CTS	FSCRYPT_MODE_AES_128_CTS
190*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_SPECK128_256_XTS	7	/* removed */
191*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_SPECK128_256_CTS	8	/* removed */
192*4882a593Smuzhiyun #define FS_ENCRYPTION_MODE_ADIANTUM	FSCRYPT_MODE_ADIANTUM
193*4882a593Smuzhiyun #define FS_KEY_DESC_PREFIX		FSCRYPT_KEY_DESC_PREFIX
194*4882a593Smuzhiyun #define FS_KEY_DESC_PREFIX_SIZE		FSCRYPT_KEY_DESC_PREFIX_SIZE
195*4882a593Smuzhiyun #define FS_MAX_KEY_SIZE			FSCRYPT_MAX_KEY_SIZE
196*4882a593Smuzhiyun #endif /* !__KERNEL__ */
197*4882a593Smuzhiyun 
198*4882a593Smuzhiyun #endif /* _UAPI_LINUX_FSCRYPT_H */
199