81 82#define SHA512_MDLEN 64 83#define G_ELI_AUTH_SECKEYLEN SHA256_DIGEST_LENGTH 84 85#define G_ELI_MAXMKEYS 2 86#define G_ELI_MAXKEYLEN 64 87#define G_ELI_USERKEYLEN G_ELI_MAXKEYLEN 88#define G_ELI_DATAKEYLEN G_ELI_MAXKEYLEN 89#define G_ELI_AUTHKEYLEN G_ELI_MAXKEYLEN 90#define G_ELI_IVKEYLEN G_ELI_MAXKEYLEN 91#define G_ELI_SALTLEN 64 92#define G_ELI_DATAIVKEYLEN (G_ELI_DATAKEYLEN + G_ELI_IVKEYLEN) 93/* Data-Key, IV-Key, HMAC_SHA512(Derived-Key, Data-Key+IV-Key) */ 94#define G_ELI_MKEYLEN (G_ELI_DATAIVKEYLEN + SHA512_MDLEN) 95 96#ifdef _KERNEL 97extern u_int g_eli_debug; 98extern u_int g_eli_overwrites; 99extern u_int g_eli_batch; 100 101#define G_ELI_CRYPTO_HW 1 102#define G_ELI_CRYPTO_SW 2 103 104#define G_ELI_DEBUG(lvl, ...) do { \ 105 if (g_eli_debug >= (lvl)) { \ 106 printf("GEOM_ELI"); \ 107 if (g_eli_debug > 0) \ 108 printf("[%u]", lvl); \ 109 printf(": "); \ 110 printf(__VA_ARGS__); \ 111 printf("\n"); \ 112 } \ 113} while (0) 114#define G_ELI_LOGREQ(lvl, bp, ...) do { \ 115 if (g_eli_debug >= (lvl)) { \ 116 printf("GEOM_ELI"); \ 117 if (g_eli_debug > 0) \ 118 printf("[%u]", lvl); \ 119 printf(": "); \ 120 printf(__VA_ARGS__); \ 121 printf(" "); \ 122 g_print_bio(bp); \ 123 printf("\n"); \ 124 } \ 125} while (0) 126 127struct g_eli_worker { 128 struct g_eli_softc *w_softc; 129 struct proc *w_proc; 130 u_int w_number; 131 uint64_t w_sid; 132 LIST_ENTRY(g_eli_worker) w_next; 133}; 134 135struct g_eli_softc { 136 struct g_geom *sc_geom; 137 u_int sc_crypto; 138 uint8_t sc_mkey[G_ELI_DATAIVKEYLEN]; 139 uint8_t sc_ekey[G_ELI_DATAKEYLEN]; 140 u_int sc_ealgo; 141 u_int sc_ekeylen; 142 uint8_t sc_akey[G_ELI_AUTHKEYLEN]; 143 u_int sc_aalgo; 144 u_int sc_akeylen; 145 u_int sc_alen; 146 SHA256_CTX sc_akeyctx; 147 uint8_t sc_ivkey[G_ELI_IVKEYLEN]; 148 SHA256_CTX sc_ivctx; 149 int sc_nkey; 150 uint32_t sc_flags; 151 u_int sc_bytes_per_sector; 152 u_int sc_data_per_sector; 153 154 /* Only for software cryptography. */ 155 struct bio_queue_head sc_queue; 156 struct mtx sc_queue_mtx; 157 LIST_HEAD(, g_eli_worker) sc_workers; 158}; 159#define sc_name sc_geom->name 160#endif /* _KERNEL */ 161 162struct g_eli_metadata { 163 char md_magic[16]; /* Magic value. */ 164 uint32_t md_version; /* Version number. */ 165 uint32_t md_flags; /* Additional flags. */ 166 uint16_t md_ealgo; /* Encryption algorithm. */ 167 uint16_t md_keylen; /* Key length. */ 168 uint16_t md_aalgo; /* Authentication algorithm. */ 169 uint64_t md_provsize; /* Provider's size. */ 170 uint32_t md_sectorsize; /* Sector size. */ 171 uint8_t md_keys; /* Available keys. */ 172 int32_t md_iterations; /* Number of iterations for PKCS#5v2. */ 173 uint8_t md_salt[G_ELI_SALTLEN]; /* Salt. */ 174 /* Encrypted master key (IV-key, Data-key, HMAC). */ 175 uint8_t md_mkeys[G_ELI_MAXMKEYS * G_ELI_MKEYLEN]; 176 u_char md_hash[16]; /* MD5 hash. */ 177} __packed; 178#ifndef _OpenSSL_ 179static __inline void 180eli_metadata_encode(struct g_eli_metadata *md, u_char *data) 181{ 182 MD5_CTX ctx; 183 u_char *p; 184 185 p = data; 186 bcopy(md->md_magic, p, sizeof(md->md_magic)); p += sizeof(md->md_magic); 187 le32enc(p, md->md_version); p += sizeof(md->md_version); 188 le32enc(p, md->md_flags); p += sizeof(md->md_flags); 189 le16enc(p, md->md_ealgo); p += sizeof(md->md_ealgo); 190 le16enc(p, md->md_keylen); p += sizeof(md->md_keylen); 191 le16enc(p, md->md_aalgo); p += sizeof(md->md_aalgo); 192 le64enc(p, md->md_provsize); p += sizeof(md->md_provsize); 193 le32enc(p, md->md_sectorsize); p += sizeof(md->md_sectorsize); 194 *p = md->md_keys; p += sizeof(md->md_keys); 195 le32enc(p, md->md_iterations); p += sizeof(md->md_iterations); 196 bcopy(md->md_salt, p, sizeof(md->md_salt)); p += sizeof(md->md_salt); 197 bcopy(md->md_mkeys, p, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 198 MD5Init(&ctx); 199 MD5Update(&ctx, data, p - data); 200 MD5Final(md->md_hash, &ctx); 201 bcopy(md->md_hash, p, sizeof(md->md_hash)); 202} 203static __inline int 204eli_metadata_decode_v0(const u_char *data, struct g_eli_metadata *md) 205{ 206 MD5_CTX ctx; 207 const u_char *p; 208 209 p = data + sizeof(md->md_magic) + sizeof(md->md_version); 210 md->md_flags = le32dec(p); p += sizeof(md->md_flags); 211 md->md_ealgo = le16dec(p); p += sizeof(md->md_ealgo); 212 md->md_keylen = le16dec(p); p += sizeof(md->md_keylen); 213 md->md_provsize = le64dec(p); p += sizeof(md->md_provsize); 214 md->md_sectorsize = le32dec(p); p += sizeof(md->md_sectorsize); 215 md->md_keys = *p; p += sizeof(md->md_keys); 216 md->md_iterations = le32dec(p); p += sizeof(md->md_iterations); 217 bcopy(p, md->md_salt, sizeof(md->md_salt)); p += sizeof(md->md_salt); 218 bcopy(p, md->md_mkeys, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 219 MD5Init(&ctx); 220 MD5Update(&ctx, data, p - data); 221 MD5Final(md->md_hash, &ctx); 222 if (bcmp(md->md_hash, p, 16) != 0) 223 return (EINVAL); 224 return (0); 225} 226static __inline int 227eli_metadata_decode_v1v2(const u_char *data, struct g_eli_metadata *md) 228{ 229 MD5_CTX ctx; 230 const u_char *p; 231 232 p = data + sizeof(md->md_magic) + sizeof(md->md_version); 233 md->md_flags = le32dec(p); p += sizeof(md->md_flags); 234 md->md_ealgo = le16dec(p); p += sizeof(md->md_ealgo); 235 md->md_keylen = le16dec(p); p += sizeof(md->md_keylen); 236 md->md_aalgo = le16dec(p); p += sizeof(md->md_aalgo); 237 md->md_provsize = le64dec(p); p += sizeof(md->md_provsize); 238 md->md_sectorsize = le32dec(p); p += sizeof(md->md_sectorsize); 239 md->md_keys = *p; p += sizeof(md->md_keys); 240 md->md_iterations = le32dec(p); p += sizeof(md->md_iterations); 241 bcopy(p, md->md_salt, sizeof(md->md_salt)); p += sizeof(md->md_salt); 242 bcopy(p, md->md_mkeys, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 243 MD5Init(&ctx); 244 MD5Update(&ctx, data, p - data); 245 MD5Final(md->md_hash, &ctx); 246 if (bcmp(md->md_hash, p, 16) != 0) 247 return (EINVAL); 248 return (0); 249} 250static __inline int 251eli_metadata_decode(const u_char *data, struct g_eli_metadata *md) 252{ 253 int error; 254 255 bcopy(data, md->md_magic, sizeof(md->md_magic)); 256 md->md_version = le32dec(data + sizeof(md->md_magic)); 257 switch (md->md_version) { 258 case 0: 259 error = eli_metadata_decode_v0(data, md); 260 break; 261 case 1: 262 case 2: 263 error = eli_metadata_decode_v1v2(data, md); 264 break; 265 default: 266 error = EINVAL; 267 break; 268 } 269 return (error); 270} 271#endif /* !_OpenSSL */ 272 273static __inline u_int 274g_eli_str2ealgo(const char *name) 275{ 276 277 if (strcasecmp("null", name) == 0) 278 return (CRYPTO_NULL_CBC); 279 else if (strcasecmp("aes", name) == 0) 280 return (CRYPTO_AES_CBC); 281 else if (strcasecmp("blowfish", name) == 0) 282 return (CRYPTO_BLF_CBC); 283 else if (strcasecmp("3des", name) == 0) 284 return (CRYPTO_3DES_CBC); 285 return (CRYPTO_ALGORITHM_MIN - 1); 286} 287 288static __inline u_int 289g_eli_str2aalgo(const char *name) 290{ 291 292 if (strcasecmp("hmac/md5", name) == 0) 293 return (CRYPTO_MD5_HMAC); 294 else if (strcasecmp("hmac/sha1", name) == 0) 295 return (CRYPTO_SHA1_HMAC); 296 else if (strcasecmp("hmac/ripemd160", name) == 0) 297 return (CRYPTO_RIPEMD160_HMAC); 298 else if (strcasecmp("hmac/sha256", name) == 0) 299 return (CRYPTO_SHA2_256_HMAC); 300 else if (strcasecmp("hmac/sha384", name) == 0) 301 return (CRYPTO_SHA2_384_HMAC); 302 else if (strcasecmp("hmac/sha512", name) == 0) 303 return (CRYPTO_SHA2_512_HMAC); 304 return (CRYPTO_ALGORITHM_MIN - 1); 305} 306 307static __inline const char * 308g_eli_algo2str(u_int algo) 309{ 310 311 switch (algo) { 312 case CRYPTO_NULL_CBC: 313 return ("NULL"); 314 case CRYPTO_AES_CBC: 315 return ("AES-CBC"); 316 case CRYPTO_BLF_CBC: 317 return ("Blowfish-CBC"); 318 case CRYPTO_3DES_CBC: 319 return ("3DES-CBC"); 320 case CRYPTO_MD5_HMAC: 321 return ("HMAC/MD5"); 322 case CRYPTO_SHA1_HMAC: 323 return ("HMAC/SHA1"); 324 case CRYPTO_RIPEMD160_HMAC: 325 return ("HMAC/RIPEMD160"); 326 case CRYPTO_SHA2_256_HMAC: 327 return ("HMAC/SHA256"); 328 case CRYPTO_SHA2_384_HMAC: 329 return ("HMAC/SHA384"); 330 case CRYPTO_SHA2_512_HMAC: 331 return ("HMAC/SHA512"); 332 } 333 return ("unknown"); 334} 335 336static __inline void 337eli_metadata_dump(const struct g_eli_metadata *md) 338{ 339 static const char hex[] = "0123456789abcdef"; 340 char str[sizeof(md->md_mkeys) * 2 + 1]; 341 u_int i; 342 343 printf(" magic: %s\n", md->md_magic); 344 printf(" version: %u\n", (u_int)md->md_version); 345 printf(" flags: 0x%x\n", (u_int)md->md_flags); 346 printf(" ealgo: %s\n", g_eli_algo2str(md->md_ealgo)); 347 printf(" keylen: %u\n", (u_int)md->md_keylen); 348 if (md->md_flags & G_ELI_FLAG_AUTH) 349 printf(" aalgo: %s\n", g_eli_algo2str(md->md_aalgo)); 350 printf(" provsize: %ju\n", (uintmax_t)md->md_provsize); 351 printf("sectorsize: %u\n", (u_int)md->md_sectorsize); 352 printf(" keys: 0x%02x\n", (u_int)md->md_keys); 353 printf("iterations: %u\n", (u_int)md->md_iterations); 354 bzero(str, sizeof(str)); 355 for (i = 0; i < sizeof(md->md_salt); i++) { 356 str[i * 2] = hex[md->md_salt[i] >> 4]; 357 str[i * 2 + 1] = hex[md->md_salt[i] & 0x0f]; 358 } 359 printf(" Salt: %s\n", str); 360 bzero(str, sizeof(str)); 361 for (i = 0; i < sizeof(md->md_mkeys); i++) { 362 str[i * 2] = hex[md->md_mkeys[i] >> 4]; 363 str[i * 2 + 1] = hex[md->md_mkeys[i] & 0x0f]; 364 } 365 printf("Master Key: %s\n", str); 366 bzero(str, sizeof(str)); 367 for (i = 0; i < 16; i++) { 368 str[i * 2] = hex[md->md_hash[i] >> 4]; 369 str[i * 2 + 1] = hex[md->md_hash[i] & 0x0f]; 370 } 371 printf(" MD5 hash: %s\n", str); 372} 373 374static __inline u_int 375g_eli_keylen(u_int algo, u_int keylen) 376{ 377 378 switch (algo) { 379 case CRYPTO_NULL_CBC: 380 if (keylen == 0) 381 keylen = 64 * 8; 382 else { 383 if (keylen > 64 * 8) 384 keylen = 0; 385 } 386 return (keylen); 387 case CRYPTO_AES_CBC: 388 switch (keylen) { 389 case 0: 390 return (128); 391 case 128: 392 case 192: 393 case 256: 394 return (keylen); 395 default: 396 return (0); 397 } 398 case CRYPTO_BLF_CBC: 399 if (keylen == 0) 400 return (128); 401 if (keylen < 128 || keylen > 448) 402 return (0); 403 if ((keylen % 32) != 0) 404 return (0); 405 return (keylen); 406 case CRYPTO_3DES_CBC: 407 if (keylen == 0 || keylen == 192) 408 return (192); 409 return (0); 410 default: 411 return (0); 412 } 413} 414 415static __inline u_int 416g_eli_hashlen(u_int algo) 417{ 418 419 switch (algo) { 420 case CRYPTO_MD5_HMAC: 421 return (16); 422 case CRYPTO_SHA1_HMAC: 423 return (20); 424 case CRYPTO_RIPEMD160_HMAC: 425 return (20); 426 case CRYPTO_SHA2_256_HMAC: 427 return (32); 428 case CRYPTO_SHA2_384_HMAC: 429 return (48); 430 case CRYPTO_SHA2_512_HMAC: 431 return (64); 432 } 433 return (0); 434} 435 436#ifdef _KERNEL 437int g_eli_read_metadata(struct g_class *mp, struct g_provider *pp, 438 struct g_eli_metadata *md); 439struct g_geom *g_eli_create(struct gctl_req *req, struct g_class *mp, 440 struct g_provider *bpp, const struct g_eli_metadata *md, 441 const u_char *mkey, int nkey); 442int g_eli_destroy(struct g_eli_softc *sc, boolean_t force); 443 444int g_eli_access(struct g_provider *pp, int dr, int dw, int de); 445void g_eli_config(struct gctl_req *req, struct g_class *mp, const char *verb); 446 447void g_eli_read_done(struct bio *bp); 448void g_eli_write_done(struct bio *bp); 449int g_eli_crypto_rerun(struct cryptop *crp); 450void g_eli_crypto_ivgen(struct g_eli_softc *sc, off_t offset, u_char *iv, 451 size_t size); 452 453void g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp); 454 455void g_eli_auth_read(struct g_eli_softc *sc, struct bio *bp); 456void g_eli_auth_run(struct g_eli_worker *wr, struct bio *bp); 457#endif 458 459void g_eli_mkey_hmac(unsigned char *mkey, const unsigned char *key); 460int g_eli_mkey_decrypt(const struct g_eli_metadata *md, 461 const unsigned char *key, unsigned char *mkey, unsigned *nkeyp); 462int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, 463 unsigned char *mkey); 464#ifdef _KERNEL 465void g_eli_mkey_propagate(struct g_eli_softc *sc, const unsigned char *mkey); 466#endif 467 468int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, 469 const u_char *key, size_t keysize); 470int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, 471 const u_char *key, size_t keysize); 472 473struct hmac_ctx { 474 SHA512_CTX shactx; 475 u_char k_opad[128]; 476}; 477 478void g_eli_crypto_hmac_init(struct hmac_ctx *ctx, const uint8_t *hkey, 479 size_t hkeylen); 480void g_eli_crypto_hmac_update(struct hmac_ctx *ctx, const uint8_t *data, 481 size_t datasize); 482void g_eli_crypto_hmac_final(struct hmac_ctx *ctx, uint8_t *md, size_t mdsize); 483void g_eli_crypto_hmac(const uint8_t *hkey, size_t hkeysize, 484 const uint8_t *data, size_t datasize, uint8_t *md, size_t mdsize); 485#endif /* !_G_ELI_H_ */
| 85 86#define SHA512_MDLEN 64 87#define G_ELI_AUTH_SECKEYLEN SHA256_DIGEST_LENGTH 88 89#define G_ELI_MAXMKEYS 2 90#define G_ELI_MAXKEYLEN 64 91#define G_ELI_USERKEYLEN G_ELI_MAXKEYLEN 92#define G_ELI_DATAKEYLEN G_ELI_MAXKEYLEN 93#define G_ELI_AUTHKEYLEN G_ELI_MAXKEYLEN 94#define G_ELI_IVKEYLEN G_ELI_MAXKEYLEN 95#define G_ELI_SALTLEN 64 96#define G_ELI_DATAIVKEYLEN (G_ELI_DATAKEYLEN + G_ELI_IVKEYLEN) 97/* Data-Key, IV-Key, HMAC_SHA512(Derived-Key, Data-Key+IV-Key) */ 98#define G_ELI_MKEYLEN (G_ELI_DATAIVKEYLEN + SHA512_MDLEN) 99 100#ifdef _KERNEL 101extern u_int g_eli_debug; 102extern u_int g_eli_overwrites; 103extern u_int g_eli_batch; 104 105#define G_ELI_CRYPTO_HW 1 106#define G_ELI_CRYPTO_SW 2 107 108#define G_ELI_DEBUG(lvl, ...) do { \ 109 if (g_eli_debug >= (lvl)) { \ 110 printf("GEOM_ELI"); \ 111 if (g_eli_debug > 0) \ 112 printf("[%u]", lvl); \ 113 printf(": "); \ 114 printf(__VA_ARGS__); \ 115 printf("\n"); \ 116 } \ 117} while (0) 118#define G_ELI_LOGREQ(lvl, bp, ...) do { \ 119 if (g_eli_debug >= (lvl)) { \ 120 printf("GEOM_ELI"); \ 121 if (g_eli_debug > 0) \ 122 printf("[%u]", lvl); \ 123 printf(": "); \ 124 printf(__VA_ARGS__); \ 125 printf(" "); \ 126 g_print_bio(bp); \ 127 printf("\n"); \ 128 } \ 129} while (0) 130 131struct g_eli_worker { 132 struct g_eli_softc *w_softc; 133 struct proc *w_proc; 134 u_int w_number; 135 uint64_t w_sid; 136 LIST_ENTRY(g_eli_worker) w_next; 137}; 138 139struct g_eli_softc { 140 struct g_geom *sc_geom; 141 u_int sc_crypto; 142 uint8_t sc_mkey[G_ELI_DATAIVKEYLEN]; 143 uint8_t sc_ekey[G_ELI_DATAKEYLEN]; 144 u_int sc_ealgo; 145 u_int sc_ekeylen; 146 uint8_t sc_akey[G_ELI_AUTHKEYLEN]; 147 u_int sc_aalgo; 148 u_int sc_akeylen; 149 u_int sc_alen; 150 SHA256_CTX sc_akeyctx; 151 uint8_t sc_ivkey[G_ELI_IVKEYLEN]; 152 SHA256_CTX sc_ivctx; 153 int sc_nkey; 154 uint32_t sc_flags; 155 u_int sc_bytes_per_sector; 156 u_int sc_data_per_sector; 157 158 /* Only for software cryptography. */ 159 struct bio_queue_head sc_queue; 160 struct mtx sc_queue_mtx; 161 LIST_HEAD(, g_eli_worker) sc_workers; 162}; 163#define sc_name sc_geom->name 164#endif /* _KERNEL */ 165 166struct g_eli_metadata { 167 char md_magic[16]; /* Magic value. */ 168 uint32_t md_version; /* Version number. */ 169 uint32_t md_flags; /* Additional flags. */ 170 uint16_t md_ealgo; /* Encryption algorithm. */ 171 uint16_t md_keylen; /* Key length. */ 172 uint16_t md_aalgo; /* Authentication algorithm. */ 173 uint64_t md_provsize; /* Provider's size. */ 174 uint32_t md_sectorsize; /* Sector size. */ 175 uint8_t md_keys; /* Available keys. */ 176 int32_t md_iterations; /* Number of iterations for PKCS#5v2. */ 177 uint8_t md_salt[G_ELI_SALTLEN]; /* Salt. */ 178 /* Encrypted master key (IV-key, Data-key, HMAC). */ 179 uint8_t md_mkeys[G_ELI_MAXMKEYS * G_ELI_MKEYLEN]; 180 u_char md_hash[16]; /* MD5 hash. */ 181} __packed; 182#ifndef _OpenSSL_ 183static __inline void 184eli_metadata_encode(struct g_eli_metadata *md, u_char *data) 185{ 186 MD5_CTX ctx; 187 u_char *p; 188 189 p = data; 190 bcopy(md->md_magic, p, sizeof(md->md_magic)); p += sizeof(md->md_magic); 191 le32enc(p, md->md_version); p += sizeof(md->md_version); 192 le32enc(p, md->md_flags); p += sizeof(md->md_flags); 193 le16enc(p, md->md_ealgo); p += sizeof(md->md_ealgo); 194 le16enc(p, md->md_keylen); p += sizeof(md->md_keylen); 195 le16enc(p, md->md_aalgo); p += sizeof(md->md_aalgo); 196 le64enc(p, md->md_provsize); p += sizeof(md->md_provsize); 197 le32enc(p, md->md_sectorsize); p += sizeof(md->md_sectorsize); 198 *p = md->md_keys; p += sizeof(md->md_keys); 199 le32enc(p, md->md_iterations); p += sizeof(md->md_iterations); 200 bcopy(md->md_salt, p, sizeof(md->md_salt)); p += sizeof(md->md_salt); 201 bcopy(md->md_mkeys, p, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 202 MD5Init(&ctx); 203 MD5Update(&ctx, data, p - data); 204 MD5Final(md->md_hash, &ctx); 205 bcopy(md->md_hash, p, sizeof(md->md_hash)); 206} 207static __inline int 208eli_metadata_decode_v0(const u_char *data, struct g_eli_metadata *md) 209{ 210 MD5_CTX ctx; 211 const u_char *p; 212 213 p = data + sizeof(md->md_magic) + sizeof(md->md_version); 214 md->md_flags = le32dec(p); p += sizeof(md->md_flags); 215 md->md_ealgo = le16dec(p); p += sizeof(md->md_ealgo); 216 md->md_keylen = le16dec(p); p += sizeof(md->md_keylen); 217 md->md_provsize = le64dec(p); p += sizeof(md->md_provsize); 218 md->md_sectorsize = le32dec(p); p += sizeof(md->md_sectorsize); 219 md->md_keys = *p; p += sizeof(md->md_keys); 220 md->md_iterations = le32dec(p); p += sizeof(md->md_iterations); 221 bcopy(p, md->md_salt, sizeof(md->md_salt)); p += sizeof(md->md_salt); 222 bcopy(p, md->md_mkeys, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 223 MD5Init(&ctx); 224 MD5Update(&ctx, data, p - data); 225 MD5Final(md->md_hash, &ctx); 226 if (bcmp(md->md_hash, p, 16) != 0) 227 return (EINVAL); 228 return (0); 229} 230static __inline int 231eli_metadata_decode_v1v2(const u_char *data, struct g_eli_metadata *md) 232{ 233 MD5_CTX ctx; 234 const u_char *p; 235 236 p = data + sizeof(md->md_magic) + sizeof(md->md_version); 237 md->md_flags = le32dec(p); p += sizeof(md->md_flags); 238 md->md_ealgo = le16dec(p); p += sizeof(md->md_ealgo); 239 md->md_keylen = le16dec(p); p += sizeof(md->md_keylen); 240 md->md_aalgo = le16dec(p); p += sizeof(md->md_aalgo); 241 md->md_provsize = le64dec(p); p += sizeof(md->md_provsize); 242 md->md_sectorsize = le32dec(p); p += sizeof(md->md_sectorsize); 243 md->md_keys = *p; p += sizeof(md->md_keys); 244 md->md_iterations = le32dec(p); p += sizeof(md->md_iterations); 245 bcopy(p, md->md_salt, sizeof(md->md_salt)); p += sizeof(md->md_salt); 246 bcopy(p, md->md_mkeys, sizeof(md->md_mkeys)); p += sizeof(md->md_mkeys); 247 MD5Init(&ctx); 248 MD5Update(&ctx, data, p - data); 249 MD5Final(md->md_hash, &ctx); 250 if (bcmp(md->md_hash, p, 16) != 0) 251 return (EINVAL); 252 return (0); 253} 254static __inline int 255eli_metadata_decode(const u_char *data, struct g_eli_metadata *md) 256{ 257 int error; 258 259 bcopy(data, md->md_magic, sizeof(md->md_magic)); 260 md->md_version = le32dec(data + sizeof(md->md_magic)); 261 switch (md->md_version) { 262 case 0: 263 error = eli_metadata_decode_v0(data, md); 264 break; 265 case 1: 266 case 2: 267 error = eli_metadata_decode_v1v2(data, md); 268 break; 269 default: 270 error = EINVAL; 271 break; 272 } 273 return (error); 274} 275#endif /* !_OpenSSL */ 276 277static __inline u_int 278g_eli_str2ealgo(const char *name) 279{ 280 281 if (strcasecmp("null", name) == 0) 282 return (CRYPTO_NULL_CBC); 283 else if (strcasecmp("aes", name) == 0) 284 return (CRYPTO_AES_CBC); 285 else if (strcasecmp("blowfish", name) == 0) 286 return (CRYPTO_BLF_CBC); 287 else if (strcasecmp("3des", name) == 0) 288 return (CRYPTO_3DES_CBC); 289 return (CRYPTO_ALGORITHM_MIN - 1); 290} 291 292static __inline u_int 293g_eli_str2aalgo(const char *name) 294{ 295 296 if (strcasecmp("hmac/md5", name) == 0) 297 return (CRYPTO_MD5_HMAC); 298 else if (strcasecmp("hmac/sha1", name) == 0) 299 return (CRYPTO_SHA1_HMAC); 300 else if (strcasecmp("hmac/ripemd160", name) == 0) 301 return (CRYPTO_RIPEMD160_HMAC); 302 else if (strcasecmp("hmac/sha256", name) == 0) 303 return (CRYPTO_SHA2_256_HMAC); 304 else if (strcasecmp("hmac/sha384", name) == 0) 305 return (CRYPTO_SHA2_384_HMAC); 306 else if (strcasecmp("hmac/sha512", name) == 0) 307 return (CRYPTO_SHA2_512_HMAC); 308 return (CRYPTO_ALGORITHM_MIN - 1); 309} 310 311static __inline const char * 312g_eli_algo2str(u_int algo) 313{ 314 315 switch (algo) { 316 case CRYPTO_NULL_CBC: 317 return ("NULL"); 318 case CRYPTO_AES_CBC: 319 return ("AES-CBC"); 320 case CRYPTO_BLF_CBC: 321 return ("Blowfish-CBC"); 322 case CRYPTO_3DES_CBC: 323 return ("3DES-CBC"); 324 case CRYPTO_MD5_HMAC: 325 return ("HMAC/MD5"); 326 case CRYPTO_SHA1_HMAC: 327 return ("HMAC/SHA1"); 328 case CRYPTO_RIPEMD160_HMAC: 329 return ("HMAC/RIPEMD160"); 330 case CRYPTO_SHA2_256_HMAC: 331 return ("HMAC/SHA256"); 332 case CRYPTO_SHA2_384_HMAC: 333 return ("HMAC/SHA384"); 334 case CRYPTO_SHA2_512_HMAC: 335 return ("HMAC/SHA512"); 336 } 337 return ("unknown"); 338} 339 340static __inline void 341eli_metadata_dump(const struct g_eli_metadata *md) 342{ 343 static const char hex[] = "0123456789abcdef"; 344 char str[sizeof(md->md_mkeys) * 2 + 1]; 345 u_int i; 346 347 printf(" magic: %s\n", md->md_magic); 348 printf(" version: %u\n", (u_int)md->md_version); 349 printf(" flags: 0x%x\n", (u_int)md->md_flags); 350 printf(" ealgo: %s\n", g_eli_algo2str(md->md_ealgo)); 351 printf(" keylen: %u\n", (u_int)md->md_keylen); 352 if (md->md_flags & G_ELI_FLAG_AUTH) 353 printf(" aalgo: %s\n", g_eli_algo2str(md->md_aalgo)); 354 printf(" provsize: %ju\n", (uintmax_t)md->md_provsize); 355 printf("sectorsize: %u\n", (u_int)md->md_sectorsize); 356 printf(" keys: 0x%02x\n", (u_int)md->md_keys); 357 printf("iterations: %u\n", (u_int)md->md_iterations); 358 bzero(str, sizeof(str)); 359 for (i = 0; i < sizeof(md->md_salt); i++) { 360 str[i * 2] = hex[md->md_salt[i] >> 4]; 361 str[i * 2 + 1] = hex[md->md_salt[i] & 0x0f]; 362 } 363 printf(" Salt: %s\n", str); 364 bzero(str, sizeof(str)); 365 for (i = 0; i < sizeof(md->md_mkeys); i++) { 366 str[i * 2] = hex[md->md_mkeys[i] >> 4]; 367 str[i * 2 + 1] = hex[md->md_mkeys[i] & 0x0f]; 368 } 369 printf("Master Key: %s\n", str); 370 bzero(str, sizeof(str)); 371 for (i = 0; i < 16; i++) { 372 str[i * 2] = hex[md->md_hash[i] >> 4]; 373 str[i * 2 + 1] = hex[md->md_hash[i] & 0x0f]; 374 } 375 printf(" MD5 hash: %s\n", str); 376} 377 378static __inline u_int 379g_eli_keylen(u_int algo, u_int keylen) 380{ 381 382 switch (algo) { 383 case CRYPTO_NULL_CBC: 384 if (keylen == 0) 385 keylen = 64 * 8; 386 else { 387 if (keylen > 64 * 8) 388 keylen = 0; 389 } 390 return (keylen); 391 case CRYPTO_AES_CBC: 392 switch (keylen) { 393 case 0: 394 return (128); 395 case 128: 396 case 192: 397 case 256: 398 return (keylen); 399 default: 400 return (0); 401 } 402 case CRYPTO_BLF_CBC: 403 if (keylen == 0) 404 return (128); 405 if (keylen < 128 || keylen > 448) 406 return (0); 407 if ((keylen % 32) != 0) 408 return (0); 409 return (keylen); 410 case CRYPTO_3DES_CBC: 411 if (keylen == 0 || keylen == 192) 412 return (192); 413 return (0); 414 default: 415 return (0); 416 } 417} 418 419static __inline u_int 420g_eli_hashlen(u_int algo) 421{ 422 423 switch (algo) { 424 case CRYPTO_MD5_HMAC: 425 return (16); 426 case CRYPTO_SHA1_HMAC: 427 return (20); 428 case CRYPTO_RIPEMD160_HMAC: 429 return (20); 430 case CRYPTO_SHA2_256_HMAC: 431 return (32); 432 case CRYPTO_SHA2_384_HMAC: 433 return (48); 434 case CRYPTO_SHA2_512_HMAC: 435 return (64); 436 } 437 return (0); 438} 439 440#ifdef _KERNEL 441int g_eli_read_metadata(struct g_class *mp, struct g_provider *pp, 442 struct g_eli_metadata *md); 443struct g_geom *g_eli_create(struct gctl_req *req, struct g_class *mp, 444 struct g_provider *bpp, const struct g_eli_metadata *md, 445 const u_char *mkey, int nkey); 446int g_eli_destroy(struct g_eli_softc *sc, boolean_t force); 447 448int g_eli_access(struct g_provider *pp, int dr, int dw, int de); 449void g_eli_config(struct gctl_req *req, struct g_class *mp, const char *verb); 450 451void g_eli_read_done(struct bio *bp); 452void g_eli_write_done(struct bio *bp); 453int g_eli_crypto_rerun(struct cryptop *crp); 454void g_eli_crypto_ivgen(struct g_eli_softc *sc, off_t offset, u_char *iv, 455 size_t size); 456 457void g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp); 458 459void g_eli_auth_read(struct g_eli_softc *sc, struct bio *bp); 460void g_eli_auth_run(struct g_eli_worker *wr, struct bio *bp); 461#endif 462 463void g_eli_mkey_hmac(unsigned char *mkey, const unsigned char *key); 464int g_eli_mkey_decrypt(const struct g_eli_metadata *md, 465 const unsigned char *key, unsigned char *mkey, unsigned *nkeyp); 466int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, 467 unsigned char *mkey); 468#ifdef _KERNEL 469void g_eli_mkey_propagate(struct g_eli_softc *sc, const unsigned char *mkey); 470#endif 471 472int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, 473 const u_char *key, size_t keysize); 474int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, 475 const u_char *key, size_t keysize); 476 477struct hmac_ctx { 478 SHA512_CTX shactx; 479 u_char k_opad[128]; 480}; 481 482void g_eli_crypto_hmac_init(struct hmac_ctx *ctx, const uint8_t *hkey, 483 size_t hkeylen); 484void g_eli_crypto_hmac_update(struct hmac_ctx *ctx, const uint8_t *data, 485 size_t datasize); 486void g_eli_crypto_hmac_final(struct hmac_ctx *ctx, uint8_t *md, size_t mdsize); 487void g_eli_crypto_hmac(const uint8_t *hkey, size_t hkeysize, 488 const uint8_t *data, size_t datasize, uint8_t *md, size_t mdsize); 489#endif /* !_G_ELI_H_ */
|