27
27
#include < sys/stat.h>
28
28
#include < sys/types.h>
29
29
30
+ #include < android-base/file.h>
30
31
#include < android-base/logging.h>
31
32
#include < cutils/properties.h>
32
33
@@ -48,6 +49,7 @@ struct ext4_encryption_policy {
48
49
49
50
#define EXT4_ENCRYPTION_MODE_AES_256_XTS 1
50
51
#define EXT4_ENCRYPTION_MODE_AES_256_CTS 4
52
+ #define EXT4_ENCRYPTION_MODE_PRIVATE 127
51
53
52
54
// ext4enc:TODO Get value from somewhere sensible
53
55
#define EXT4_IOC_SET_ENCRYPTION_POLICY _IOR (' f' , 19 , struct ext4_encryption_policy )
@@ -99,7 +101,8 @@ static bool is_dir_empty(const char *dirname, bool *is_empty)
99
101
return true ;
100
102
}
101
103
102
- static bool e4crypt_policy_set (const char *directory, const char *policy, size_t policy_length) {
104
+ static bool e4crypt_policy_set (const char *directory, const char *policy,
105
+ size_t policy_length, int contents_encryption_mode) {
103
106
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
104
107
LOG (ERROR) << " Policy wrong length: " << policy_length;
105
108
return false ;
@@ -112,7 +115,7 @@ static bool e4crypt_policy_set(const char *directory, const char *policy, size_t
112
115
113
116
ext4_encryption_policy eep;
114
117
eep.version = 0 ;
115
- eep.contents_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_XTS ;
118
+ eep.contents_encryption_mode = contents_encryption_mode ;
116
119
eep.filenames_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_CTS;
117
120
eep.flags = 0 ;
118
121
memcpy (eep.master_key_descriptor , policy, EXT4_KEY_DESCRIPTOR_SIZE);
@@ -129,7 +132,8 @@ static bool e4crypt_policy_set(const char *directory, const char *policy, size_t
129
132
return true ;
130
133
}
131
134
132
- static bool e4crypt_policy_get (const char *directory, char *policy, size_t policy_length) {
135
+ static bool e4crypt_policy_get (const char *directory, char *policy,
136
+ size_t policy_length, int contents_encryption_mode) {
133
137
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
134
138
LOG (ERROR) << " Policy wrong length: " << policy_length;
135
139
return false ;
@@ -151,7 +155,7 @@ static bool e4crypt_policy_get(const char *directory, char *policy, size_t polic
151
155
close (fd);
152
156
153
157
if ((eep.version != 0 )
154
- || (eep.contents_encryption_mode != EXT4_ENCRYPTION_MODE_AES_256_XTS )
158
+ || (eep.contents_encryption_mode != contents_encryption_mode )
155
159
|| (eep.filenames_encryption_mode != EXT4_ENCRYPTION_MODE_AES_256_CTS)
156
160
|| (eep.flags != 0 )) {
157
161
LOG (ERROR) << " Failed to find matching encryption policy for " << directory;
@@ -162,13 +166,15 @@ static bool e4crypt_policy_get(const char *directory, char *policy, size_t polic
162
166
return true ;
163
167
}
164
168
165
- static bool e4crypt_policy_check (const char *directory, const char *policy, size_t policy_length) {
169
+ static bool e4crypt_policy_check (const char *directory, const char *policy,
170
+ size_t policy_length, int contents_encryption_mode) {
166
171
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
167
172
LOG (ERROR) << " Policy wrong length: " << policy_length;
168
173
return false ;
169
174
}
170
175
char existing_policy[EXT4_KEY_DESCRIPTOR_SIZE];
171
- if (!e4crypt_policy_get (directory, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE)) return false ;
176
+ if (!e4crypt_policy_get (directory, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE,
177
+ contents_encryption_mode)) return false ;
172
178
char existing_policy_hex[EXT4_KEY_DESCRIPTOR_SIZE_HEX];
173
179
174
180
policy_to_hex (existing_policy, existing_policy_hex);
@@ -185,13 +191,26 @@ static bool e4crypt_policy_check(const char *directory, const char *policy, size
185
191
return true ;
186
192
}
187
193
188
- int e4crypt_policy_ensure (const char *directory, const char *policy, size_t policy_length) {
194
+ int e4crypt_policy_ensure (const char *directory, const char *policy,
195
+ size_t policy_length, const char * contents_encryption_mode) {
196
+ int mode = 0 ;
197
+ if (!strcmp (contents_encryption_mode, " software" )) {
198
+ mode = EXT4_ENCRYPTION_MODE_AES_256_XTS;
199
+ } else if (!strcmp (contents_encryption_mode, " ice" )) {
200
+ mode = EXT4_ENCRYPTION_MODE_PRIVATE;
201
+ } else {
202
+ LOG (ERROR) << " Invalid encryption mode" ;
203
+ return -1 ;
204
+ }
205
+
189
206
bool is_empty;
190
207
if (!is_dir_empty (directory, &is_empty)) return -1 ;
191
208
if (is_empty) {
192
- if (!e4crypt_policy_set (directory, policy, policy_length)) return -1 ;
209
+ if (!e4crypt_policy_set (directory, policy, policy_length,
210
+ mode)) return -1 ;
193
211
} else {
194
- if (!e4crypt_policy_check (directory, policy, policy_length)) return -1 ;
212
+ if (!e4crypt_policy_check (directory, policy, policy_length,
213
+ mode)) return -1 ;
195
214
}
196
215
return 0 ;
197
216
}
0 commit comments