2017-06-23 18:24:00 +02:00
|
|
|
/*
|
|
|
|
* QEMU block full disk encryption
|
|
|
|
*
|
|
|
|
* Copyright (c) 2015-2017 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2020-10-23 14:44:24 +02:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2017-06-23 18:24:00 +02:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2019-03-15 15:51:21 +01:00
|
|
|
#ifndef BLOCK_CRYPTO_H
|
|
|
|
#define BLOCK_CRYPTO_H
|
2017-06-23 18:24:00 +02:00
|
|
|
|
qcow: convert QCow to use QCryptoBlock for encryption
This converts the qcow driver to make use of the QCryptoBlock
APIs for encrypting image content. This is only wired up to
permit use of the legacy QCow encryption format. Users who wish
to have the strong LUKS format should switch to qcow2 instead.
With this change it is now required to use the QCryptoSecret
object for providing passwords, instead of the current block
password APIs / interactive prompting.
$QEMU \
-object secret,id=sec0,file=/home/berrange/encrypted.pw \
-drive file=/home/berrange/encrypted.qcow,encrypt.format=aes,\
encrypt.key-secret=sec0
Though note that running QEMU system emulators with the AES
encryption is no longer supported, so while the above syntax
is valid, QEMU will refuse to actually run the VM in this
particular example.
Likewise when creating images with the legacy AES-CBC format
qemu-img create -f qcow \
--object secret,id=sec0,file=/home/berrange/encrypted.pw \
-o encrypt.format=aes,encrypt.key-secret=sec0 \
/home/berrange/encrypted.qcow 64M
Reviewed-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Alberto Garcia <berto@igalia.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-id: 20170623162419.26068-10-berrange@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2017-06-23 18:24:08 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_KEY_SECRET(prefix, helpstr) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_QCOW_KEY_SECRET, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = helpstr, \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BLOCK_CRYPTO_OPT_QCOW_KEY_SECRET "key-secret"
|
|
|
|
|
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_QCOW_KEY_SECRET(prefix) \
|
|
|
|
BLOCK_CRYPTO_OPT_DEF_KEY_SECRET(prefix, \
|
|
|
|
"ID of the secret that provides the AES encryption key")
|
|
|
|
|
2017-06-23 18:24:00 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_KEY_SECRET "key-secret"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_CIPHER_ALG "cipher-alg"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_CIPHER_MODE "cipher-mode"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_IVGEN_ALG "ivgen-alg"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_IVGEN_HASH_ALG "ivgen-hash-alg"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_HASH_ALG "hash-alg"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_ITER_TIME "iter-time"
|
2024-01-30 06:37:23 +01:00
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_DETACHED_HEADER "detached-header"
|
2020-06-25 14:55:42 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_KEYSLOT "keyslot"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_STATE "state"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_OLD_SECRET "old-secret"
|
|
|
|
#define BLOCK_CRYPTO_OPT_LUKS_NEW_SECRET "new-secret"
|
|
|
|
|
2017-06-23 18:24:00 +02:00
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_KEY_SECRET(prefix) \
|
qcow: convert QCow to use QCryptoBlock for encryption
This converts the qcow driver to make use of the QCryptoBlock
APIs for encrypting image content. This is only wired up to
permit use of the legacy QCow encryption format. Users who wish
to have the strong LUKS format should switch to qcow2 instead.
With this change it is now required to use the QCryptoSecret
object for providing passwords, instead of the current block
password APIs / interactive prompting.
$QEMU \
-object secret,id=sec0,file=/home/berrange/encrypted.pw \
-drive file=/home/berrange/encrypted.qcow,encrypt.format=aes,\
encrypt.key-secret=sec0
Though note that running QEMU system emulators with the AES
encryption is no longer supported, so while the above syntax
is valid, QEMU will refuse to actually run the VM in this
particular example.
Likewise when creating images with the legacy AES-CBC format
qemu-img create -f qcow \
--object secret,id=sec0,file=/home/berrange/encrypted.pw \
-o encrypt.format=aes,encrypt.key-secret=sec0 \
/home/berrange/encrypted.qcow 64M
Reviewed-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Alberto Garcia <berto@igalia.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-id: 20170623162419.26068-10-berrange@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2017-06-23 18:24:08 +02:00
|
|
|
BLOCK_CRYPTO_OPT_DEF_KEY_SECRET(prefix, \
|
|
|
|
"ID of the secret that provides the keyslot passphrase")
|
2017-06-23 18:24:00 +02:00
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_ALG(prefix) \
|
2017-06-23 18:24:00 +02:00
|
|
|
{ \
|
2017-06-23 18:24:01 +02:00
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_CIPHER_ALG, \
|
2017-06-23 18:24:00 +02:00
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Name of encryption cipher algorithm", \
|
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_MODE(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_CIPHER_MODE, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Name of encryption cipher mode", \
|
2017-06-23 18:24:00 +02:00
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_ALG(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_IVGEN_ALG, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Name of IV generator algorithm", \
|
2017-06-23 18:24:00 +02:00
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_HASH_ALG(prefix) \
|
2017-06-23 18:24:00 +02:00
|
|
|
{ \
|
2017-06-23 18:24:01 +02:00
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_IVGEN_HASH_ALG, \
|
2017-06-23 18:24:00 +02:00
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Name of IV generator hash algorithm", \
|
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_HASH_ALG(prefix) \
|
2017-06-23 18:24:00 +02:00
|
|
|
{ \
|
2017-06-23 18:24:01 +02:00
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_HASH_ALG, \
|
2017-06-23 18:24:00 +02:00
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Name of encryption hash algorithm", \
|
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:01 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_ITER_TIME(prefix) \
|
2017-06-23 18:24:00 +02:00
|
|
|
{ \
|
2017-06-23 18:24:01 +02:00
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_ITER_TIME, \
|
2017-06-23 18:24:00 +02:00
|
|
|
.type = QEMU_OPT_NUMBER, \
|
|
|
|
.help = "Time to spend in PBKDF in milliseconds", \
|
|
|
|
}
|
|
|
|
|
2020-06-25 14:55:42 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_STATE(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_STATE, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Select new state of affected keyslots (active/inactive)",\
|
|
|
|
}
|
|
|
|
|
2024-01-30 06:37:23 +01:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_DETACHED_HEADER(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_DETACHED_HEADER, \
|
|
|
|
.type = QEMU_OPT_BOOL, \
|
|
|
|
.help = "Create a detached LUKS header", \
|
|
|
|
}
|
|
|
|
|
2020-06-25 14:55:42 +02:00
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_KEYSLOT(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_KEYSLOT, \
|
|
|
|
.type = QEMU_OPT_NUMBER, \
|
|
|
|
.help = "Select a single keyslot to modify explicitly",\
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_OLD_SECRET(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_OLD_SECRET, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "Select all keyslots that match this password", \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BLOCK_CRYPTO_OPT_DEF_LUKS_NEW_SECRET(prefix) \
|
|
|
|
{ \
|
|
|
|
.name = prefix BLOCK_CRYPTO_OPT_LUKS_NEW_SECRET, \
|
|
|
|
.type = QEMU_OPT_STRING, \
|
|
|
|
.help = "New secret to set in the matching keyslots. " \
|
|
|
|
"Empty string to erase", \
|
|
|
|
}
|
|
|
|
|
2017-06-23 18:24:00 +02:00
|
|
|
QCryptoBlockCreateOptions *
|
2018-06-26 19:41:19 +02:00
|
|
|
block_crypto_create_opts_init(QDict *opts, Error **errp);
|
2017-06-23 18:24:00 +02:00
|
|
|
|
2020-06-25 14:55:36 +02:00
|
|
|
QCryptoBlockAmendOptions *
|
|
|
|
block_crypto_amend_opts_init(QDict *opts, Error **errp);
|
|
|
|
|
2017-06-23 18:24:00 +02:00
|
|
|
QCryptoBlockOpenOptions *
|
2018-06-26 19:41:19 +02:00
|
|
|
block_crypto_open_opts_init(QDict *opts, Error **errp);
|
2017-06-23 18:24:00 +02:00
|
|
|
|
2019-03-15 15:51:21 +01:00
|
|
|
#endif /* BLOCK_CRYPTO_H */
|