xref: /openbmc/qemu/crypto/block-luks.c (revision d0112eb4)
1 /*
2  * QEMU Crypto block device encryption LUKS format
3  *
4  * Copyright (c) 2015-2016 Red Hat, Inc.
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18  *
19  */
20 
21 #include "qemu/osdep.h"
22 #include "qapi/error.h"
23 #include "qemu/bswap.h"
24 
25 #include "block-luks.h"
26 #include "block-luks-priv.h"
27 
28 #include "crypto/hash.h"
29 #include "crypto/afsplit.h"
30 #include "crypto/pbkdf.h"
31 #include "crypto/secret.h"
32 #include "crypto/random.h"
33 #include "qemu/uuid.h"
34 
35 #include "qemu/bitmap.h"
36 
37 /*
38  * Reference for the LUKS format implemented here is
39  *
40  *   docs/on-disk-format.pdf
41  *
42  * in 'cryptsetup' package source code
43  *
44  * This file implements the 1.2.1 specification, dated
45  * Oct 16, 2011.
46  */
47 
48 typedef struct QCryptoBlockLUKS QCryptoBlockLUKS;
49 
50 typedef struct QCryptoBlockLUKSNameMap QCryptoBlockLUKSNameMap;
51 struct QCryptoBlockLUKSNameMap {
52     const char *name;
53     int id;
54 };
55 
56 typedef struct QCryptoBlockLUKSCipherSizeMap QCryptoBlockLUKSCipherSizeMap;
57 struct QCryptoBlockLUKSCipherSizeMap {
58     uint32_t key_bytes;
59     int id;
60 };
61 typedef struct QCryptoBlockLUKSCipherNameMap QCryptoBlockLUKSCipherNameMap;
62 struct QCryptoBlockLUKSCipherNameMap {
63     const char *name;
64     const QCryptoBlockLUKSCipherSizeMap *sizes;
65 };
66 
67 
68 static const QCryptoBlockLUKSCipherSizeMap
69 qcrypto_block_luks_cipher_size_map_aes[] = {
70     { 16, QCRYPTO_CIPHER_ALG_AES_128 },
71     { 24, QCRYPTO_CIPHER_ALG_AES_192 },
72     { 32, QCRYPTO_CIPHER_ALG_AES_256 },
73     { 0, 0 },
74 };
75 
76 static const QCryptoBlockLUKSCipherSizeMap
77 qcrypto_block_luks_cipher_size_map_cast5[] = {
78     { 16, QCRYPTO_CIPHER_ALG_CAST5_128 },
79     { 0, 0 },
80 };
81 
82 static const QCryptoBlockLUKSCipherSizeMap
83 qcrypto_block_luks_cipher_size_map_serpent[] = {
84     { 16, QCRYPTO_CIPHER_ALG_SERPENT_128 },
85     { 24, QCRYPTO_CIPHER_ALG_SERPENT_192 },
86     { 32, QCRYPTO_CIPHER_ALG_SERPENT_256 },
87     { 0, 0 },
88 };
89 
90 static const QCryptoBlockLUKSCipherSizeMap
91 qcrypto_block_luks_cipher_size_map_twofish[] = {
92     { 16, QCRYPTO_CIPHER_ALG_TWOFISH_128 },
93     { 24, QCRYPTO_CIPHER_ALG_TWOFISH_192 },
94     { 32, QCRYPTO_CIPHER_ALG_TWOFISH_256 },
95     { 0, 0 },
96 };
97 
98 #ifdef CONFIG_CRYPTO_SM4
99 static const QCryptoBlockLUKSCipherSizeMap
100 qcrypto_block_luks_cipher_size_map_sm4[] = {
101     { 16, QCRYPTO_CIPHER_ALG_SM4},
102     { 0, 0 },
103 };
104 #endif
105 
106 static const QCryptoBlockLUKSCipherNameMap
107 qcrypto_block_luks_cipher_name_map[] = {
108     { "aes", qcrypto_block_luks_cipher_size_map_aes },
109     { "cast5", qcrypto_block_luks_cipher_size_map_cast5 },
110     { "serpent", qcrypto_block_luks_cipher_size_map_serpent },
111     { "twofish", qcrypto_block_luks_cipher_size_map_twofish },
112 #ifdef CONFIG_CRYPTO_SM4
113     { "sm4", qcrypto_block_luks_cipher_size_map_sm4},
114 #endif
115 };
116 
117 QEMU_BUILD_BUG_ON(sizeof(struct QCryptoBlockLUKSKeySlot) != 48);
118 QEMU_BUILD_BUG_ON(sizeof(struct QCryptoBlockLUKSHeader) != 592);
119 
120 
121 struct QCryptoBlockLUKS {
122     QCryptoBlockLUKSHeader header;
123 
124     /* Main encryption algorithm used for encryption*/
125     QCryptoCipherAlgorithm cipher_alg;
126 
127     /* Mode of encryption for the selected encryption algorithm */
128     QCryptoCipherMode cipher_mode;
129 
130     /* Initialization vector generation algorithm */
131     QCryptoIVGenAlgorithm ivgen_alg;
132 
133     /* Hash algorithm used for IV generation*/
134     QCryptoHashAlgorithm ivgen_hash_alg;
135 
136     /*
137      * Encryption algorithm used for IV generation.
138      * Usually the same as main encryption algorithm
139      */
140     QCryptoCipherAlgorithm ivgen_cipher_alg;
141 
142     /* Hash algorithm used in pbkdf2 function */
143     QCryptoHashAlgorithm hash_alg;
144 
145     /* Name of the secret that was used to open the image */
146     char *secret;
147 };
148 
149 
150 static int qcrypto_block_luks_cipher_name_lookup(const char *name,
151                                                  QCryptoCipherMode mode,
152                                                  uint32_t key_bytes,
153                                                  Error **errp)
154 {
155     const QCryptoBlockLUKSCipherNameMap *map =
156         qcrypto_block_luks_cipher_name_map;
157     size_t maplen = G_N_ELEMENTS(qcrypto_block_luks_cipher_name_map);
158     size_t i, j;
159 
160     if (mode == QCRYPTO_CIPHER_MODE_XTS) {
161         key_bytes /= 2;
162     }
163 
164     for (i = 0; i < maplen; i++) {
165         if (!g_str_equal(map[i].name, name)) {
166             continue;
167         }
168         for (j = 0; j < map[i].sizes[j].key_bytes; j++) {
169             if (map[i].sizes[j].key_bytes == key_bytes) {
170                 return map[i].sizes[j].id;
171             }
172         }
173     }
174 
175     error_setg(errp, "Algorithm '%s' with key size %d bytes not supported",
176                name, key_bytes);
177     return 0;
178 }
179 
180 static const char *
181 qcrypto_block_luks_cipher_alg_lookup(QCryptoCipherAlgorithm alg,
182                                      Error **errp)
183 {
184     const QCryptoBlockLUKSCipherNameMap *map =
185         qcrypto_block_luks_cipher_name_map;
186     size_t maplen = G_N_ELEMENTS(qcrypto_block_luks_cipher_name_map);
187     size_t i, j;
188     for (i = 0; i < maplen; i++) {
189         for (j = 0; j < map[i].sizes[j].key_bytes; j++) {
190             if (map[i].sizes[j].id == alg) {
191                 return map[i].name;
192             }
193         }
194     }
195 
196     error_setg(errp, "Algorithm '%s' not supported",
197                QCryptoCipherAlgorithm_str(alg));
198     return NULL;
199 }
200 
201 /* XXX replace with qapi_enum_parse() in future, when we can
202  * make that function emit a more friendly error message */
203 static int qcrypto_block_luks_name_lookup(const char *name,
204                                           const QEnumLookup *map,
205                                           const char *type,
206                                           Error **errp)
207 {
208     int ret = qapi_enum_parse(map, name, -1, NULL);
209 
210     if (ret < 0) {
211         error_setg(errp, "%s '%s' not supported", type, name);
212         return 0;
213     }
214     return ret;
215 }
216 
217 #define qcrypto_block_luks_cipher_mode_lookup(name, errp)               \
218     qcrypto_block_luks_name_lookup(name,                                \
219                                    &QCryptoCipherMode_lookup,           \
220                                    "Cipher mode",                       \
221                                    errp)
222 
223 #define qcrypto_block_luks_hash_name_lookup(name, errp)                 \
224     qcrypto_block_luks_name_lookup(name,                                \
225                                    &QCryptoHashAlgorithm_lookup,        \
226                                    "Hash algorithm",                    \
227                                    errp)
228 
229 #define qcrypto_block_luks_ivgen_name_lookup(name, errp)                \
230     qcrypto_block_luks_name_lookup(name,                                \
231                                    &QCryptoIVGenAlgorithm_lookup,       \
232                                    "IV generator",                      \
233                                    errp)
234 
235 
236 static bool
237 qcrypto_block_luks_has_format(const uint8_t *buf,
238                               size_t buf_size)
239 {
240     const QCryptoBlockLUKSHeader *luks_header = (const void *)buf;
241 
242     if (buf_size >= offsetof(QCryptoBlockLUKSHeader, cipher_name) &&
243         memcmp(luks_header->magic, qcrypto_block_luks_magic,
244                QCRYPTO_BLOCK_LUKS_MAGIC_LEN) == 0 &&
245         be16_to_cpu(luks_header->version) == QCRYPTO_BLOCK_LUKS_VERSION) {
246         return true;
247     } else {
248         return false;
249     }
250 }
251 
252 
253 /**
254  * Deal with a quirk of dm-crypt usage of ESSIV.
255  *
256  * When calculating ESSIV IVs, the cipher length used by ESSIV
257  * may be different from the cipher length used for the block
258  * encryption, because dm-crypt uses the hash digest length
259  * as the key size. ie, if you have AES 128 as the block cipher
260  * and SHA 256 as ESSIV hash, then ESSIV will use AES 256 as
261  * the cipher since that gets a key length matching the digest
262  * size, not AES 128 with truncated digest as might be imagined
263  */
264 static QCryptoCipherAlgorithm
265 qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher,
266                                 QCryptoHashAlgorithm hash,
267                                 Error **errp)
268 {
269     size_t digestlen = qcrypto_hash_digest_len(hash);
270     size_t keylen = qcrypto_cipher_get_key_len(cipher);
271     if (digestlen == keylen) {
272         return cipher;
273     }
274 
275     switch (cipher) {
276     case QCRYPTO_CIPHER_ALG_AES_128:
277     case QCRYPTO_CIPHER_ALG_AES_192:
278     case QCRYPTO_CIPHER_ALG_AES_256:
279         if (digestlen == qcrypto_cipher_get_key_len(
280                 QCRYPTO_CIPHER_ALG_AES_128)) {
281             return QCRYPTO_CIPHER_ALG_AES_128;
282         } else if (digestlen == qcrypto_cipher_get_key_len(
283                        QCRYPTO_CIPHER_ALG_AES_192)) {
284             return QCRYPTO_CIPHER_ALG_AES_192;
285         } else if (digestlen == qcrypto_cipher_get_key_len(
286                        QCRYPTO_CIPHER_ALG_AES_256)) {
287             return QCRYPTO_CIPHER_ALG_AES_256;
288         } else {
289             error_setg(errp, "No AES cipher with key size %zu available",
290                        digestlen);
291             return 0;
292         }
293         break;
294     case QCRYPTO_CIPHER_ALG_SERPENT_128:
295     case QCRYPTO_CIPHER_ALG_SERPENT_192:
296     case QCRYPTO_CIPHER_ALG_SERPENT_256:
297         if (digestlen == qcrypto_cipher_get_key_len(
298                 QCRYPTO_CIPHER_ALG_SERPENT_128)) {
299             return QCRYPTO_CIPHER_ALG_SERPENT_128;
300         } else if (digestlen == qcrypto_cipher_get_key_len(
301                        QCRYPTO_CIPHER_ALG_SERPENT_192)) {
302             return QCRYPTO_CIPHER_ALG_SERPENT_192;
303         } else if (digestlen == qcrypto_cipher_get_key_len(
304                        QCRYPTO_CIPHER_ALG_SERPENT_256)) {
305             return QCRYPTO_CIPHER_ALG_SERPENT_256;
306         } else {
307             error_setg(errp, "No Serpent cipher with key size %zu available",
308                        digestlen);
309             return 0;
310         }
311         break;
312     case QCRYPTO_CIPHER_ALG_TWOFISH_128:
313     case QCRYPTO_CIPHER_ALG_TWOFISH_192:
314     case QCRYPTO_CIPHER_ALG_TWOFISH_256:
315         if (digestlen == qcrypto_cipher_get_key_len(
316                 QCRYPTO_CIPHER_ALG_TWOFISH_128)) {
317             return QCRYPTO_CIPHER_ALG_TWOFISH_128;
318         } else if (digestlen == qcrypto_cipher_get_key_len(
319                        QCRYPTO_CIPHER_ALG_TWOFISH_192)) {
320             return QCRYPTO_CIPHER_ALG_TWOFISH_192;
321         } else if (digestlen == qcrypto_cipher_get_key_len(
322                        QCRYPTO_CIPHER_ALG_TWOFISH_256)) {
323             return QCRYPTO_CIPHER_ALG_TWOFISH_256;
324         } else {
325             error_setg(errp, "No Twofish cipher with key size %zu available",
326                        digestlen);
327             return 0;
328         }
329         break;
330     default:
331         error_setg(errp, "Cipher %s not supported with essiv",
332                    QCryptoCipherAlgorithm_str(cipher));
333         return 0;
334     }
335 }
336 
337 /*
338  * Returns number of sectors needed to store the key material
339  * given number of anti forensic stripes
340  */
341 static int
342 qcrypto_block_luks_splitkeylen_sectors(const QCryptoBlockLUKS *luks,
343                                        unsigned int header_sectors,
344                                        unsigned int stripes)
345 {
346     /*
347      * This calculation doesn't match that shown in the spec,
348      * but instead follows the cryptsetup implementation.
349      */
350 
351     size_t splitkeylen = luks->header.master_key_len * stripes;
352 
353     /* First align the key material size to block size*/
354     size_t splitkeylen_sectors =
355         DIV_ROUND_UP(splitkeylen, QCRYPTO_BLOCK_LUKS_SECTOR_SIZE);
356 
357     /* Then also align the key material size to the size of the header */
358     return ROUND_UP(splitkeylen_sectors, header_sectors);
359 }
360 
361 
362 void
363 qcrypto_block_luks_to_disk_endian(QCryptoBlockLUKSHeader *hdr)
364 {
365     size_t i;
366 
367     /*
368      * Everything on disk uses Big Endian (tm), so flip header fields
369      * before writing them
370      */
371     cpu_to_be16s(&hdr->version);
372     cpu_to_be32s(&hdr->payload_offset_sector);
373     cpu_to_be32s(&hdr->master_key_len);
374     cpu_to_be32s(&hdr->master_key_iterations);
375 
376     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
377         cpu_to_be32s(&hdr->key_slots[i].active);
378         cpu_to_be32s(&hdr->key_slots[i].iterations);
379         cpu_to_be32s(&hdr->key_slots[i].key_offset_sector);
380         cpu_to_be32s(&hdr->key_slots[i].stripes);
381     }
382 }
383 
384 void
385 qcrypto_block_luks_from_disk_endian(QCryptoBlockLUKSHeader *hdr)
386 {
387     size_t i;
388 
389     /*
390      * The header is always stored in big-endian format, so
391      * convert everything to native
392      */
393     be16_to_cpus(&hdr->version);
394     be32_to_cpus(&hdr->payload_offset_sector);
395     be32_to_cpus(&hdr->master_key_len);
396     be32_to_cpus(&hdr->master_key_iterations);
397 
398     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
399         be32_to_cpus(&hdr->key_slots[i].active);
400         be32_to_cpus(&hdr->key_slots[i].iterations);
401         be32_to_cpus(&hdr->key_slots[i].key_offset_sector);
402         be32_to_cpus(&hdr->key_slots[i].stripes);
403     }
404 }
405 
406 /*
407  * Stores the main LUKS header, taking care of endianness
408  */
409 static int
410 qcrypto_block_luks_store_header(QCryptoBlock *block,
411                                 QCryptoBlockWriteFunc writefunc,
412                                 void *opaque,
413                                 Error **errp)
414 {
415     const QCryptoBlockLUKS *luks = block->opaque;
416     Error *local_err = NULL;
417     g_autofree QCryptoBlockLUKSHeader *hdr_copy = NULL;
418 
419     /* Create a copy of the header */
420     hdr_copy = g_new0(QCryptoBlockLUKSHeader, 1);
421     memcpy(hdr_copy, &luks->header, sizeof(QCryptoBlockLUKSHeader));
422 
423     qcrypto_block_luks_to_disk_endian(hdr_copy);
424 
425     /* Write out the partition header and key slot headers */
426     writefunc(block, 0, (const uint8_t *)hdr_copy, sizeof(*hdr_copy),
427               opaque, &local_err);
428 
429     if (local_err) {
430         error_propagate(errp, local_err);
431         return -1;
432     }
433     return 0;
434 }
435 
436 /*
437  * Loads the main LUKS header, and byteswaps it to native endianness
438  * And run basic sanity checks on it
439  */
440 static int
441 qcrypto_block_luks_load_header(QCryptoBlock *block,
442                                 QCryptoBlockReadFunc readfunc,
443                                 void *opaque,
444                                 Error **errp)
445 {
446     int rv;
447     QCryptoBlockLUKS *luks = block->opaque;
448 
449     /*
450      * Read the entire LUKS header, minus the key material from
451      * the underlying device
452      */
453     rv = readfunc(block, 0,
454                   (uint8_t *)&luks->header,
455                   sizeof(luks->header),
456                   opaque,
457                   errp);
458     if (rv < 0) {
459         return rv;
460     }
461 
462     qcrypto_block_luks_from_disk_endian(&luks->header);
463 
464     return 0;
465 }
466 
467 /*
468  * Does basic sanity checks on the LUKS header
469  */
470 static int
471 qcrypto_block_luks_check_header(const QCryptoBlockLUKS *luks,
472                                 unsigned int flags,
473                                 Error **errp)
474 {
475     size_t i, j;
476 
477     unsigned int header_sectors = QCRYPTO_BLOCK_LUKS_KEY_SLOT_OFFSET /
478         QCRYPTO_BLOCK_LUKS_SECTOR_SIZE;
479     bool detached = flags & QCRYPTO_BLOCK_OPEN_DETACHED;
480 
481     if (memcmp(luks->header.magic, qcrypto_block_luks_magic,
482                QCRYPTO_BLOCK_LUKS_MAGIC_LEN) != 0) {
483         error_setg(errp, "Volume is not in LUKS format");
484         return -1;
485     }
486 
487     if (luks->header.version != QCRYPTO_BLOCK_LUKS_VERSION) {
488         error_setg(errp, "LUKS version %" PRIu32 " is not supported",
489                    luks->header.version);
490         return -1;
491     }
492 
493     if (!memchr(luks->header.cipher_name, '\0',
494                 sizeof(luks->header.cipher_name))) {
495         error_setg(errp, "LUKS header cipher name is not NUL terminated");
496         return -1;
497     }
498 
499     if (!memchr(luks->header.cipher_mode, '\0',
500                 sizeof(luks->header.cipher_mode))) {
501         error_setg(errp, "LUKS header cipher mode is not NUL terminated");
502         return -1;
503     }
504 
505     if (!memchr(luks->header.hash_spec, '\0',
506                 sizeof(luks->header.hash_spec))) {
507         error_setg(errp, "LUKS header hash spec is not NUL terminated");
508         return -1;
509     }
510 
511     if (!detached && luks->header.payload_offset_sector <
512         DIV_ROUND_UP(QCRYPTO_BLOCK_LUKS_KEY_SLOT_OFFSET,
513                      QCRYPTO_BLOCK_LUKS_SECTOR_SIZE)) {
514         error_setg(errp, "LUKS payload is overlapping with the header");
515         return -1;
516     }
517 
518     if (luks->header.master_key_iterations == 0) {
519         error_setg(errp, "LUKS key iteration count is zero");
520         return -1;
521     }
522 
523     /* Check all keyslots for corruption  */
524     for (i = 0 ; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS ; i++) {
525 
526         const QCryptoBlockLUKSKeySlot *slot1 = &luks->header.key_slots[i];
527         unsigned int start1 = slot1->key_offset_sector;
528         unsigned int len1 =
529             qcrypto_block_luks_splitkeylen_sectors(luks,
530                                                    header_sectors,
531                                                    slot1->stripes);
532 
533         if (slot1->stripes != QCRYPTO_BLOCK_LUKS_STRIPES) {
534             error_setg(errp, "Keyslot %zu is corrupted (stripes %d != %d)",
535                        i, slot1->stripes, QCRYPTO_BLOCK_LUKS_STRIPES);
536             return -1;
537         }
538 
539         if (slot1->active != QCRYPTO_BLOCK_LUKS_KEY_SLOT_DISABLED &&
540             slot1->active != QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED) {
541             error_setg(errp,
542                        "Keyslot %zu state (active/disable) is corrupted", i);
543             return -1;
544         }
545 
546         if (slot1->active == QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED &&
547             slot1->iterations == 0) {
548             error_setg(errp, "Keyslot %zu iteration count is zero", i);
549             return -1;
550         }
551 
552         if (start1 < DIV_ROUND_UP(QCRYPTO_BLOCK_LUKS_KEY_SLOT_OFFSET,
553                                   QCRYPTO_BLOCK_LUKS_SECTOR_SIZE)) {
554             error_setg(errp,
555                        "Keyslot %zu is overlapping with the LUKS header",
556                        i);
557             return -1;
558         }
559 
560         if (!detached && start1 + len1 > luks->header.payload_offset_sector) {
561             error_setg(errp,
562                        "Keyslot %zu is overlapping with the encrypted payload",
563                        i);
564             return -1;
565         }
566 
567         for (j = i + 1 ; j < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS ; j++) {
568             const QCryptoBlockLUKSKeySlot *slot2 = &luks->header.key_slots[j];
569             unsigned int start2 = slot2->key_offset_sector;
570             unsigned int len2 =
571                 qcrypto_block_luks_splitkeylen_sectors(luks,
572                                                        header_sectors,
573                                                        slot2->stripes);
574 
575             if (start1 + len1 > start2 && start2 + len2 > start1) {
576                 error_setg(errp,
577                            "Keyslots %zu and %zu are overlapping in the header",
578                            i, j);
579                 return -1;
580             }
581         }
582 
583     }
584     return 0;
585 }
586 
587 /*
588  * Parses the crypto parameters that are stored in the LUKS header
589  */
590 
591 static int
592 qcrypto_block_luks_parse_header(QCryptoBlockLUKS *luks, Error **errp)
593 {
594     g_autofree char *cipher_mode = g_strdup(luks->header.cipher_mode);
595     char *ivgen_name, *ivhash_name;
596     Error *local_err = NULL;
597 
598     /*
599      * The cipher_mode header contains a string that we have
600      * to further parse, of the format
601      *
602      *    <cipher-mode>-<iv-generator>[:<iv-hash>]
603      *
604      * eg  cbc-essiv:sha256, cbc-plain64
605      */
606     ivgen_name = strchr(cipher_mode, '-');
607     if (!ivgen_name) {
608         error_setg(errp, "Unexpected cipher mode string format '%s'",
609                    luks->header.cipher_mode);
610         return -1;
611     }
612     *ivgen_name = '\0';
613     ivgen_name++;
614 
615     ivhash_name = strchr(ivgen_name, ':');
616     if (!ivhash_name) {
617         luks->ivgen_hash_alg = 0;
618     } else {
619         *ivhash_name = '\0';
620         ivhash_name++;
621 
622         luks->ivgen_hash_alg = qcrypto_block_luks_hash_name_lookup(ivhash_name,
623                                                                    &local_err);
624         if (local_err) {
625             error_propagate(errp, local_err);
626             return -1;
627         }
628     }
629 
630     luks->cipher_mode = qcrypto_block_luks_cipher_mode_lookup(cipher_mode,
631                                                               &local_err);
632     if (local_err) {
633         error_propagate(errp, local_err);
634         return -1;
635     }
636 
637     luks->cipher_alg =
638             qcrypto_block_luks_cipher_name_lookup(luks->header.cipher_name,
639                                                   luks->cipher_mode,
640                                                   luks->header.master_key_len,
641                                                   &local_err);
642     if (local_err) {
643         error_propagate(errp, local_err);
644         return -1;
645     }
646 
647     luks->hash_alg =
648             qcrypto_block_luks_hash_name_lookup(luks->header.hash_spec,
649                                                 &local_err);
650     if (local_err) {
651         error_propagate(errp, local_err);
652         return -1;
653     }
654 
655     luks->ivgen_alg = qcrypto_block_luks_ivgen_name_lookup(ivgen_name,
656                                                            &local_err);
657     if (local_err) {
658         error_propagate(errp, local_err);
659         return -1;
660     }
661 
662     if (luks->ivgen_alg == QCRYPTO_IVGEN_ALG_ESSIV) {
663         if (!ivhash_name) {
664             error_setg(errp, "Missing IV generator hash specification");
665             return -1;
666         }
667         luks->ivgen_cipher_alg =
668                 qcrypto_block_luks_essiv_cipher(luks->cipher_alg,
669                                                 luks->ivgen_hash_alg,
670                                                 &local_err);
671         if (local_err) {
672             error_propagate(errp, local_err);
673             return -1;
674         }
675     } else {
676 
677         /*
678          * Note we parsed the ivhash_name earlier in the cipher_mode
679          * spec string even with plain/plain64 ivgens, but we
680          * will ignore it, since it is irrelevant for these ivgens.
681          * This is for compat with dm-crypt which will silently
682          * ignore hash names with these ivgens rather than report
683          * an error about the invalid usage
684          */
685         luks->ivgen_cipher_alg = luks->cipher_alg;
686     }
687     return 0;
688 }
689 
690 /*
691  * Given a key slot,  user password, and the master key,
692  * will store the encrypted master key there, and update the
693  * in-memory header. User must then write the in-memory header
694  *
695  * Returns:
696  *    0 if the keyslot was written successfully
697  *      with the provided password
698  *   -1 if a fatal error occurred while storing the key
699  */
700 static int
701 qcrypto_block_luks_store_key(QCryptoBlock *block,
702                              unsigned int slot_idx,
703                              const char *password,
704                              uint8_t *masterkey,
705                              uint64_t iter_time,
706                              QCryptoBlockWriteFunc writefunc,
707                              void *opaque,
708                              Error **errp)
709 {
710     QCryptoBlockLUKS *luks = block->opaque;
711     QCryptoBlockLUKSKeySlot *slot;
712     g_autofree uint8_t *splitkey = NULL;
713     size_t splitkeylen;
714     g_autofree uint8_t *slotkey = NULL;
715     g_autoptr(QCryptoCipher) cipher = NULL;
716     g_autoptr(QCryptoIVGen) ivgen = NULL;
717     Error *local_err = NULL;
718     uint64_t iters;
719     int ret = -1;
720 
721     assert(slot_idx < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS);
722     slot = &luks->header.key_slots[slot_idx];
723     splitkeylen = luks->header.master_key_len * slot->stripes;
724 
725     if (qcrypto_random_bytes(slot->salt,
726                              QCRYPTO_BLOCK_LUKS_SALT_LEN,
727                              errp) < 0) {
728         goto cleanup;
729     }
730 
731     /*
732      * Determine how many iterations are required to
733      * hash the user password while consuming 1 second of compute
734      * time
735      */
736     iters = qcrypto_pbkdf2_count_iters(luks->hash_alg,
737                                        (uint8_t *)password, strlen(password),
738                                        slot->salt,
739                                        QCRYPTO_BLOCK_LUKS_SALT_LEN,
740                                        luks->header.master_key_len,
741                                        &local_err);
742     if (local_err) {
743         error_propagate(errp, local_err);
744         goto cleanup;
745     }
746 
747     if (iters > (ULLONG_MAX / iter_time)) {
748         error_setg_errno(errp, ERANGE,
749                          "PBKDF iterations %llu too large to scale",
750                          (unsigned long long)iters);
751         goto cleanup;
752     }
753 
754     /* iter_time was in millis, but count_iters reported for secs */
755     iters = iters * iter_time / 1000;
756 
757     if (iters > UINT32_MAX) {
758         error_setg_errno(errp, ERANGE,
759                          "PBKDF iterations %llu larger than %u",
760                          (unsigned long long)iters, UINT32_MAX);
761         goto cleanup;
762     }
763 
764     slot->iterations =
765         MAX(iters, QCRYPTO_BLOCK_LUKS_MIN_SLOT_KEY_ITERS);
766 
767 
768     /*
769      * Generate a key that we'll use to encrypt the master
770      * key, from the user's password
771      */
772     slotkey = g_new0(uint8_t, luks->header.master_key_len);
773     if (qcrypto_pbkdf2(luks->hash_alg,
774                        (uint8_t *)password, strlen(password),
775                        slot->salt,
776                        QCRYPTO_BLOCK_LUKS_SALT_LEN,
777                        slot->iterations,
778                        slotkey, luks->header.master_key_len,
779                        errp) < 0) {
780         goto cleanup;
781     }
782 
783 
784     /*
785      * Setup the encryption objects needed to encrypt the
786      * master key material
787      */
788     cipher = qcrypto_cipher_new(luks->cipher_alg,
789                                 luks->cipher_mode,
790                                 slotkey, luks->header.master_key_len,
791                                 errp);
792     if (!cipher) {
793         goto cleanup;
794     }
795 
796     ivgen = qcrypto_ivgen_new(luks->ivgen_alg,
797                               luks->ivgen_cipher_alg,
798                               luks->ivgen_hash_alg,
799                               slotkey, luks->header.master_key_len,
800                               errp);
801     if (!ivgen) {
802         goto cleanup;
803     }
804 
805     /*
806      * Before storing the master key, we need to vastly
807      * increase its size, as protection against forensic
808      * disk data recovery
809      */
810     splitkey = g_new0(uint8_t, splitkeylen);
811 
812     if (qcrypto_afsplit_encode(luks->hash_alg,
813                                luks->header.master_key_len,
814                                slot->stripes,
815                                masterkey,
816                                splitkey,
817                                errp) < 0) {
818         goto cleanup;
819     }
820 
821     /*
822      * Now we encrypt the split master key with the key generated
823      * from the user's password, before storing it
824      */
825     if (qcrypto_block_cipher_encrypt_helper(cipher, block->niv, ivgen,
826                                             QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
827                                             0,
828                                             splitkey,
829                                             splitkeylen,
830                                             errp) < 0) {
831         goto cleanup;
832     }
833 
834     /* Write out the slot's master key material. */
835     if (writefunc(block,
836                   slot->key_offset_sector *
837                   QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
838                   splitkey, splitkeylen,
839                   opaque,
840                   errp) < 0) {
841         goto cleanup;
842     }
843 
844     slot->active = QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED;
845 
846     if (qcrypto_block_luks_store_header(block,  writefunc, opaque, errp) < 0) {
847         goto cleanup;
848     }
849 
850     ret = 0;
851 
852 cleanup:
853     if (slotkey) {
854         memset(slotkey, 0, luks->header.master_key_len);
855     }
856     if (splitkey) {
857         memset(splitkey, 0, splitkeylen);
858     }
859     return ret;
860 }
861 
862 /*
863  * Given a key slot, and user password, this will attempt to unlock
864  * the master encryption key from the key slot.
865  *
866  * Returns:
867  *    0 if the key slot is disabled, or key could not be decrypted
868  *      with the provided password
869  *    1 if the key slot is enabled, and key decrypted successfully
870  *      with the provided password
871  *   -1 if a fatal error occurred loading the key
872  */
873 static int
874 qcrypto_block_luks_load_key(QCryptoBlock *block,
875                             size_t slot_idx,
876                             const char *password,
877                             uint8_t *masterkey,
878                             QCryptoBlockReadFunc readfunc,
879                             void *opaque,
880                             Error **errp)
881 {
882     QCryptoBlockLUKS *luks = block->opaque;
883     const QCryptoBlockLUKSKeySlot *slot;
884     g_autofree uint8_t *splitkey = NULL;
885     size_t splitkeylen;
886     g_autofree uint8_t *possiblekey = NULL;
887     int rv;
888     g_autoptr(QCryptoCipher) cipher = NULL;
889     uint8_t keydigest[QCRYPTO_BLOCK_LUKS_DIGEST_LEN];
890     g_autoptr(QCryptoIVGen) ivgen = NULL;
891     size_t niv;
892 
893     assert(slot_idx < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS);
894     slot = &luks->header.key_slots[slot_idx];
895     if (slot->active != QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED) {
896         return 0;
897     }
898 
899     splitkeylen = luks->header.master_key_len * slot->stripes;
900     splitkey = g_new0(uint8_t, splitkeylen);
901     possiblekey = g_new0(uint8_t, luks->header.master_key_len);
902 
903     /*
904      * The user password is used to generate a (possible)
905      * decryption key. This may or may not successfully
906      * decrypt the master key - we just blindly assume
907      * the key is correct and validate the results of
908      * decryption later.
909      */
910     if (qcrypto_pbkdf2(luks->hash_alg,
911                        (const uint8_t *)password, strlen(password),
912                        slot->salt, QCRYPTO_BLOCK_LUKS_SALT_LEN,
913                        slot->iterations,
914                        possiblekey, luks->header.master_key_len,
915                        errp) < 0) {
916         return -1;
917     }
918 
919     /*
920      * We need to read the master key material from the
921      * LUKS key material header. What we're reading is
922      * not the raw master key, but rather the data after
923      * it has been passed through AFSplit and the result
924      * then encrypted.
925      */
926     rv = readfunc(block,
927                   slot->key_offset_sector * QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
928                   splitkey, splitkeylen,
929                   opaque,
930                   errp);
931     if (rv < 0) {
932         return -1;
933     }
934 
935 
936     /* Setup the cipher/ivgen that we'll use to try to decrypt
937      * the split master key material */
938     cipher = qcrypto_cipher_new(luks->cipher_alg,
939                                 luks->cipher_mode,
940                                 possiblekey,
941                                 luks->header.master_key_len,
942                                 errp);
943     if (!cipher) {
944         return -1;
945     }
946 
947     niv = qcrypto_cipher_get_iv_len(luks->cipher_alg,
948                                     luks->cipher_mode);
949 
950     ivgen = qcrypto_ivgen_new(luks->ivgen_alg,
951                               luks->ivgen_cipher_alg,
952                               luks->ivgen_hash_alg,
953                               possiblekey,
954                               luks->header.master_key_len,
955                               errp);
956     if (!ivgen) {
957         return -1;
958     }
959 
960 
961     /*
962      * The master key needs to be decrypted in the same
963      * way that the block device payload will be decrypted
964      * later. In particular we'll be using the IV generator
965      * to reset the encryption cipher every time the master
966      * key crosses a sector boundary.
967      */
968     if (qcrypto_block_cipher_decrypt_helper(cipher,
969                                             niv,
970                                             ivgen,
971                                             QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
972                                             0,
973                                             splitkey,
974                                             splitkeylen,
975                                             errp) < 0) {
976         return -1;
977     }
978 
979     /*
980      * Now we've decrypted the split master key, join
981      * it back together to get the actual master key.
982      */
983     if (qcrypto_afsplit_decode(luks->hash_alg,
984                                luks->header.master_key_len,
985                                slot->stripes,
986                                splitkey,
987                                masterkey,
988                                errp) < 0) {
989         return -1;
990     }
991 
992 
993     /*
994      * We still don't know that the masterkey we got is valid,
995      * because we just blindly assumed the user's password
996      * was correct. This is where we now verify it. We are
997      * creating a hash of the master key using PBKDF and
998      * then comparing that to the hash stored in the key slot
999      * header
1000      */
1001     if (qcrypto_pbkdf2(luks->hash_alg,
1002                        masterkey,
1003                        luks->header.master_key_len,
1004                        luks->header.master_key_salt,
1005                        QCRYPTO_BLOCK_LUKS_SALT_LEN,
1006                        luks->header.master_key_iterations,
1007                        keydigest,
1008                        G_N_ELEMENTS(keydigest),
1009                        errp) < 0) {
1010         return -1;
1011     }
1012 
1013     if (memcmp(keydigest, luks->header.master_key_digest,
1014                QCRYPTO_BLOCK_LUKS_DIGEST_LEN) == 0) {
1015         /* Success, we got the right master key */
1016         return 1;
1017     }
1018 
1019     /* Fail, user's password was not valid for this key slot,
1020      * tell caller to try another slot */
1021     return 0;
1022 }
1023 
1024 
1025 /*
1026  * Given a user password, this will iterate over all key
1027  * slots and try to unlock each active key slot using the
1028  * password until it successfully obtains a master key.
1029  *
1030  * Returns 0 if a key was loaded, -1 if no keys could be loaded
1031  */
1032 static int
1033 qcrypto_block_luks_find_key(QCryptoBlock *block,
1034                             const char *password,
1035                             uint8_t *masterkey,
1036                             QCryptoBlockReadFunc readfunc,
1037                             void *opaque,
1038                             Error **errp)
1039 {
1040     size_t i;
1041     int rv;
1042 
1043     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1044         rv = qcrypto_block_luks_load_key(block,
1045                                          i,
1046                                          password,
1047                                          masterkey,
1048                                          readfunc,
1049                                          opaque,
1050                                          errp);
1051         if (rv < 0) {
1052             goto error;
1053         }
1054         if (rv == 1) {
1055             return 0;
1056         }
1057     }
1058 
1059     error_setg(errp, "Invalid password, cannot unlock any keyslot");
1060  error:
1061     return -1;
1062 }
1063 
1064 /*
1065  * Returns true if a slot i is marked as active
1066  * (contains encrypted copy of the master key)
1067  */
1068 static bool
1069 qcrypto_block_luks_slot_active(const QCryptoBlockLUKS *luks,
1070                                unsigned int slot_idx)
1071 {
1072     uint32_t val;
1073 
1074     assert(slot_idx < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS);
1075     val = luks->header.key_slots[slot_idx].active;
1076     return val == QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED;
1077 }
1078 
1079 /*
1080  * Returns the number of slots that are marked as active
1081  * (slots that contain encrypted copy of the master key)
1082  */
1083 static unsigned int
1084 qcrypto_block_luks_count_active_slots(const QCryptoBlockLUKS *luks)
1085 {
1086     size_t i = 0;
1087     unsigned int ret = 0;
1088 
1089     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1090         if (qcrypto_block_luks_slot_active(luks, i)) {
1091             ret++;
1092         }
1093     }
1094     return ret;
1095 }
1096 
1097 /*
1098  * Finds first key slot which is not active
1099  * Returns the key slot index, or -1 if it doesn't exist
1100  */
1101 static int
1102 qcrypto_block_luks_find_free_keyslot(const QCryptoBlockLUKS *luks)
1103 {
1104     size_t i;
1105 
1106     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1107         if (!qcrypto_block_luks_slot_active(luks, i)) {
1108             return i;
1109         }
1110     }
1111     return -1;
1112 }
1113 
1114 /*
1115  * Erases an keyslot given its index
1116  * Returns:
1117  *    0 if the keyslot was erased successfully
1118  *   -1 if a error occurred while erasing the keyslot
1119  *
1120  */
1121 static int
1122 qcrypto_block_luks_erase_key(QCryptoBlock *block,
1123                              unsigned int slot_idx,
1124                              QCryptoBlockWriteFunc writefunc,
1125                              void *opaque,
1126                              Error **errp)
1127 {
1128     QCryptoBlockLUKS *luks = block->opaque;
1129     QCryptoBlockLUKSKeySlot *slot;
1130     g_autofree uint8_t *garbagesplitkey = NULL;
1131     size_t splitkeylen;
1132     size_t i;
1133     Error *local_err = NULL;
1134     int ret;
1135 
1136     assert(slot_idx < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS);
1137     slot = &luks->header.key_slots[slot_idx];
1138 
1139     splitkeylen = luks->header.master_key_len * slot->stripes;
1140     assert(splitkeylen > 0);
1141 
1142     garbagesplitkey = g_new0(uint8_t, splitkeylen);
1143 
1144     /* Reset the key slot header */
1145     memset(slot->salt, 0, QCRYPTO_BLOCK_LUKS_SALT_LEN);
1146     slot->iterations = 0;
1147     slot->active = QCRYPTO_BLOCK_LUKS_KEY_SLOT_DISABLED;
1148 
1149     ret = qcrypto_block_luks_store_header(block, writefunc,
1150                                           opaque, &local_err);
1151 
1152     if (ret < 0) {
1153         error_propagate(errp, local_err);
1154     }
1155     /*
1156      * Now try to erase the key material, even if the header
1157      * update failed
1158      */
1159     for (i = 0; i < QCRYPTO_BLOCK_LUKS_ERASE_ITERATIONS; i++) {
1160         if (qcrypto_random_bytes(garbagesplitkey,
1161                                  splitkeylen, &local_err) < 0) {
1162             /*
1163              * If we failed to get the random data, still write
1164              * at least zeros to the key slot at least once
1165              */
1166             error_propagate(errp, local_err);
1167 
1168             if (i > 0) {
1169                 return -1;
1170             }
1171         }
1172         if (writefunc(block,
1173                       slot->key_offset_sector * QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
1174                       garbagesplitkey,
1175                       splitkeylen,
1176                       opaque,
1177                       &local_err) < 0) {
1178             error_propagate(errp, local_err);
1179             return -1;
1180         }
1181     }
1182     return ret;
1183 }
1184 
1185 static int
1186 qcrypto_block_luks_open(QCryptoBlock *block,
1187                         QCryptoBlockOpenOptions *options,
1188                         const char *optprefix,
1189                         QCryptoBlockReadFunc readfunc,
1190                         void *opaque,
1191                         unsigned int flags,
1192                         size_t n_threads,
1193                         Error **errp)
1194 {
1195     QCryptoBlockLUKS *luks = NULL;
1196     g_autofree uint8_t *masterkey = NULL;
1197     g_autofree char *password = NULL;
1198 
1199     if (!(flags & QCRYPTO_BLOCK_OPEN_NO_IO)) {
1200         if (!options->u.luks.key_secret) {
1201             error_setg(errp, "Parameter '%skey-secret' is required for cipher",
1202                        optprefix ? optprefix : "");
1203             return -1;
1204         }
1205         password = qcrypto_secret_lookup_as_utf8(
1206             options->u.luks.key_secret, errp);
1207         if (!password) {
1208             return -1;
1209         }
1210     }
1211 
1212     luks = g_new0(QCryptoBlockLUKS, 1);
1213     block->opaque = luks;
1214     luks->secret = g_strdup(options->u.luks.key_secret);
1215 
1216     if (qcrypto_block_luks_load_header(block, readfunc, opaque, errp) < 0) {
1217         goto fail;
1218     }
1219 
1220     if (qcrypto_block_luks_check_header(luks, flags, errp) < 0) {
1221         goto fail;
1222     }
1223 
1224     if (qcrypto_block_luks_parse_header(luks, errp) < 0) {
1225         goto fail;
1226     }
1227 
1228     if (!(flags & QCRYPTO_BLOCK_OPEN_NO_IO)) {
1229         /* Try to find which key slot our password is valid for
1230          * and unlock the master key from that slot.
1231          */
1232 
1233         masterkey = g_new0(uint8_t, luks->header.master_key_len);
1234 
1235         if (qcrypto_block_luks_find_key(block,
1236                                         password,
1237                                         masterkey,
1238                                         readfunc, opaque,
1239                                         errp) < 0) {
1240             goto fail;
1241         }
1242 
1243         /* We have a valid master key now, so can setup the
1244          * block device payload decryption objects
1245          */
1246         block->kdfhash = luks->hash_alg;
1247         block->niv = qcrypto_cipher_get_iv_len(luks->cipher_alg,
1248                                                luks->cipher_mode);
1249 
1250         block->ivgen = qcrypto_ivgen_new(luks->ivgen_alg,
1251                                          luks->ivgen_cipher_alg,
1252                                          luks->ivgen_hash_alg,
1253                                          masterkey,
1254                                          luks->header.master_key_len,
1255                                          errp);
1256         if (!block->ivgen) {
1257             goto fail;
1258         }
1259 
1260         if (qcrypto_block_init_cipher(block,
1261                                       luks->cipher_alg,
1262                                       luks->cipher_mode,
1263                                       masterkey,
1264                                       luks->header.master_key_len,
1265                                       n_threads,
1266                                       errp) < 0) {
1267             goto fail;
1268         }
1269     }
1270 
1271     block->sector_size = QCRYPTO_BLOCK_LUKS_SECTOR_SIZE;
1272     block->payload_offset = luks->header.payload_offset_sector *
1273         block->sector_size;
1274 
1275     return 0;
1276 
1277  fail:
1278     qcrypto_block_free_cipher(block);
1279     qcrypto_ivgen_free(block->ivgen);
1280     g_free(luks->secret);
1281     g_free(luks);
1282     return -1;
1283 }
1284 
1285 
1286 static void
1287 qcrypto_block_luks_uuid_gen(uint8_t *uuidstr)
1288 {
1289     QemuUUID uuid;
1290     qemu_uuid_generate(&uuid);
1291     qemu_uuid_unparse(&uuid, (char *)uuidstr);
1292 }
1293 
1294 static int
1295 qcrypto_block_luks_create(QCryptoBlock *block,
1296                           QCryptoBlockCreateOptions *options,
1297                           const char *optprefix,
1298                           QCryptoBlockInitFunc initfunc,
1299                           QCryptoBlockWriteFunc writefunc,
1300                           void *opaque,
1301                           Error **errp)
1302 {
1303     QCryptoBlockLUKS *luks;
1304     QCryptoBlockCreateOptionsLUKS luks_opts;
1305     Error *local_err = NULL;
1306     g_autofree uint8_t *masterkey = NULL;
1307     size_t header_sectors;
1308     size_t split_key_sectors;
1309     size_t i;
1310     g_autofree char *password = NULL;
1311     const char *cipher_alg;
1312     const char *cipher_mode;
1313     const char *ivgen_alg;
1314     const char *ivgen_hash_alg = NULL;
1315     const char *hash_alg;
1316     g_autofree char *cipher_mode_spec = NULL;
1317     uint64_t iters;
1318     uint64_t detached_header_size;
1319 
1320     memcpy(&luks_opts, &options->u.luks, sizeof(luks_opts));
1321     if (!luks_opts.has_iter_time) {
1322         luks_opts.iter_time = QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME_MS;
1323     }
1324     if (!luks_opts.has_cipher_alg) {
1325         luks_opts.cipher_alg = QCRYPTO_CIPHER_ALG_AES_256;
1326     }
1327     if (!luks_opts.has_cipher_mode) {
1328         luks_opts.cipher_mode = QCRYPTO_CIPHER_MODE_XTS;
1329     }
1330     if (!luks_opts.has_ivgen_alg) {
1331         luks_opts.ivgen_alg = QCRYPTO_IVGEN_ALG_PLAIN64;
1332     }
1333     if (!luks_opts.has_hash_alg) {
1334         luks_opts.hash_alg = QCRYPTO_HASH_ALG_SHA256;
1335     }
1336     if (luks_opts.ivgen_alg == QCRYPTO_IVGEN_ALG_ESSIV) {
1337         if (!luks_opts.has_ivgen_hash_alg) {
1338             luks_opts.ivgen_hash_alg = QCRYPTO_HASH_ALG_SHA256;
1339             luks_opts.has_ivgen_hash_alg = true;
1340         }
1341     }
1342 
1343     luks = g_new0(QCryptoBlockLUKS, 1);
1344     block->opaque = luks;
1345 
1346     luks->cipher_alg = luks_opts.cipher_alg;
1347     luks->cipher_mode = luks_opts.cipher_mode;
1348     luks->ivgen_alg = luks_opts.ivgen_alg;
1349     luks->ivgen_hash_alg = luks_opts.ivgen_hash_alg;
1350     luks->hash_alg = luks_opts.hash_alg;
1351 
1352 
1353     /* Note we're allowing ivgen_hash_alg to be set even for
1354      * non-essiv iv generators that don't need a hash. It will
1355      * be silently ignored, for compatibility with dm-crypt */
1356 
1357     if (!options->u.luks.key_secret) {
1358         error_setg(errp, "Parameter '%skey-secret' is required for cipher",
1359                    optprefix ? optprefix : "");
1360         goto error;
1361     }
1362     luks->secret = g_strdup(options->u.luks.key_secret);
1363 
1364     password = qcrypto_secret_lookup_as_utf8(luks_opts.key_secret, errp);
1365     if (!password) {
1366         goto error;
1367     }
1368 
1369 
1370     memcpy(luks->header.magic, qcrypto_block_luks_magic,
1371            QCRYPTO_BLOCK_LUKS_MAGIC_LEN);
1372 
1373     /* We populate the header in native endianness initially and
1374      * then convert everything to big endian just before writing
1375      * it out to disk
1376      */
1377     luks->header.version = QCRYPTO_BLOCK_LUKS_VERSION;
1378     qcrypto_block_luks_uuid_gen(luks->header.uuid);
1379 
1380     cipher_alg = qcrypto_block_luks_cipher_alg_lookup(luks_opts.cipher_alg,
1381                                                       errp);
1382     if (!cipher_alg) {
1383         goto error;
1384     }
1385 
1386     cipher_mode = QCryptoCipherMode_str(luks_opts.cipher_mode);
1387     ivgen_alg = QCryptoIVGenAlgorithm_str(luks_opts.ivgen_alg);
1388     if (luks_opts.has_ivgen_hash_alg) {
1389         ivgen_hash_alg = QCryptoHashAlgorithm_str(luks_opts.ivgen_hash_alg);
1390         cipher_mode_spec = g_strdup_printf("%s-%s:%s", cipher_mode, ivgen_alg,
1391                                            ivgen_hash_alg);
1392     } else {
1393         cipher_mode_spec = g_strdup_printf("%s-%s", cipher_mode, ivgen_alg);
1394     }
1395     hash_alg = QCryptoHashAlgorithm_str(luks_opts.hash_alg);
1396 
1397 
1398     if (strlen(cipher_alg) >= QCRYPTO_BLOCK_LUKS_CIPHER_NAME_LEN) {
1399         error_setg(errp, "Cipher name '%s' is too long for LUKS header",
1400                    cipher_alg);
1401         goto error;
1402     }
1403     if (strlen(cipher_mode_spec) >= QCRYPTO_BLOCK_LUKS_CIPHER_MODE_LEN) {
1404         error_setg(errp, "Cipher mode '%s' is too long for LUKS header",
1405                    cipher_mode_spec);
1406         goto error;
1407     }
1408     if (strlen(hash_alg) >= QCRYPTO_BLOCK_LUKS_HASH_SPEC_LEN) {
1409         error_setg(errp, "Hash name '%s' is too long for LUKS header",
1410                    hash_alg);
1411         goto error;
1412     }
1413 
1414     if (luks_opts.ivgen_alg == QCRYPTO_IVGEN_ALG_ESSIV) {
1415         luks->ivgen_cipher_alg =
1416                 qcrypto_block_luks_essiv_cipher(luks_opts.cipher_alg,
1417                                                 luks_opts.ivgen_hash_alg,
1418                                                 &local_err);
1419         if (local_err) {
1420             error_propagate(errp, local_err);
1421             goto error;
1422         }
1423     } else {
1424         luks->ivgen_cipher_alg = luks_opts.cipher_alg;
1425     }
1426 
1427     strcpy(luks->header.cipher_name, cipher_alg);
1428     strcpy(luks->header.cipher_mode, cipher_mode_spec);
1429     strcpy(luks->header.hash_spec, hash_alg);
1430 
1431     luks->header.master_key_len =
1432         qcrypto_cipher_get_key_len(luks_opts.cipher_alg);
1433 
1434     if (luks_opts.cipher_mode == QCRYPTO_CIPHER_MODE_XTS) {
1435         luks->header.master_key_len *= 2;
1436     }
1437 
1438     /* Generate the salt used for hashing the master key
1439      * with PBKDF later
1440      */
1441     if (qcrypto_random_bytes(luks->header.master_key_salt,
1442                              QCRYPTO_BLOCK_LUKS_SALT_LEN,
1443                              errp) < 0) {
1444         goto error;
1445     }
1446 
1447     /* Generate random master key */
1448     masterkey = g_new0(uint8_t, luks->header.master_key_len);
1449     if (qcrypto_random_bytes(masterkey,
1450                              luks->header.master_key_len, errp) < 0) {
1451         goto error;
1452     }
1453 
1454 
1455     /* Setup the block device payload encryption objects */
1456     if (qcrypto_block_init_cipher(block, luks_opts.cipher_alg,
1457                                   luks_opts.cipher_mode, masterkey,
1458                                   luks->header.master_key_len, 1, errp) < 0) {
1459         goto error;
1460     }
1461 
1462     block->kdfhash = luks_opts.hash_alg;
1463     block->niv = qcrypto_cipher_get_iv_len(luks_opts.cipher_alg,
1464                                            luks_opts.cipher_mode);
1465     block->ivgen = qcrypto_ivgen_new(luks_opts.ivgen_alg,
1466                                      luks->ivgen_cipher_alg,
1467                                      luks_opts.ivgen_hash_alg,
1468                                      masterkey, luks->header.master_key_len,
1469                                      errp);
1470 
1471     if (!block->ivgen) {
1472         goto error;
1473     }
1474 
1475 
1476     /* Determine how many iterations we need to hash the master
1477      * key, in order to have 1 second of compute time used
1478      */
1479     iters = qcrypto_pbkdf2_count_iters(luks_opts.hash_alg,
1480                                        masterkey, luks->header.master_key_len,
1481                                        luks->header.master_key_salt,
1482                                        QCRYPTO_BLOCK_LUKS_SALT_LEN,
1483                                        QCRYPTO_BLOCK_LUKS_DIGEST_LEN,
1484                                        &local_err);
1485     if (local_err) {
1486         error_propagate(errp, local_err);
1487         goto error;
1488     }
1489 
1490     if (iters > (ULLONG_MAX / luks_opts.iter_time)) {
1491         error_setg_errno(errp, ERANGE,
1492                          "PBKDF iterations %llu too large to scale",
1493                          (unsigned long long)iters);
1494         goto error;
1495     }
1496 
1497     /* iter_time was in millis, but count_iters reported for secs */
1498     iters = iters * luks_opts.iter_time / 1000;
1499 
1500     /* Why /= 8 ?  That matches cryptsetup, but there's no
1501      * explanation why they chose /= 8... Probably so that
1502      * if all 8 keyslots are active we only spend 1 second
1503      * in total time to check all keys */
1504     iters /= 8;
1505     if (iters > UINT32_MAX) {
1506         error_setg_errno(errp, ERANGE,
1507                          "PBKDF iterations %llu larger than %u",
1508                          (unsigned long long)iters, UINT32_MAX);
1509         goto error;
1510     }
1511     iters = MAX(iters, QCRYPTO_BLOCK_LUKS_MIN_MASTER_KEY_ITERS);
1512     luks->header.master_key_iterations = iters;
1513 
1514     /* Hash the master key, saving the result in the LUKS
1515      * header. This hash is used when opening the encrypted
1516      * device to verify that the user password unlocked a
1517      * valid master key
1518      */
1519     if (qcrypto_pbkdf2(luks_opts.hash_alg,
1520                        masterkey, luks->header.master_key_len,
1521                        luks->header.master_key_salt,
1522                        QCRYPTO_BLOCK_LUKS_SALT_LEN,
1523                        luks->header.master_key_iterations,
1524                        luks->header.master_key_digest,
1525                        QCRYPTO_BLOCK_LUKS_DIGEST_LEN,
1526                        errp) < 0) {
1527         goto error;
1528     }
1529 
1530     /* start with the sector that follows the header*/
1531     header_sectors = QCRYPTO_BLOCK_LUKS_KEY_SLOT_OFFSET /
1532         QCRYPTO_BLOCK_LUKS_SECTOR_SIZE;
1533 
1534     split_key_sectors =
1535         qcrypto_block_luks_splitkeylen_sectors(luks,
1536                                                header_sectors,
1537                                                QCRYPTO_BLOCK_LUKS_STRIPES);
1538 
1539     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1540         QCryptoBlockLUKSKeySlot *slot = &luks->header.key_slots[i];
1541         slot->active = QCRYPTO_BLOCK_LUKS_KEY_SLOT_DISABLED;
1542 
1543         slot->key_offset_sector = header_sectors + i * split_key_sectors;
1544         slot->stripes = QCRYPTO_BLOCK_LUKS_STRIPES;
1545     }
1546 
1547     if (block->detached_header) {
1548         /*
1549          * For a detached LUKS header image, set the payload_offset_sector
1550          * to 0 to specify the starting point for read/write
1551          */
1552         luks->header.payload_offset_sector = 0;
1553     } else {
1554         /*
1555          * The total size of the LUKS headers is the partition header + key
1556          * slot headers, rounded up to the nearest sector, combined with
1557          * the size of each master key material region, also rounded up
1558          * to the nearest sector
1559          */
1560         luks->header.payload_offset_sector = header_sectors +
1561                 QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS * split_key_sectors;
1562     }
1563 
1564     block->sector_size = QCRYPTO_BLOCK_LUKS_SECTOR_SIZE;
1565     block->payload_offset = luks->header.payload_offset_sector *
1566         block->sector_size;
1567     detached_header_size =
1568         (header_sectors + QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS *
1569          split_key_sectors) * block->sector_size;
1570 
1571     /* Reserve header space to match payload offset */
1572     initfunc(block, detached_header_size, opaque, &local_err);
1573     if (local_err) {
1574         error_propagate(errp, local_err);
1575         goto error;
1576     }
1577 
1578 
1579     /* populate the slot 0 with the password encrypted master key*/
1580     /* This will also store the header */
1581     if (qcrypto_block_luks_store_key(block,
1582                                      0,
1583                                      password,
1584                                      masterkey,
1585                                      luks_opts.iter_time,
1586                                      writefunc,
1587                                      opaque,
1588                                      errp) < 0) {
1589         goto error;
1590     }
1591 
1592     memset(masterkey, 0, luks->header.master_key_len);
1593 
1594     return 0;
1595 
1596  error:
1597     if (masterkey) {
1598         memset(masterkey, 0, luks->header.master_key_len);
1599     }
1600 
1601     qcrypto_block_free_cipher(block);
1602     qcrypto_ivgen_free(block->ivgen);
1603 
1604     g_free(luks->secret);
1605     g_free(luks);
1606     return -1;
1607 }
1608 
1609 static int
1610 qcrypto_block_luks_amend_add_keyslot(QCryptoBlock *block,
1611                                      QCryptoBlockReadFunc readfunc,
1612                                      QCryptoBlockWriteFunc writefunc,
1613                                      void *opaque,
1614                                      QCryptoBlockAmendOptionsLUKS *opts_luks,
1615                                      bool force,
1616                                      Error **errp)
1617 {
1618     QCryptoBlockLUKS *luks = block->opaque;
1619     uint64_t iter_time = opts_luks->has_iter_time ?
1620                          opts_luks->iter_time :
1621                          QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME_MS;
1622     int keyslot;
1623     g_autofree char *old_password = NULL;
1624     g_autofree char *new_password = NULL;
1625     g_autofree uint8_t *master_key = NULL;
1626 
1627     char *secret = opts_luks->secret ?: luks->secret;
1628 
1629     if (!opts_luks->new_secret) {
1630         error_setg(errp, "'new-secret' is required to activate a keyslot");
1631         return -1;
1632     }
1633     if (opts_luks->old_secret) {
1634         error_setg(errp,
1635                    "'old-secret' must not be given when activating keyslots");
1636         return -1;
1637     }
1638 
1639     if (opts_luks->has_keyslot) {
1640         keyslot = opts_luks->keyslot;
1641         if (keyslot < 0 || keyslot >= QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS) {
1642             error_setg(errp,
1643                        "Invalid keyslot %u specified, must be between 0 and %u",
1644                        keyslot, QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS - 1);
1645             return -1;
1646         }
1647     } else {
1648         keyslot = qcrypto_block_luks_find_free_keyslot(luks);
1649         if (keyslot == -1) {
1650             error_setg(errp,
1651                        "Can't add a keyslot - all keyslots are in use");
1652             return -1;
1653         }
1654     }
1655 
1656     if (!force && qcrypto_block_luks_slot_active(luks, keyslot)) {
1657         error_setg(errp,
1658                    "Refusing to overwrite active keyslot %i - "
1659                    "please erase it first",
1660                    keyslot);
1661         return -1;
1662     }
1663 
1664     /* Locate the password that will be used to retrieve the master key */
1665     old_password = qcrypto_secret_lookup_as_utf8(secret, errp);
1666     if (!old_password) {
1667         return -1;
1668     }
1669 
1670     /* Retrieve the master key */
1671     master_key = g_new0(uint8_t, luks->header.master_key_len);
1672 
1673     if (qcrypto_block_luks_find_key(block, old_password, master_key,
1674                                     readfunc, opaque, errp) < 0) {
1675         error_append_hint(errp, "Failed to retrieve the master key");
1676         return -1;
1677     }
1678 
1679     /* Locate the new password*/
1680     new_password = qcrypto_secret_lookup_as_utf8(opts_luks->new_secret, errp);
1681     if (!new_password) {
1682         return -1;
1683     }
1684 
1685     /* Now set the new keyslots */
1686     if (qcrypto_block_luks_store_key(block, keyslot, new_password, master_key,
1687                                      iter_time, writefunc, opaque, errp)) {
1688         error_append_hint(errp, "Failed to write to keyslot %i", keyslot);
1689         return -1;
1690     }
1691     return 0;
1692 }
1693 
1694 static int
1695 qcrypto_block_luks_amend_erase_keyslots(QCryptoBlock *block,
1696                                         QCryptoBlockReadFunc readfunc,
1697                                         QCryptoBlockWriteFunc writefunc,
1698                                         void *opaque,
1699                                         QCryptoBlockAmendOptionsLUKS *opts_luks,
1700                                         bool force,
1701                                         Error **errp)
1702 {
1703     QCryptoBlockLUKS *luks = block->opaque;
1704     g_autofree uint8_t *tmpkey = NULL;
1705     g_autofree char *old_password = NULL;
1706 
1707     if (opts_luks->new_secret) {
1708         error_setg(errp,
1709                    "'new-secret' must not be given when erasing keyslots");
1710         return -1;
1711     }
1712     if (opts_luks->has_iter_time) {
1713         error_setg(errp,
1714                    "'iter-time' must not be given when erasing keyslots");
1715         return -1;
1716     }
1717     if (opts_luks->secret) {
1718         error_setg(errp,
1719                    "'secret' must not be given when erasing keyslots");
1720         return -1;
1721     }
1722 
1723     /* Load the old password if given */
1724     if (opts_luks->old_secret) {
1725         old_password = qcrypto_secret_lookup_as_utf8(opts_luks->old_secret,
1726                                                      errp);
1727         if (!old_password) {
1728             return -1;
1729         }
1730 
1731         /*
1732          * Allocate a temporary key buffer that we will need when
1733          * checking if slot matches the given old password
1734          */
1735         tmpkey = g_new0(uint8_t, luks->header.master_key_len);
1736     }
1737 
1738     /* Erase an explicitly given keyslot */
1739     if (opts_luks->has_keyslot) {
1740         int keyslot = opts_luks->keyslot;
1741 
1742         if (keyslot < 0 || keyslot >= QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS) {
1743             error_setg(errp,
1744                        "Invalid keyslot %i specified, must be between 0 and %i",
1745                        keyslot, QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS - 1);
1746             return -1;
1747         }
1748 
1749         if (opts_luks->old_secret) {
1750             int rv = qcrypto_block_luks_load_key(block,
1751                                                  keyslot,
1752                                                  old_password,
1753                                                  tmpkey,
1754                                                  readfunc,
1755                                                  opaque,
1756                                                  errp);
1757             if (rv == -1) {
1758                 return -1;
1759             } else if (rv == 0) {
1760                 error_setg(errp,
1761                            "Given keyslot %i doesn't contain the given "
1762                            "old password for erase operation",
1763                            keyslot);
1764                 return -1;
1765             }
1766         }
1767 
1768         if (!force && !qcrypto_block_luks_slot_active(luks, keyslot)) {
1769             error_setg(errp,
1770                        "Given keyslot %i is already erased (inactive) ",
1771                        keyslot);
1772             return -1;
1773         }
1774 
1775         if (!force && qcrypto_block_luks_count_active_slots(luks) == 1) {
1776             error_setg(errp,
1777                        "Attempt to erase the only active keyslot %i "
1778                        "which will erase all the data in the image "
1779                        "irreversibly - refusing operation",
1780                        keyslot);
1781             return -1;
1782         }
1783 
1784         if (qcrypto_block_luks_erase_key(block, keyslot,
1785                                          writefunc, opaque, errp)) {
1786             error_append_hint(errp, "Failed to erase keyslot %i", keyslot);
1787             return -1;
1788         }
1789 
1790     /* Erase all keyslots that match the given old password */
1791     } else if (opts_luks->old_secret) {
1792 
1793         unsigned long slots_to_erase_bitmap = 0;
1794         size_t i;
1795         int slot_count;
1796 
1797         assert(QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS <=
1798                sizeof(slots_to_erase_bitmap) * 8);
1799 
1800         for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1801             int rv = qcrypto_block_luks_load_key(block,
1802                                                  i,
1803                                                  old_password,
1804                                                  tmpkey,
1805                                                  readfunc,
1806                                                  opaque,
1807                                                  errp);
1808             if (rv == -1) {
1809                 return -1;
1810             } else if (rv == 1) {
1811                 bitmap_set(&slots_to_erase_bitmap, i, 1);
1812             }
1813         }
1814 
1815         slot_count = bitmap_count_one(&slots_to_erase_bitmap,
1816                                       QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS);
1817         if (slot_count == 0) {
1818             error_setg(errp,
1819                        "No keyslots match given (old) password for erase operation");
1820             return -1;
1821         }
1822 
1823         if (!force &&
1824             slot_count == qcrypto_block_luks_count_active_slots(luks)) {
1825             error_setg(errp,
1826                        "All the active keyslots match the (old) password that "
1827                        "was given and erasing them will erase all the data in "
1828                        "the image irreversibly - refusing operation");
1829             return -1;
1830         }
1831 
1832         /* Now apply the update */
1833         for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1834             if (!test_bit(i, &slots_to_erase_bitmap)) {
1835                 continue;
1836             }
1837             if (qcrypto_block_luks_erase_key(block, i, writefunc,
1838                 opaque, errp)) {
1839                 error_append_hint(errp, "Failed to erase keyslot %zu", i);
1840                 return -1;
1841             }
1842         }
1843     } else {
1844         error_setg(errp,
1845                    "To erase keyslot(s), either explicit keyslot index "
1846                    "or the password currently contained in them must be given");
1847         return -1;
1848     }
1849     return 0;
1850 }
1851 
1852 static int
1853 qcrypto_block_luks_amend_options(QCryptoBlock *block,
1854                                  QCryptoBlockReadFunc readfunc,
1855                                  QCryptoBlockWriteFunc writefunc,
1856                                  void *opaque,
1857                                  QCryptoBlockAmendOptions *options,
1858                                  bool force,
1859                                  Error **errp)
1860 {
1861     QCryptoBlockAmendOptionsLUKS *opts_luks = &options->u.luks;
1862 
1863     switch (opts_luks->state) {
1864     case Q_CRYPTO_BLOCKLUKS_KEYSLOT_STATE_ACTIVE:
1865         return qcrypto_block_luks_amend_add_keyslot(block, readfunc,
1866                                                     writefunc, opaque,
1867                                                     opts_luks, force, errp);
1868     case Q_CRYPTO_BLOCKLUKS_KEYSLOT_STATE_INACTIVE:
1869         return qcrypto_block_luks_amend_erase_keyslots(block, readfunc,
1870                                                        writefunc, opaque,
1871                                                        opts_luks, force, errp);
1872     default:
1873         g_assert_not_reached();
1874     }
1875 }
1876 
1877 static int qcrypto_block_luks_get_info(QCryptoBlock *block,
1878                                        QCryptoBlockInfo *info,
1879                                        Error **errp)
1880 {
1881     QCryptoBlockLUKS *luks = block->opaque;
1882     QCryptoBlockInfoLUKSSlot *slot;
1883     QCryptoBlockInfoLUKSSlotList **tail = &info->u.luks.slots;
1884     size_t i;
1885 
1886     info->u.luks.cipher_alg = luks->cipher_alg;
1887     info->u.luks.cipher_mode = luks->cipher_mode;
1888     info->u.luks.ivgen_alg = luks->ivgen_alg;
1889     if (info->u.luks.ivgen_alg == QCRYPTO_IVGEN_ALG_ESSIV) {
1890         info->u.luks.has_ivgen_hash_alg = true;
1891         info->u.luks.ivgen_hash_alg = luks->ivgen_hash_alg;
1892     }
1893     info->u.luks.hash_alg = luks->hash_alg;
1894     info->u.luks.payload_offset = block->payload_offset;
1895     info->u.luks.master_key_iters = luks->header.master_key_iterations;
1896     info->u.luks.uuid = g_strndup((const char *)luks->header.uuid,
1897                                   sizeof(luks->header.uuid));
1898 
1899     for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) {
1900         slot = g_new0(QCryptoBlockInfoLUKSSlot, 1);
1901         slot->active = luks->header.key_slots[i].active ==
1902             QCRYPTO_BLOCK_LUKS_KEY_SLOT_ENABLED;
1903         slot->key_offset = luks->header.key_slots[i].key_offset_sector
1904              * QCRYPTO_BLOCK_LUKS_SECTOR_SIZE;
1905         if (slot->active) {
1906             slot->has_iters = true;
1907             slot->iters = luks->header.key_slots[i].iterations;
1908             slot->has_stripes = true;
1909             slot->stripes = luks->header.key_slots[i].stripes;
1910         }
1911 
1912         QAPI_LIST_APPEND(tail, slot);
1913     }
1914 
1915     return 0;
1916 }
1917 
1918 
1919 static void qcrypto_block_luks_cleanup(QCryptoBlock *block)
1920 {
1921     QCryptoBlockLUKS *luks = block->opaque;
1922     if (luks) {
1923         g_free(luks->secret);
1924         g_free(luks);
1925     }
1926 }
1927 
1928 
1929 static int
1930 qcrypto_block_luks_decrypt(QCryptoBlock *block,
1931                            uint64_t offset,
1932                            uint8_t *buf,
1933                            size_t len,
1934                            Error **errp)
1935 {
1936     assert(QEMU_IS_ALIGNED(offset, QCRYPTO_BLOCK_LUKS_SECTOR_SIZE));
1937     assert(QEMU_IS_ALIGNED(len, QCRYPTO_BLOCK_LUKS_SECTOR_SIZE));
1938     return qcrypto_block_decrypt_helper(block,
1939                                         QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
1940                                         offset, buf, len, errp);
1941 }
1942 
1943 
1944 static int
1945 qcrypto_block_luks_encrypt(QCryptoBlock *block,
1946                            uint64_t offset,
1947                            uint8_t *buf,
1948                            size_t len,
1949                            Error **errp)
1950 {
1951     assert(QEMU_IS_ALIGNED(offset, QCRYPTO_BLOCK_LUKS_SECTOR_SIZE));
1952     assert(QEMU_IS_ALIGNED(len, QCRYPTO_BLOCK_LUKS_SECTOR_SIZE));
1953     return qcrypto_block_encrypt_helper(block,
1954                                         QCRYPTO_BLOCK_LUKS_SECTOR_SIZE,
1955                                         offset, buf, len, errp);
1956 }
1957 
1958 
1959 const QCryptoBlockDriver qcrypto_block_driver_luks = {
1960     .open = qcrypto_block_luks_open,
1961     .create = qcrypto_block_luks_create,
1962     .amend = qcrypto_block_luks_amend_options,
1963     .get_info = qcrypto_block_luks_get_info,
1964     .cleanup = qcrypto_block_luks_cleanup,
1965     .decrypt = qcrypto_block_luks_decrypt,
1966     .encrypt = qcrypto_block_luks_encrypt,
1967     .has_format = qcrypto_block_luks_has_format,
1968 };
1969