summaryrefslogtreecommitdiff
path: root/cryptfs/cryptfs.go
blob: 5b3f0742841416f2a245bd7942c618b56203595e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
package cryptfs

// CryptFS is the crypto backend of GoCryptFS

import (
	"crypto/aes"
	"crypto/cipher"
	"fmt"
)

const (
	PROGRAM_NAME = "gocryptfs"

	DEFAULT_PLAINBS = 4096
	KEY_LEN         = 32 // AES-256
	AUTH_TAG_LEN    = 16
	DIRIV_LEN       = 16 // identical to AES block size
	DIRIV_FILENAME  = "gocryptfs.diriv"
)

type CryptFS struct {
	blockCipher cipher.Block
	gcm         cipher.AEAD
	gcmIVLen    int
	gcmIVGen    nonceGenerator
	plainBS     uint64
	cipherBS    uint64
	// Stores an all-zero block of size cipherBS
	allZeroBlock []byte
	// DirIV cache for filename encryption
	DirIVCacheEnc DirIVCache
}

func NewCryptFS(key []byte, useOpenssl bool, plaintextNames bool, GCMIV128 bool) *CryptFS {

	if len(key) != KEY_LEN {
		panic(fmt.Sprintf("Unsupported key length %d", len(key)))
	}

	b, err := aes.NewCipher(key)
	if err != nil {
		panic(err)
	}

	// We want the IV size in bytes
	gcmIV := 96 / 8
	if GCMIV128 {
		gcmIV = 128 / 8
	}

	var gcm cipher.AEAD
	if useOpenssl {
		gcm = opensslGCM{key}
	} else {
		gcm, err = goGCMWrapper(b, gcmIV)
		if err != nil {
			panic(err)
		}
	}

	plainBS := DEFAULT_PLAINBS
	cipherBS := plainBS + gcmIV + AUTH_TAG_LEN

	return &CryptFS{
		blockCipher:  b,
		gcm:          gcm,
		gcmIVLen:     gcmIV,
		gcmIVGen:     nonceGenerator{nonceLen: gcmIV},
		plainBS:      uint64(plainBS),
		cipherBS:     uint64(cipherBS),
		allZeroBlock: make([]byte, cipherBS),
	}
}

// Get plaintext block size
func (be *CryptFS) PlainBS() uint64 {
	return be.plainBS
}

// Per-block storage overhead
func (be *CryptFS) BlockOverhead() uint64 {
	return be.cipherBS - be.plainBS
}