This file is indexed.

/usr/include/dislocker/metadata/metadata.priv.h is in libdislocker0-dev 0.6.1-7.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
/* -*- coding: utf-8 -*- */
/* -*- mode: c -*- */
/*
 * Dislocker -- enables to read/write on BitLocker encrypted partitions under
 * Linux
 * Copyright (C) 2012-2013  Romain Coltel, Hervé Schauer Consultants
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version 2
 * of the License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301,
 * USA.
 */
#ifndef DIS_METADATA_PRIV_H
#define DIS_METADATA_PRIV_H


#include "dislocker/common.h"
#include "dislocker/metadata/metadata.h"
#include "dislocker/metadata/extended_info.h"
#include "dislocker/metadata/guid.h"
#include "dislocker/ntfs/clock.h"

#include "dislocker/return_values.h"
#define checkupdate_dis_meta_state(ctx, state)                              \
	do {                                                                    \
		(ctx)->curr_state = (state);                                        \
		if((state) == (ctx)->init_stop_at) {                                \
			dis_printf(L_DEBUG, "Library end init at state %d\n", (state)); \
			return (state);                                                 \
		}                                                                   \
	} while(0);

#include <assert.h>

#ifndef static_assert
#define static_assert(x, s) extern int static_assertion[2*!!(x)-1]
#endif



#pragma pack (1)
/** First sector of an NTFS or BitLocker volume */
typedef struct _volume_header
{
	/* 512 bytes long */
	uint8_t  jump[3];             //                                                -- offset 0
	uint8_t  signature[8];        // = "-FVE-FS-" (without 0 at the string's end)   -- offset 3
	                              // = "NTFS    " (idem) for NTFS volumes (ORLY?)
	                              // = "MSWIN4.1" for BitLocker-To-Go encrypted volumes

	uint16_t sector_size;         // = 0x0200 = 512 bytes                           -- offset 0xb
	uint8_t  sectors_per_cluster; //                                                -- offset 0xd
	uint16_t reserved_clusters;   //                                                -- offset 0xe
	uint8_t  fat_count;           //                                                -- offset 0x10
	uint16_t root_entries;        //                                                -- offset 0x11
	uint16_t nb_sectors_16b;      //                                                -- offset 0x13
	uint8_t  media_descriptor;    //                                                -- offset 0x15
	uint16_t sectors_per_fat;     //                                                -- offset 0x16
	uint16_t sectors_per_track;   //                                                -- offset 0x18
	uint16_t nb_of_heads;         //                                                -- offset 0x1a
	uint32_t hidden_sectors;      //                                                -- offset 0x1c
	uint32_t nb_sectors_32b;      //                                                -- offset 0x20

	union {                       //                                                -- offset 0x24
		struct { // Classic BitLocker
			uint8_t  unknown2[4];         // NTFS = 0x00800080 (little endian)
			uint64_t nb_sectors_64b;      //                                        -- offset 0x28
			uint64_t mft_start_cluster;   //                                        -- offset 0x30
			union {                       // Metadata LCN or MFT Mirror             -- offset 0x38
				uint64_t metadata_lcn;    //  depending on whether we're talking about a Vista volume
				uint64_t mft_mirror;      //  or an NTFS one
			};
			uint8_t  unknown3[96];        //                                        -- offset 0x40

			guid_t   guid;                //                                        -- offset 0xa0
			uint64_t information_off[3];  // NOT for Vista                          -- offset 0xb0
			uint64_t eow_information_off[2]; // NOT for Vista NOR 7                 -- offset 0xc8

			uint8_t  unknown4[294];       //                                        -- offset 0xd8
		};
		struct { // BitLocker-To-Go
			uint8_t  unknown5[35];

			uint8_t  fs_name[11];         //                                        -- offset 0x47
			uint8_t  fs_signature[8];     //                                        -- offset 0x52

			uint8_t  unknown6[334];       //                                        -- offset 0x5a

			guid_t   bltg_guid;           //                                        -- offset 0x1a8
			uint64_t bltg_header[3];      //                                        -- offset 0x1b8

			uint8_t  Unknown7[46];        //                                        -- offset 0x1d0
		};
	};

	uint16_t boot_partition_identifier; // = 0xaa55                                 -- offset 0x1fe
} volume_header_t; // Size = 512

static_assert(
	sizeof(struct _volume_header) == 512,
	"Volume header structure's size isn't equal to 512"
);



/** Header of a data set, used in the bitlocker header below */
typedef struct _bitlocker_dataset
{
	uint32_t size;         //                      -- offset 0
	uint32_t unknown1;     // = 0x0001 FIXME       -- offset 4
	uint32_t header_size;  // = 0x0030             -- offset 8
	uint32_t copy_size;    // = dataset_size       -- offset 0xc

	guid_t guid;           // dataset GUID         -- offset 0x10
	uint32_t next_counter; //                      -- offset 0x20

	uint16_t algorithm;    //                      -- offset 0x24
	uint16_t trash;        //                      -- offset 0x26
	ntfs_time_t timestamp; //                      -- offset 0x28
} bitlocker_dataset_t; // Size = 0x30

static_assert(
	sizeof(struct _bitlocker_dataset) == 0x30,
	"BitLocker dataset structure's size isn't equal to 0x30"
);


/** Different states BitLocker is in */
enum state_types
{
	METADATA_STATE_NULL                     = 0,
	METADATA_STATE_DECRYPTED                = 1,
	METADATA_STATE_SWITCHING_ENCRYPTION     = 2,
	METADATA_STATE_EOW_ACTIVATED            = 3,
	METADATA_STATE_ENCRYPTED                = 4,
	METADATA_STATE_SWITCH_ENCRYPTION_PAUSED = 5
};
typedef uint16_t dis_metadata_state_t;


/**
 * Header of a BitLocker metadata structure, named information
 *
 * Datums (protectors) with keys in them follow this header
 */
typedef struct _bitlocker_information
{
	uint8_t signature[8]; // = "-FVE-FS-"                                                   -- offset 0
	uint16_t size;        // Total size (has to be multiplied by 16 when the version is 2)  -- offset 8
	version_t version;    // = 0x0002 for Windows 7 and 1 for Windows Vista                 -- offset 0xa

	/* Not sure about the next two fields */
	dis_metadata_state_t curr_state;  // Current encryption state                           -- offset 0xc
	dis_metadata_state_t next_state;  // Next encryption state                              -- offset 0xe

	uint64_t encrypted_volume_size; // Size of the encrypted volume                         -- offset 0x10
	/*
	 * The following size describes a virtualized region. This region is only
	 * checked when this->curr_state == 2. It begins at the offset described by
	 * this->encrypted_volume_size
	 */
	uint32_t convert_size;  //                                                              -- offset 0x18
	uint32_t nb_backup_sectors;   //                                                        -- offset 0x1c

	uint64_t information_off[3];  //                                                        -- offset 0x20

	union {
		uint64_t boot_sectors_backup; // Address where the boot sectors have been backed up -- offset 0x38
		uint64_t mftmirror_backup;    // This is the address of the MftMirror for Vista     -- offset 0x38
	};

	struct _bitlocker_dataset dataset; // See above                                         -- offset 0x40
} bitlocker_information_t; // Size = 0x40 + 0x30

static_assert(
	sizeof(struct _bitlocker_information) == (0x40 + 0x30),
	"BitLocker information structure's size isn't equal to 0x70"
);



/*
 * The following structure is followed by a datum of type 5 (DATUM_AES_CCM) or 1
 * (DATUM_KEY). When there's a DATUM_AES_CCM, this is actually the DATUM_KEY
 * encrypted using the VMK.
 * The key contained in the DATUM_KEY structure is the SHA-256 sum of the entire
 * BitLocker's metadata fields (bitlocker_information_t + every datum).
 *
 * Therefore, the size field contains 8 plus the size of the datum.
 */
typedef struct _bitlocker_validations
{
	uint16_t  size;
	version_t version;
	uint32_t  crc32;
} bitlocker_validations_t; // Size = 8

static_assert(
	sizeof(struct _bitlocker_validations) == 8,
	"BitLocker validations structure's size isn't equal to 8"
);



/**
 * The following structure is used when the volume GUID is
 * EOW_INFORMATION_OFFSET_GUID (see guid.c).
 * It's followed by some kind of payload I don't know about yet (but that
 * explains header_size vs infos_size)
 */
typedef struct _bitlocker_eow_infos
{
	uint8_t  signature[8];    // = "FVE-EOW"                                    -- offset 0
	uint16_t header_size;     // = 0x38                                         -- offset 8
	uint16_t infos_size;      //                                                -- offset 0xa
	uint32_t sector_size1;    //                                                -- offset 0xc
	uint32_t sector_size2;    //                                                -- offset 0x10
	uint32_t unknown_14;      // FIXME                                          -- offset 0x14
	uint32_t convlog_size;    //                                                -- offset 0x18
	uint32_t unknown_1c;      // FIXME                                          -- offset 0x1c
	uint32_t nb_regions;      //                                                -- offset 0x20
	uint32_t crc32;           //                                                -- offset 0x24
	uint64_t disk_offsets[2]; //                                                -- offset 0x28
} bitlocker_eow_infos_t; // Size = 0x38

static_assert(
	sizeof(struct _bitlocker_eow_infos) == 0x38,
	"BitLocker EOW information structure's size isn't equal to 0x38"
);

#pragma pack ()




/**
 * A region is used to describe BitLocker metadata on disk
 */
typedef struct _regions
{
	/* Metadata offset */
	uint64_t addr;
	/* Metadata size on disk */
	uint64_t size;
} dis_regions_t;



struct _dis_metadata {
	/* The volume header, 512 bytes */
	volume_header_t* volume_header;

	/* BitLocker-volume's main metadata */
	bitlocker_information_t* information;

	/* BitLocker-volume's submain metadata */
	bitlocker_dataset_t* dataset;

	/* BitLocker-volume's EOW main metadata */
	bitlocker_eow_infos_t* eow_information;

	/*
	 * Virtualized regions are presented as zeroes when queried from the NTFS
	 * layer. In these virtualized regions, we find the 3 BitLocker metadata
	 * headers, the area where NTFS boot sectors are backed-up for W$ 7&8, and
	 * an area I don't know about yet for W$ 8.
	 * This last area is used only when BitLocker's state is 2.
	 */
	size_t           nb_virt_region;
	dis_regions_t    virt_region[5];

	/* Size (in bytes) of the NTFS backed-up sectors */
	off_t            virtualized_size;

	/* Extended info which may be present (NULL otherwise) */
	extended_info_t* xinfo;

	/* A pointer to the configuration of the metadata */
	dis_metadata_config_t cfg;
};


#ifdef _HAVE_RUBY
#include "dislocker/ruby.h"

void Init_metadata(VALUE rb_mDislocker);
#endif

#endif /* DIS_METADATA_PRIV_H */