mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-17 13:50:06 +01:00
Preparation to merge cryptsetup-reencrypt in cryptsetup.
This commit is contained in:
@@ -46,7 +46,7 @@ src/integritysetup.c
|
|||||||
src/cryptsetup_reencrypt.c
|
src/cryptsetup_reencrypt.c
|
||||||
src/utils_tools.c
|
src/utils_tools.c
|
||||||
src/utils_password.c
|
src/utils_password.c
|
||||||
src/utils_luks2.c
|
src/utils_luks.c
|
||||||
src/utils_blockdev.c
|
src/utils_blockdev.c
|
||||||
src/utils_args.c
|
src/utils_args.c
|
||||||
tokens/ssh/cryptsetup-ssh.c
|
tokens/ssh/cryptsetup-ssh.c
|
||||||
|
|||||||
@@ -9,7 +9,8 @@ cryptsetup_SOURCES = \
|
|||||||
src/utils_args.c \
|
src/utils_args.c \
|
||||||
src/utils_tools.c \
|
src/utils_tools.c \
|
||||||
src/utils_password.c \
|
src/utils_password.c \
|
||||||
src/utils_luks2.c \
|
src/utils_luks.c \
|
||||||
|
src/utils_luks.h \
|
||||||
src/utils_blockdev.c \
|
src/utils_blockdev.c \
|
||||||
src/utils_arg_names.h \
|
src/utils_arg_names.h \
|
||||||
src/utils_arg_macros.h \
|
src/utils_arg_macros.h \
|
||||||
|
|||||||
211
src/cryptsetup.c
211
src/cryptsetup.c
@@ -25,6 +25,7 @@
|
|||||||
|
|
||||||
#include "cryptsetup.h"
|
#include "cryptsetup.h"
|
||||||
#include "cryptsetup_args.h"
|
#include "cryptsetup_args.h"
|
||||||
|
#include "utils_luks.h"
|
||||||
|
|
||||||
static char *keyfiles[MAX_KEYFILES];
|
static char *keyfiles[MAX_KEYFILES];
|
||||||
static char *keyfile_stdin = NULL;
|
static char *keyfile_stdin = NULL;
|
||||||
@@ -33,7 +34,7 @@ static int keyfiles_count = 0;
|
|||||||
static int64_t data_shift = 0;
|
static int64_t data_shift = 0;
|
||||||
|
|
||||||
static const char *device_type = "luks";
|
static const char *device_type = "luks";
|
||||||
static const char *set_pbkdf = NULL;
|
const char *set_pbkdf = NULL;
|
||||||
|
|
||||||
static const char **action_argv;
|
static const char **action_argv;
|
||||||
static int action_argc;
|
static int action_argc;
|
||||||
@@ -42,6 +43,12 @@ static int total_keyfiles = 0;
|
|||||||
|
|
||||||
static struct tools_log_params log_parms;
|
static struct tools_log_params log_parms;
|
||||||
|
|
||||||
|
struct tools_arg tool_core_args[] = { { NULL, false, CRYPT_ARG_BOOL }, /* leave unused due to popt library */
|
||||||
|
#define ARG(A, B, C, D, E, F, G, H) { A, false, F, G, H },
|
||||||
|
#include "cryptsetup_arg_list.h"
|
||||||
|
#undef ARG
|
||||||
|
};
|
||||||
|
|
||||||
void tools_cleanup(void)
|
void tools_cleanup(void)
|
||||||
{
|
{
|
||||||
tools_args_free(tool_core_args, ARRAY_SIZE(tool_core_args));
|
tools_args_free(tool_core_args, ARRAY_SIZE(tool_core_args));
|
||||||
@@ -62,95 +69,11 @@ static const char *uuid_or_device_header(const char **data_device)
|
|||||||
return uuid_or_device(ARG_STR(OPT_HEADER_ID) ?: action_argv[0]);
|
return uuid_or_device(ARG_STR(OPT_HEADER_ID) ?: action_argv[0]);
|
||||||
}
|
}
|
||||||
|
|
||||||
static const char *luksType(const char *type)
|
|
||||||
{
|
|
||||||
if (type && !strcmp(type, "luks2"))
|
|
||||||
return CRYPT_LUKS2;
|
|
||||||
|
|
||||||
if (type && !strcmp(type, "luks1"))
|
|
||||||
return CRYPT_LUKS1;
|
|
||||||
|
|
||||||
if (type && !strcmp(type, "luks"))
|
|
||||||
return CRYPT_LUKS; /* NULL */
|
|
||||||
|
|
||||||
if (type && *type)
|
|
||||||
return type;
|
|
||||||
|
|
||||||
return CRYPT_LUKS; /* NULL */
|
|
||||||
}
|
|
||||||
|
|
||||||
static bool isLUKS1(const char *type)
|
|
||||||
{
|
|
||||||
return type && !strcmp(type, CRYPT_LUKS1);
|
|
||||||
}
|
|
||||||
|
|
||||||
static bool isLUKS2(const char *type)
|
|
||||||
{
|
|
||||||
return type && !strcmp(type, CRYPT_LUKS2);
|
|
||||||
}
|
|
||||||
|
|
||||||
static bool isLUKS(const char *type)
|
static bool isLUKS(const char *type)
|
||||||
{
|
{
|
||||||
return isLUKS2(type) || isLUKS1(type);
|
return isLUKS2(type) || isLUKS1(type);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int _verify_passphrase(int def)
|
|
||||||
{
|
|
||||||
/* Batch mode switch off verify - if not overridden by -y */
|
|
||||||
if (ARG_SET(OPT_VERIFY_PASSPHRASE_ID))
|
|
||||||
def = 1;
|
|
||||||
else if (ARG_SET(OPT_BATCH_MODE_ID))
|
|
||||||
def = 0;
|
|
||||||
|
|
||||||
/* Non-tty input doesn't allow verify */
|
|
||||||
if (def && !isatty(STDIN_FILENO)) {
|
|
||||||
if (ARG_SET(OPT_VERIFY_PASSPHRASE_ID))
|
|
||||||
log_err(_("Can't do passphrase verification on non-tty inputs."));
|
|
||||||
def = 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
return def;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void _set_activation_flags(uint32_t *flags)
|
|
||||||
{
|
|
||||||
if (ARG_SET(OPT_READONLY_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_READONLY;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_ALLOW_DISCARDS_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_ALLOW_DISCARDS;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_PERF_SAME_CPU_CRYPT_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_SAME_CPU_CRYPT;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_PERF_SUBMIT_FROM_CRYPT_CPUS_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_SUBMIT_FROM_CRYPT_CPUS;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_PERF_NO_READ_WORKQUEUE_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_NO_READ_WORKQUEUE;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_PERF_NO_WRITE_WORKQUEUE_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_NO_WRITE_WORKQUEUE;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_INTEGRITY_NO_JOURNAL_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_NO_JOURNAL;
|
|
||||||
|
|
||||||
/* In persistent mode, we use what is set on command line */
|
|
||||||
if (ARG_SET(OPT_PERSISTENT_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_IGNORE_PERSISTENT;
|
|
||||||
|
|
||||||
/* Only for LUKS2 but ignored elsewhere */
|
|
||||||
if (ARG_SET(OPT_TEST_PASSPHRASE_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_ALLOW_UNBOUND_KEY;
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_SERIALIZE_MEMORY_HARD_PBKDF_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_SERIALIZE_MEMORY_HARD_PBKDF;
|
|
||||||
|
|
||||||
/* Only for plain */
|
|
||||||
if (ARG_SET(OPT_IV_LARGE_SECTORS_ID))
|
|
||||||
*flags |= CRYPT_ACTIVATE_IV_LARGE_SECTORS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void _set_reencryption_flags(uint32_t *flags)
|
static void _set_reencryption_flags(uint32_t *flags)
|
||||||
{
|
{
|
||||||
if (ARG_SET(OPT_INIT_ONLY_ID))
|
if (ARG_SET(OPT_INIT_ONLY_ID))
|
||||||
@@ -175,11 +98,6 @@ static int _set_keyslot_encryption_params(struct crypt_device *cd)
|
|||||||
return crypt_keyslot_set_encryption(cd, ARG_STR(OPT_KEYSLOT_CIPHER_ID), ARG_UINT32(OPT_KEYSLOT_KEY_SIZE_ID) / 8);
|
return crypt_keyslot_set_encryption(cd, ARG_STR(OPT_KEYSLOT_CIPHER_ID), ARG_UINT32(OPT_KEYSLOT_KEY_SIZE_ID) / 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int _set_tries_tty(void)
|
|
||||||
{
|
|
||||||
return (tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID)) && isatty(STDIN_FILENO)) ? ARG_UINT32(OPT_TRIES_ID) : 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int _try_token_pin_unlock(struct crypt_device *cd,
|
static int _try_token_pin_unlock(struct crypt_device *cd,
|
||||||
int token_id,
|
int token_id,
|
||||||
const char *activated_name,
|
const char *activated_name,
|
||||||
@@ -203,7 +121,7 @@ static int _try_token_pin_unlock(struct crypt_device *cd,
|
|||||||
|
|
||||||
do {
|
do {
|
||||||
r = tools_get_key(msg, &pin, &pin_len, 0, 0, NULL,
|
r = tools_get_key(msg, &pin, &pin_len, 0, 0, NULL,
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
break;
|
break;
|
||||||
|
|
||||||
@@ -326,7 +244,7 @@ static int action_open_plain(void)
|
|||||||
if (ARG_SET(OPT_SHARED_ID))
|
if (ARG_SET(OPT_SHARED_ID))
|
||||||
activate_flags |= CRYPT_ACTIVATE_SHARED;
|
activate_flags |= CRYPT_ACTIVATE_SHARED;
|
||||||
|
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
|
|
||||||
if (!tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID))) {
|
if (!tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID))) {
|
||||||
/* If no hash, key is read directly, read size is always key_size
|
/* If no hash, key is read directly, read size is always key_size
|
||||||
@@ -343,7 +261,7 @@ static int action_open_plain(void)
|
|||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), key_size_max,
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), key_size_max,
|
||||||
ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_TIMEOUT_ID),
|
ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0, cd);
|
verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -393,7 +311,7 @@ static int action_open_loopaes(void)
|
|||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
|
|
||||||
r = crypt_activate_by_keyfile_device_offset(cd, activated_name, CRYPT_ANY_SLOT,
|
r = crypt_activate_by_keyfile_device_offset(cd, activated_name, CRYPT_ANY_SLOT,
|
||||||
tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID)) ? "/dev/stdin" : ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID),
|
tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID)) ? "/dev/stdin" : ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID),
|
||||||
@@ -408,12 +326,12 @@ static int tcrypt_load(struct crypt_device *cd, struct crypt_params_tcrypt *para
|
|||||||
{
|
{
|
||||||
int r, tries, eperm = 0;
|
int r, tries, eperm = 0;
|
||||||
|
|
||||||
tries = _set_tries_tty();
|
tries = set_tries_tty();
|
||||||
do {
|
do {
|
||||||
/* TCRYPT header is encrypted, get passphrase now */
|
/* TCRYPT header is encrypted, get passphrase now */
|
||||||
r = tools_get_key(NULL, CONST_CAST(char**)¶ms->passphrase,
|
r = tools_get_key(NULL, CONST_CAST(char**)¶ms->passphrase,
|
||||||
¶ms->passphrase_size, 0, 0, keyfile_stdin, ARG_UINT32(OPT_TIMEOUT_ID),
|
¶ms->passphrase_size, 0, 0, keyfile_stdin, ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0, cd);
|
verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
@@ -426,7 +344,7 @@ static int tcrypt_load(struct crypt_device *cd, struct crypt_params_tcrypt *para
|
|||||||
r = tools_get_key(_("Enter VeraCrypt PIM: "),
|
r = tools_get_key(_("Enter VeraCrypt PIM: "),
|
||||||
&tmp_pim_nptr,
|
&tmp_pim_nptr,
|
||||||
&tmp_pim_size, 0, 0, keyfile_stdin, ARG_UINT32(OPT_TIMEOUT_ID),
|
&tmp_pim_size, 0, 0, keyfile_stdin, ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0, cd);
|
verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
@@ -506,7 +424,7 @@ static int action_open_tcrypt(void)
|
|||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
|
|
||||||
if (activated_name)
|
if (activated_name)
|
||||||
r = crypt_activate_by_volume_key(cd, activated_name, NULL, 0, activate_flags);
|
r = crypt_activate_by_volume_key(cd, activated_name, NULL, 0, activate_flags);
|
||||||
@@ -537,7 +455,7 @@ static int action_open_bitlk(void)
|
|||||||
log_err(_("Device %s is not a valid BITLK device."), action_argv[0]);
|
log_err(_("Device %s is not a valid BITLK device."), action_argv[0]);
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
|
|
||||||
if (ARG_SET(OPT_MASTER_KEY_FILE_ID)) {
|
if (ARG_SET(OPT_MASTER_KEY_FILE_ID)) {
|
||||||
keysize = crypt_get_volume_key_size(cd);
|
keysize = crypt_get_volume_key_size(cd);
|
||||||
@@ -554,11 +472,11 @@ static int action_open_bitlk(void)
|
|||||||
r = crypt_activate_by_volume_key(cd, activated_name,
|
r = crypt_activate_by_volume_key(cd, activated_name,
|
||||||
key, keysize, activate_flags);
|
key, keysize, activate_flags);
|
||||||
} else {
|
} else {
|
||||||
tries = _set_tries_tty();
|
tries = set_tries_tty();
|
||||||
do {
|
do {
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -808,7 +726,7 @@ static int action_resize(void)
|
|||||||
|
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1115,32 +1033,6 @@ static int action_benchmark(void)
|
|||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int set_pbkdf_params(struct crypt_device *cd, const char *dev_type)
|
|
||||||
{
|
|
||||||
const struct crypt_pbkdf_type *pbkdf_default;
|
|
||||||
struct crypt_pbkdf_type pbkdf = {};
|
|
||||||
|
|
||||||
pbkdf_default = crypt_get_pbkdf_default(dev_type);
|
|
||||||
if (!pbkdf_default)
|
|
||||||
return -EINVAL;
|
|
||||||
|
|
||||||
pbkdf.type = set_pbkdf ?: pbkdf_default->type;
|
|
||||||
pbkdf.hash = ARG_STR(OPT_HASH_ID) ?: pbkdf_default->hash;
|
|
||||||
pbkdf.time_ms = ARG_UINT32(OPT_ITER_TIME_ID) ?: pbkdf_default->time_ms;
|
|
||||||
if (strcmp(pbkdf.type, CRYPT_KDF_PBKDF2)) {
|
|
||||||
pbkdf.max_memory_kb = ARG_UINT32(OPT_PBKDF_MEMORY_ID) ?: pbkdf_default->max_memory_kb;
|
|
||||||
pbkdf.parallel_threads = ARG_UINT32(OPT_PBKDF_PARALLEL_ID) ?: pbkdf_default->parallel_threads;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ARG_SET(OPT_PBKDF_FORCE_ITERATIONS_ID)) {
|
|
||||||
pbkdf.iterations = ARG_UINT32(OPT_PBKDF_FORCE_ITERATIONS_ID);
|
|
||||||
pbkdf.time_ms = 0;
|
|
||||||
pbkdf.flags |= CRYPT_PBKDF_NO_BENCHMARK;
|
|
||||||
}
|
|
||||||
|
|
||||||
return crypt_set_pbkdf_type(cd, &pbkdf);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int set_keyslot_params(struct crypt_device *cd, int keyslot)
|
static int set_keyslot_params(struct crypt_device *cd, int keyslot)
|
||||||
{
|
{
|
||||||
const char *cipher;
|
const char *cipher;
|
||||||
@@ -1204,7 +1096,7 @@ static int _do_luks2_reencrypt_recovery(struct crypt_device *cd)
|
|||||||
r = tools_get_key(_("Enter passphrase for reencryption recovery: "),
|
r = tools_get_key(_("Enter passphrase for reencryption recovery: "),
|
||||||
&password, &passwordLen, ARG_UINT64(OPT_KEYFILE_OFFSET_ID),
|
&password, &passwordLen, ARG_UINT64(OPT_KEYFILE_OFFSET_ID),
|
||||||
ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_TIMEOUT_ID),
|
ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID), ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0, cd);
|
verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
@@ -1307,22 +1199,7 @@ static int strcmp_or_null(const char *str, const char *expected)
|
|||||||
return !str ? 0 : strcmp(str, expected);
|
return !str ? 0 : strcmp(str, expected);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int get_adjusted_key_size(const char *cipher_mode, uint32_t default_size_bits, int integrity_keysize)
|
int luksFormat(struct crypt_device **r_cd, char **r_password, size_t *r_passwordLen)
|
||||||
{
|
|
||||||
uint32_t keysize_bits = ARG_UINT32(OPT_KEY_SIZE_ID);
|
|
||||||
|
|
||||||
#ifdef ENABLE_LUKS_ADJUST_XTS_KEYSIZE
|
|
||||||
if (!ARG_SET(OPT_KEY_SIZE_ID) && !strncmp(cipher_mode, "xts-", 4)) {
|
|
||||||
if (default_size_bits == 128)
|
|
||||||
keysize_bits = 256;
|
|
||||||
else if (default_size_bits == 256)
|
|
||||||
keysize_bits = 512;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
return (keysize_bits ?: default_size_bits) / 8 + integrity_keysize;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int _luksFormat(struct crypt_device **r_cd, char **r_password, size_t *r_passwordLen)
|
|
||||||
{
|
{
|
||||||
int r = -EINVAL, keysize, integrity_keysize = 0, fd, created = 0;
|
int r = -EINVAL, keysize, integrity_keysize = 0, fd, created = 0;
|
||||||
struct stat st;
|
struct stat st;
|
||||||
@@ -1463,7 +1340,7 @@ static int _luksFormat(struct crypt_device **r_cd, char **r_password, size_t *r_
|
|||||||
|
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1525,7 +1402,7 @@ out:
|
|||||||
|
|
||||||
static int action_luksFormat(void)
|
static int action_luksFormat(void)
|
||||||
{
|
{
|
||||||
return _luksFormat(NULL, NULL, NULL);
|
return luksFormat(NULL, NULL, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int action_open_luks(void)
|
static int action_open_luks(void)
|
||||||
@@ -1566,7 +1443,7 @@ static int action_open_luks(void)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
|
|
||||||
if (ARG_SET(OPT_MASTER_KEY_FILE_ID)) {
|
if (ARG_SET(OPT_MASTER_KEY_FILE_ID)) {
|
||||||
keysize = crypt_get_volume_key_size(cd);
|
keysize = crypt_get_volume_key_size(cd);
|
||||||
@@ -1590,16 +1467,16 @@ static int action_open_luks(void)
|
|||||||
|
|
||||||
/* Token requires PIN, but ask only if there is no password query later */
|
/* Token requires PIN, but ask only if there is no password query later */
|
||||||
if (ARG_SET(OPT_TOKEN_ONLY_ID) && r == -ENOANO)
|
if (ARG_SET(OPT_TOKEN_ONLY_ID) && r == -ENOANO)
|
||||||
r = _try_token_pin_unlock(cd, ARG_INT32(OPT_TOKEN_ID_ID), activated_name, ARG_STR(OPT_TOKEN_TYPE_ID), activate_flags, _set_tries_tty());
|
r = _try_token_pin_unlock(cd, ARG_INT32(OPT_TOKEN_ID_ID), activated_name, ARG_STR(OPT_TOKEN_TYPE_ID), activate_flags, set_tries_tty());
|
||||||
|
|
||||||
if (r >= 0 || r == -EEXIST || ARG_SET(OPT_TOKEN_ONLY_ID))
|
if (r >= 0 || r == -EEXIST || ARG_SET(OPT_TOKEN_ONLY_ID))
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
tries = _set_tries_tty();
|
tries = set_tries_tty();
|
||||||
do {
|
do {
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1639,7 +1516,7 @@ static int verify_keyslot(struct crypt_device *cd, int key_slot, crypt_keyslot_i
|
|||||||
|
|
||||||
r = tools_get_key(msg_pass, &password, &passwordLen,
|
r = tools_get_key(msg_pass, &password, &passwordLen,
|
||||||
keyfile_offset, keyfile_size, key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
keyfile_offset, keyfile_size, key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0, cd);
|
verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1749,7 +1626,7 @@ static int action_luksRemoveKey(void)
|
|||||||
&password, &passwordLen,
|
&password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID),
|
ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(0), 0,
|
verify_passphrase(0), 0,
|
||||||
cd);
|
cd);
|
||||||
if(r < 0)
|
if(r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
@@ -1829,7 +1706,7 @@ static int luksAddUnboundKey(void)
|
|||||||
&password_new, &password_new_size,
|
&password_new, &password_new_size,
|
||||||
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
||||||
new_key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
new_key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1901,7 +1778,7 @@ static int action_luksAddKey(void)
|
|||||||
&password_new, &password_new_size,
|
&password_new, &password_new_size,
|
||||||
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
||||||
new_key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
new_key_file, ARG_UINT32(OPT_TIMEOUT_ID),
|
||||||
_verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1917,7 +1794,7 @@ static int action_luksAddKey(void)
|
|||||||
r = tools_get_key(_("Enter any existing passphrase: "),
|
r = tools_get_key(_("Enter any existing passphrase: "),
|
||||||
&password, &password_size,
|
&password, &password_size,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
|
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
@@ -1934,7 +1811,7 @@ static int action_luksAddKey(void)
|
|||||||
r = tools_get_key(_("Enter new passphrase for key slot: "),
|
r = tools_get_key(_("Enter new passphrase for key slot: "),
|
||||||
&password_new, &password_new_size,
|
&password_new, &password_new_size,
|
||||||
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID), new_key_file,
|
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID), new_key_file,
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -1985,7 +1862,7 @@ static int action_luksChangeKey(void)
|
|||||||
r = tools_get_key(_("Enter passphrase to be changed: "),
|
r = tools_get_key(_("Enter passphrase to be changed: "),
|
||||||
&password, &password_size,
|
&password, &password_size,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -2002,7 +1879,7 @@ static int action_luksChangeKey(void)
|
|||||||
&password_new, &password_new_size,
|
&password_new, &password_new_size,
|
||||||
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
ARG_UINT64(OPT_NEW_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_NEW_KEYFILE_SIZE_ID),
|
||||||
new_key_file,
|
new_key_file,
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(1), !ARG_SET(OPT_FORCE_PASSWORD_ID), cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -2051,7 +1928,7 @@ static int action_luksConvertKey(void)
|
|||||||
r = tools_get_key(_("Enter passphrase for keyslot to be converted: "),
|
r = tools_get_key(_("Enter passphrase for keyslot to be converted: "),
|
||||||
&password, &password_size,
|
&password, &password_size,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -2315,11 +2192,11 @@ static int action_luksResume(void)
|
|||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
tries = _set_tries_tty();
|
tries = set_tries_tty();
|
||||||
do {
|
do {
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -2826,7 +2703,7 @@ static int action_reencrypt_load(struct crypt_device *cd)
|
|||||||
|
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
@@ -2977,7 +2854,7 @@ static int action_encrypt_luks2(struct crypt_device **cd)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
r = _luksFormat(cd, &password, &passwordLen);
|
r = luksFormat(cd, &password, &passwordLen);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
@@ -3012,7 +2889,7 @@ static int action_encrypt_luks2(struct crypt_device **cd)
|
|||||||
/* activate device */
|
/* activate device */
|
||||||
if (action_argc > 1) {
|
if (action_argc > 1) {
|
||||||
activated_name = action_argv[1];
|
activated_name = action_argv[1];
|
||||||
_set_activation_flags(&activate_flags);
|
set_activation_flags(&activate_flags);
|
||||||
r = crypt_activate_by_passphrase(*cd, activated_name, ARG_INT32(OPT_KEY_SLOT_ID), password, passwordLen, activate_flags);
|
r = crypt_activate_by_passphrase(*cd, activated_name, ARG_INT32(OPT_KEY_SLOT_ID), password, passwordLen, activate_flags);
|
||||||
if (r >= 0)
|
if (r >= 0)
|
||||||
log_std(_("%s/%s is now active and ready for online encryption.\n"), crypt_get_dir(), activated_name);
|
log_std(_("%s/%s is now active and ready for online encryption.\n"), crypt_get_dir(), activated_name);
|
||||||
@@ -3060,7 +2937,7 @@ static int action_decrypt_luks2(struct crypt_device *cd)
|
|||||||
|
|
||||||
r = tools_get_key(NULL, &password, &passwordLen,
|
r = tools_get_key(NULL, &password, &passwordLen,
|
||||||
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
ARG_UINT64(OPT_KEYFILE_OFFSET_ID), ARG_UINT32(OPT_KEYFILE_SIZE_ID), ARG_STR(OPT_KEY_FILE_ID),
|
||||||
ARG_UINT32(OPT_TIMEOUT_ID), _verify_passphrase(0), 0, cd);
|
ARG_UINT32(OPT_TIMEOUT_ID), verify_passphrase(0), 0, cd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
@@ -3117,7 +2994,7 @@ static int init_passphrase(struct keyslot_passwords *kp, size_t keyslot_password
|
|||||||
return -ENOENT;
|
return -ENOENT;
|
||||||
}
|
}
|
||||||
|
|
||||||
retry_count = _set_tries_tty();
|
retry_count = set_tries_tty();
|
||||||
|
|
||||||
while (retry_count--) {
|
while (retry_count--) {
|
||||||
r = tools_get_key(msg, &password, &passwordLen, 0, 0,
|
r = tools_get_key(msg, &password, &passwordLen, 0, 0,
|
||||||
|
|||||||
@@ -89,10 +89,6 @@ OPT_UNUSED_ID = 0, /* leave unused due to popt library */
|
|||||||
#undef ARG
|
#undef ARG
|
||||||
};
|
};
|
||||||
|
|
||||||
static struct tools_arg tool_core_args[] = { { NULL, false, CRYPT_ARG_BOOL }, /* leave unused due to popt library */
|
extern struct tools_arg tool_core_args[];
|
||||||
#define ARG(A, B, C, D, E, F, G, H) { A, false, F, G, H },
|
|
||||||
#include "cryptsetup_arg_list.h"
|
|
||||||
#undef ARG
|
|
||||||
};
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
273
src/utils_luks.c
Normal file
273
src/utils_luks.c
Normal file
@@ -0,0 +1,273 @@
|
|||||||
|
/*
|
||||||
|
* Helper utilities for LUKS2 features
|
||||||
|
*
|
||||||
|
* Copyright (C) 2018-2021 Red Hat, Inc. All rights reserved.
|
||||||
|
* Copyright (C) 2018-2021 Milan Broz
|
||||||
|
* Copyright (C) 2018-2021 Ondrej Kozina
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License
|
||||||
|
* as published by the Free Software Foundation; either version 2
|
||||||
|
* of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "cryptsetup.h"
|
||||||
|
#include "cryptsetup_args.h"
|
||||||
|
#include "utils_luks.h"
|
||||||
|
|
||||||
|
extern const char *set_pbkdf;
|
||||||
|
|
||||||
|
const char *luksType(const char *type)
|
||||||
|
{
|
||||||
|
if (type && !strcmp(type, "luks2"))
|
||||||
|
return CRYPT_LUKS2;
|
||||||
|
|
||||||
|
if (type && !strcmp(type, "luks1"))
|
||||||
|
return CRYPT_LUKS1;
|
||||||
|
|
||||||
|
if (type && !strcmp(type, "luks"))
|
||||||
|
return CRYPT_LUKS; /* NULL */
|
||||||
|
|
||||||
|
if (type && *type)
|
||||||
|
return type;
|
||||||
|
|
||||||
|
return CRYPT_LUKS; /* NULL */
|
||||||
|
}
|
||||||
|
|
||||||
|
bool isLUKS1(const char *type)
|
||||||
|
{
|
||||||
|
return type && !strcmp(type, CRYPT_LUKS1);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool isLUKS2(const char *type)
|
||||||
|
{
|
||||||
|
return type && !strcmp(type, CRYPT_LUKS2);
|
||||||
|
}
|
||||||
|
|
||||||
|
int verify_passphrase(int def)
|
||||||
|
{
|
||||||
|
/* Batch mode switch off verify - if not overridden by -y */
|
||||||
|
if (ARG_SET(OPT_VERIFY_PASSPHRASE_ID))
|
||||||
|
def = 1;
|
||||||
|
else if (ARG_SET(OPT_BATCH_MODE_ID))
|
||||||
|
def = 0;
|
||||||
|
|
||||||
|
/* Non-tty input doesn't allow verify */
|
||||||
|
if (def && !isatty(STDIN_FILENO)) {
|
||||||
|
if (ARG_SET(OPT_VERIFY_PASSPHRASE_ID))
|
||||||
|
log_err(_("Can't do passphrase verification on non-tty inputs."));
|
||||||
|
def = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return def;
|
||||||
|
}
|
||||||
|
|
||||||
|
void set_activation_flags(uint32_t *flags)
|
||||||
|
{
|
||||||
|
if (ARG_SET(OPT_READONLY_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_READONLY;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_ALLOW_DISCARDS_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_ALLOW_DISCARDS;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_PERF_SAME_CPU_CRYPT_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_SAME_CPU_CRYPT;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_PERF_SUBMIT_FROM_CRYPT_CPUS_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_SUBMIT_FROM_CRYPT_CPUS;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_PERF_NO_READ_WORKQUEUE_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_NO_READ_WORKQUEUE;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_PERF_NO_WRITE_WORKQUEUE_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_NO_WRITE_WORKQUEUE;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_INTEGRITY_NO_JOURNAL_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_NO_JOURNAL;
|
||||||
|
|
||||||
|
/* In persistent mode, we use what is set on command line */
|
||||||
|
if (ARG_SET(OPT_PERSISTENT_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_IGNORE_PERSISTENT;
|
||||||
|
|
||||||
|
/* Only for LUKS2 but ignored elsewhere */
|
||||||
|
if (ARG_SET(OPT_TEST_PASSPHRASE_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_ALLOW_UNBOUND_KEY;
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_SERIALIZE_MEMORY_HARD_PBKDF_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_SERIALIZE_MEMORY_HARD_PBKDF;
|
||||||
|
|
||||||
|
/* Only for plain */
|
||||||
|
if (ARG_SET(OPT_IV_LARGE_SECTORS_ID))
|
||||||
|
*flags |= CRYPT_ACTIVATE_IV_LARGE_SECTORS;
|
||||||
|
}
|
||||||
|
|
||||||
|
int set_pbkdf_params(struct crypt_device *cd, const char *dev_type)
|
||||||
|
{
|
||||||
|
const struct crypt_pbkdf_type *pbkdf_default;
|
||||||
|
struct crypt_pbkdf_type pbkdf = {};
|
||||||
|
|
||||||
|
pbkdf_default = crypt_get_pbkdf_default(dev_type);
|
||||||
|
if (!pbkdf_default)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
pbkdf.type = set_pbkdf ?: pbkdf_default->type;
|
||||||
|
pbkdf.hash = ARG_STR(OPT_HASH_ID) ?: pbkdf_default->hash;
|
||||||
|
pbkdf.time_ms = ARG_UINT32(OPT_ITER_TIME_ID) ?: pbkdf_default->time_ms;
|
||||||
|
if (strcmp(pbkdf.type, CRYPT_KDF_PBKDF2)) {
|
||||||
|
pbkdf.max_memory_kb = ARG_UINT32(OPT_PBKDF_MEMORY_ID) ?: pbkdf_default->max_memory_kb;
|
||||||
|
pbkdf.parallel_threads = ARG_UINT32(OPT_PBKDF_PARALLEL_ID) ?: pbkdf_default->parallel_threads;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ARG_SET(OPT_PBKDF_FORCE_ITERATIONS_ID)) {
|
||||||
|
pbkdf.iterations = ARG_UINT32(OPT_PBKDF_FORCE_ITERATIONS_ID);
|
||||||
|
pbkdf.time_ms = 0;
|
||||||
|
pbkdf.flags |= CRYPT_PBKDF_NO_BENCHMARK;
|
||||||
|
}
|
||||||
|
|
||||||
|
return crypt_set_pbkdf_type(cd, &pbkdf);
|
||||||
|
}
|
||||||
|
|
||||||
|
int set_tries_tty(void)
|
||||||
|
{
|
||||||
|
return (tools_is_stdin(ARG_STR(OPT_KEY_FILE_ID)) && isatty(STDIN_FILENO)) ? ARG_UINT32(OPT_TRIES_ID) : 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int get_adjusted_key_size(const char *cipher_mode, uint32_t default_size_bits, int integrity_keysize)
|
||||||
|
{
|
||||||
|
uint32_t keysize_bits = ARG_UINT32(OPT_KEY_SIZE_ID);
|
||||||
|
|
||||||
|
#ifdef ENABLE_LUKS_ADJUST_XTS_KEYSIZE
|
||||||
|
if (!ARG_SET(OPT_KEY_SIZE_ID) && !strncmp(cipher_mode, "xts-", 4)) {
|
||||||
|
if (default_size_bits == 128)
|
||||||
|
keysize_bits = 256;
|
||||||
|
else if (default_size_bits == 256)
|
||||||
|
keysize_bits = 512;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
return (keysize_bits ?: default_size_bits) / 8 + integrity_keysize;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* FIXME: 4MiBs is max LUKS2 mda length (including binary header).
|
||||||
|
* In future, read max allowed JSON size from config section.
|
||||||
|
*/
|
||||||
|
#define LUKS2_MAX_MDA_SIZE 0x400000
|
||||||
|
int tools_read_json_file(const char *file, char **json, size_t *json_size, bool batch_mode)
|
||||||
|
{
|
||||||
|
ssize_t ret;
|
||||||
|
int fd, block, r;
|
||||||
|
void *buf = NULL;
|
||||||
|
|
||||||
|
block = tools_signals_blocked();
|
||||||
|
if (block)
|
||||||
|
set_int_block(0);
|
||||||
|
|
||||||
|
if (tools_is_stdin(file)) {
|
||||||
|
fd = STDIN_FILENO;
|
||||||
|
log_dbg("STDIN descriptor JSON read requested.");
|
||||||
|
} else {
|
||||||
|
log_dbg("File descriptor JSON read requested.");
|
||||||
|
fd = open(file, O_RDONLY);
|
||||||
|
if (fd < 0) {
|
||||||
|
log_err(_("Failed to open file %s in read-only mode."), file);
|
||||||
|
r = -EINVAL;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
buf = malloc(LUKS2_MAX_MDA_SIZE);
|
||||||
|
if (!buf) {
|
||||||
|
r = -ENOMEM;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isatty(fd) && !batch_mode)
|
||||||
|
log_std(_("Provide valid LUKS2 token JSON:\n"));
|
||||||
|
|
||||||
|
/* we expect JSON (string) */
|
||||||
|
r = 0;
|
||||||
|
ret = read_buffer_intr(fd, buf, LUKS2_MAX_MDA_SIZE - 1, &quit);
|
||||||
|
if (ret < 0) {
|
||||||
|
r = -EIO;
|
||||||
|
log_err(_("Failed to read JSON file."));
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
check_signal(&r);
|
||||||
|
if (r) {
|
||||||
|
log_err(_("\nRead interrupted."));
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
*json_size = (size_t)ret;
|
||||||
|
*json = buf;
|
||||||
|
*(*json + ret) = '\0';
|
||||||
|
out:
|
||||||
|
if (block && !quit)
|
||||||
|
set_int_block(1);
|
||||||
|
if (fd >= 0 && fd != STDIN_FILENO)
|
||||||
|
close(fd);
|
||||||
|
if (r && buf) {
|
||||||
|
memset(buf, 0, LUKS2_MAX_MDA_SIZE);
|
||||||
|
free(buf);
|
||||||
|
}
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
int tools_write_json_file(const char *file, const char *json)
|
||||||
|
{
|
||||||
|
int block, fd, r;
|
||||||
|
size_t json_len;
|
||||||
|
ssize_t ret;
|
||||||
|
|
||||||
|
if (!json || !(json_len = strlen(json)) || json_len >= LUKS2_MAX_MDA_SIZE)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
block = tools_signals_blocked();
|
||||||
|
if (block)
|
||||||
|
set_int_block(0);
|
||||||
|
|
||||||
|
if (tools_is_stdin(file)) {
|
||||||
|
fd = STDOUT_FILENO;
|
||||||
|
log_dbg("STDOUT descriptor JSON write requested.");
|
||||||
|
} else {
|
||||||
|
log_dbg("File descriptor JSON write requested.");
|
||||||
|
fd = open(file, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (fd < 0) {
|
||||||
|
log_err(_("Failed to open file %s in write mode."), file ?: "");
|
||||||
|
r = -EINVAL;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
r = 0;
|
||||||
|
ret = write_buffer_intr(fd, json, json_len, &quit);
|
||||||
|
check_signal(&r);
|
||||||
|
if (r) {
|
||||||
|
log_err(_("\nWrite interrupted."));
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
if (ret < 0 || (size_t)ret != json_len) {
|
||||||
|
log_err(_("Failed to write JSON file."));
|
||||||
|
r = -EIO;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isatty(fd))
|
||||||
|
(void) write_buffer_intr(fd, "\n", 1, &quit);
|
||||||
|
out:
|
||||||
|
if (block && !quit)
|
||||||
|
set_int_block(1);
|
||||||
|
if (fd >=0 && fd != STDOUT_FILENO)
|
||||||
|
close(fd);
|
||||||
|
return r;
|
||||||
|
}
|
||||||
46
src/utils_luks.h
Normal file
46
src/utils_luks.h
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
/*
|
||||||
|
* Helper utilities for LUKS in cryptsetup
|
||||||
|
*
|
||||||
|
* Copyright (C) 2018-2021 Red Hat, Inc. All rights reserved.
|
||||||
|
* Copyright (C) 2018-2021 Milan Broz
|
||||||
|
* Copyright (C) 2018-2021 Ondrej Kozina
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License
|
||||||
|
* as published by the Free Software Foundation; either version 2
|
||||||
|
* of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef UTILS_LUKS_H
|
||||||
|
#define UTILS_LUKS_H
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
const char *luksType(const char *type);
|
||||||
|
|
||||||
|
bool isLUKS1(const char *type);
|
||||||
|
|
||||||
|
bool isLUKS2(const char *type);
|
||||||
|
|
||||||
|
int verify_passphrase(int def);
|
||||||
|
|
||||||
|
void set_activation_flags(uint32_t *flags);
|
||||||
|
|
||||||
|
int set_pbkdf_params(struct crypt_device *cd, const char *dev_type);
|
||||||
|
|
||||||
|
int set_tries_tty(void);
|
||||||
|
|
||||||
|
int get_adjusted_key_size(const char *cipher_mode, uint32_t default_size_bits, int integrity_keysize);
|
||||||
|
|
||||||
|
int luksFormat(struct crypt_device **r_cd, char **r_password, size_t *r_passwordLen);
|
||||||
|
|
||||||
|
#endif /* UTILS_LUKS_H */
|
||||||
@@ -1,139 +0,0 @@
|
|||||||
/*
|
|
||||||
* Helper utilities for LUKS2 features
|
|
||||||
*
|
|
||||||
* Copyright (C) 2018-2021 Red Hat, Inc. All rights reserved.
|
|
||||||
* Copyright (C) 2018-2021 Milan Broz
|
|
||||||
* Copyright (C) 2018-2021 Ondrej Kozina
|
|
||||||
*
|
|
||||||
* This program is free software; you can redistribute it and/or
|
|
||||||
* modify it under the terms of the GNU General Public License
|
|
||||||
* as published by the Free Software Foundation; either version 2
|
|
||||||
* of the License, or (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This program is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
* GNU General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU General Public License
|
|
||||||
* along with this program; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include "cryptsetup.h"
|
|
||||||
|
|
||||||
/*
|
|
||||||
* FIXME: 4MiBs is max LUKS2 mda length (including binary header).
|
|
||||||
* In future, read max allowed JSON size from config section.
|
|
||||||
*/
|
|
||||||
#define LUKS2_MAX_MDA_SIZE 0x400000
|
|
||||||
int tools_read_json_file(const char *file, char **json, size_t *json_size, bool batch_mode)
|
|
||||||
{
|
|
||||||
ssize_t ret;
|
|
||||||
int fd, block, r;
|
|
||||||
void *buf = NULL;
|
|
||||||
|
|
||||||
block = tools_signals_blocked();
|
|
||||||
if (block)
|
|
||||||
set_int_block(0);
|
|
||||||
|
|
||||||
if (tools_is_stdin(file)) {
|
|
||||||
fd = STDIN_FILENO;
|
|
||||||
log_dbg("STDIN descriptor JSON read requested.");
|
|
||||||
} else {
|
|
||||||
log_dbg("File descriptor JSON read requested.");
|
|
||||||
fd = open(file, O_RDONLY);
|
|
||||||
if (fd < 0) {
|
|
||||||
log_err(_("Failed to open file %s in read-only mode."), file);
|
|
||||||
r = -EINVAL;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
buf = malloc(LUKS2_MAX_MDA_SIZE);
|
|
||||||
if (!buf) {
|
|
||||||
r = -ENOMEM;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (isatty(fd) && !batch_mode)
|
|
||||||
log_std(_("Provide valid LUKS2 token JSON:\n"));
|
|
||||||
|
|
||||||
/* we expect JSON (string) */
|
|
||||||
r = 0;
|
|
||||||
ret = read_buffer_intr(fd, buf, LUKS2_MAX_MDA_SIZE - 1, &quit);
|
|
||||||
if (ret < 0) {
|
|
||||||
r = -EIO;
|
|
||||||
log_err(_("Failed to read JSON file."));
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
check_signal(&r);
|
|
||||||
if (r) {
|
|
||||||
log_err(_("\nRead interrupted."));
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
*json_size = (size_t)ret;
|
|
||||||
*json = buf;
|
|
||||||
*(*json + ret) = '\0';
|
|
||||||
out:
|
|
||||||
if (block && !quit)
|
|
||||||
set_int_block(1);
|
|
||||||
if (fd >= 0 && fd != STDIN_FILENO)
|
|
||||||
close(fd);
|
|
||||||
if (r && buf) {
|
|
||||||
memset(buf, 0, LUKS2_MAX_MDA_SIZE);
|
|
||||||
free(buf);
|
|
||||||
}
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
int tools_write_json_file(const char *file, const char *json)
|
|
||||||
{
|
|
||||||
int block, fd, r;
|
|
||||||
size_t json_len;
|
|
||||||
ssize_t ret;
|
|
||||||
|
|
||||||
if (!json || !(json_len = strlen(json)) || json_len >= LUKS2_MAX_MDA_SIZE)
|
|
||||||
return -EINVAL;
|
|
||||||
|
|
||||||
block = tools_signals_blocked();
|
|
||||||
if (block)
|
|
||||||
set_int_block(0);
|
|
||||||
|
|
||||||
if (tools_is_stdin(file)) {
|
|
||||||
fd = STDOUT_FILENO;
|
|
||||||
log_dbg("STDOUT descriptor JSON write requested.");
|
|
||||||
} else {
|
|
||||||
log_dbg("File descriptor JSON write requested.");
|
|
||||||
fd = open(file, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (fd < 0) {
|
|
||||||
log_err(_("Failed to open file %s in write mode."), file ?: "");
|
|
||||||
r = -EINVAL;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
r = 0;
|
|
||||||
ret = write_buffer_intr(fd, json, json_len, &quit);
|
|
||||||
check_signal(&r);
|
|
||||||
if (r) {
|
|
||||||
log_err(_("\nWrite interrupted."));
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
if (ret < 0 || (size_t)ret != json_len) {
|
|
||||||
log_err(_("Failed to write JSON file."));
|
|
||||||
r = -EIO;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (isatty(fd))
|
|
||||||
(void) write_buffer_intr(fd, "\n", 1, &quit);
|
|
||||||
out:
|
|
||||||
if (block && !quit)
|
|
||||||
set_int_block(1);
|
|
||||||
if (fd >=0 && fd != STDOUT_FILENO)
|
|
||||||
close(fd);
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user