|
Packit |
94f725 |
/*
|
|
Packit |
94f725 |
* LUKS - Linux Unified Key Setup v2, kernel keyring token
|
|
Packit |
94f725 |
*
|
|
Packit |
94f725 |
* Copyright (C) 2016-2020 Red Hat, Inc. All rights reserved.
|
|
Packit |
94f725 |
* Copyright (C) 2016-2020 Ondrej Kozina
|
|
Packit |
94f725 |
*
|
|
Packit |
94f725 |
* This program is free software; you can redistribute it and/or
|
|
Packit |
94f725 |
* modify it under the terms of the GNU General Public License
|
|
Packit |
94f725 |
* as published by the Free Software Foundation; either version 2
|
|
Packit |
94f725 |
* of the License, or (at your option) any later version.
|
|
Packit |
94f725 |
*
|
|
Packit |
94f725 |
* This program is distributed in the hope that it will be useful,
|
|
Packit |
94f725 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
94f725 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
Packit |
94f725 |
* GNU General Public License for more details.
|
|
Packit |
94f725 |
*
|
|
Packit |
94f725 |
* You should have received a copy of the GNU General Public License
|
|
Packit |
94f725 |
* along with this program; if not, write to the Free Software
|
|
Packit |
94f725 |
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
Packit |
94f725 |
*/
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
#include <assert.h>
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
#include "luks2_internal.h"
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
static int keyring_open(struct crypt_device *cd,
|
|
Packit |
94f725 |
int token,
|
|
Packit |
94f725 |
char **buffer,
|
|
Packit |
94f725 |
size_t *buffer_len,
|
|
Packit |
94f725 |
void *usrptr __attribute__((unused)))
|
|
Packit |
94f725 |
{
|
|
Packit |
94f725 |
json_object *jobj_token, *jobj_key;
|
|
Packit |
94f725 |
struct luks2_hdr *hdr;
|
|
Packit |
94f725 |
int r;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
if (!(hdr = crypt_get_hdr(cd, CRYPT_LUKS2)))
|
|
Packit |
94f725 |
return -EINVAL;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj_token = LUKS2_get_token_jobj(hdr, token);
|
|
Packit |
94f725 |
if (!jobj_token)
|
|
Packit |
94f725 |
return -EINVAL;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
json_object_object_get_ex(jobj_token, "key_description", &jobj_key);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
r = keyring_get_passphrase(json_object_get_string(jobj_key), buffer, buffer_len);
|
|
Packit |
94f725 |
if (r == -ENOTSUP) {
|
|
Packit |
94f725 |
log_dbg(cd, "Kernel keyring features disabled.");
|
|
Packit |
94f725 |
return -EINVAL;
|
|
Packit |
94f725 |
} else if (r < 0) {
|
|
Packit |
94f725 |
log_dbg(cd, "keyring_get_passphrase failed (error %d)", r);
|
|
Packit |
94f725 |
return -EINVAL;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
return 0;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
static int keyring_validate(struct crypt_device *cd __attribute__((unused)),
|
|
Packit |
94f725 |
const char *json)
|
|
Packit |
94f725 |
{
|
|
Packit |
94f725 |
enum json_tokener_error jerr;
|
|
Packit |
94f725 |
json_object *jobj_token, *jobj_key;
|
|
Packit |
94f725 |
int r = 1;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
log_dbg(cd, "Validating keyring token json");
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj_token = json_tokener_parse_verbose(json, &jerr);
|
|
Packit |
94f725 |
if (!jobj_token) {
|
|
Packit |
94f725 |
log_dbg(cd, "Keyring token JSON parse failed.");
|
|
Packit |
94f725 |
return r;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
if (json_object_object_length(jobj_token) != 3) {
|
|
Packit |
94f725 |
log_dbg(cd, "Keyring token is expected to have exactly 3 fields.");
|
|
Packit |
94f725 |
goto out;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
if (!json_object_object_get_ex(jobj_token, "key_description", &jobj_key)) {
|
|
Packit |
94f725 |
log_dbg(cd, "missing key_description field.");
|
|
Packit |
94f725 |
goto out;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
if (!json_object_is_type(jobj_key, json_type_string)) {
|
|
Packit |
94f725 |
log_dbg(cd, "key_description is not a string.");
|
|
Packit |
94f725 |
goto out;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
/* TODO: perhaps check that key description is in '%s:%s'
|
|
Packit |
94f725 |
* format where both strings are not empty */
|
|
Packit |
94f725 |
r = !strlen(json_object_get_string(jobj_key));
|
|
Packit |
94f725 |
out:
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
return r;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
static void keyring_dump(struct crypt_device *cd, const char *json)
|
|
Packit |
94f725 |
{
|
|
Packit |
94f725 |
enum json_tokener_error jerr;
|
|
Packit |
94f725 |
json_object *jobj_token, *jobj_key;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj_token = json_tokener_parse_verbose(json, &jerr);
|
|
Packit |
94f725 |
if (!jobj_token)
|
|
Packit |
94f725 |
return;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
if (!json_object_object_get_ex(jobj_token, "key_description", &jobj_key)) {
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
return;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
log_std(cd, "\tKey description: %s\n", json_object_get_string(jobj_key));
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
int token_keyring_set(json_object **jobj_builtin_token,
|
|
Packit |
94f725 |
const void *params)
|
|
Packit |
94f725 |
{
|
|
Packit |
94f725 |
json_object *jobj_token, *jobj;
|
|
Packit |
94f725 |
const struct crypt_token_params_luks2_keyring *keyring_params = (const struct crypt_token_params_luks2_keyring *) params;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj_token = json_object_new_object();
|
|
Packit |
94f725 |
if (!jobj_token)
|
|
Packit |
94f725 |
return -ENOMEM;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj = json_object_new_string(LUKS2_TOKEN_KEYRING);
|
|
Packit |
94f725 |
if (!jobj) {
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
return -ENOMEM;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
json_object_object_add(jobj_token, "type", jobj);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj = json_object_new_array();
|
|
Packit |
94f725 |
if (!jobj) {
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
return -ENOMEM;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
json_object_object_add(jobj_token, "keyslots", jobj);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
jobj = json_object_new_string(keyring_params->key_description);
|
|
Packit |
94f725 |
if (!jobj) {
|
|
Packit |
94f725 |
json_object_put(jobj_token);
|
|
Packit |
94f725 |
return -ENOMEM;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
json_object_object_add(jobj_token, "key_description", jobj);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
*jobj_builtin_token = jobj_token;
|
|
Packit |
94f725 |
return 0;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
int token_keyring_get(json_object *jobj_token,
|
|
Packit |
94f725 |
void *params)
|
|
Packit |
94f725 |
{
|
|
Packit |
94f725 |
json_object *jobj;
|
|
Packit |
94f725 |
struct crypt_token_params_luks2_keyring *keyring_params = (struct crypt_token_params_luks2_keyring *) params;
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
json_object_object_get_ex(jobj_token, "type", &jobj);
|
|
Packit |
94f725 |
assert(!strcmp(json_object_get_string(jobj), LUKS2_TOKEN_KEYRING));
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
json_object_object_get_ex(jobj_token, "key_description", &jobj);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
keyring_params->key_description = json_object_get_string(jobj);
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
return 0;
|
|
Packit |
94f725 |
}
|
|
Packit |
94f725 |
|
|
Packit |
94f725 |
const crypt_token_handler keyring_handler = {
|
|
Packit |
94f725 |
.name = LUKS2_TOKEN_KEYRING,
|
|
Packit |
94f725 |
.open = keyring_open,
|
|
Packit |
94f725 |
.validate = keyring_validate,
|
|
Packit |
94f725 |
.dump = keyring_dump
|
|
Packit |
94f725 |
};
|