1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143
|
/*
* Declarations for encryption/security mechanisms for cryptmount
* (C)Copyright 2005-2024, RW Penney
*/
/*
This file is part of cryptmount
cryptmount is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
cryptmount is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#ifndef _ARMOUR_H
#define _ARMOUR_H
#include "cryptmount.h"
/*! \addtogroup keymgrs
* @{ */
struct keyinfo;
struct bound_tgtdefn;
struct cm_testinfo;
struct km_pw_context;
struct km_overrides;
/*! @brief Abstract interface to manager of filesystem access keys.
*
* This structure consists of a set of function points,
* defining mechanisms through which filesystem keys
* can be read from, or written to, a secure key container.
* Different key-managers may use different approaches
* to key security, e.g. using libgcrypt for a stand-alone key,
* or LUKS for key storage within a filesystem header.
*/
typedef struct keymanager {
const char *ident;
unsigned initialized;
/*! Initialize any underlying cryptographic libraries */
int (*init_algs)(void);
/*! Close-down any underlying cryptographic libraries */
int (*free_algs)(void);
/*! Attempt to attach to particular target,
installing default fields in target-definition */
int (*bind)(struct bound_tgtdefn *boundtgt, FILE *fp_key);
/*! Get properties, e.g. whether a password is needed for access: */
unsigned (*get_properties)(const struct bound_tgtdefn *boundtgt);
/*! Extract encrypted key from file: */
int (*get_key)(struct bound_tgtdefn *boundtgt,
const struct km_pw_context *pw_ctxt,
uint8_t **key, int *keylen, FILE *fp_key);
/*! Write encrypted key into file: */
int (*put_key)(struct bound_tgtdefn *boundtgt,
const struct km_pw_context *pw_ctxt,
const uint8_t *key, const int keylen, FILE *fp_key);
/*! Linked-list scaffolding: */
struct keymanager *next;
#ifdef TESTING
void (*install_testctxt)(struct cm_testinfo *context);
int (*run_tests)(void);
unsigned test_flags;
#endif
} keymanager_t;
/*! Key-manager initialization status flags: */
enum {
KM_INIT_ALGS = 0x001,
KM_TESTED = 0x800
};
/*! Key-manager key-properties flags: */
enum {
KM_PROP_HASPASSWD = 0x001, /*!< Password needed to access key */
KM_PROP_NEEDSKEYFILE = 0x002, /*!< Key-file must be present */
KM_PROP_FIXEDLOC = 0x004, /*!< Key-file cannot be renamed */
KM_PROP_FORMATTED = 0x008 /*!< Key-file has been formatted */
};
/*! Association of user-defined target-data & particular key-manager: */
typedef struct bound_tgtdefn
{
tgtdefn_t *tgt;
const keymanager_t *keymgr;
void *km_data;
} bound_tgtdefn_t;
const char **get_keymgr_list(void);
int free_keymanagers(void);
bound_tgtdefn_t *bind_tgtdefn(const tgtdefn_t *tgt);
void free_boundtgt(bound_tgtdefn_t *boundtgt);
unsigned cm_get_keyproperties(const bound_tgtdefn_t *boundtgt);
int cm_get_key(bound_tgtdefn_t *boundtgt,
const struct km_pw_context *pw_ctxt,
uint8_t **key, int *keylen);
int cm_put_key(bound_tgtdefn_t *boundtgt,
const struct km_pw_context *pw_ctxt,
const uint8_t *key, const int keylen, FILE *fp_key);
size_t mk_key_string(const uint8_t *key, const size_t keylen,
char *buff);
int sycheck_directory(const char *dirname);
int sycheck_cmtab(const char *cmtab);
int sycheck_target(const struct tgtdefn *ent);
int cm_mutex_lock(void);
int cm_mutex_unlock(void);
/** @} */
#endif /* _ARMOUR_H */
/*
* (C)Copyright 2005-2024, RW Penney
*/
|