File: utils_key_description.c

package info (click to toggle)
cryptsetup 2%3A2.8.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 20,312 kB
  • sloc: ansic: 65,883; sh: 17,680; cpp: 994; xml: 920; makefile: 495; perl: 486
file content (159 lines) | stat: -rw-r--r-- 3,936 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Password quality check wrapper
 *
 * Copyright (C) 2023-2025 Red Hat, Inc. All rights reserved.
 * Copyright (C) 2023-2025 Ondrej Kozina
 * Copyright (C) 2023-2025 Milan Broz
 */

#include "cryptsetup.h"
#include <assert.h>

int tools_parse_vk_description(const char *key_description, char **ret_key_description)
{
	char *tmp;
	int r;

	assert(key_description);
	assert(ret_key_description);

	/* apply default key type */
	if (*key_description != '%')
		r = asprintf(&tmp, "%%user:%s", key_description) < 0 ? -EINVAL : 0;
	else
		r = (tmp = strdup(key_description)) ? 0 : -ENOMEM;
	if (!r)
		*ret_key_description = tmp;

	return r;
}

static int parse_single_vk_and_keyring_description(
	struct crypt_device *cd,
	char *keyring_key_description, char **keyring_part_out, char
	**key_part_out, char **type_part_out)
{
	int r = -EINVAL;
	char *endp, *sep, *key_part, *type_part = NULL;
	char *key_part_copy = NULL, *type_part_copy = NULL, *keyring_part = NULL;

	if (!cd || !keyring_key_description)
		return -EINVAL;

	/* "::" is separator between keyring specification a key description */
	key_part = strstr(keyring_key_description, "::");
	if (!key_part)
		goto out;

	*key_part = '\0';
	key_part = key_part + 2;

	if (*key_part == '%') {
		type_part = key_part + 1;
		sep = strstr(type_part, ":");
		if (!sep)
			goto out;
		*sep = '\0';

		key_part = sep + 1;
	}

	if (*keyring_key_description == '%') {
		keyring_key_description = strstr(keyring_key_description, ":");
		if (!keyring_key_description)
			goto out;
		log_verbose(_("Type specification in --link-vk-to-keyring keyring specification is ignored."));
		keyring_key_description++;
	}

	(void)strtol(keyring_key_description, &endp, 0);

	r = 0;
	if (*keyring_key_description == '@' || !*endp)
		keyring_part = strdup(keyring_key_description);
	else
		r = asprintf(&keyring_part, "%%:%s", keyring_key_description);

	if (!keyring_part || r < 0) {
		r = -ENOMEM;
		goto out;
	}

	if (!(key_part_copy = strdup(key_part))) {
		r = -ENOMEM;
		goto out;
	}
	if (type_part && !(type_part_copy = strdup(type_part)))
		r = -ENOMEM;

out:
	if (r < 0) {
		free(keyring_part);
		free(key_part_copy);
		free(type_part_copy);
	} else {
		*keyring_part_out = keyring_part;
		*key_part_out = key_part_copy;
		*type_part_out = type_part_copy;
	}

	return r;
}

int tools_parse_vk_and_keyring_description(
	struct crypt_device *cd,
	char **keyring_key_descriptions,
	int keyring_key_links_count)
{
	int r = 0;

	char *keyring_part_out1 = NULL, *key_part_out1 = NULL, *type_part_out1 = NULL;
	char *keyring_part_out2 = NULL, *key_part_out2 = NULL, *type_part_out2 = NULL;

	if (keyring_key_links_count > 0) {
		r = parse_single_vk_and_keyring_description(cd,
				keyring_key_descriptions[0],
				&keyring_part_out1, &key_part_out1,
				&type_part_out1);
		if (r < 0)
			goto out;
	}
	if (keyring_key_links_count > 1) {
		r = parse_single_vk_and_keyring_description(cd,
				keyring_key_descriptions[1],
				&keyring_part_out2, &key_part_out2,
				&type_part_out2);
		if (r < 0)
			goto out;

		if ((type_part_out1 && type_part_out2) && strcmp(type_part_out1, type_part_out2)) {
			log_err(_("Key types have to be the same for both volume keys."));
			r = -EINVAL;
			goto out;
		}
		if ((keyring_part_out1 && keyring_part_out2) && strcmp(keyring_part_out1, keyring_part_out2)) {
			log_err(_("Both volume keys have to be linked to the same keyring."));
			r = -EINVAL;
			goto out;
		}
	}

	if (keyring_key_links_count > 0) {
		r = crypt_set_keyring_to_link(cd, key_part_out1, key_part_out2,
				type_part_out1, keyring_part_out1);
		if (r == -EAGAIN)
			log_err(_("You need to supply more key names."));
	}
out:
	if (r == -EINVAL)
		log_err(_("Invalid --link-vk-to-keyring value."));
	free(keyring_part_out1);
	free(key_part_out1);
	free(type_part_out1);
	free(keyring_part_out2);
	free(key_part_out2);
	free(type_part_out2);

	return r;
}