/* * VAS_EBOOT -- GRand Unified Bootloader * Copyright (C) 2003,2007,2010,2011,2019 Free Software Foundation, Inc. * * VAS_EBOOT is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * VAS_EBOOT is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with VAS_EBOOT. If not, see . */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef VAS_EBOOT_UTIL #include #endif VAS_EBOOT_MOD_LICENSE ("GPLv3+"); VasEBoot_cryptodisk_dev_t VasEBoot_cryptodisk_list; enum { OPTION_UUID, OPTION_ALL, OPTION_BOOT, OPTION_PASSWORD, OPTION_KEYFILE, OPTION_KEYFILE_OFFSET, OPTION_KEYFILE_SIZE, OPTION_HEADER, OPTION_PROTECTOR, OPTION_HWACCEL }; static const struct VasEBoot_arg_option options[] = { {"uuid", 'u', 0, N_("Mount by UUID."), 0, 0}, /* TRANSLATORS: It's still restricted to cryptodisks only. */ {"all", 'a', 0, N_("Mount all."), 0, 0}, {"boot", 'b', 0, N_("Mount all volumes with `boot' flag set."), 0, 0}, {"password", 'p', 0, N_("Password to open volumes."), 0, ARG_TYPE_STRING}, {"key-file", 'k', 0, N_("Key file"), 0, ARG_TYPE_STRING}, {"keyfile-offset", 'O', 0, N_("Key file offset (bytes)"), 0, ARG_TYPE_INT}, {"keyfile-size", 'S', 0, N_("Key file data size (bytes)"), 0, ARG_TYPE_INT}, {"header", 'H', 0, N_("Read header from file"), 0, ARG_TYPE_STRING}, {"protector", 'P', VAS_EBOOT_ARG_OPTION_REPEATABLE, N_("Unlock volume(s) using key protector(s)."), 0, ARG_TYPE_STRING}, {"hw-accel", 'A', 0, N_("Enable hardware acceleration."), 0, 0}, {0, 0, 0, 0, 0, 0} }; struct cryptodisk_read_hook_ctx { VasEBoot_file_t hdr_file; VasEBoot_disk_addr_t part_start; }; typedef struct cryptodisk_read_hook_ctx *cryptodisk_read_hook_ctx_t; /* Our irreducible polynom is x^128+x^7+x^2+x+1. Lowest byte of it is: */ #define GF_POLYNOM 0x87 static inline int GF_PER_SECTOR (const struct VasEBoot_cryptodisk *dev) { return 1U << (dev->log_sector_size - VAS_EBOOT_CRYPTODISK_GF_LOG_BYTES); } static VasEBoot_cryptodisk_t cryptodisk_list = NULL; static VasEBoot_uint8_t last_cryptodisk_id = 0; static void gf_mul_x (VasEBoot_uint8_t *g) { int over = 0, over2 = 0; unsigned j; for (j = 0; j < VAS_EBOOT_CRYPTODISK_GF_BYTES; j++) { over2 = !!(g[j] & 0x80); g[j] <<= 1; g[j] |= over; over = over2; } if (over) g[0] ^= GF_POLYNOM; } static void gf_mul_x_be (VasEBoot_uint8_t *g) { int over = 0, over2 = 0; int j; for (j = (int) VAS_EBOOT_CRYPTODISK_GF_BYTES - 1; j >= 0; j--) { over2 = !!(g[j] & 0x80); g[j] <<= 1; g[j] |= over; over = over2; } if (over) g[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] ^= GF_POLYNOM; } static void gf_mul_be (VasEBoot_uint8_t *o, const VasEBoot_uint8_t *a, const VasEBoot_uint8_t *b) { unsigned i; VasEBoot_uint8_t t[VAS_EBOOT_CRYPTODISK_GF_BYTES]; VasEBoot_memset (o, 0, VAS_EBOOT_CRYPTODISK_GF_BYTES); VasEBoot_memcpy (t, b, VAS_EBOOT_CRYPTODISK_GF_BYTES); for (i = 0; i < VAS_EBOOT_CRYPTODISK_GF_SIZE; i++) { if (((a[VAS_EBOOT_CRYPTODISK_GF_BYTES - i / VAS_EBOOT_CHAR_BIT - 1] >> (i % VAS_EBOOT_CHAR_BIT))) & 1) VasEBoot_crypto_xor (o, o, t, VAS_EBOOT_CRYPTODISK_GF_BYTES); gf_mul_x_be (t); } } static gcry_err_code_t VasEBoot_crypto_pcbc_decrypt (VasEBoot_crypto_cipher_handle_t cipher, void *out, void *in, VasEBoot_size_t size, void *iv) { VasEBoot_uint8_t *inptr, *outptr, *end; VasEBoot_uint8_t ivt[VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE]; VasEBoot_size_t blocksize; if (!cipher->cipher->decrypt) return GPG_ERR_NOT_SUPPORTED; blocksize = cipher->cipher->blocksize; if (blocksize == 0 || (((blocksize - 1) & blocksize) != 0) || ((size & (blocksize - 1)) != 0)) return GPG_ERR_INV_ARG; if (blocksize > VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE) return GPG_ERR_INV_ARG; end = (VasEBoot_uint8_t *) in + size; for (inptr = in, outptr = out; inptr < end; inptr += blocksize, outptr += blocksize) { VasEBoot_memcpy (ivt, inptr, blocksize); cipher->cipher->decrypt (cipher->ctx, outptr, inptr); VasEBoot_crypto_xor (outptr, outptr, iv, blocksize); VasEBoot_crypto_xor (iv, ivt, outptr, blocksize); } return GPG_ERR_NO_ERROR; } static gcry_err_code_t VasEBoot_crypto_pcbc_encrypt (VasEBoot_crypto_cipher_handle_t cipher, void *out, void *in, VasEBoot_size_t size, void *iv) { VasEBoot_uint8_t *inptr, *outptr, *end; VasEBoot_uint8_t ivt[VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE]; VasEBoot_size_t blocksize; if (!cipher->cipher->encrypt) return GPG_ERR_NOT_SUPPORTED; blocksize = cipher->cipher->blocksize; if (blocksize > VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE) return GPG_ERR_INV_ARG; if (blocksize == 0 || (((blocksize - 1) & blocksize) != 0) || ((size & (blocksize - 1)) != 0)) return GPG_ERR_INV_ARG; end = (VasEBoot_uint8_t *) in + size; for (inptr = in, outptr = out; inptr < end; inptr += blocksize, outptr += blocksize) { VasEBoot_memcpy (ivt, inptr, blocksize); VasEBoot_crypto_xor (outptr, outptr, iv, blocksize); cipher->cipher->encrypt (cipher->ctx, outptr, inptr); VasEBoot_crypto_xor (iv, ivt, outptr, blocksize); } return GPG_ERR_NO_ERROR; } struct lrw_sector { VasEBoot_uint8_t low[VAS_EBOOT_CRYPTODISK_GF_BYTES]; VasEBoot_uint8_t high[VAS_EBOOT_CRYPTODISK_GF_BYTES]; VasEBoot_uint8_t low_byte, low_byte_c; }; static void generate_lrw_sector (struct lrw_sector *sec, const struct VasEBoot_cryptodisk *dev, const VasEBoot_uint8_t *iv) { VasEBoot_uint8_t idx[VAS_EBOOT_CRYPTODISK_GF_BYTES]; VasEBoot_uint16_t c; int j; VasEBoot_memcpy (idx, iv, VAS_EBOOT_CRYPTODISK_GF_BYTES); sec->low_byte = (idx[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] & (GF_PER_SECTOR (dev) - 1)); sec->low_byte_c = (((GF_PER_SECTOR (dev) - 1) & ~sec->low_byte) + 1); idx[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] &= ~(GF_PER_SECTOR (dev) - 1); gf_mul_be (sec->low, dev->lrw_key, idx); if (!sec->low_byte) return; c = idx[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] + GF_PER_SECTOR (dev); if (c & 0x100) { for (j = VAS_EBOOT_CRYPTODISK_GF_BYTES - 2; j >= 0; j--) { idx[j]++; if (idx[j] != 0) break; } } idx[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] = c; gf_mul_be (sec->high, dev->lrw_key, idx); } static void __attribute__ ((unused)) lrw_xor (const struct lrw_sector *sec, const struct VasEBoot_cryptodisk *dev, VasEBoot_uint8_t *b) { unsigned i; for (i = 0; i < sec->low_byte_c * VAS_EBOOT_CRYPTODISK_GF_BYTES; i += VAS_EBOOT_CRYPTODISK_GF_BYTES) VasEBoot_crypto_xor (b + i, b + i, sec->low, VAS_EBOOT_CRYPTODISK_GF_BYTES); VasEBoot_crypto_xor (b, b, dev->lrw_precalc + VAS_EBOOT_CRYPTODISK_GF_BYTES * sec->low_byte, sec->low_byte_c * VAS_EBOOT_CRYPTODISK_GF_BYTES); if (!sec->low_byte) return; for (i = sec->low_byte_c * VAS_EBOOT_CRYPTODISK_GF_BYTES; i < (1U << dev->log_sector_size); i += VAS_EBOOT_CRYPTODISK_GF_BYTES) VasEBoot_crypto_xor (b + i, b + i, sec->high, VAS_EBOOT_CRYPTODISK_GF_BYTES); VasEBoot_crypto_xor (b + sec->low_byte_c * VAS_EBOOT_CRYPTODISK_GF_BYTES, b + sec->low_byte_c * VAS_EBOOT_CRYPTODISK_GF_BYTES, dev->lrw_precalc, sec->low_byte * VAS_EBOOT_CRYPTODISK_GF_BYTES); } static gcry_err_code_t VasEBoot_cryptodisk_endecrypt (struct VasEBoot_cryptodisk *dev, VasEBoot_uint8_t * data, VasEBoot_size_t len, VasEBoot_disk_addr_t sector, VasEBoot_size_t log_sector_size, int do_encrypt) { VasEBoot_size_t i; gcry_err_code_t err; if (dev->cipher->cipher->blocksize > VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE) return GPG_ERR_INV_ARG; /* The only mode without IV. */ if (dev->mode == VAS_EBOOT_CRYPTODISK_MODE_ECB && !dev->rekey) return (do_encrypt ? VasEBoot_crypto_ecb_encrypt (dev->cipher, data, data, len) : VasEBoot_crypto_ecb_decrypt (dev->cipher, data, data, len)); for (i = 0; i < len; i += ((VasEBoot_size_t) 1 << log_sector_size)) { VasEBoot_size_t sz = ((dev->cipher->cipher->blocksize + sizeof (VasEBoot_uint32_t) - 1) / sizeof (VasEBoot_uint32_t)); VasEBoot_uint32_t iv[(VAS_EBOOT_CRYPTO_MAX_CIPHER_BLOCKSIZE + 3) / 4]; if (dev->rekey) { VasEBoot_uint64_t zone = sector >> dev->rekey_shift; if (zone != dev->last_rekey) { err = dev->rekey (dev, zone); if (err) return err; dev->last_rekey = zone; } } VasEBoot_memset (iv, 0, sizeof (iv)); switch (dev->mode_iv) { case VAS_EBOOT_CRYPTODISK_MODE_IV_NULL: break; case VAS_EBOOT_CRYPTODISK_MODE_IV_BYTECOUNT64_HASH: { VasEBoot_uint64_t tmp; void *ctx; ctx = VasEBoot_zalloc (dev->iv_hash->contextsize); if (!ctx) return GPG_ERR_OUT_OF_MEMORY; tmp = VasEBoot_cpu_to_le64 (sector << log_sector_size); dev->iv_hash->init (ctx, 0); dev->iv_hash->write (ctx, dev->iv_prefix, dev->iv_prefix_len); dev->iv_hash->write (ctx, &tmp, sizeof (tmp)); dev->iv_hash->final (ctx); VasEBoot_memcpy (iv, dev->iv_hash->read (ctx), sizeof (iv)); VasEBoot_free (ctx); } break; case VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN64: case VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN: /* * The IV is a 32 or 64 bit value of the dm-crypt native sector * number. If using 32 bit IV mode, zero out the most significant * 32 bits. */ { VasEBoot_uint64_t iv64; iv64 = VasEBoot_cpu_to_le64 (sector << (log_sector_size - VAS_EBOOT_CRYPTODISK_IV_LOG_SIZE)); VasEBoot_set_unaligned64 (iv, iv64); if (dev->mode_iv == VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN) iv[1] = 0; } break; case VAS_EBOOT_CRYPTODISK_MODE_IV_BYTECOUNT64: /* The IV is the 64 bit byte offset of the sector. */ iv[1] = VasEBoot_cpu_to_le32 (sector >> (VAS_EBOOT_TYPE_BITS (iv[1]) - log_sector_size)); iv[0] = VasEBoot_cpu_to_le32 ((sector << log_sector_size) & VAS_EBOOT_TYPE_U_MAX (iv[0])); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_BENBI: { VasEBoot_uint64_t num = (sector << dev->benbi_log) + 1; iv[sz - 2] = VasEBoot_cpu_to_be32 (num >> VAS_EBOOT_TYPE_BITS (iv[0])); iv[sz - 1] = VasEBoot_cpu_to_be32 (num & VAS_EBOOT_TYPE_U_MAX (iv[0])); } break; case VAS_EBOOT_CRYPTODISK_MODE_IV_ESSIV: iv[0] = VasEBoot_cpu_to_le32 (sector & VAS_EBOOT_TYPE_U_MAX (iv[0])); err = VasEBoot_crypto_ecb_encrypt (dev->essiv_cipher, iv, iv, dev->cipher->cipher->blocksize); if (err) return err; } switch (dev->mode) { case VAS_EBOOT_CRYPTODISK_MODE_CBC: if (do_encrypt) err = VasEBoot_crypto_cbc_encrypt (dev->cipher, data + i, data + i, ((VasEBoot_size_t) 1 << log_sector_size), iv); else err = VasEBoot_crypto_cbc_decrypt (dev->cipher, data + i, data + i, ((VasEBoot_size_t) 1 << log_sector_size), iv); if (err) return err; break; case VAS_EBOOT_CRYPTODISK_MODE_PCBC: if (do_encrypt) err = VasEBoot_crypto_pcbc_encrypt (dev->cipher, data + i, data + i, ((VasEBoot_size_t) 1 << log_sector_size), iv); else err = VasEBoot_crypto_pcbc_decrypt (dev->cipher, data + i, data + i, ((VasEBoot_size_t) 1 << log_sector_size), iv); if (err) return err; break; case VAS_EBOOT_CRYPTODISK_MODE_XTS: { unsigned j; err = VasEBoot_crypto_ecb_encrypt (dev->secondary_cipher, iv, iv, dev->cipher->cipher->blocksize); if (err) return err; for (j = 0; j < (1U << log_sector_size); j += dev->cipher->cipher->blocksize) { VasEBoot_crypto_xor (data + i + j, data + i + j, iv, dev->cipher->cipher->blocksize); if (do_encrypt) err = VasEBoot_crypto_ecb_encrypt (dev->cipher, data + i + j, data + i + j, dev->cipher->cipher->blocksize); else err = VasEBoot_crypto_ecb_decrypt (dev->cipher, data + i + j, data + i + j, dev->cipher->cipher->blocksize); if (err) return err; VasEBoot_crypto_xor (data + i + j, data + i + j, iv, dev->cipher->cipher->blocksize); gf_mul_x ((VasEBoot_uint8_t *) iv); } } break; case VAS_EBOOT_CRYPTODISK_MODE_LRW: { struct lrw_sector sec; generate_lrw_sector (&sec, dev, (VasEBoot_uint8_t *) iv); lrw_xor (&sec, dev, data + i); if (do_encrypt) err = VasEBoot_crypto_ecb_encrypt (dev->cipher, data + i, data + i, (1U << log_sector_size)); else err = VasEBoot_crypto_ecb_decrypt (dev->cipher, data + i, data + i, (1U << log_sector_size)); if (err) return err; lrw_xor (&sec, dev, data + i); } break; case VAS_EBOOT_CRYPTODISK_MODE_ECB: if (do_encrypt) err = VasEBoot_crypto_ecb_encrypt (dev->cipher, data + i, data + i, (1U << log_sector_size)); else err = VasEBoot_crypto_ecb_decrypt (dev->cipher, data + i, data + i, (1U << log_sector_size)); if (err) return err; break; default: return GPG_ERR_NOT_IMPLEMENTED; } sector++; } return GPG_ERR_NO_ERROR; } gcry_err_code_t VasEBoot_cryptodisk_decrypt (struct VasEBoot_cryptodisk *dev, VasEBoot_uint8_t * data, VasEBoot_size_t len, VasEBoot_disk_addr_t sector, VasEBoot_size_t log_sector_size) { return VasEBoot_cryptodisk_endecrypt (dev, data, len, sector, log_sector_size, 0); } VasEBoot_err_t VasEBoot_cryptodisk_setcipher (VasEBoot_cryptodisk_t crypt, const char *ciphername, const char *ciphermode) { const char *cipheriv = NULL; VasEBoot_crypto_cipher_handle_t cipher = NULL, secondary_cipher = NULL; VasEBoot_crypto_cipher_handle_t essiv_cipher = NULL; const gcry_md_spec_t *essiv_hash = NULL; const struct gcry_cipher_spec *ciph; VasEBoot_cryptodisk_mode_t mode; VasEBoot_cryptodisk_mode_iv_t mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN64; int benbi_log = 0; VasEBoot_err_t ret = VAS_EBOOT_ERR_NONE; ciph = VasEBoot_crypto_lookup_cipher_by_name (ciphername); if (!ciph) { ret = VasEBoot_error (VAS_EBOOT_ERR_FILE_NOT_FOUND, "Cipher %s isn't available", ciphername); goto err; } /* Configure the cipher used for the bulk data. */ cipher = VasEBoot_crypto_cipher_open (ciph); if (!cipher) { ret = VasEBoot_error (VAS_EBOOT_ERR_FILE_NOT_FOUND, "Cipher %s could not be initialized", ciphername); goto err; } /* Configure the cipher mode. */ if (VasEBoot_strcmp (ciphermode, "ecb") == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_ECB; mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN; cipheriv = NULL; } else if (VasEBoot_strcmp (ciphermode, "plain") == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_CBC; mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN; cipheriv = NULL; } else if (VasEBoot_memcmp (ciphermode, "cbc-", sizeof ("cbc-") - 1) == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_CBC; cipheriv = ciphermode + sizeof ("cbc-") - 1; } else if (VasEBoot_memcmp (ciphermode, "pcbc-", sizeof ("pcbc-") - 1) == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_PCBC; cipheriv = ciphermode + sizeof ("pcbc-") - 1; } else if (VasEBoot_memcmp (ciphermode, "xts-", sizeof ("xts-") - 1) == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_XTS; cipheriv = ciphermode + sizeof ("xts-") - 1; secondary_cipher = VasEBoot_crypto_cipher_open (ciph); if (!secondary_cipher) { ret = VasEBoot_error (VAS_EBOOT_ERR_FILE_NOT_FOUND, "Secondary cipher %s isn't available", ciphername); goto err; } if (cipher->cipher->blocksize != VAS_EBOOT_CRYPTODISK_GF_BYTES) { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unsupported XTS block size: %" PRIuVAS_EBOOT_SIZE, cipher->cipher->blocksize); goto err; } if (secondary_cipher->cipher->blocksize != VAS_EBOOT_CRYPTODISK_GF_BYTES) { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unsupported XTS block size: %" PRIuVAS_EBOOT_SIZE, secondary_cipher->cipher->blocksize); goto err; } } else if (VasEBoot_memcmp (ciphermode, "lrw-", sizeof ("lrw-") - 1) == 0) { mode = VAS_EBOOT_CRYPTODISK_MODE_LRW; cipheriv = ciphermode + sizeof ("lrw-") - 1; if (cipher->cipher->blocksize != VAS_EBOOT_CRYPTODISK_GF_BYTES) { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unsupported LRW block size: %" PRIuVAS_EBOOT_SIZE, cipher->cipher->blocksize); goto err; } } else { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unknown cipher mode: %s", ciphermode); goto err; } if (cipheriv == NULL) ; else if (VasEBoot_memcmp (cipheriv, "plain64", sizeof ("plain64") - 1) == 0) mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN64; else if (VasEBoot_memcmp (cipheriv, "plain", sizeof ("plain") - 1) == 0) mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN; else if (VasEBoot_memcmp (cipheriv, "benbi", sizeof ("benbi") - 1) == 0) { if (cipher->cipher->blocksize & (cipher->cipher->blocksize - 1) || cipher->cipher->blocksize == 0) VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unsupported benbi blocksize: %" PRIuVAS_EBOOT_SIZE, cipher->cipher->blocksize); /* FIXME should we return an error here? */ for (benbi_log = 0; (cipher->cipher->blocksize << benbi_log) < VAS_EBOOT_DISK_SECTOR_SIZE; benbi_log++); mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_BENBI; } else if (VasEBoot_memcmp (cipheriv, "null", sizeof ("null") - 1) == 0) mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_NULL; else if (VasEBoot_memcmp (cipheriv, "essiv:", sizeof ("essiv:") - 1) == 0) { const char *hash_str = cipheriv + 6; mode_iv = VAS_EBOOT_CRYPTODISK_MODE_IV_ESSIV; /* Configure the hash and cipher used for ESSIV. */ essiv_hash = VasEBoot_crypto_lookup_md_by_name (hash_str); if (!essiv_hash) { ret = VasEBoot_error (VAS_EBOOT_ERR_FILE_NOT_FOUND, "Couldn't load %s hash", hash_str); goto err; } essiv_cipher = VasEBoot_crypto_cipher_open (ciph); if (!essiv_cipher) { ret = VasEBoot_error (VAS_EBOOT_ERR_FILE_NOT_FOUND, "Couldn't load %s cipher", ciphername); goto err; } } else { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "Unknown IV mode: %s", cipheriv); goto err; } crypt->cipher = cipher; crypt->benbi_log = benbi_log; crypt->mode = mode; crypt->mode_iv = mode_iv; crypt->secondary_cipher = secondary_cipher; crypt->essiv_cipher = essiv_cipher; crypt->essiv_hash = essiv_hash; err: if (ret) { VasEBoot_crypto_cipher_close (cipher); VasEBoot_crypto_cipher_close (secondary_cipher); } return ret; } gcry_err_code_t VasEBoot_cryptodisk_setkey (VasEBoot_cryptodisk_t dev, VasEBoot_uint8_t *key, VasEBoot_size_t keysize) { gcry_err_code_t err; int real_keysize; real_keysize = keysize; if (dev->mode == VAS_EBOOT_CRYPTODISK_MODE_XTS) real_keysize /= 2; if (dev->mode == VAS_EBOOT_CRYPTODISK_MODE_LRW) real_keysize -= dev->cipher->cipher->blocksize; /* Set the PBKDF2 output as the cipher key. */ err = VasEBoot_crypto_cipher_set_key (dev->cipher, key, real_keysize); if (err) return err; VasEBoot_memcpy (dev->key, key, keysize); dev->keysize = keysize; /* Configure ESSIV if necessary. */ if (dev->mode_iv == VAS_EBOOT_CRYPTODISK_MODE_IV_ESSIV) { VasEBoot_size_t essiv_keysize = dev->essiv_hash->mdlen; VasEBoot_uint8_t hashed_key[VAS_EBOOT_CRYPTO_MAX_MDLEN]; if (essiv_keysize > VAS_EBOOT_CRYPTO_MAX_MDLEN) return GPG_ERR_INV_ARG; VasEBoot_crypto_hash (dev->essiv_hash, hashed_key, key, keysize); err = VasEBoot_crypto_cipher_set_key (dev->essiv_cipher, hashed_key, essiv_keysize); if (err) return err; } if (dev->mode == VAS_EBOOT_CRYPTODISK_MODE_XTS) { err = VasEBoot_crypto_cipher_set_key (dev->secondary_cipher, key + real_keysize, keysize / 2); if (err) return err; } if (dev->mode == VAS_EBOOT_CRYPTODISK_MODE_LRW) { unsigned i; VasEBoot_uint8_t idx[VAS_EBOOT_CRYPTODISK_GF_BYTES]; VasEBoot_free (dev->lrw_precalc); VasEBoot_memcpy (dev->lrw_key, key + real_keysize, dev->cipher->cipher->blocksize); dev->lrw_precalc = VasEBoot_malloc ((1U << dev->log_sector_size)); if (!dev->lrw_precalc) return GPG_ERR_OUT_OF_MEMORY; VasEBoot_memset (idx, 0, VAS_EBOOT_CRYPTODISK_GF_BYTES); for (i = 0; i < (1U << dev->log_sector_size); i += VAS_EBOOT_CRYPTODISK_GF_BYTES) { idx[VAS_EBOOT_CRYPTODISK_GF_BYTES - 1] = i / VAS_EBOOT_CRYPTODISK_GF_BYTES; gf_mul_be (dev->lrw_precalc + i, idx, dev->lrw_key); } } return GPG_ERR_NO_ERROR; } static int VasEBoot_cryptodisk_iterate (VasEBoot_disk_dev_iterate_hook_t hook, void *hook_data, VasEBoot_disk_pull_t pull) { VasEBoot_cryptodisk_t i; if (pull != VAS_EBOOT_DISK_PULL_NONE) return 0; for (i = cryptodisk_list; i != NULL; i = i->next) { char buf[30]; VasEBoot_snprintf (buf, sizeof (buf), "crypto%lu", i->id); if (hook (buf, hook_data)) return 1; } return VAS_EBOOT_ERR_NONE; } static VasEBoot_err_t VasEBoot_cryptodisk_open (const char *name, VasEBoot_disk_t disk) { VasEBoot_cryptodisk_t dev; if (VasEBoot_memcmp (name, "crypto", sizeof ("crypto") - 1) != 0) return VasEBoot_error (VAS_EBOOT_ERR_UNKNOWN_DEVICE, "No such device"); if (VasEBoot_memcmp (name, "cryptouuid/", sizeof ("cryptouuid/") - 1) == 0) { for (dev = cryptodisk_list; dev != NULL; dev = dev->next) if (VasEBoot_uuidcasecmp (name + sizeof ("cryptouuid/") - 1, dev->uuid, sizeof (dev->uuid)) == 0) break; } else { unsigned long id = VasEBoot_strtoul (name + sizeof ("crypto") - 1, 0, 0); if (VasEBoot_errno) return VasEBoot_error (VAS_EBOOT_ERR_UNKNOWN_DEVICE, "No such device"); /* Search for requested device in the list of CRYPTODISK devices. */ for (dev = cryptodisk_list; dev != NULL; dev = dev->next) if (dev->id == id) break; } if (!dev) return VasEBoot_error (VAS_EBOOT_ERR_UNKNOWN_DEVICE, "No such device"); #ifdef VAS_EBOOT_UTIL if (dev->cheat) { VasEBoot_uint64_t cheat_dev_size; unsigned int cheat_log_sector_size; if (!VAS_EBOOT_UTIL_FD_IS_VALID (dev->cheat_fd)) dev->cheat_fd = VasEBoot_util_fd_open (dev->cheat, VAS_EBOOT_UTIL_FD_O_RDONLY); if (!VAS_EBOOT_UTIL_FD_IS_VALID (dev->cheat_fd)) return VasEBoot_error (VAS_EBOOT_ERR_IO, N_("cannot open `%s': %s"), dev->cheat, VasEBoot_util_fd_strerror ()); /* Use the sector size and count of the cheat device. */ cheat_dev_size = VasEBoot_util_get_fd_size (dev->cheat_fd, dev->cheat, &cheat_log_sector_size); if (cheat_dev_size == -1) { const char *errmsg = VasEBoot_util_fd_strerror (); VasEBoot_util_fd_close (dev->cheat_fd); dev->cheat_fd = VAS_EBOOT_UTIL_FD_INVALID; return VasEBoot_error (VAS_EBOOT_ERR_IO, N_("failed to query size of device `%s': %s"), dev->cheat, errmsg); } dev->log_sector_size = cheat_log_sector_size; dev->total_sectors = cheat_dev_size >> cheat_log_sector_size; } #endif if (!dev->source_disk) { VasEBoot_dprintf ("cryptodisk", "Opening device %s\n", name); /* Try to open the source disk and populate the requested disk. */ dev->source_disk = VasEBoot_disk_open (dev->source); if (!dev->source_disk) return VasEBoot_errno; } disk->data = dev; disk->log_sector_size = dev->log_sector_size; disk->total_sectors = dev->total_sectors; disk->max_agglomerate = VAS_EBOOT_DISK_MAX_MAX_AGGLOMERATE; disk->id = dev->id; dev->ref++; return VAS_EBOOT_ERR_NONE; } static void VasEBoot_cryptodisk_close (VasEBoot_disk_t disk) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; VasEBoot_dprintf ("cryptodisk", "Closing disk\n"); dev->ref--; if (dev->ref != 0) return; #ifdef VAS_EBOOT_UTIL if (dev->cheat) { VasEBoot_util_fd_close (dev->cheat_fd); dev->cheat_fd = VAS_EBOOT_UTIL_FD_INVALID; } #endif VasEBoot_disk_close (dev->source_disk); dev->source_disk = NULL; } static VasEBoot_err_t VasEBoot_cryptodisk_read (VasEBoot_disk_t disk, VasEBoot_disk_addr_t sector, VasEBoot_size_t size, char *buf) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; VasEBoot_err_t err; gcry_err_code_t gcry_err; #ifdef VAS_EBOOT_UTIL if (dev->cheat) { int r; r = VasEBoot_util_fd_seek (dev->cheat_fd, sector << disk->log_sector_size); if (r) return VasEBoot_error (VAS_EBOOT_ERR_BAD_DEVICE, N_("cannot seek `%s': %s"), dev->cheat, VasEBoot_util_fd_strerror ()); if (VasEBoot_util_fd_read (dev->cheat_fd, buf, size << disk->log_sector_size) != (ssize_t) (size << disk->log_sector_size)) return VasEBoot_error (VAS_EBOOT_ERR_READ_ERROR, N_("cannot read `%s': %s"), dev->cheat, VasEBoot_util_fd_strerror ()); return VAS_EBOOT_ERR_NONE; } #endif VasEBoot_dprintf ("cryptodisk", "Reading %" PRIuVAS_EBOOT_SIZE " sectors from sector 0x%" PRIxVAS_EBOOT_UINT64_T " with offset of %" PRIuVAS_EBOOT_UINT64_T "\n", size, sector, dev->offset_sectors); err = VasEBoot_disk_read (dev->source_disk, VasEBoot_disk_from_native_sector (disk, sector + dev->offset_sectors), 0, size << disk->log_sector_size, buf); if (err) { VasEBoot_dprintf ("cryptodisk", "VasEBoot_disk_read failed with error %d\n", err); return err; } gcry_err = VasEBoot_cryptodisk_endecrypt (dev, (VasEBoot_uint8_t *) buf, size << disk->log_sector_size, sector, dev->log_sector_size, 0); return VasEBoot_crypto_gcry_error (gcry_err); } static VasEBoot_err_t VasEBoot_cryptodisk_write (VasEBoot_disk_t disk, VasEBoot_disk_addr_t sector, VasEBoot_size_t size, const char *buf) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; gcry_err_code_t gcry_err; char *tmp; VasEBoot_err_t err; #ifdef VAS_EBOOT_UTIL if (dev->cheat) { int r; r = VasEBoot_util_fd_seek (dev->cheat_fd, sector << disk->log_sector_size); if (r) return VasEBoot_error (VAS_EBOOT_ERR_BAD_DEVICE, N_("cannot seek `%s': %s"), dev->cheat, VasEBoot_util_fd_strerror ()); if (VasEBoot_util_fd_write (dev->cheat_fd, buf, size << disk->log_sector_size) != (ssize_t) (size << disk->log_sector_size)) return VasEBoot_error (VAS_EBOOT_ERR_READ_ERROR, N_("cannot read `%s': %s"), dev->cheat, VasEBoot_util_fd_strerror ()); return VAS_EBOOT_ERR_NONE; } #endif tmp = VasEBoot_malloc (size << disk->log_sector_size); if (!tmp) return VasEBoot_errno; VasEBoot_memcpy (tmp, buf, size << disk->log_sector_size); VasEBoot_dprintf ("cryptodisk", "Writing %" PRIuVAS_EBOOT_SIZE " sectors to sector 0x%" PRIxVAS_EBOOT_UINT64_T " with offset of %" PRIuVAS_EBOOT_UINT64_T "\n", size, sector, dev->offset_sectors); gcry_err = VasEBoot_cryptodisk_endecrypt (dev, (VasEBoot_uint8_t *) tmp, size << disk->log_sector_size, sector, disk->log_sector_size, 1); if (gcry_err) { VasEBoot_free (tmp); return VasEBoot_crypto_gcry_error (gcry_err); } /* Since ->write was called so disk.mod is loaded but be paranoid */ sector = sector + dev->offset_sectors; if (VasEBoot_disk_write_weak) err = VasEBoot_disk_write_weak (dev->source_disk, VasEBoot_disk_from_native_sector (disk, sector), 0, size << disk->log_sector_size, tmp); else err = VasEBoot_error (VAS_EBOOT_ERR_BUG, "disk.mod not loaded"); VasEBoot_free (tmp); return err; } #ifdef VAS_EBOOT_UTIL static VasEBoot_disk_memberlist_t VasEBoot_cryptodisk_memberlist (VasEBoot_disk_t disk) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; VasEBoot_disk_memberlist_t list = NULL; list = VasEBoot_malloc (sizeof (*list)); if (list) { list->disk = dev->source_disk; list->next = NULL; } return list; } #endif static void cryptodisk_cleanup (void) { #if 0 VasEBoot_cryptodisk_t dev = cryptodisk_list; VasEBoot_cryptodisk_t tmp; while (dev != NULL) { VasEBoot_free (dev->source); VasEBoot_free (dev->cipher); VasEBoot_free (dev->secondary_cipher); VasEBoot_free (dev->essiv_cipher); tmp = dev->next; VasEBoot_free (dev); dev = tmp; } #endif } VasEBoot_err_t VasEBoot_cryptodisk_insert (VasEBoot_cryptodisk_t newdev, const char *name, VasEBoot_disk_t source) { newdev->source = VasEBoot_strdup (name); if (!newdev->source) return VasEBoot_errno; newdev->id = last_cryptodisk_id++; newdev->source_id = source->id; newdev->source_dev_id = source->dev->id; newdev->partition_start = VasEBoot_partition_get_start (source->partition); newdev->next = cryptodisk_list; cryptodisk_list = newdev; return VAS_EBOOT_ERR_NONE; } VasEBoot_cryptodisk_t VasEBoot_cryptodisk_get_by_uuid (const char *uuid) { VasEBoot_cryptodisk_t dev; for (dev = cryptodisk_list; dev != NULL; dev = dev->next) if (VasEBoot_uuidcasecmp (dev->uuid, uuid, sizeof (dev->uuid)) == 0) return dev; return NULL; } VasEBoot_cryptodisk_t VasEBoot_cryptodisk_get_by_source_disk (VasEBoot_disk_t disk) { VasEBoot_cryptodisk_t dev; for (dev = cryptodisk_list; dev != NULL; dev = dev->next) if (dev->source_id == disk->id && dev->source_dev_id == disk->dev->id) if ((disk->partition && VasEBoot_partition_get_start (disk->partition) == dev->partition_start) || (!disk->partition && dev->partition_start == 0)) return dev; return NULL; } #ifdef VAS_EBOOT_UTIL VasEBoot_err_t VasEBoot_cryptodisk_cheat_insert (VasEBoot_cryptodisk_t newdev, const char *name, VasEBoot_disk_t source, const char *cheat) { newdev->cheat = VasEBoot_strdup (cheat); newdev->source = VasEBoot_strdup (name); if (!newdev->source || !newdev->cheat) { VasEBoot_free (newdev->source); VasEBoot_free (newdev->cheat); return VasEBoot_errno; } newdev->cheat_fd = VAS_EBOOT_UTIL_FD_INVALID; newdev->source_id = source->id; newdev->source_dev_id = source->dev->id; newdev->partition_start = VasEBoot_partition_get_start (source->partition); newdev->id = last_cryptodisk_id++; newdev->next = cryptodisk_list; cryptodisk_list = newdev; return VAS_EBOOT_ERR_NONE; } void VasEBoot_util_cryptodisk_get_abstraction (VasEBoot_disk_t disk, void (*cb) (const char *val, void *data), void *data) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; cb ("cryptodisk", data); cb (dev->modname, data); if (dev->cipher) cb (dev->cipher->cipher->modname, data); if (dev->secondary_cipher) cb (dev->secondary_cipher->cipher->modname, data); if (dev->essiv_cipher) cb (dev->essiv_cipher->cipher->modname, data); if (dev->hash) cb (dev->hash->modname, data); if (dev->essiv_hash) cb (dev->essiv_hash->modname, data); if (dev->iv_hash) cb (dev->iv_hash->modname, data); } const char * VasEBoot_util_cryptodisk_get_uuid (VasEBoot_disk_t disk) { VasEBoot_cryptodisk_t dev = (VasEBoot_cryptodisk_t) disk->data; return dev->uuid; } #endif static void cryptodisk_close (VasEBoot_cryptodisk_t dev) { VasEBoot_crypto_cipher_close (dev->cipher); VasEBoot_crypto_cipher_close (dev->secondary_cipher); VasEBoot_crypto_cipher_close (dev->essiv_cipher); VasEBoot_free (dev); } static VasEBoot_err_t cryptodisk_read_hook (VasEBoot_disk_addr_t sector, unsigned offset, unsigned length, char *buf, void *data) { cryptodisk_read_hook_ctx_t ctx = data; if (ctx->hdr_file == NULL) return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, N_("header file not found")); if (VasEBoot_file_seek (ctx->hdr_file, ((sector - ctx->part_start) * VAS_EBOOT_DISK_SECTOR_SIZE) + offset) == (VasEBoot_off_t) -1) return VasEBoot_errno; if (VasEBoot_file_read (ctx->hdr_file, buf, length) != (VasEBoot_ssize_t) length) { if (VasEBoot_errno == VAS_EBOOT_ERR_NONE) VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, N_("header file too small")); return VasEBoot_errno; } return VAS_EBOOT_ERR_NONE; } static VasEBoot_cryptodisk_t VasEBoot_cryptodisk_scan_device_real (const char *name, VasEBoot_disk_t source, VasEBoot_cryptomount_args_t cargs) { VasEBoot_err_t ret = VAS_EBOOT_ERR_NONE; VasEBoot_cryptodisk_t dev; VasEBoot_cryptodisk_dev_t cr; int i; struct cryptodisk_read_hook_ctx read_hook_data = {0}; int askpass = 0; char *part = NULL; dev = VasEBoot_cryptodisk_get_by_source_disk (source); if (dev) return dev; if (cargs->hdr_file != NULL) { /* * Set read hook to read header from a file instead of the source disk. * Disk read hooks are executed after the data has been read from the * disk. This is okay, because the read hook is given the read buffer * before its sent back to the caller. In this case, the hook can then * overwrite the data read from the disk device with data from the * header file sent in as the read hook data. This is transparent to the * read caller. Since the callers of this function have just opened the * source disk, there are no current read hooks, so there's no need to * save/restore them nor consider if they should be called or not. * * This hook assumes that the header is at the start of the volume, which * is not the case for some formats (eg. GELI). It also can only be used * with formats where the detached header file can be written to the * first blocks of the volume and the volume could still be unlocked. * So the header file can not be formatted differently from the on-disk * header. If these assumpts are not met, detached header file processing * must be specially handled in the cryptodisk backend module. * * This hook needs only be set once and will be called potentially many * times by a backend. This is fine because of the assumptions mentioned * and the read hook reads from absolute offsets and is stateless. */ read_hook_data.part_start = VasEBoot_partition_get_start (source->partition); read_hook_data.hdr_file = cargs->hdr_file; source->read_hook = cryptodisk_read_hook; source->read_hook_data = (void *) &read_hook_data; } FOR_CRYPTODISK_DEVS (cr) { /* * Loop through each cryptodisk backend that is registered (ie. loaded). * If the scan returns NULL, then the backend being tested does not * recognize the source disk, so move on to the next backend. */ dev = cr->scan (source, cargs); if (VasEBoot_errno) goto error_no_close; if (!dev) continue; break; } if (dev == NULL) { VasEBoot_error (VAS_EBOOT_ERR_BAD_MODULE, "no cryptodisk module can handle this device"); goto error_no_close; } if (cargs->protectors) { for (i = 0; cargs->protectors[i]; i++) { if (cargs->key_cache[i].invalid) continue; if (cargs->key_cache[i].key == NULL) { ret = VasEBoot_key_protector_recover_key (cargs->protectors[i], &cargs->key_cache[i].key, &cargs->key_cache[i].key_len); if (ret != VAS_EBOOT_ERR_NONE) { if (VasEBoot_errno) { VasEBoot_print_error (); VasEBoot_errno = VAS_EBOOT_ERR_NONE; } VasEBoot_dprintf ("cryptodisk", "failed to recover a key from key protector " "%s, will not try it again for any other " "disks, if any, during this invocation of " "cryptomount\n", cargs->protectors[i]); cargs->key_cache[i].invalid = 1; continue; } } cargs->key_data = cargs->key_cache[i].key; cargs->key_len = cargs->key_cache[i].key_len; ret = cr->recover_key (source, dev, cargs); if (ret != VAS_EBOOT_ERR_NONE) { /* Reset key data to trigger the passphrase prompt later */ cargs->key_data = NULL; cargs->key_len = 0; part = VasEBoot_partition_get_name (source->partition); VasEBoot_dprintf ("cryptodisk", "recovered a key from key protector %s but it " "failed to unlock %s%s%s (%s)\n", cargs->protectors[i], source->name, source->partition != NULL ? "," : "", part != NULL ? part : N_("UNKNOWN"), dev->uuid); VasEBoot_free (part); continue; } else { ret = VasEBoot_cryptodisk_insert (dev, name, source); if (ret != VAS_EBOOT_ERR_NONE) goto error; #ifndef VAS_EBOOT_UTIL VasEBoot_cli_set_auth_needed (); #endif goto cleanup; } } part = VasEBoot_partition_get_name (source->partition); VasEBoot_error (VAS_EBOOT_ERR_ACCESS_DENIED, N_("no key protector provided a usable key for %s%s%s (%s)"), source->name, source->partition != NULL ? "," : "", part != NULL ? part : N_("UNKNOWN"), dev->uuid); VasEBoot_free (part); } if (cargs->key_len) { ret = cr->recover_key (source, dev, cargs); if (ret != VAS_EBOOT_ERR_NONE) goto error; } else { /* Get the passphrase from the user, if no key data. */ unsigned long tries = 3; const char *tries_env; /* * Print the error from key protectors and clear VasEBoot_errno. * * Since '--protector' cannot coexist with '--password' and * '--key-file', in case key protectors fail, only * "cargs->key_len == 0" is expected, so cryptomount falls back * here to request the passphrase. * * To avoid the error from key protectors stops the further code, * print the error to notify the user why key protectors fail and * clear VasEBoot_errno to have a fresh start. */ if (VasEBoot_errno != VAS_EBOOT_ERR_NONE) { VasEBoot_print_error (); VasEBoot_errno = VAS_EBOOT_ERR_NONE; } askpass = 1; cargs->key_data = VasEBoot_malloc (VAS_EBOOT_CRYPTODISK_MAX_PASSPHRASE); if (cargs->key_data == NULL) goto error_no_close; tries_env = VasEBoot_env_get ("cryptodisk_passphrase_tries"); if (tries_env != NULL && tries_env[0] != '\0') { unsigned long tries_env_val; const char *p; tries_env_val = VasEBoot_strtoul (tries_env, &p, 0); if (*p == '\0' && tries_env_val != ~0UL) tries = tries_env_val; else VasEBoot_printf_ (N_("Invalid cryptodisk_passphrase_tries value `%s'. Defaulting to %lu.\n"), tries_env, tries); } for (; tries > 0; tries--) { part = VasEBoot_partition_get_name (source->partition); VasEBoot_printf_ (N_("Enter passphrase for %s%s%s (%s): "), source->name, source->partition != NULL ? "," : "", part != NULL ? part : N_("UNKNOWN"), dev->uuid); VasEBoot_free (part); if (!VasEBoot_password_get ((char *) cargs->key_data, VAS_EBOOT_CRYPTODISK_MAX_PASSPHRASE)) { VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "passphrase not supplied"); goto error; } cargs->key_len = VasEBoot_strlen ((char *) cargs->key_data); ret = cr->recover_key (source, dev, cargs); if (ret == VAS_EBOOT_ERR_NONE) break; if (ret != VAS_EBOOT_ERR_ACCESS_DENIED || tries == 1) goto error; VasEBoot_puts_ (N_("Invalid passphrase.")); /* * Since recover_key() calls a function that returns VasEBoot_errno, * a leftover error value from a previously rejected passphrase * will trigger a phantom failure. We therefore clear it before * trying a new passphrase. */ VasEBoot_errno = VAS_EBOOT_ERR_NONE; } } ret = VasEBoot_cryptodisk_insert (dev, name, source); if (ret != VAS_EBOOT_ERR_NONE) goto error; goto cleanup; error: cryptodisk_close (dev); error_no_close: dev = NULL; cleanup: if (cargs->hdr_file != NULL) source->read_hook = NULL; if (askpass) { VasEBoot_memset (cargs->key_data, 0, cargs->key_len); cargs->key_len = 0; VasEBoot_free (cargs->key_data); } return dev; } #ifdef VAS_EBOOT_UTIL #include VasEBoot_err_t VasEBoot_cryptodisk_cheat_mount (const char *sourcedev, const char *cheat) { VasEBoot_err_t err; VasEBoot_cryptodisk_t dev; VasEBoot_cryptodisk_dev_t cr; VasEBoot_disk_t source; struct VasEBoot_cryptomount_args cargs = {0}; /* Try to open disk. */ source = VasEBoot_disk_open (sourcedev); if (!source) return VasEBoot_errno; dev = VasEBoot_cryptodisk_get_by_source_disk (source); if (dev) { VasEBoot_disk_close (source); return VAS_EBOOT_ERR_NONE; } FOR_CRYPTODISK_DEVS (cr) { dev = cr->scan (source, &cargs); if (VasEBoot_errno) return VasEBoot_errno; if (!dev) continue; VasEBoot_util_info ("cheatmounted %s (%s) at %s", sourcedev, dev->modname, cheat); err = VasEBoot_cryptodisk_cheat_insert (dev, sourcedev, source, cheat); VasEBoot_disk_close (source); if (err) VasEBoot_free (dev); return VAS_EBOOT_ERR_NONE; } VasEBoot_disk_close (source); return VAS_EBOOT_ERR_NONE; } #endif static int VasEBoot_cryptodisk_scan_device (const char *name, void *data) { int ret = 0; VasEBoot_disk_t source; VasEBoot_cryptodisk_t dev; VasEBoot_cryptomount_args_t cargs = data; VasEBoot_errno = VAS_EBOOT_ERR_NONE; /* Try to open disk. */ source = VasEBoot_disk_open (name); if (!source) { VasEBoot_print_error (); return 0; } dev = VasEBoot_cryptodisk_scan_device_real (name, source, cargs); if (dev) { ret = (cargs->search_uuid != NULL && VasEBoot_uuidcasecmp (cargs->search_uuid, dev->uuid, sizeof (dev->uuid)) == 0); goto cleanup; } /* * Do not print error when err is VAS_EBOOT_ERR_BAD_MODULE to avoid many unhelpful * error messages. */ if (VasEBoot_errno == VAS_EBOOT_ERR_BAD_MODULE) VasEBoot_error_pop (); if (cargs->search_uuid != NULL) /* Push error onto stack to save for cryptomount. */ VasEBoot_error_push (); else VasEBoot_print_error (); cleanup: VasEBoot_disk_close (source); return ret; } static void VasEBoot_cryptodisk_clear_key_cache (struct VasEBoot_cryptomount_args *cargs) { int i; if (cargs->key_cache == NULL || cargs->protectors == NULL) return; for (i = 0; cargs->protectors[i]; i++) { if (cargs->key_cache[i].key) VasEBoot_memset (cargs->key_cache[i].key, 0, cargs->key_cache[i].key_len); VasEBoot_free (cargs->key_cache[i].key); } VasEBoot_free (cargs->key_cache); } static VasEBoot_err_t __VasEBoot_cmd_cryptomount (VasEBoot_extcmd_context_t ctxt, int argc, char **args) { struct VasEBoot_arg_list *state = ctxt->state; struct VasEBoot_cryptomount_args cargs = {0}; if (argc < 1 && !state[OPTION_ALL].set && !state[OPTION_BOOT].set) return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "device name required"); if (VasEBoot_cryptodisk_list == NULL) return VasEBoot_error (VAS_EBOOT_ERR_BAD_MODULE, "no cryptodisk modules loaded"); if (state[OPTION_PASSWORD].set && state[OPTION_PROTECTOR].set) /* password and key protector */ return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "a password and a key protector cannot both be set"); if (state[OPTION_KEYFILE].set && state[OPTION_PROTECTOR].set) /* key file and key protector */ return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "a key file and a key protector cannot both be set"); if (state[OPTION_PASSWORD].set) /* password */ { cargs.key_data = (VasEBoot_uint8_t *) state[OPTION_PASSWORD].arg; cargs.key_len = VasEBoot_strlen (state[OPTION_PASSWORD].arg); } if (state[OPTION_KEYFILE].set) /* keyfile */ { const char *p = NULL; VasEBoot_file_t keyfile; unsigned long long keyfile_offset = 0, keyfile_size = 0; if (state[OPTION_KEYFILE_OFFSET].set) /* keyfile-offset */ { VasEBoot_errno = VAS_EBOOT_ERR_NONE; keyfile_offset = VasEBoot_strtoull (state[OPTION_KEYFILE_OFFSET].arg, &p, 0); if (state[OPTION_KEYFILE_OFFSET].arg[0] == '\0' || *p != '\0') return VasEBoot_error (VasEBoot_errno, N_("non-numeric or invalid keyfile offset `%s'"), state[OPTION_KEYFILE_OFFSET].arg); } if (state[OPTION_KEYFILE_SIZE].set) /* keyfile-size */ { VasEBoot_errno = VAS_EBOOT_ERR_NONE; keyfile_size = VasEBoot_strtoull (state[OPTION_KEYFILE_SIZE].arg, &p, 0); if (state[OPTION_KEYFILE_SIZE].arg[0] == '\0' || *p != '\0') return VasEBoot_error (VasEBoot_errno, N_("non-numeric or invalid keyfile size `%s'"), state[OPTION_KEYFILE_SIZE].arg); if (keyfile_size == 0) return VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, N_("key file size is 0")); if (keyfile_size > VAS_EBOOT_CRYPTODISK_MAX_KEYFILE_SIZE) return VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, N_("key file size exceeds maximum (%d)"), VAS_EBOOT_CRYPTODISK_MAX_KEYFILE_SIZE); } keyfile = VasEBoot_file_open (state[OPTION_KEYFILE].arg, VAS_EBOOT_FILE_TYPE_CRYPTODISK_ENCRYPTION_KEY); if (keyfile == NULL) return VasEBoot_errno; if (keyfile_offset > keyfile->size) return VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, N_("Keyfile offset, %llu, is greater than " "keyfile size, %llu"), keyfile_offset, (unsigned long long) keyfile->size); if (VasEBoot_file_seek (keyfile, (VasEBoot_off_t) keyfile_offset) == (VasEBoot_off_t) -1) return VasEBoot_errno; if (keyfile_size != 0) { if (keyfile_size > (keyfile->size - keyfile_offset)) return VasEBoot_error (VAS_EBOOT_ERR_FILE_READ_ERROR, N_("keyfile is too small: requested %llu bytes," " but the file only has %" PRIuVAS_EBOOT_UINT64_T " bytes left at offset %llu"), keyfile_size, (VasEBoot_off_t) (keyfile->size - keyfile_offset), keyfile_offset); cargs.key_len = keyfile_size; } else cargs.key_len = keyfile->size - keyfile_offset; cargs.key_data = VasEBoot_malloc (cargs.key_len); if (cargs.key_data == NULL) return VAS_EBOOT_ERR_OUT_OF_MEMORY; if (VasEBoot_file_read (keyfile, cargs.key_data, cargs.key_len) != (VasEBoot_ssize_t) cargs.key_len) return VasEBoot_error (VAS_EBOOT_ERR_FILE_READ_ERROR, (N_("failed to read key file"))); } if (state[OPTION_HEADER].set) /* header */ { if (state[OPTION_UUID].set) return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, N_("cannot use UUID lookup with detached header")); cargs.hdr_file = VasEBoot_file_open (state[OPTION_HEADER].arg, VAS_EBOOT_FILE_TYPE_CRYPTODISK_DETACHED_HEADER); if (cargs.hdr_file == NULL) return VasEBoot_errno; } if (state[OPTION_PROTECTOR].set) /* key protector(s) */ { cargs.key_cache = VasEBoot_calloc (state[OPTION_PROTECTOR].set, sizeof (*cargs.key_cache)); if (cargs.key_cache == NULL) return VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_MEMORY, "no memory for key protector key cache"); cargs.protectors = state[OPTION_PROTECTOR].args; } if (state[OPTION_UUID].set) /* uuid */ { int found_uuid; VasEBoot_cryptodisk_t dev; dev = VasEBoot_cryptodisk_get_by_uuid (args[0]); if (dev) { VasEBoot_cryptodisk_clear_key_cache (&cargs); VasEBoot_dprintf ("cryptodisk", "already mounted as crypto%lu\n", dev->id); return VAS_EBOOT_ERR_NONE; } cargs.check_boot = state[OPTION_BOOT].set; cargs.search_uuid = args[0]; found_uuid = VasEBoot_device_iterate (&VasEBoot_cryptodisk_scan_device, &cargs); VasEBoot_cryptodisk_clear_key_cache (&cargs); if (found_uuid) return VAS_EBOOT_ERR_NONE; else if (VasEBoot_errno == VAS_EBOOT_ERR_NONE) { /* * Try to pop the next error on the stack. If there is not one, then * no device matched the given UUID. */ VasEBoot_error_pop (); if (VasEBoot_errno == VAS_EBOOT_ERR_NONE) return VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "no such cryptodisk found, perhaps a needed disk or cryptodisk module is not loaded"); } return VasEBoot_errno; } else if (state[OPTION_ALL].set || (argc == 0 && state[OPTION_BOOT].set)) /* -a|-b */ { cargs.check_boot = state[OPTION_BOOT].set; VasEBoot_device_iterate (&VasEBoot_cryptodisk_scan_device, &cargs); VasEBoot_cryptodisk_clear_key_cache (&cargs); return VAS_EBOOT_ERR_NONE; } else { VasEBoot_disk_t disk; VasEBoot_cryptodisk_t dev; char *diskname; char *disklast = NULL; VasEBoot_size_t len; cargs.check_boot = state[OPTION_BOOT].set; diskname = args[0]; len = VasEBoot_strlen (diskname); if (len && diskname[0] == '(' && diskname[len - 1] == ')') { disklast = &diskname[len - 1]; *disklast = '\0'; diskname++; } disk = VasEBoot_disk_open (diskname); if (!disk) { VasEBoot_cryptodisk_clear_key_cache (&cargs); if (disklast) *disklast = ')'; return VasEBoot_errno; } dev = VasEBoot_cryptodisk_get_by_source_disk (disk); if (dev) { VasEBoot_dprintf ("cryptodisk", "already mounted as crypto%lu\n", dev->id); VasEBoot_disk_close (disk); VasEBoot_cryptodisk_clear_key_cache (&cargs); if (disklast) *disklast = ')'; return VAS_EBOOT_ERR_NONE; } dev = VasEBoot_cryptodisk_scan_device_real (diskname, disk, &cargs); VasEBoot_cryptodisk_clear_key_cache (&cargs); VasEBoot_disk_close (disk); if (disklast) *disklast = ')'; return (dev == NULL) ? VasEBoot_errno : VAS_EBOOT_ERR_NONE; } } static VasEBoot_err_t VasEBoot_cmd_cryptomount (VasEBoot_extcmd_context_t ctxt, int argc, char **args) { struct VasEBoot_arg_list *state = ctxt->state; VasEBoot_err_t err; if (state[OPTION_HWACCEL].set) VasEBoot_enable_gcry_hwf (); err = __VasEBoot_cmd_cryptomount (ctxt, argc, args); if (state[OPTION_HWACCEL].set) VasEBoot_reset_gcry_hwf (); return err; } static struct VasEBoot_disk_dev VasEBoot_cryptodisk_dev = { .name = "cryptodisk", .id = VAS_EBOOT_DISK_DEVICE_CRYPTODISK_ID, .disk_iterate = VasEBoot_cryptodisk_iterate, .disk_open = VasEBoot_cryptodisk_open, .disk_close = VasEBoot_cryptodisk_close, .disk_read = VasEBoot_cryptodisk_read, .disk_write = VasEBoot_cryptodisk_write, #ifdef VAS_EBOOT_UTIL .disk_memberlist = VasEBoot_cryptodisk_memberlist, #endif .next = 0 }; static char hex (VasEBoot_uint8_t val) { if (val < 10) return '0' + val; return 'a' + val - 10; } /* Open a file named NAME and initialize FILE. */ static char * luks_script_get (VasEBoot_size_t *sz) { VasEBoot_cryptodisk_t i; VasEBoot_size_t size = 0, mul; char *ptr, *ret; *sz = 0; for (i = cryptodisk_list; i != NULL; i = i->next) if (VasEBoot_strcmp (i->modname, "luks") == 0 || VasEBoot_strcmp (i->modname, "luks2") == 0) { /* * Add space in the line for (in order) spaces, cipher mode, cipher IV * mode, sector offset, sector size and the trailing newline. This is * an upper bound on the size of this data. There are 15 extra bytes * in an earlier version of this code that are unaccounted for. It is * left in the calculations in case it is needed. At worst, its short- * lived wasted space. * * 60 = 5 + 5 + 8 + 20 + 6 + 1 + 15 */ if (VasEBoot_add (size, VasEBoot_strlen (i->modname), &size) || VasEBoot_add (size, sizeof ("_mount") + 60, &size) || VasEBoot_add (size, VasEBoot_strlen (i->uuid), &size) || VasEBoot_add (size, VasEBoot_strlen (i->cipher->cipher->name), &size) || VasEBoot_mul (i->keysize, 2, &mul) || VasEBoot_add (size, mul, &size)) { VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, "overflow detected while obtaining size of luks script"); return 0; } if (i->essiv_hash) { if (VasEBoot_add (size, VasEBoot_strlen (i->essiv_hash->name), &size)) { VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, "overflow detected while obtaining size of luks script"); return 0; } } } if (VasEBoot_add (size, 1, &size)) { VasEBoot_error (VAS_EBOOT_ERR_OUT_OF_RANGE, "overflow detected while obtaining size of luks script"); return 0; } ret = VasEBoot_malloc (size); if (!ret) return 0; ptr = ret; for (i = cryptodisk_list; i != NULL; i = i->next) if (VasEBoot_strcmp (i->modname, "luks") == 0 || VasEBoot_strcmp (i->modname, "luks2") == 0) { unsigned j; const char *iptr; ptr = VasEBoot_stpcpy (ptr, i->modname); ptr = VasEBoot_stpcpy (ptr, "_mount "); ptr = VasEBoot_stpcpy (ptr, i->uuid); *ptr++ = ' '; ptr += VasEBoot_snprintf (ptr, 21, "%" PRIxVAS_EBOOT_OFFSET, i->offset_sectors); *ptr++ = ' '; ptr += VasEBoot_snprintf (ptr, 7, "%u", 1 << i->log_sector_size); *ptr++ = ' '; for (iptr = i->cipher->cipher->name; *iptr; iptr++) *ptr++ = VasEBoot_tolower (*iptr); switch (i->mode) { case VAS_EBOOT_CRYPTODISK_MODE_ECB: ptr = VasEBoot_stpcpy (ptr, "-ecb"); break; case VAS_EBOOT_CRYPTODISK_MODE_CBC: ptr = VasEBoot_stpcpy (ptr, "-cbc"); break; case VAS_EBOOT_CRYPTODISK_MODE_PCBC: ptr = VasEBoot_stpcpy (ptr, "-pcbc"); break; case VAS_EBOOT_CRYPTODISK_MODE_XTS: ptr = VasEBoot_stpcpy (ptr, "-xts"); break; case VAS_EBOOT_CRYPTODISK_MODE_LRW: ptr = VasEBoot_stpcpy (ptr, "-lrw"); break; } switch (i->mode_iv) { case VAS_EBOOT_CRYPTODISK_MODE_IV_NULL: ptr = VasEBoot_stpcpy (ptr, "-null"); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN: ptr = VasEBoot_stpcpy (ptr, "-plain"); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_PLAIN64: ptr = VasEBoot_stpcpy (ptr, "-plain64"); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_BENBI: ptr = VasEBoot_stpcpy (ptr, "-benbi"); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_ESSIV: ptr = VasEBoot_stpcpy (ptr, "-essiv:"); ptr = VasEBoot_stpcpy (ptr, i->essiv_hash->name); break; case VAS_EBOOT_CRYPTODISK_MODE_IV_BYTECOUNT64: case VAS_EBOOT_CRYPTODISK_MODE_IV_BYTECOUNT64_HASH: break; } *ptr++ = ' '; for (j = 0; j < i->keysize; j++) { *ptr++ = hex (i->key[j] >> 4); *ptr++ = hex (i->key[j] & 0xf); } *ptr++ = '\n'; } *ptr = '\0'; *sz = ptr - ret; return ret; } #ifdef VAS_EBOOT_MACHINE_EFI VasEBoot_err_t VasEBoot_cryptodisk_challenge_password (void) { VasEBoot_cryptodisk_t cr_dev; for (cr_dev = cryptodisk_list; cr_dev != NULL; cr_dev = cr_dev->next) { VasEBoot_cryptodisk_dev_t cr; VasEBoot_disk_t source = NULL; VasEBoot_err_t ret = VAS_EBOOT_ERR_NONE; VasEBoot_cryptodisk_t dev = NULL; char *part = NULL; struct VasEBoot_cryptomount_args cargs = {0}; cargs.check_boot = 0; cargs.search_uuid = cr_dev->uuid; source = VasEBoot_disk_open (cr_dev->source); if (source == NULL) { ret = VasEBoot_errno; goto error_out; } FOR_CRYPTODISK_DEVS (cr) { dev = cr->scan (source, &cargs); if (VasEBoot_errno) { ret = VasEBoot_errno; goto error_out; } if (dev == NULL) continue; break; } if (dev == NULL) { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_MODULE, "no cryptodisk module can handle this device"); goto error_out; } part = VasEBoot_partition_get_name (source->partition); VasEBoot_printf_ (N_("Enter passphrase for %s%s%s (%s): "), source->name, source->partition != NULL ? "," : "", part != NULL ? part : N_("UNKNOWN"), cr_dev->uuid); VasEBoot_free (part); cargs.key_data = VasEBoot_malloc (VAS_EBOOT_CRYPTODISK_MAX_PASSPHRASE); if (cargs.key_data == NULL) { ret = VasEBoot_errno; goto error_out; } if (!VasEBoot_password_get ((char *) cargs.key_data, VAS_EBOOT_CRYPTODISK_MAX_PASSPHRASE)) { ret = VasEBoot_error (VAS_EBOOT_ERR_BAD_ARGUMENT, "passphrase not supplied"); goto error_out; } cargs.key_len = VasEBoot_strlen ((char *) cargs.key_data); ret = cr->recover_key (source, dev, &cargs); error_out: VasEBoot_disk_close (source); if (dev != NULL) cryptodisk_close (dev); if (cargs.key_data) { VasEBoot_memset (cargs.key_data, 0, cargs.key_len); VasEBoot_free (cargs.key_data); } return ret; } return VAS_EBOOT_ERR_NONE; } void VasEBoot_cryptodisk_erasesecrets (void) { VasEBoot_cryptodisk_t i; VasEBoot_uint8_t *buf; buf = VasEBoot_zalloc (VAS_EBOOT_CRYPTODISK_MAX_KEYLEN); if (buf == NULL) VasEBoot_fatal ("VasEBoot_cryptodisk_erasesecrets: cannot allocate memory"); for (i = cryptodisk_list; i != NULL; i = i->next) if (VasEBoot_cryptodisk_setkey (i, buf, i->keysize)) VasEBoot_fatal ("VasEBoot_cryptodisk_erasesecrets: cannot erase secrets for %s", i->source); else VasEBoot_printf ("Erased crypto secrets for %s\n", i->source); /* * Unfortunately, there is no way to "force unmount" a given disk, it may * have mounted "child" disks as well, e.g., an LVM volume. So, this * function MUST be called when there is no way back, e.g., when exiting. * Otherwise, subsequent read calls for a cryptodisk will return garbage. */ VasEBoot_free (buf); } #endif /* VAS_EBOOT_MACHINE_EFI */ struct VasEBoot_procfs_entry luks_script = { .name = "luks_script", .get_contents = luks_script_get }; static VasEBoot_extcmd_t cmd; VAS_EBOOT_MOD_INIT (cryptodisk) { VasEBoot_disk_dev_register (&VasEBoot_cryptodisk_dev); cmd = VasEBoot_register_extcmd ("cryptomount", VasEBoot_cmd_cryptomount, 0, N_("[ [-p password] | [-k keyfile" " [-O keyoffset] [-S keysize] ] ] [-H file]" " [-P protector [-P protector ...]] | [-A]" " "), N_("Mount a crypto device."), options); VasEBoot_procfs_register ("luks_script", &luks_script); } VAS_EBOOT_MOD_FINI (cryptodisk) { #ifdef VAS_EBOOT_MACHINE_EFI VasEBoot_cryptodisk_erasesecrets (); #endif VasEBoot_disk_dev_unregister (&VasEBoot_cryptodisk_dev); cryptodisk_cleanup (); VasEBoot_unregister_extcmd (cmd); VasEBoot_procfs_unregister (&luks_script); }