108 lines
3.4 KiB
C
108 lines
3.4 KiB
C
/*
|
|
luksrku - Tool to remotely unlock LUKS disks using TLS.
|
|
Copyright (C) 2016-2016 Johannes Bauer
|
|
|
|
This file is part of luksrku.
|
|
|
|
luksrku is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; this program is ONLY licensed under
|
|
version 3 of the License, later versions are explicitly excluded.
|
|
|
|
luksrku is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with luksrku; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
Johannes Bauer <JohannesBauer@gmx.de>
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <stdbool.h>
|
|
|
|
#include "keyfile.h"
|
|
#include "util.h"
|
|
|
|
struct keyentry_t *last_keyentry(struct keydb_t *keydb) {
|
|
return keydb_getentry(keydb, keydb->entrycnt - 1);
|
|
}
|
|
|
|
bool add_keyslot(struct keydb_t *keydb) {
|
|
struct keyentry_t *new_db = realloc(keydb->entries, (keydb->entrycnt + 1) * sizeof(struct keyentry_t));
|
|
if (!new_db) {
|
|
return false;
|
|
}
|
|
keydb->entries = new_db;
|
|
|
|
keydb->entrycnt++;
|
|
memset(&keydb->entries[keydb->entrycnt - 1], 0, sizeof(struct keyentry_t));
|
|
|
|
return true;
|
|
}
|
|
|
|
const struct keyentry_t *keydb_find_entry_by_host_uuid(const struct keydb_t *keydb, const uint8_t *server_uuid) {
|
|
for (int i = 0; i < keydb->entrycnt; i++) {
|
|
if (!memcmp(server_uuid, keydb->entries[i].host_uuid, 16)) {
|
|
return keydb->entries + i;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
struct keyentry_t* keydb_getentry(struct keydb_t *keydb, int keyid) {
|
|
if ((keyid < 0) || (keyid >= keydb->entrycnt)) {
|
|
return NULL;
|
|
}
|
|
return keydb->entries + keyid;
|
|
}
|
|
|
|
void keydb_dump(const struct keydb_t *keydb) {
|
|
fprintf(stderr, "Dumping key database with %d host entries:\n", keydb->entrycnt);
|
|
for (int i = 0; i < keydb->entrycnt; i++) {
|
|
fprintf(stderr, " Host entry %d: host UUID ", i);
|
|
dump_uuid(stderr, keydb->entries[i].host_uuid);
|
|
fprintf(stderr, ", PSK ");
|
|
dump_hex(stderr, keydb->entries[i].psk, PSK_SIZE_BYTES);
|
|
fprintf(stderr, "\n");
|
|
|
|
for (int j = 0; j < MAX_DISKS_PER_HOST; j++) {
|
|
if (keydb->entries[i].disk_keys[j].occupied) {
|
|
fprintf(stderr, " Disk key %d: UUID ", j);
|
|
dump_uuid(stderr, keydb->entries[i].disk_keys[j].disk_uuid);
|
|
if (keydb->entries[i].disk_keys[j].passphrase_length) {
|
|
fprintf(stderr, " Key (%d bytes): ", keydb->entries[i].disk_keys[j].passphrase_length);
|
|
dump_hex(stderr, keydb->entries[i].disk_keys[j].passphrase, keydb->entries[i].disk_keys[j].passphrase_length);
|
|
}
|
|
if (keydb->entries[i].disk_keys[j].devmapper_name[0] != 0) {
|
|
fprintf(stderr, " devmapper name %s", keydb->entries[i].disk_keys[j].devmapper_name);
|
|
}
|
|
fprintf(stderr, "\n");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
unsigned int keydb_disk_key_count(const struct keydb_t *keydb) {
|
|
unsigned int cnt = 0;
|
|
for (int i = 0; i < keydb->entrycnt; i++) {
|
|
for (int j = 0; j < MAX_DISKS_PER_HOST; j++) {
|
|
if (keydb->entries[i].disk_keys[j].occupied && (keydb->entries[i].disk_keys[j].passphrase_length > 0)) {
|
|
cnt++;
|
|
}
|
|
}
|
|
}
|
|
return cnt;
|
|
}
|
|
|
|
void keydb_free(struct keydb_t *keydb) {
|
|
memset(keydb->entries, 0, keydb->entrycnt * sizeof(struct keyentry_t));
|
|
free(keydb->entries);
|
|
memset(keydb, 0, sizeof(struct keydb_t));
|
|
}
|