2 * LUKS - Linux Unified Key Setup v2, LUKS1 conversion code
4 * Copyright (C) 2015-2023 Red Hat, Inc. All rights reserved.
5 * Copyright (C) 2015-2023 Ondrej Kozina
6 * Copyright (C) 2015-2023 Milan Broz
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version 2
11 * of the License, or (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23 #include "luks2_internal.h"
24 #include "../luks1/luks.h"
25 #include "../luks1/af.h"
27 /* This differs from LUKS_check_cipher() that it does not check dm-crypt fallback. */
28 int LUKS2_check_cipher(struct crypt_device *cd,
31 const char *cipher_mode)
34 struct crypt_storage *s;
35 char buf[SECTOR_SIZE], *empty_key;
37 log_dbg(cd, "Checking if cipher %s-%s is usable (storage wrapper).", cipher, cipher_mode);
39 empty_key = crypt_safe_alloc(keylength);
43 /* No need to get KEY quality random but it must avoid known weak keys. */
44 r = crypt_random_get(cd, empty_key, keylength, CRYPT_RND_NORMAL);
48 r = crypt_storage_init(&s, SECTOR_SIZE, cipher, cipher_mode, empty_key, keylength, false);
52 memset(buf, 0, sizeof(buf));
53 r = crypt_storage_decrypt(s, 0, sizeof(buf), buf);
54 crypt_storage_destroy(s);
56 crypt_safe_free(empty_key);
57 crypt_safe_memzero(buf, sizeof(buf));
61 static int json_luks1_keyslot(const struct luks_phdr *hdr_v1, int keyslot, struct json_object **keyslot_object)
63 char *base64_str, cipher[LUKS_CIPHERNAME_L+LUKS_CIPHERMODE_L];
65 struct json_object *keyslot_obj, *field, *jobj_kdf, *jobj_af, *jobj_area;
66 uint64_t offset, area_size, length;
69 keyslot_obj = json_object_new_object();
70 json_object_object_add(keyslot_obj, "type", json_object_new_string("luks2"));
71 json_object_object_add(keyslot_obj, "key_size", json_object_new_int64(hdr_v1->keyBytes));
74 jobj_kdf = json_object_new_object();
75 json_object_object_add(jobj_kdf, "type", json_object_new_string(CRYPT_KDF_PBKDF2));
76 json_object_object_add(jobj_kdf, "hash", json_object_new_string(hdr_v1->hashSpec));
77 json_object_object_add(jobj_kdf, "iterations", json_object_new_int64(hdr_v1->keyblock[keyslot].passwordIterations));
79 r = crypt_base64_encode(&base64_str, &base64_len, hdr_v1->keyblock[keyslot].passwordSalt, LUKS_SALTSIZE);
81 json_object_put(keyslot_obj);
82 json_object_put(jobj_kdf);
85 field = json_object_new_string_len(base64_str, base64_len);
87 json_object_object_add(jobj_kdf, "salt", field);
88 json_object_object_add(keyslot_obj, "kdf", jobj_kdf);
91 jobj_af = json_object_new_object();
92 json_object_object_add(jobj_af, "type", json_object_new_string("luks1"));
93 json_object_object_add(jobj_af, "hash", json_object_new_string(hdr_v1->hashSpec));
94 /* stripes field ignored, fixed to LUKS_STRIPES (4000) */
95 json_object_object_add(jobj_af, "stripes", json_object_new_int(LUKS_STRIPES));
96 json_object_object_add(keyslot_obj, "af", jobj_af);
99 jobj_area = json_object_new_object();
100 json_object_object_add(jobj_area, "type", json_object_new_string("raw"));
102 /* encryption algorithm field */
103 if (*hdr_v1->cipherMode != '\0') {
104 if (snprintf(cipher, sizeof(cipher), "%s-%s", hdr_v1->cipherName, hdr_v1->cipherMode) < 0) {
105 json_object_put(keyslot_obj);
106 json_object_put(jobj_area);
109 json_object_object_add(jobj_area, "encryption", json_object_new_string(cipher));
111 json_object_object_add(jobj_area, "encryption", json_object_new_string(hdr_v1->cipherName));
114 if (LUKS_keyslot_area(hdr_v1, keyslot, &offset, &length)) {
115 json_object_put(keyslot_obj);
116 json_object_put(jobj_area);
119 area_size = size_round_up(length, 4096);
120 json_object_object_add(jobj_area, "key_size", json_object_new_int(hdr_v1->keyBytes));
121 json_object_object_add(jobj_area, "offset", crypt_jobj_new_uint64(offset));
122 json_object_object_add(jobj_area, "size", crypt_jobj_new_uint64(area_size));
123 json_object_object_add(keyslot_obj, "area", jobj_area);
125 *keyslot_object = keyslot_obj;
129 static int json_luks1_keyslots(const struct luks_phdr *hdr_v1, struct json_object **keyslots_object)
132 struct json_object *keyslot_obj, *field;
134 keyslot_obj = json_object_new_object();
138 for (keyslot = 0; keyslot < LUKS_NUMKEYS; keyslot++) {
139 if (hdr_v1->keyblock[keyslot].active != LUKS_KEY_ENABLED)
141 r = json_luks1_keyslot(hdr_v1, keyslot, &field);
143 json_object_put(keyslot_obj);
146 json_object_object_add_by_uint(keyslot_obj, keyslot, field);
149 *keyslots_object = keyslot_obj;
153 static int json_luks1_segment(const struct luks_phdr *hdr_v1, struct json_object **segment_object)
156 char cipher[LUKS_CIPHERNAME_L+LUKS_CIPHERMODE_L];
157 struct json_object *segment_obj, *field;
160 segment_obj = json_object_new_object();
165 field = json_object_new_string("crypt");
167 json_object_put(segment_obj);
170 json_object_object_add(segment_obj, "type", field);
173 number = (uint64_t)hdr_v1->payloadOffset * SECTOR_SIZE;
175 field = crypt_jobj_new_uint64(number);
177 json_object_put(segment_obj);
180 json_object_object_add(segment_obj, "offset", field);
183 field = json_object_new_string("0");
185 json_object_put(segment_obj);
188 json_object_object_add(segment_obj, "iv_tweak", field);
191 field = json_object_new_string("dynamic");
193 json_object_put(segment_obj);
196 json_object_object_add(segment_obj, "size", field);
199 if (*hdr_v1->cipherMode != '\0') {
200 if (snprintf(cipher, sizeof(cipher), "%s-%s", hdr_v1->cipherName, hdr_v1->cipherMode) < 0) {
201 json_object_put(segment_obj);
206 c = hdr_v1->cipherName;
208 field = json_object_new_string(c);
210 json_object_put(segment_obj);
213 json_object_object_add(segment_obj, "encryption", field);
216 field = json_object_new_int(SECTOR_SIZE);
218 json_object_put(segment_obj);
221 json_object_object_add(segment_obj, "sector_size", field);
223 *segment_object = segment_obj;
227 static int json_luks1_segments(const struct luks_phdr *hdr_v1, struct json_object **segments_object)
230 struct json_object *segments_obj, *field;
232 segments_obj = json_object_new_object();
236 r = json_luks1_segment(hdr_v1, &field);
238 json_object_put(segments_obj);
241 json_object_object_add_by_uint(segments_obj, 0, field);
243 *segments_object = segments_obj;
247 static int json_luks1_digest(const struct luks_phdr *hdr_v1, struct json_object **digest_object)
249 char keyslot_str[16], *base64_str;
252 struct json_object *digest_obj, *array, *field;
254 digest_obj = json_object_new_object();
259 field = json_object_new_string("pbkdf2");
261 json_object_put(digest_obj);
264 json_object_object_add(digest_obj, "type", field);
267 array = json_object_new_array();
269 json_object_put(digest_obj);
272 json_object_object_add(digest_obj, "keyslots", json_object_get(array));
274 for (ks = 0; ks < LUKS_NUMKEYS; ks++) {
275 if (hdr_v1->keyblock[ks].active != LUKS_KEY_ENABLED)
277 if (snprintf(keyslot_str, sizeof(keyslot_str), "%d", ks) < 0) {
278 json_object_put(field);
279 json_object_put(array);
280 json_object_put(digest_obj);
284 field = json_object_new_string(keyslot_str);
285 if (!field || json_object_array_add(array, field) < 0) {
286 json_object_put(field);
287 json_object_put(array);
288 json_object_put(digest_obj);
293 json_object_put(array);
296 array = json_object_new_array();
298 json_object_put(digest_obj);
301 json_object_object_add(digest_obj, "segments", json_object_get(array));
303 field = json_object_new_string("0");
304 if (!field || json_object_array_add(array, field) < 0) {
305 json_object_put(field);
306 json_object_put(array);
307 json_object_put(digest_obj);
311 json_object_put(array);
314 field = json_object_new_string(hdr_v1->hashSpec);
316 json_object_put(digest_obj);
319 json_object_object_add(digest_obj, "hash", field);
322 r = crypt_base64_encode(&base64_str, &base64_len, hdr_v1->mkDigestSalt, LUKS_SALTSIZE);
324 json_object_put(digest_obj);
328 field = json_object_new_string_len(base64_str, base64_len);
331 json_object_put(digest_obj);
334 json_object_object_add(digest_obj, "salt", field);
337 r = crypt_base64_encode(&base64_str, &base64_len, hdr_v1->mkDigest, LUKS_DIGESTSIZE);
339 json_object_put(digest_obj);
343 field = json_object_new_string_len(base64_str, base64_len);
346 json_object_put(digest_obj);
349 json_object_object_add(digest_obj, "digest", field);
351 /* iterations field */
352 field = json_object_new_int64(hdr_v1->mkDigestIterations);
354 json_object_put(digest_obj);
357 json_object_object_add(digest_obj, "iterations", field);
359 *digest_object = digest_obj;
363 static int json_luks1_digests(const struct luks_phdr *hdr_v1, struct json_object **digests_object)
366 struct json_object *digests_obj, *field;
368 digests_obj = json_object_new_object();
372 r = json_luks1_digest(hdr_v1, &field);
374 json_object_put(digests_obj);
377 json_object_object_add(digests_obj, "0", field);
379 *digests_object = digests_obj;
383 static int json_luks1_object(struct luks_phdr *hdr_v1, struct json_object **luks1_object, uint64_t keyslots_size)
386 struct json_object *luks1_obj, *field;
389 luks1_obj = json_object_new_object();
394 r = json_luks1_keyslots(hdr_v1, &field);
396 json_object_put(luks1_obj);
399 json_object_object_add(luks1_obj, "keyslots", field);
402 field = json_object_new_object();
404 json_object_put(luks1_obj);
407 json_object_object_add(luks1_obj, "tokens", field);
410 r = json_luks1_segments(hdr_v1, &field);
412 json_object_put(luks1_obj);
415 json_object_object_add(luks1_obj, "segments", field);
418 r = json_luks1_digests(hdr_v1, &field);
420 json_object_put(luks1_obj);
423 json_object_object_add(luks1_obj, "digests", field);
427 field = json_object_new_object();
429 json_object_put(luks1_obj);
432 json_object_object_add(luks1_obj, "config", field);
434 json_size = LUKS2_HDR_16K_LEN - LUKS2_HDR_BIN_LEN;
435 json_object_object_add(field, "json_size", crypt_jobj_new_uint64(json_size));
436 keyslots_size -= (keyslots_size % 4096);
437 json_object_object_add(field, "keyslots_size", crypt_jobj_new_uint64(keyslots_size));
439 *luks1_object = luks1_obj;
443 static void move_keyslot_offset(json_object *jobj, int offset_add)
445 json_object *jobj1, *jobj2, *jobj_area;
448 json_object_object_get_ex(jobj, "keyslots", &jobj1);
449 json_object_object_foreach(jobj1, key, val) {
451 json_object_object_get_ex(val, "area", &jobj_area);
452 json_object_object_get_ex(jobj_area, "offset", &jobj2);
453 offset = crypt_jobj_get_uint64(jobj2) + offset_add;
454 json_object_object_add(jobj_area, "offset", crypt_jobj_new_uint64(offset));
458 static int move_keyslot_areas(struct crypt_device *cd, off_t offset_from,
459 off_t offset_to, size_t buf_size)
462 struct device *device = crypt_metadata_device(cd);
465 log_dbg(cd, "Moving keyslot areas of size %zu from %jd to %jd.",
466 buf_size, (intmax_t)offset_from, (intmax_t)offset_to);
468 if (posix_memalign(&buf, crypt_getpagesize(), buf_size))
471 devfd = device_open(cd, device, O_RDWR);
477 /* This can safely fail (for block devices). It only allocates space if it is possible. */
478 if (posix_fallocate(devfd, offset_to, buf_size))
479 log_dbg(cd, "Preallocation (fallocate) of new keyslot area not available.");
481 /* Try to read *new* area to check that area is there (trimmed backup). */
482 if (read_lseek_blockwise(devfd, device_block_size(cd, device),
483 device_alignment(device), buf, buf_size,
484 offset_to)!= (ssize_t)buf_size)
487 if (read_lseek_blockwise(devfd, device_block_size(cd, device),
488 device_alignment(device), buf, buf_size,
489 offset_from)!= (ssize_t)buf_size)
492 if (write_lseek_blockwise(devfd, device_block_size(cd, device),
493 device_alignment(device), buf, buf_size,
494 offset_to) != (ssize_t)buf_size)
499 device_sync(cd, device);
500 crypt_safe_memzero(buf, buf_size);
506 static int luks_header_in_use(struct crypt_device *cd)
510 r = lookup_dm_dev_by_uuid(cd, crypt_get_uuid(cd), crypt_get_type(cd));
512 log_err(cd, _("Cannot check status of device with uuid: %s."), crypt_get_uuid(cd));
517 /* Check if there is a luksmeta area (foreign metadata created by the luksmeta package) */
518 static int luksmeta_header_present(struct crypt_device *cd, off_t luks1_size)
521 static const uint8_t LM_MAGIC[] = { 'L', 'U', 'K', 'S', 'M', 'E', 'T', 'A' };
522 struct device *device = crypt_metadata_device(cd);
525 if (posix_memalign(&buf, crypt_getpagesize(), sizeof(LM_MAGIC)))
528 devfd = device_open(cd, device, O_RDONLY);
534 /* Note: we must not detect failure as problem here, header can be trimmed. */
535 if (read_lseek_blockwise(devfd, device_block_size(cd, device), device_alignment(device),
536 buf, sizeof(LM_MAGIC), luks1_size) == (ssize_t)sizeof(LM_MAGIC) &&
537 !memcmp(LM_MAGIC, buf, sizeof(LM_MAGIC))) {
538 log_err(cd, _("Unable to convert header with LUKSMETA additional metadata."));
546 /* Convert LUKS1 -> LUKS2 */
547 int LUKS2_luks1_to_luks2(struct crypt_device *cd, struct luks_phdr *hdr1, struct luks2_hdr *hdr2)
550 json_object *jobj = NULL;
551 size_t buf_size, buf_offset, luks1_size, luks1_shift = 2 * LUKS2_HDR_16K_LEN - LUKS_ALIGN_KEYSLOTS;
552 uint64_t required_size, max_size = crypt_get_data_offset(cd) * SECTOR_SIZE;
554 /* for detached headers max size == device size */
555 if (!max_size && (r = device_size(crypt_metadata_device(cd), &max_size)))
558 luks1_size = LUKS_device_sectors(hdr1) << SECTOR_SHIFT;
559 luks1_size = size_round_up(luks1_size, LUKS_ALIGN_KEYSLOTS);
563 if (LUKS_keyslots_offset(hdr1) != (LUKS_ALIGN_KEYSLOTS / SECTOR_SIZE)) {
564 log_dbg(cd, "Unsupported keyslots material offset: %zu.", LUKS_keyslots_offset(hdr1));
568 if (LUKS2_check_cipher(cd, hdr1->keyBytes, hdr1->cipherName, hdr1->cipherMode)) {
569 log_err(cd, _("Unable to use cipher specification %s-%s for LUKS2."),
570 hdr1->cipherName, hdr1->cipherMode);
574 if (luksmeta_header_present(cd, luks1_size))
577 log_dbg(cd, "Max size: %" PRIu64 ", LUKS1 (full) header size %zu , required shift: %zu",
578 max_size, luks1_size, luks1_shift);
580 required_size = luks1_size + luks1_shift;
582 if ((max_size < required_size) &&
583 device_fallocate(crypt_metadata_device(cd), required_size)) {
584 log_err(cd, _("Unable to move keyslot area. Not enough space."));
588 if (max_size < required_size)
589 max_size = required_size;
591 r = json_luks1_object(hdr1, &jobj, max_size - 2 * LUKS2_HDR_16K_LEN);
595 move_keyslot_offset(jobj, luks1_shift);
597 /* Create and fill LUKS2 hdr */
598 memset(hdr2, 0, sizeof(*hdr2));
599 hdr2->hdr_size = LUKS2_HDR_16K_LEN;
602 strncpy(hdr2->checksum_alg, "sha256", LUKS2_CHECKSUM_ALG_L);
603 crypt_random_get(cd, (char*)hdr2->salt1, sizeof(hdr2->salt1), CRYPT_RND_SALT);
604 crypt_random_get(cd, (char*)hdr2->salt2, sizeof(hdr2->salt2), CRYPT_RND_SALT);
605 strncpy(hdr2->uuid, crypt_get_uuid(cd), LUKS2_UUID_L-1); /* UUID should be max 36 chars */
609 * It duplicates check in LUKS2_hdr_write() but we don't want to move
610 * keyslot areas in case it would fail later
612 if (max_size < LUKS2_hdr_and_areas_size(hdr2)) {
617 /* check future LUKS2 metadata before moving keyslots area */
618 if (LUKS2_hdr_validate(cd, hdr2->jobj, hdr2->hdr_size - LUKS2_HDR_BIN_LEN)) {
619 log_err(cd, _("Cannot convert to LUKS2 format - invalid metadata."));
624 if ((r = luks_header_in_use(cd))) {
630 /* move keyslots 4k -> 32k offset */
631 buf_offset = 2 * LUKS2_HDR_16K_LEN;
632 buf_size = luks1_size - LUKS_ALIGN_KEYSLOTS;
634 /* check future LUKS2 keyslots area is at least as large as LUKS1 keyslots area */
635 if (buf_size > LUKS2_keyslots_size(hdr2)) {
636 log_err(cd, _("Unable to move keyslot area. LUKS2 keyslots area too small."));
641 if ((r = move_keyslot_areas(cd, 8 * SECTOR_SIZE, buf_offset, buf_size)) < 0) {
642 log_err(cd, _("Unable to move keyslot area."));
646 /* Write new LUKS2 JSON */
647 r = LUKS2_hdr_write(cd, hdr2);
649 LUKS2_hdr_free(cd, hdr2);
654 static int keyslot_LUKS1_compatible(struct crypt_device *cd, struct luks2_hdr *hdr,
655 int keyslot, uint32_t key_size, const char *hash)
657 json_object *jobj_keyslot, *jobj, *jobj_kdf, *jobj_af;
658 uint64_t l2_offset, l2_length;
660 const char *ks_cipher, *data_cipher;
662 jobj_keyslot = LUKS2_get_keyslot_jobj(hdr, keyslot);
666 if (!json_object_object_get_ex(jobj_keyslot, "type", &jobj) ||
667 strcmp(json_object_get_string(jobj), "luks2"))
670 /* Using PBKDF2, this implies memory and parallel is not used. */
672 if (!json_object_object_get_ex(jobj_keyslot, "kdf", &jobj_kdf) ||
673 !json_object_object_get_ex(jobj_kdf, "type", &jobj) ||
674 strcmp(json_object_get_string(jobj), CRYPT_KDF_PBKDF2) ||
675 !json_object_object_get_ex(jobj_kdf, "hash", &jobj) ||
676 strcmp(json_object_get_string(jobj), hash))
680 if (!json_object_object_get_ex(jobj_keyslot, "af", &jobj_af) ||
681 !json_object_object_get_ex(jobj_af, "stripes", &jobj) ||
682 json_object_get_int(jobj) != LUKS_STRIPES)
686 if (!json_object_object_get_ex(jobj_af, "hash", &jobj) ||
687 (crypt_hash_size(json_object_get_string(jobj)) < 0) ||
688 strcmp(json_object_get_string(jobj), hash))
691 ks_cipher = LUKS2_get_keyslot_cipher(hdr, keyslot, &ks_key_size);
692 data_cipher = LUKS2_get_cipher(hdr, CRYPT_DEFAULT_SEGMENT);
693 if (!ks_cipher || !data_cipher || key_size != ks_key_size || strcmp(ks_cipher, data_cipher)) {
694 log_dbg(cd, "Cipher in keyslot %d is different from volume key encryption.", keyslot);
698 if (LUKS2_keyslot_area(hdr, keyslot, &l2_offset, &l2_length))
701 if (l2_length != (size_round_up(AF_split_sectors(key_size, LUKS_STRIPES) * SECTOR_SIZE, 4096))) {
702 log_dbg(cd, "Area length in LUKS2 keyslot (%d) is not compatible with LUKS1", keyslot);
709 /* Convert LUKS2 -> LUKS1 */
710 int LUKS2_luks2_to_luks1(struct crypt_device *cd, struct luks2_hdr *hdr2, struct luks_phdr *hdr1)
712 size_t buf_size, buf_offset;
713 char cipher[LUKS_CIPHERNAME_L], cipher_mode[LUKS_CIPHERMODE_L];
714 char *digest, *digest_salt;
717 json_object *jobj_keyslot, *jobj_digest, *jobj_segment, *jobj_kdf, *jobj_area, *jobj1, *jobj2;
719 int i, r, last_active = 0;
720 uint64_t offset, area_length;
721 char *buf, luksMagic[] = LUKS_MAGIC;
723 jobj_digest = LUKS2_get_digest_jobj(hdr2, 0);
727 jobj_segment = LUKS2_get_segment_jobj(hdr2, CRYPT_DEFAULT_SEGMENT);
731 if (json_segment_get_sector_size(jobj_segment) != SECTOR_SIZE) {
732 log_err(cd, _("Cannot convert to LUKS1 format - default segment encryption sector size is not 512 bytes."));
736 json_object_object_get_ex(hdr2->jobj, "digests", &jobj1);
737 if (!json_object_object_get_ex(jobj_digest, "type", &jobj2) ||
738 strcmp(json_object_get_string(jobj2), "pbkdf2") ||
739 json_object_object_length(jobj1) != 1) {
740 log_err(cd, _("Cannot convert to LUKS1 format - key slot digests are not LUKS1 compatible."));
743 if (!json_object_object_get_ex(jobj_digest, "hash", &jobj2))
745 hash = json_object_get_string(jobj2);
747 r = crypt_parse_name_and_mode(LUKS2_get_cipher(hdr2, CRYPT_DEFAULT_SEGMENT), cipher, NULL, cipher_mode);
751 if (crypt_cipher_wrapped_key(cipher, cipher_mode)) {
752 log_err(cd, _("Cannot convert to LUKS1 format - device uses wrapped key cipher %s."), cipher);
756 if (json_segments_count(LUKS2_get_segments_jobj(hdr2)) != 1) {
757 log_err(cd, _("Cannot convert to LUKS1 format - device uses more segments."));
761 r = LUKS2_tokens_count(hdr2);
765 log_err(cd, _("Cannot convert to LUKS1 format - LUKS2 header contains %u token(s)."), r);
769 r = LUKS2_get_volume_key_size(hdr2, 0);
774 for (i = 0; i < LUKS2_KEYSLOTS_MAX; i++) {
775 if (LUKS2_keyslot_info(hdr2, i) == CRYPT_SLOT_INACTIVE)
778 if (LUKS2_keyslot_info(hdr2, i) == CRYPT_SLOT_INVALID) {
779 log_err(cd, _("Cannot convert to LUKS1 format - keyslot %u is in invalid state."), i);
783 if (i >= LUKS_NUMKEYS) {
784 log_err(cd, _("Cannot convert to LUKS1 format - slot %u (over maximum slots) is still active."), i);
788 if (!keyslot_LUKS1_compatible(cd, hdr2, i, key_size, hash)) {
789 log_err(cd, _("Cannot convert to LUKS1 format - keyslot %u is not LUKS1 compatible."), i);
794 memset(hdr1, 0, sizeof(*hdr1));
796 for (i = 0; i < LUKS_NUMKEYS; i++) {
797 hdr1->keyblock[i].active = LUKS_KEY_DISABLED;
798 hdr1->keyblock[i].stripes = LUKS_STRIPES;
800 jobj_keyslot = LUKS2_get_keyslot_jobj(hdr2, i);
803 if (!json_object_object_get_ex(jobj_keyslot, "area", &jobj_area))
805 if (!json_object_object_get_ex(jobj_area, "offset", &jobj1))
807 offset = crypt_jobj_get_uint64(jobj1);
809 if (LUKS2_find_area_gap(cd, hdr2, key_size, &offset, &area_length))
812 * We have to create placeholder luks2 keyslots in place of all
813 * inactive keyslots. Otherwise we would allocate all
814 * inactive luks1 keyslots over same binary keyslot area.
816 if (placeholder_keyslot_alloc(cd, i, offset, area_length))
820 offset /= SECTOR_SIZE;
821 if (offset > UINT32_MAX)
824 hdr1->keyblock[i].keyMaterialOffset = offset;
825 hdr1->keyblock[i].keyMaterialOffset -=
826 ((2 * LUKS2_HDR_16K_LEN - LUKS_ALIGN_KEYSLOTS) / SECTOR_SIZE);
831 hdr1->keyblock[i].active = LUKS_KEY_ENABLED;
834 if (!json_object_object_get_ex(jobj_keyslot, "kdf", &jobj_kdf))
837 if (!json_object_object_get_ex(jobj_kdf, "iterations", &jobj1))
839 hdr1->keyblock[i].passwordIterations = crypt_jobj_get_uint32(jobj1);
841 if (!json_object_object_get_ex(jobj_kdf, "salt", &jobj1))
844 if (crypt_base64_decode(&buf, &len, json_object_get_string(jobj1),
845 json_object_get_string_len(jobj1)))
847 if (len > 0 && len != LUKS_SALTSIZE) {
851 memcpy(hdr1->keyblock[i].passwordSalt, buf, LUKS_SALTSIZE);
856 jobj_keyslot = LUKS2_get_keyslot_jobj(hdr2, last_active);
861 if (!json_object_object_get_ex(jobj_keyslot, "area", &jobj_area))
863 if (!json_object_object_get_ex(jobj_area, "encryption", &jobj1))
865 r = crypt_parse_name_and_mode(json_object_get_string(jobj1), cipher, NULL, cipher_mode);
869 strncpy(hdr1->cipherName, cipher, LUKS_CIPHERNAME_L - 1);
870 hdr1->cipherName[LUKS_CIPHERNAME_L-1] = '\0';
871 strncpy(hdr1->cipherMode, cipher_mode, LUKS_CIPHERMODE_L - 1);
872 hdr1->cipherMode[LUKS_CIPHERMODE_L-1] = '\0';
874 if (!json_object_object_get_ex(jobj_keyslot, "kdf", &jobj_kdf))
876 if (!json_object_object_get_ex(jobj_kdf, "hash", &jobj1))
878 strncpy(hdr1->hashSpec, json_object_get_string(jobj1), sizeof(hdr1->hashSpec) - 1);
880 hdr1->keyBytes = key_size;
882 if (!json_object_object_get_ex(jobj_digest, "iterations", &jobj1))
884 hdr1->mkDigestIterations = crypt_jobj_get_uint32(jobj1);
886 if (!json_object_object_get_ex(jobj_digest, "digest", &jobj1))
888 r = crypt_base64_decode(&digest, &len, json_object_get_string(jobj1),
889 json_object_get_string_len(jobj1));
892 /* We can store full digest here, not only sha1 length */
893 if (len < LUKS_DIGESTSIZE) {
897 memcpy(hdr1->mkDigest, digest, LUKS_DIGESTSIZE);
900 if (!json_object_object_get_ex(jobj_digest, "salt", &jobj1))
902 r = crypt_base64_decode(&digest_salt, &len, json_object_get_string(jobj1),
903 json_object_get_string_len(jobj1));
906 if (len != LUKS_SALTSIZE) {
910 memcpy(hdr1->mkDigestSalt, digest_salt, LUKS_SALTSIZE);
913 if (!json_object_object_get_ex(jobj_segment, "offset", &jobj1))
915 offset = crypt_jobj_get_uint64(jobj1) / SECTOR_SIZE;
916 if (offset > UINT32_MAX)
918 hdr1->payloadOffset = offset;
920 strncpy(hdr1->uuid, hdr2->uuid, UUID_STRING_L); /* max 36 chars */
921 hdr1->uuid[UUID_STRING_L-1] = '\0';
923 memcpy(hdr1->magic, luksMagic, LUKS_MAGIC_L);
927 r = luks_header_in_use(cd);
929 return r > 0 ? -EBUSY : r;
931 /* move keyslots 32k -> 4k offset */
932 buf_offset = 2 * LUKS2_HDR_16K_LEN;
933 buf_size = LUKS2_keyslots_size(hdr2);
934 r = move_keyslot_areas(cd, buf_offset, 8 * SECTOR_SIZE, buf_size);
936 log_err(cd, _("Unable to move keyslot area."));
940 crypt_wipe_device(cd, crypt_metadata_device(cd), CRYPT_WIPE_ZERO, 0,
941 8 * SECTOR_SIZE, 8 * SECTOR_SIZE, NULL, NULL);
943 /* Write new LUKS1 hdr */
944 return LUKS_write_phdr(hdr1, cd);