#include "luks.h"
#include "loopaes.h"
#include "verity.h"
+#include "tcrypt.h"
#include "internal.h"
struct crypt_device {
unsigned int verity_root_hash_size;
char *verity_uuid;
+ /* used in CRYPT_TCRYPT */
+ struct crypt_params_tcrypt tcrypt_params;
+ struct tcrypt_phdr tcrypt_hdr;
+
/* callbacks definitions */
void (*log)(int level, const char *msg, void *usrptr);
void *log_usrptr;
return cd->device;
}
-static int init_crypto(struct crypt_device *ctx)
+int init_crypto(struct crypt_device *ctx)
{
int r;
return (type && !strcmp(CRYPT_VERITY, type));
}
+static int isTCRYPT(const char *type)
+{
+ return (type && !strcmp(CRYPT_TCRYPT, type));
+}
+
/* keyslot helpers */
static int keyslot_verify_or_find_empty(struct crypt_device *cd, int *keyslot)
{
return r;
}
+static int _crypt_load_tcrypt(struct crypt_device *cd, struct crypt_params_tcrypt *params)
+{
+ int r;
+
+ r = init_crypto(cd);
+ if (r < 0)
+ return r;
+
+ memcpy(&cd->tcrypt_params, params, sizeof(*params));
+
+ r = TCRYPT_read_phdr(cd, &cd->tcrypt_hdr, &cd->tcrypt_params);
+
+ cd->tcrypt_params.passphrase = NULL;
+ cd->tcrypt_params.passphrase_size = 0;
+ cd->tcrypt_params.keyfiles = NULL;
+ cd->tcrypt_params.keyfiles_count = 0;
+
+ if (r < 0)
+ return r;
+
+ if (!cd->type && !(cd->type = strdup(CRYPT_TCRYPT)))
+ return -ENOMEM;
+
+ return r;
+}
+
static int _crypt_load_verity(struct crypt_device *cd, struct crypt_params_verity *params)
{
int r;
if (r < 0)
return r;
- if (params->flags & CRYPT_VERITY_NO_HEADER)
+ if (params && params->flags & CRYPT_VERITY_NO_HEADER)
return -EINVAL;
if (params)
return -ENOMEM;
cd->verity_hdr.flags = params->flags;
- cd->verity_hdr.hash_name = strdup(params->hash_name);
+ if (!(cd->verity_hdr.hash_name = strdup(params->hash_name)))
+ return -ENOMEM;
cd->verity_hdr.data_device = NULL;
cd->verity_hdr.data_block_size = params->data_block_size;
cd->verity_hdr.hash_block_size = params->hash_block_size;
cd->verity_hdr.hash_type = params->hash_type;
cd->verity_hdr.flags = params->flags;
cd->verity_hdr.salt_size = params->salt_size;
- cd->verity_hdr.salt = malloc(params->salt_size);
+ if (!(cd->verity_hdr.salt = malloc(params->salt_size)))
+ return -ENOMEM;
+
if (params->salt)
memcpy(CONST_CAST(char*)cd->verity_hdr.salt, params->salt,
params->salt_size);
return -EINVAL;
}
r = _crypt_load_verity(cd, params);
+ } else if (isTCRYPT(requested_type)) {
+ if (cd->type && !isTCRYPT(cd->type)) {
+ log_dbg("Context is already initialised to type %s", cd->type);
+ return -EINVAL;
+ }
+ r = _crypt_load_tcrypt(cd, params);
} else
return -EINVAL;
log_dbg("Suspending volume %s.", name);
- if (!isLUKS(cd->type)) {
+ if (!cd || !isLUKS(cd->type)) {
log_err(cd, _("This operation is supported only for LUKS device.\n"));
r = -EINVAL;
goto out;
return -EINVAL;
}
- if (!cd)
- dm_backend_init();
+ dm_backend_init();
r = dm_status_suspended(cd, name);
if (r < 0)
else if (r)
log_err(cd, "Error during suspending device %s.\n", name);
out:
- if (!cd)
- dm_backend_exit();
+ dm_backend_exit();
return r;
}
if (cd->verity_root_hash)
memcpy(cd->verity_root_hash, volume_key, volume_key_size);
}
+ } else if (isTCRYPT(cd->type)) {
+ if (!name)
+ return -EINVAL;
+ r = TCRYPT_activate(cd, name, &cd->tcrypt_hdr,
+ &cd->tcrypt_params, flags);
} else
log_err(cd, _("Device type is not properly initialised.\n"));
if (isLOOPAES(cd->type))
return cd->loopaes_hdr.offset;
+ if (isTCRYPT(cd->type)) { // FIXME: system vol.
+ if (!cd->tcrypt_hdr.d.mk_offset)
+ return 1;
+ return (cd->tcrypt_hdr.d.mk_offset / cd->tcrypt_hdr.d.sector_size);
+ }
+
return 0;
}
if (isLOOPAES(cd->type))
return cd->loopaes_hdr.skip;
+ if (isTCRYPT(cd->type)) {
+ if (!cd->tcrypt_hdr.d.mk_offset)
+ return 0;
+ return (cd->tcrypt_hdr.d.mk_offset / cd->tcrypt_hdr.d.sector_size);
+ }
+
return 0;
}