gbde.c revision 264808
1/*- 2 * Copyright (c) 2002 Poul-Henning Kamp 3 * Copyright (c) 2002 Networks Associates Technology, Inc. 4 * All rights reserved. 5 * 6 * This software was developed for the FreeBSD Project by Poul-Henning Kamp 7 * and NAI Labs, the Security Research Division of Network Associates, Inc. 8 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 9 * DARPA CHATS research program. 10 * 11 * Redistribution and use in source and binary forms, with or without 12 * modification, are permitted provided that the following conditions 13 * are met: 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $FreeBSD: stable/10/sbin/gbde/gbde.c 264808 2014-04-23 09:22:24Z brueffer $ 33 * 34 * XXX: Future stuff 35 * 36 * Replace the template file options (-i & -f) with command-line variables 37 * "-v property=foo" 38 * 39 * Introduce -e, extra entropy source (XOR with /dev/random) 40 * 41 * Introduce -E, alternate entropy source (instead of /dev/random) 42 * 43 * Introduce -i take IV from keyboard or 44 * 45 * Introduce -I take IV from file/cmd 46 * 47 * Introduce -m/-M store encrypted+encoded masterkey in file 48 * 49 * Introduce -k/-K get pass-phrase part from file/cmd 50 * 51 * Introduce -d add more dest-devices to worklist. 52 * 53 * Add key-option: selfdestruct bit. 54 * 55 * New/changed verbs: 56 * "onetime" attach with onetime nonstored locksector 57 * "key"/"unkey" to blast memory copy of key without orphaning 58 * "nuke" blow away everything attached, crash/halt/power-off if possible. 59 * "blast" destroy all copies of the masterkey 60 * "destroy" destroy one copy of the masterkey 61 * "backup"/"restore" of masterkey sectors. 62 * 63 * Make all verbs work on both attached/detached devices. 64 * 65 */ 66 67#include <sys/types.h> 68#include <sys/queue.h> 69#include <sys/mutex.h> 70#include <md5.h> 71#include <readpassphrase.h> 72#include <string.h> 73#include <stdint.h> 74#include <unistd.h> 75#include <fcntl.h> 76#include <paths.h> 77#include <strings.h> 78#include <stdlib.h> 79#include <err.h> 80#include <stdio.h> 81#include <libutil.h> 82#include <libgeom.h> 83#include <sys/errno.h> 84#include <sys/disk.h> 85#include <sys/stat.h> 86#include <crypto/rijndael/rijndael-api-fst.h> 87#include <crypto/sha2/sha2.h> 88#include <sys/param.h> 89#include <sys/linker.h> 90 91#define GBDEMOD "geom_bde" 92#define KASSERT(foo, bar) do { if(!(foo)) { warn bar ; exit (1); } } while (0) 93 94#include <geom/geom.h> 95#include <geom/bde/g_bde.h> 96 97extern const char template[]; 98 99 100#if 0 101static void 102g_hexdump(void *ptr, int length) 103{ 104 int i, j, k; 105 unsigned char *cp; 106 107 cp = ptr; 108 for (i = 0; i < length; i+= 16) { 109 printf("%04x ", i); 110 for (j = 0; j < 16; j++) { 111 k = i + j; 112 if (k < length) 113 printf(" %02x", cp[k]); 114 else 115 printf(" "); 116 } 117 printf(" |"); 118 for (j = 0; j < 16; j++) { 119 k = i + j; 120 if (k >= length) 121 printf(" "); 122 else if (cp[k] >= ' ' && cp[k] <= '~') 123 printf("%c", cp[k]); 124 else 125 printf("."); 126 } 127 printf("|\n"); 128 } 129} 130#endif 131 132static void __dead2 133usage(void) 134{ 135 136 (void)fprintf(stderr, 137"usage: gbde attach destination [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 138" gbde detach destination\n" 139" gbde init destination [-i] [-f filename] [-K new-keyfile]\n" 140" [-L new-lockfile] [-P new-pass-phrase]\n" 141" gbde setkey destination [-n key]\n" 142" [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 143" [-K new-keyfile] [-L new-lockfile] [-P new-pass-phrase]\n" 144" gbde nuke destination [-n key]\n" 145" [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 146" gbde destroy destination [-k keyfile] [-l lockfile] [-p pass-phrase]\n"); 147 exit(1); 148} 149 150void * 151g_read_data(struct g_consumer *cp, off_t offset, off_t length, int *error) 152{ 153 void *p; 154 int fd, i; 155 off_t o2; 156 157 p = malloc(length); 158 if (p == NULL) 159 err(1, "malloc"); 160 fd = *(int *)cp; 161 o2 = lseek(fd, offset, SEEK_SET); 162 if (o2 != offset) 163 err(1, "lseek"); 164 i = read(fd, p, length); 165 if (i != length) 166 err(1, "read"); 167 if (error != NULL) 168 error = 0; 169 return (p); 170} 171 172static void 173random_bits(void *p, u_int len) 174{ 175 static int fdr = -1; 176 int i; 177 178 if (fdr < 0) { 179 fdr = open("/dev/urandom", O_RDONLY); 180 if (fdr < 0) 181 err(1, "/dev/urandom"); 182 } 183 184 i = read(fdr, p, len); 185 if (i != (int)len) 186 err(1, "read from /dev/urandom"); 187} 188 189/* XXX: not nice */ 190static u_char sha2[SHA512_DIGEST_LENGTH]; 191 192static void 193reset_passphrase(struct g_bde_softc *sc) 194{ 195 196 memcpy(sc->sha2, sha2, SHA512_DIGEST_LENGTH); 197} 198 199static void 200setup_passphrase(struct g_bde_softc *sc, int sure, const char *input, 201 const char *keyfile) 202{ 203 char buf1[BUFSIZ + SHA512_DIGEST_LENGTH]; 204 char buf2[BUFSIZ + SHA512_DIGEST_LENGTH]; 205 char *p; 206 int kfd, klen, bpos = 0; 207 208 if (keyfile != NULL) { 209 /* Read up to BUFSIZ bytes from keyfile */ 210 kfd = open(keyfile, O_RDONLY, 0); 211 if (kfd < 0) 212 err(1, "%s", keyfile); 213 klen = read(kfd, buf1, BUFSIZ); 214 if (klen == -1) 215 err(1, "%s", keyfile); 216 close(kfd); 217 218 /* Prepend the passphrase with the hash of the key read */ 219 g_bde_hash_pass(sc, buf1, klen); 220 memcpy(buf1, sc->sha2, SHA512_DIGEST_LENGTH); 221 memcpy(buf2, sc->sha2, SHA512_DIGEST_LENGTH); 222 bpos = SHA512_DIGEST_LENGTH; 223 } 224 225 if (input != NULL) { 226 if (strlen(input) >= BUFSIZ) 227 errx(1, "Passphrase too long"); 228 strcpy(buf1 + bpos, input); 229 230 g_bde_hash_pass(sc, buf1, strlen(buf1 + bpos) + bpos); 231 memcpy(sha2, sc->sha2, SHA512_DIGEST_LENGTH); 232 return; 233 } 234 for (;;) { 235 p = readpassphrase( 236 sure ? "Enter new passphrase:" : "Enter passphrase: ", 237 buf1 + bpos, sizeof buf1 - bpos, 238 RPP_ECHO_OFF | RPP_REQUIRE_TTY); 239 if (p == NULL) 240 err(1, "readpassphrase"); 241 242 if (sure) { 243 p = readpassphrase("Reenter new passphrase: ", 244 buf2 + bpos, sizeof buf2 - bpos, 245 RPP_ECHO_OFF | RPP_REQUIRE_TTY); 246 if (p == NULL) 247 err(1, "readpassphrase"); 248 249 if (strcmp(buf1 + bpos, buf2 + bpos)) { 250 printf("They didn't match.\n"); 251 continue; 252 } 253 } 254 if (strlen(buf1 + bpos) < 3) { 255 printf("Too short passphrase.\n"); 256 continue; 257 } 258 break; 259 } 260 g_bde_hash_pass(sc, buf1, strlen(buf1 + bpos) + bpos); 261 memcpy(sha2, sc->sha2, SHA512_DIGEST_LENGTH); 262} 263 264static void 265encrypt_sector(void *d, int len, int klen, void *key) 266{ 267 keyInstance ki; 268 cipherInstance ci; 269 int error; 270 271 error = rijndael_cipherInit(&ci, MODE_CBC, NULL); 272 if (error <= 0) 273 errx(1, "rijndael_cipherInit=%d", error); 274 error = rijndael_makeKey(&ki, DIR_ENCRYPT, klen, key); 275 if (error <= 0) 276 errx(1, "rijndael_makeKeY=%d", error); 277 error = rijndael_blockEncrypt(&ci, &ki, d, len * 8, d); 278 if (error <= 0) 279 errx(1, "rijndael_blockEncrypt=%d", error); 280} 281 282static void 283cmd_attach(const struct g_bde_softc *sc, const char *dest, const char *lfile) 284{ 285 int ffd; 286 u_char buf[16]; 287 struct gctl_req *r; 288 const char *errstr; 289 290 r = gctl_get_handle(); 291 gctl_ro_param(r, "verb", -1, "create geom"); 292 gctl_ro_param(r, "class", -1, "BDE"); 293 gctl_ro_param(r, "provider", -1, dest); 294 gctl_ro_param(r, "pass", SHA512_DIGEST_LENGTH, sc->sha2); 295 if (lfile != NULL) { 296 ffd = open(lfile, O_RDONLY, 0); 297 if (ffd < 0) 298 err(1, "%s", lfile); 299 read(ffd, buf, 16); 300 gctl_ro_param(r, "key", 16, buf); 301 close(ffd); 302 } 303 /* gctl_dump(r, stdout); */ 304 errstr = gctl_issue(r); 305 if (errstr != NULL) 306 errx(1, "Attach to %s failed: %s", dest, errstr); 307 308 exit (0); 309} 310 311static void 312cmd_detach(const char *dest) 313{ 314 struct gctl_req *r; 315 const char *errstr; 316 char buf[BUFSIZ]; 317 318 r = gctl_get_handle(); 319 gctl_ro_param(r, "verb", -1, "destroy geom"); 320 gctl_ro_param(r, "class", -1, "BDE"); 321 sprintf(buf, "%s.bde", dest); 322 gctl_ro_param(r, "geom", -1, buf); 323 /* gctl_dump(r, stdout); */ 324 errstr = gctl_issue(r); 325 if (errstr != NULL) 326 errx(1, "Detach of %s failed: %s", dest, errstr); 327 exit (0); 328} 329 330static void 331cmd_open(struct g_bde_softc *sc, int dfd , const char *l_opt, u_int *nkey) 332{ 333 int error; 334 int ffd; 335 u_char keyloc[16]; 336 u_int sectorsize; 337 off_t mediasize; 338 struct stat st; 339 340 error = ioctl(dfd, DIOCGSECTORSIZE, §orsize); 341 if (error) 342 sectorsize = 512; 343 error = ioctl(dfd, DIOCGMEDIASIZE, &mediasize); 344 if (error) { 345 error = fstat(dfd, &st); 346 if (error == 0 && S_ISREG(st.st_mode)) 347 mediasize = st.st_size; 348 else 349 error = ENOENT; 350 } 351 if (error) 352 mediasize = (off_t)-1; 353 if (l_opt != NULL) { 354 ffd = open(l_opt, O_RDONLY, 0); 355 if (ffd < 0) 356 err(1, "%s", l_opt); 357 read(ffd, keyloc, sizeof keyloc); 358 close(ffd); 359 } else { 360 memset(keyloc, 0, sizeof keyloc); 361 } 362 363 error = g_bde_decrypt_lock(sc, sc->sha2, keyloc, mediasize, 364 sectorsize, nkey); 365 if (error == ENOENT) 366 errx(1, "Lock was destroyed."); 367 if (error == ESRCH) 368 errx(1, "Lock was nuked."); 369 if (error == ENOTDIR) 370 errx(1, "Lock not found"); 371 if (error != 0) 372 errx(1, "Error %d decrypting lock", error); 373 if (nkey) 374 printf("Opened with key %u\n", *nkey); 375 return; 376} 377 378static void 379cmd_nuke(struct g_bde_key *gl, int dfd , int key) 380{ 381 int i; 382 u_char *sbuf; 383 off_t offset, offset2; 384 385 sbuf = malloc(gl->sectorsize); 386 memset(sbuf, 0, gl->sectorsize); 387 offset = (gl->lsector[key] & ~(gl->sectorsize - 1)); 388 offset2 = lseek(dfd, offset, SEEK_SET); 389 if (offset2 != offset) 390 err(1, "lseek"); 391 i = write(dfd, sbuf, gl->sectorsize); 392 free(sbuf); 393 if (i != (int)gl->sectorsize) 394 err(1, "write"); 395 printf("Nuked key %d\n", key); 396} 397 398static void 399cmd_write(struct g_bde_key *gl, struct g_bde_softc *sc, int dfd , int key, const char *l_opt) 400{ 401 int i, ffd; 402 uint64_t off[2]; 403 u_char keyloc[16]; 404 u_char *sbuf, *q; 405 off_t offset, offset2; 406 407 sbuf = malloc(gl->sectorsize); 408 /* 409 * Find the byte-offset in the lock sector where we will put the lock 410 * data structure. We can put it any random place as long as the 411 * structure fits. 412 */ 413 for(;;) { 414 random_bits(off, sizeof off); 415 off[0] &= (gl->sectorsize - 1); 416 if (off[0] + G_BDE_LOCKSIZE > gl->sectorsize) 417 continue; 418 break; 419 } 420 421 /* Add the sector offset in bytes */ 422 off[0] += (gl->lsector[key] & ~(gl->sectorsize - 1)); 423 gl->lsector[key] = off[0]; 424 425 i = g_bde_keyloc_encrypt(sc->sha2, off[0], off[1], keyloc); 426 if (i) 427 errx(1, "g_bde_keyloc_encrypt()"); 428 if (l_opt != NULL) { 429 ffd = open(l_opt, O_WRONLY | O_CREAT | O_TRUNC, 0600); 430 if (ffd < 0) 431 err(1, "%s", l_opt); 432 write(ffd, keyloc, sizeof keyloc); 433 close(ffd); 434 } else if (gl->flags & GBDE_F_SECT0) { 435 offset2 = lseek(dfd, 0, SEEK_SET); 436 if (offset2 != 0) 437 err(1, "lseek"); 438 i = read(dfd, sbuf, gl->sectorsize); 439 if (i != (int)gl->sectorsize) 440 err(1, "read"); 441 memcpy(sbuf + key * 16, keyloc, sizeof keyloc); 442 offset2 = lseek(dfd, 0, SEEK_SET); 443 if (offset2 != 0) 444 err(1, "lseek"); 445 i = write(dfd, sbuf, gl->sectorsize); 446 if (i != (int)gl->sectorsize) 447 err(1, "write"); 448 } else { 449 errx(1, "No -L option and no space in sector 0 for lockfile"); 450 } 451 452 /* Allocate a sectorbuffer and fill it with random junk */ 453 if (sbuf == NULL) 454 err(1, "malloc"); 455 random_bits(sbuf, gl->sectorsize); 456 457 /* Fill random bits in the spare field */ 458 random_bits(gl->spare, sizeof(gl->spare)); 459 460 /* Encode the structure where we want it */ 461 q = sbuf + (off[0] % gl->sectorsize); 462 i = g_bde_encode_lock(sc->sha2, gl, q); 463 if (i < 0) 464 errx(1, "programming error encoding lock"); 465 466 encrypt_sector(q, G_BDE_LOCKSIZE, 256, sc->sha2 + 16); 467 offset = gl->lsector[key] & ~(gl->sectorsize - 1); 468 offset2 = lseek(dfd, offset, SEEK_SET); 469 if (offset2 != offset) 470 err(1, "lseek"); 471 i = write(dfd, sbuf, gl->sectorsize); 472 if (i != (int)gl->sectorsize) 473 err(1, "write"); 474 free(sbuf); 475#if 0 476 printf("Wrote key %d at %jd\n", key, (intmax_t)offset); 477 printf("s0 = %jd\n", (intmax_t)gl->sector0); 478 printf("sN = %jd\n", (intmax_t)gl->sectorN); 479 printf("l[0] = %jd\n", (intmax_t)gl->lsector[0]); 480 printf("l[1] = %jd\n", (intmax_t)gl->lsector[1]); 481 printf("l[2] = %jd\n", (intmax_t)gl->lsector[2]); 482 printf("l[3] = %jd\n", (intmax_t)gl->lsector[3]); 483 printf("k = %jd\n", (intmax_t)gl->keyoffset); 484 printf("ss = %jd\n", (intmax_t)gl->sectorsize); 485#endif 486} 487 488static void 489cmd_destroy(struct g_bde_key *gl, int nkey) 490{ 491 int i; 492 493 bzero(&gl->sector0, sizeof gl->sector0); 494 bzero(&gl->sectorN, sizeof gl->sectorN); 495 bzero(&gl->keyoffset, sizeof gl->keyoffset); 496 bzero(&gl->flags, sizeof gl->flags); 497 bzero(gl->mkey, sizeof gl->mkey); 498 for (i = 0; i < G_BDE_MAXKEYS; i++) 499 if (i != nkey) 500 gl->lsector[i] = ~0; 501} 502 503static int 504sorthelp(const void *a, const void *b) 505{ 506 const uint64_t *oa, *ob; 507 508 oa = a; 509 ob = b; 510 if (*oa > *ob) 511 return 1; 512 if (*oa < *ob) 513 return -1; 514 return 0; 515} 516 517static void 518cmd_init(struct g_bde_key *gl, int dfd, const char *f_opt, int i_opt, const char *l_opt) 519{ 520 int i; 521 u_char *buf; 522 unsigned sector_size; 523 uint64_t first_sector; 524 uint64_t last_sector; 525 uint64_t total_sectors; 526 off_t off, off2; 527 unsigned nkeys; 528 const char *p; 529 char *q, cbuf[BUFSIZ]; 530 unsigned u, u2; 531 uint64_t o; 532 properties params; 533 534 bzero(gl, sizeof *gl); 535 if (f_opt != NULL) { 536 i = open(f_opt, O_RDONLY); 537 if (i < 0) 538 err(1, "%s", f_opt); 539 params = properties_read(i); 540 close (i); 541 } else if (i_opt) { 542 /* XXX: Polish */ 543 asprintf(&q, "%stemp.XXXXXXXXXX", _PATH_TMP); 544 if (q == NULL) 545 err(1, "asprintf"); 546 i = mkstemp(q); 547 if (i < 0) 548 err(1, "%s", q); 549 write(i, template, strlen(template)); 550 close (i); 551 p = getenv("EDITOR"); 552 if (p == NULL) 553 p = "vi"; 554 if (snprintf(cbuf, sizeof(cbuf), "%s %s\n", p, q) >= 555 (ssize_t)sizeof(cbuf)) { 556 unlink(q); 557 errx(1, "EDITOR is too long"); 558 } 559 system(cbuf); 560 i = open(q, O_RDONLY); 561 if (i < 0) 562 err(1, "%s", f_opt); 563 params = properties_read(i); 564 close (i); 565 unlink(q); 566 free(q); 567 } else { 568 /* XXX: Hack */ 569 i = open(_PATH_DEVNULL, O_RDONLY); 570 if (i < 0) 571 err(1, "%s", _PATH_DEVNULL); 572 params = properties_read(i); 573 close (i); 574 } 575 576 /* <sector_size> */ 577 p = property_find(params, "sector_size"); 578 i = ioctl(dfd, DIOCGSECTORSIZE, &u); 579 if (p != NULL) { 580 sector_size = strtoul(p, &q, 0); 581 if (!*p || *q) 582 errx(1, "sector_size not a proper number"); 583 } else if (i == 0) { 584 sector_size = u; 585 } else { 586 errx(1, "Missing sector_size property"); 587 } 588 if (sector_size & (sector_size - 1)) 589 errx(1, "sector_size not a power of 2"); 590 if (sector_size < 512) 591 errx(1, "sector_size is smaller than 512"); 592 buf = malloc(sector_size); 593 if (buf == NULL) 594 err(1, "Failed to malloc sector buffer"); 595 gl->sectorsize = sector_size; 596 597 i = ioctl(dfd, DIOCGMEDIASIZE, &off); 598 if (i == 0) { 599 first_sector = 0; 600 total_sectors = off / sector_size; 601 last_sector = total_sectors - 1; 602 } else { 603 first_sector = 0; 604 last_sector = 0; 605 total_sectors = 0; 606 } 607 608 /* <first_sector> */ 609 p = property_find(params, "first_sector"); 610 if (p != NULL) { 611 first_sector = strtoul(p, &q, 0); 612 if (!*p || *q) 613 errx(1, "first_sector not a proper number"); 614 } 615 616 /* <last_sector> */ 617 p = property_find(params, "last_sector"); 618 if (p != NULL) { 619 last_sector = strtoul(p, &q, 0); 620 if (!*p || *q) 621 errx(1, "last_sector not a proper number"); 622 if (last_sector <= first_sector) 623 errx(1, "last_sector not larger than first_sector"); 624 total_sectors = last_sector + 1; 625 } 626 627 /* <total_sectors> */ 628 p = property_find(params, "total_sectors"); 629 if (p != NULL) { 630 total_sectors = strtoul(p, &q, 0); 631 if (!*p || *q) 632 errx(1, "total_sectors not a proper number"); 633 if (last_sector == 0) 634 last_sector = first_sector + total_sectors - 1; 635 } 636 637 if (l_opt == NULL && first_sector != 0) 638 errx(1, "No -L new-lockfile argument and first_sector != 0"); 639 else if (l_opt == NULL) { 640 first_sector++; 641 total_sectors--; 642 gl->flags |= GBDE_F_SECT0; 643 } 644 gl->sector0 = first_sector * gl->sectorsize; 645 646 if (total_sectors != (last_sector - first_sector) + 1) 647 errx(1, "total_sectors disagree with first_sector and last_sector"); 648 if (total_sectors == 0) 649 errx(1, "missing last_sector or total_sectors"); 650 651 gl->sectorN = (last_sector + 1) * gl->sectorsize; 652 653 /* Find a random keyoffset */ 654 random_bits(&o, sizeof o); 655 o %= (gl->sectorN - gl->sector0); 656 o &= ~(gl->sectorsize - 1); 657 gl->keyoffset = o; 658 659 /* <number_of_keys> */ 660 p = property_find(params, "number_of_keys"); 661 if (p != NULL) { 662 nkeys = strtoul(p, &q, 0); 663 if (!*p || *q) 664 errx(1, "number_of_keys not a proper number"); 665 if (nkeys < 1 || nkeys > G_BDE_MAXKEYS) 666 errx(1, "number_of_keys out of range"); 667 } else { 668 nkeys = 4; 669 } 670 for (u = 0; u < nkeys; u++) { 671 for(;;) { 672 do { 673 random_bits(&o, sizeof o); 674 o %= gl->sectorN; 675 o &= ~(gl->sectorsize - 1); 676 } while(o < gl->sector0); 677 for (u2 = 0; u2 < u; u2++) 678 if (o == gl->lsector[u2]) 679 break; 680 if (u2 < u) 681 continue; 682 break; 683 } 684 gl->lsector[u] = o; 685 } 686 for (; u < G_BDE_MAXKEYS; u++) { 687 do 688 random_bits(&o, sizeof o); 689 while (o < gl->sectorN); 690 gl->lsector[u] = o; 691 } 692 qsort(gl->lsector, G_BDE_MAXKEYS, sizeof gl->lsector[0], sorthelp); 693 694 /* Flush sector zero if we use it for lockfile data */ 695 if (gl->flags & GBDE_F_SECT0) { 696 off2 = lseek(dfd, 0, SEEK_SET); 697 if (off2 != 0) 698 err(1, "lseek(2) to sector 0"); 699 random_bits(buf, sector_size); 700 i = write(dfd, buf, sector_size); 701 if (i != (int)sector_size) 702 err(1, "write sector 0"); 703 } 704 705 /* <random_flush> */ 706 p = property_find(params, "random_flush"); 707 if (p != NULL) { 708 off = first_sector * sector_size; 709 off2 = lseek(dfd, off, SEEK_SET); 710 if (off2 != off) 711 err(1, "lseek(2) to first_sector"); 712 off2 = last_sector * sector_size; 713 while (off <= off2) { 714 random_bits(buf, sector_size); 715 i = write(dfd, buf, sector_size); 716 if (i != (int)sector_size) 717 err(1, "write to $device_name"); 718 off += sector_size; 719 } 720 } 721 722 random_bits(gl->mkey, sizeof gl->mkey); 723 random_bits(gl->salt, sizeof gl->salt); 724 725 return; 726} 727 728static enum action { 729 ACT_HUH, 730 ACT_ATTACH, ACT_DETACH, 731 ACT_INIT, ACT_SETKEY, ACT_DESTROY, ACT_NUKE 732} action; 733 734int 735main(int argc, char **argv) 736{ 737 const char *opts; 738 const char *k_opt, *K_opt; 739 const char *l_opt, *L_opt; 740 const char *p_opt, *P_opt; 741 const char *f_opt; 742 char *dest; 743 int i_opt, n_opt, ch, dfd, doopen; 744 u_int nkey; 745 int i; 746 char *q, buf[BUFSIZ]; 747 struct g_bde_key *gl; 748 struct g_bde_softc sc; 749 750 if (argc < 3) 751 usage(); 752 753 if (modfind("g_bde") < 0) { 754 /* need to load the gbde module */ 755 if (kldload(GBDEMOD) < 0 || modfind("g_bde") < 0) 756 err(1, GBDEMOD ": Kernel module not available"); 757 } 758 doopen = 0; 759 if (!strcmp(argv[1], "attach")) { 760 action = ACT_ATTACH; 761 opts = "k:l:p:"; 762 } else if (!strcmp(argv[1], "detach")) { 763 action = ACT_DETACH; 764 opts = ""; 765 } else if (!strcmp(argv[1], "init")) { 766 action = ACT_INIT; 767 doopen = 1; 768 opts = "f:iK:L:P:"; 769 } else if (!strcmp(argv[1], "setkey")) { 770 action = ACT_SETKEY; 771 doopen = 1; 772 opts = "k:K:l:L:n:p:P:"; 773 } else if (!strcmp(argv[1], "destroy")) { 774 action = ACT_DESTROY; 775 doopen = 1; 776 opts = "k:l:p:"; 777 } else if (!strcmp(argv[1], "nuke")) { 778 action = ACT_NUKE; 779 doopen = 1; 780 opts = "k:l:n:p:"; 781 } else { 782 usage(); 783 } 784 argc--; 785 argv++; 786 787 dest = strdup(argv[1]); 788 argc--; 789 argv++; 790 791 p_opt = NULL; 792 P_opt = NULL; 793 k_opt = NULL; 794 K_opt = NULL; 795 l_opt = NULL; 796 L_opt = NULL; 797 f_opt = NULL; 798 n_opt = 0; 799 i_opt = 0; 800 801 while((ch = getopt(argc, argv, opts)) != -1) 802 switch (ch) { 803 case 'f': 804 f_opt = optarg; 805 break; 806 case 'i': 807 i_opt = !i_opt; 808 break; 809 case 'k': 810 k_opt = optarg; 811 break; 812 case 'K': 813 K_opt = optarg; 814 break; 815 case 'l': 816 l_opt = optarg; 817 break; 818 case 'L': 819 L_opt = optarg; 820 break; 821 case 'n': 822 n_opt = strtoul(optarg, &q, 0); 823 if (!*optarg || *q) 824 errx(1, "-n argument not numeric"); 825 if (n_opt < -1 || n_opt > G_BDE_MAXKEYS) 826 errx(1, "-n argument out of range"); 827 break; 828 case 'p': 829 p_opt = optarg; 830 break; 831 case 'P': 832 P_opt = optarg; 833 break; 834 default: 835 usage(); 836 } 837 838 if (doopen) { 839 dfd = open(dest, O_RDWR); 840 if (dfd < 0 && dest[0] != '/') { 841 if (snprintf(buf, sizeof(buf), "%s%s", 842 _PATH_DEV, dest) >= (ssize_t)sizeof(buf)) 843 errno = ENAMETOOLONG; 844 else 845 dfd = open(buf, O_RDWR); 846 } 847 if (dfd < 0) 848 err(1, "%s", dest); 849 } else { 850 if (!memcmp(dest, _PATH_DEV, strlen(_PATH_DEV))) 851 strcpy(dest, dest + strlen(_PATH_DEV)); 852 } 853 854 memset(&sc, 0, sizeof sc); 855 sc.consumer = (void *)&dfd; 856 gl = &sc.key; 857 switch(action) { 858 case ACT_ATTACH: 859 setup_passphrase(&sc, 0, p_opt, k_opt); 860 cmd_attach(&sc, dest, l_opt); 861 break; 862 case ACT_DETACH: 863 cmd_detach(dest); 864 break; 865 case ACT_INIT: 866 cmd_init(gl, dfd, f_opt, i_opt, L_opt); 867 setup_passphrase(&sc, 1, P_opt, K_opt); 868 cmd_write(gl, &sc, dfd, 0, L_opt); 869 break; 870 case ACT_SETKEY: 871 setup_passphrase(&sc, 0, p_opt, k_opt); 872 cmd_open(&sc, dfd, l_opt, &nkey); 873 if (n_opt == 0) 874 n_opt = nkey + 1; 875 setup_passphrase(&sc, 1, P_opt, K_opt); 876 cmd_write(gl, &sc, dfd, n_opt - 1, L_opt); 877 break; 878 case ACT_DESTROY: 879 setup_passphrase(&sc, 0, p_opt, k_opt); 880 cmd_open(&sc, dfd, l_opt, &nkey); 881 cmd_destroy(gl, nkey); 882 reset_passphrase(&sc); 883 cmd_write(gl, &sc, dfd, nkey, l_opt); 884 break; 885 case ACT_NUKE: 886 setup_passphrase(&sc, 0, p_opt, k_opt); 887 cmd_open(&sc, dfd, l_opt, &nkey); 888 if (n_opt == 0) 889 n_opt = nkey + 1; 890 if (n_opt == -1) { 891 for(i = 0; i < G_BDE_MAXKEYS; i++) 892 cmd_nuke(gl, dfd, i); 893 } else { 894 cmd_nuke(gl, dfd, n_opt - 1); 895 } 896 break; 897 default: 898 errx(1, "internal error"); 899 } 900 901 return(0); 902} 903