xref: /aosp_15_r20/external/e2fsprogs/misc/e4crypt.c (revision 6a54128f25917bfc36a8a6e9d722c04a0b4641b6)
1*6a54128fSAndroid Build Coastguard Worker /*
2*6a54128fSAndroid Build Coastguard Worker  * e4crypt.c - ext4 encryption management utility
3*6a54128fSAndroid Build Coastguard Worker  *
4*6a54128fSAndroid Build Coastguard Worker  * Copyright (c) 2014 Google, Inc.
5*6a54128fSAndroid Build Coastguard Worker  *	SHA512 implementation from libtomcrypt.
6*6a54128fSAndroid Build Coastguard Worker  *
7*6a54128fSAndroid Build Coastguard Worker  * Authors: Michael Halcrow <[email protected]>,
8*6a54128fSAndroid Build Coastguard Worker  *	Ildar Muslukhov <[email protected]>
9*6a54128fSAndroid Build Coastguard Worker  */
10*6a54128fSAndroid Build Coastguard Worker 
11*6a54128fSAndroid Build Coastguard Worker #ifndef _LARGEFILE_SOURCE
12*6a54128fSAndroid Build Coastguard Worker #define _LARGEFILE_SOURCE
13*6a54128fSAndroid Build Coastguard Worker #endif
14*6a54128fSAndroid Build Coastguard Worker 
15*6a54128fSAndroid Build Coastguard Worker #ifndef _LARGEFILE64_SOURCE
16*6a54128fSAndroid Build Coastguard Worker #define _LARGEFILE64_SOURCE
17*6a54128fSAndroid Build Coastguard Worker #endif
18*6a54128fSAndroid Build Coastguard Worker 
19*6a54128fSAndroid Build Coastguard Worker #ifndef _GNU_SOURCE
20*6a54128fSAndroid Build Coastguard Worker #define _GNU_SOURCE
21*6a54128fSAndroid Build Coastguard Worker #endif
22*6a54128fSAndroid Build Coastguard Worker 
23*6a54128fSAndroid Build Coastguard Worker #include "config.h"
24*6a54128fSAndroid Build Coastguard Worker #include <assert.h>
25*6a54128fSAndroid Build Coastguard Worker #include <errno.h>
26*6a54128fSAndroid Build Coastguard Worker #include <getopt.h>
27*6a54128fSAndroid Build Coastguard Worker #include <dirent.h>
28*6a54128fSAndroid Build Coastguard Worker #include <errno.h>
29*6a54128fSAndroid Build Coastguard Worker #include <stdbool.h>
30*6a54128fSAndroid Build Coastguard Worker #include <stdarg.h>
31*6a54128fSAndroid Build Coastguard Worker #include <stdio.h>
32*6a54128fSAndroid Build Coastguard Worker #include <stdlib.h>
33*6a54128fSAndroid Build Coastguard Worker #include <string.h>
34*6a54128fSAndroid Build Coastguard Worker #include <mntent.h>
35*6a54128fSAndroid Build Coastguard Worker #include <sys/ioctl.h>
36*6a54128fSAndroid Build Coastguard Worker #include <sys/stat.h>
37*6a54128fSAndroid Build Coastguard Worker #include <sys/types.h>
38*6a54128fSAndroid Build Coastguard Worker #include <fcntl.h>
39*6a54128fSAndroid Build Coastguard Worker #include <termios.h>
40*6a54128fSAndroid Build Coastguard Worker #include <unistd.h>
41*6a54128fSAndroid Build Coastguard Worker #include <signal.h>
42*6a54128fSAndroid Build Coastguard Worker #if !defined(HAVE_ADD_KEY) || !defined(HAVE_KEYCTL)
43*6a54128fSAndroid Build Coastguard Worker #include <sys/syscall.h>
44*6a54128fSAndroid Build Coastguard Worker #endif
45*6a54128fSAndroid Build Coastguard Worker #ifdef HAVE_SYS_KEY_H
46*6a54128fSAndroid Build Coastguard Worker #include <sys/key.h>
47*6a54128fSAndroid Build Coastguard Worker #endif
48*6a54128fSAndroid Build Coastguard Worker 
49*6a54128fSAndroid Build Coastguard Worker #include "ext2fs/ext2_fs.h"
50*6a54128fSAndroid Build Coastguard Worker #include "ext2fs/ext2fs.h"
51*6a54128fSAndroid Build Coastguard Worker #include "uuid/uuid.h"
52*6a54128fSAndroid Build Coastguard Worker 
53*6a54128fSAndroid Build Coastguard Worker /* special process keyring shortcut IDs */
54*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_THREAD_KEYRING		-1
55*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_PROCESS_KEYRING	-2
56*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_SESSION_KEYRING	-3
57*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_USER_KEYRING		-4
58*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_USER_SESSION_KEYRING	-5
59*6a54128fSAndroid Build Coastguard Worker #define KEY_SPEC_GROUP_KEYRING		-6
60*6a54128fSAndroid Build Coastguard Worker 
61*6a54128fSAndroid Build Coastguard Worker #define KEYCTL_GET_KEYRING_ID		0
62*6a54128fSAndroid Build Coastguard Worker #define KEYCTL_JOIN_SESSION_KEYRING	1
63*6a54128fSAndroid Build Coastguard Worker #define KEYCTL_DESCRIBE			6
64*6a54128fSAndroid Build Coastguard Worker #define KEYCTL_SEARCH			10
65*6a54128fSAndroid Build Coastguard Worker #define KEYCTL_SESSION_TO_PARENT	18
66*6a54128fSAndroid Build Coastguard Worker 
67*6a54128fSAndroid Build Coastguard Worker typedef __s32 key_serial_t;
68*6a54128fSAndroid Build Coastguard Worker 
69*6a54128fSAndroid Build Coastguard Worker #define EXT4_KEY_REF_STR_BUF_SIZE ((EXT4_KEY_DESCRIPTOR_SIZE * 2) + 1)
70*6a54128fSAndroid Build Coastguard Worker 
71*6a54128fSAndroid Build Coastguard Worker #ifndef EXT4_IOC_GET_ENCRYPTION_PWSALT
72*6a54128fSAndroid Build Coastguard Worker #define EXT4_IOC_GET_ENCRYPTION_PWSALT	_IOW('f', 20, __u8[16])
73*6a54128fSAndroid Build Coastguard Worker #endif
74*6a54128fSAndroid Build Coastguard Worker 
75*6a54128fSAndroid Build Coastguard Worker #define OPT_VERBOSE	0x0001
76*6a54128fSAndroid Build Coastguard Worker #define OPT_QUIET	0x0002
77*6a54128fSAndroid Build Coastguard Worker 
78*6a54128fSAndroid Build Coastguard Worker int options;
79*6a54128fSAndroid Build Coastguard Worker 
80*6a54128fSAndroid Build Coastguard Worker #ifndef HAVE_KEYCTL
keyctl(int cmd,...)81*6a54128fSAndroid Build Coastguard Worker static long keyctl(int cmd, ...)
82*6a54128fSAndroid Build Coastguard Worker {
83*6a54128fSAndroid Build Coastguard Worker 	va_list va;
84*6a54128fSAndroid Build Coastguard Worker 	unsigned long arg2, arg3, arg4, arg5;
85*6a54128fSAndroid Build Coastguard Worker 
86*6a54128fSAndroid Build Coastguard Worker 	va_start(va, cmd);
87*6a54128fSAndroid Build Coastguard Worker 	arg2 = va_arg(va, unsigned long);
88*6a54128fSAndroid Build Coastguard Worker 	arg3 = va_arg(va, unsigned long);
89*6a54128fSAndroid Build Coastguard Worker 	arg4 = va_arg(va, unsigned long);
90*6a54128fSAndroid Build Coastguard Worker 	arg5 = va_arg(va, unsigned long);
91*6a54128fSAndroid Build Coastguard Worker 	va_end(va);
92*6a54128fSAndroid Build Coastguard Worker 	return syscall(__NR_keyctl, cmd, arg2, arg3, arg4, arg5);
93*6a54128fSAndroid Build Coastguard Worker }
94*6a54128fSAndroid Build Coastguard Worker #endif
95*6a54128fSAndroid Build Coastguard Worker 
96*6a54128fSAndroid Build Coastguard Worker #ifndef HAVE_ADD_KEY
add_key(const char * type,const char * description,const void * payload,size_t plen,key_serial_t keyring)97*6a54128fSAndroid Build Coastguard Worker static key_serial_t add_key(const char *type, const char *description,
98*6a54128fSAndroid Build Coastguard Worker 			    const void *payload, size_t plen,
99*6a54128fSAndroid Build Coastguard Worker 			    key_serial_t keyring)
100*6a54128fSAndroid Build Coastguard Worker {
101*6a54128fSAndroid Build Coastguard Worker 	return syscall(__NR_add_key, type, description, payload,
102*6a54128fSAndroid Build Coastguard Worker 		       plen, keyring);
103*6a54128fSAndroid Build Coastguard Worker }
104*6a54128fSAndroid Build Coastguard Worker #endif
105*6a54128fSAndroid Build Coastguard Worker 
106*6a54128fSAndroid Build Coastguard Worker static const unsigned char *hexchars = (const unsigned char *) "0123456789abcdef";
107*6a54128fSAndroid Build Coastguard Worker static const size_t hexchars_size = 16;
108*6a54128fSAndroid Build Coastguard Worker 
109*6a54128fSAndroid Build Coastguard Worker #define SHA512_LENGTH 64
110*6a54128fSAndroid Build Coastguard Worker #define EXT2FS_KEY_TYPE_LOGON "logon"
111*6a54128fSAndroid Build Coastguard Worker #define EXT2FS_KEY_DESC_PREFIX "ext4:"
112*6a54128fSAndroid Build Coastguard Worker #define EXT2FS_KEY_DESC_PREFIX_SIZE 5
113*6a54128fSAndroid Build Coastguard Worker 
114*6a54128fSAndroid Build Coastguard Worker #define EXT4_IOC_SET_ENCRYPTION_POLICY      _IOR('f', 19, struct ext4_encryption_policy)
115*6a54128fSAndroid Build Coastguard Worker #define EXT4_IOC_GET_ENCRYPTION_POLICY      _IOW('f', 21, struct ext4_encryption_policy)
116*6a54128fSAndroid Build Coastguard Worker 
int_log2(int arg)117*6a54128fSAndroid Build Coastguard Worker static int int_log2(int arg)
118*6a54128fSAndroid Build Coastguard Worker {
119*6a54128fSAndroid Build Coastguard Worker 	int     l = 0;
120*6a54128fSAndroid Build Coastguard Worker 
121*6a54128fSAndroid Build Coastguard Worker 	arg >>= 1;
122*6a54128fSAndroid Build Coastguard Worker 	while (arg) {
123*6a54128fSAndroid Build Coastguard Worker 		l++;
124*6a54128fSAndroid Build Coastguard Worker 		arg >>= 1;
125*6a54128fSAndroid Build Coastguard Worker 	}
126*6a54128fSAndroid Build Coastguard Worker 	return l;
127*6a54128fSAndroid Build Coastguard Worker }
128*6a54128fSAndroid Build Coastguard Worker 
validate_paths(int argc,char * argv[],int path_start_index)129*6a54128fSAndroid Build Coastguard Worker static void validate_paths(int argc, char *argv[], int path_start_index)
130*6a54128fSAndroid Build Coastguard Worker {
131*6a54128fSAndroid Build Coastguard Worker 	int x;
132*6a54128fSAndroid Build Coastguard Worker 	int valid = 1;
133*6a54128fSAndroid Build Coastguard Worker 	struct stat st;
134*6a54128fSAndroid Build Coastguard Worker 
135*6a54128fSAndroid Build Coastguard Worker 	for (x = path_start_index; x < argc; x++) {
136*6a54128fSAndroid Build Coastguard Worker 		int ret = access(argv[x], W_OK);
137*6a54128fSAndroid Build Coastguard Worker 		if (ret) {
138*6a54128fSAndroid Build Coastguard Worker 		invalid:
139*6a54128fSAndroid Build Coastguard Worker 			perror(argv[x]);
140*6a54128fSAndroid Build Coastguard Worker 			valid = 0;
141*6a54128fSAndroid Build Coastguard Worker 			continue;
142*6a54128fSAndroid Build Coastguard Worker 		}
143*6a54128fSAndroid Build Coastguard Worker 		ret = stat(argv[x], &st);
144*6a54128fSAndroid Build Coastguard Worker 		if (ret < 0)
145*6a54128fSAndroid Build Coastguard Worker 			goto invalid;
146*6a54128fSAndroid Build Coastguard Worker 		if (!S_ISDIR(st.st_mode)) {
147*6a54128fSAndroid Build Coastguard Worker 			fprintf(stderr, "%s is not a directory\n", argv[x]);
148*6a54128fSAndroid Build Coastguard Worker 			goto invalid;
149*6a54128fSAndroid Build Coastguard Worker 		}
150*6a54128fSAndroid Build Coastguard Worker 	}
151*6a54128fSAndroid Build Coastguard Worker 	if (!valid)
152*6a54128fSAndroid Build Coastguard Worker 		exit(1);
153*6a54128fSAndroid Build Coastguard Worker }
154*6a54128fSAndroid Build Coastguard Worker 
hex2byte(const char * hex,size_t hex_size,unsigned char * bytes,size_t bytes_size)155*6a54128fSAndroid Build Coastguard Worker static int hex2byte(const char *hex, size_t hex_size, unsigned char *bytes,
156*6a54128fSAndroid Build Coastguard Worker 		    size_t bytes_size)
157*6a54128fSAndroid Build Coastguard Worker {
158*6a54128fSAndroid Build Coastguard Worker 	size_t x;
159*6a54128fSAndroid Build Coastguard Worker 	unsigned char *h, *l;
160*6a54128fSAndroid Build Coastguard Worker 
161*6a54128fSAndroid Build Coastguard Worker 	if (hex_size % 2)
162*6a54128fSAndroid Build Coastguard Worker 		return -EINVAL;
163*6a54128fSAndroid Build Coastguard Worker 	for (x = 0; x < hex_size; x += 2) {
164*6a54128fSAndroid Build Coastguard Worker 		h = memchr(hexchars, hex[x], hexchars_size);
165*6a54128fSAndroid Build Coastguard Worker 		if (!h)
166*6a54128fSAndroid Build Coastguard Worker 			return -EINVAL;
167*6a54128fSAndroid Build Coastguard Worker 		l = memchr(hexchars, hex[x + 1], hexchars_size);
168*6a54128fSAndroid Build Coastguard Worker 		if (!l)
169*6a54128fSAndroid Build Coastguard Worker 			return -EINVAL;
170*6a54128fSAndroid Build Coastguard Worker 		if ((x >> 1) >= bytes_size)
171*6a54128fSAndroid Build Coastguard Worker 			return -EINVAL;
172*6a54128fSAndroid Build Coastguard Worker 		bytes[x >> 1] = (((unsigned char)(h - hexchars) << 4) +
173*6a54128fSAndroid Build Coastguard Worker 				 (unsigned char)(l - hexchars));
174*6a54128fSAndroid Build Coastguard Worker 	}
175*6a54128fSAndroid Build Coastguard Worker 	return 0;
176*6a54128fSAndroid Build Coastguard Worker }
177*6a54128fSAndroid Build Coastguard Worker 
178*6a54128fSAndroid Build Coastguard Worker /*
179*6a54128fSAndroid Build Coastguard Worker  * Salt handling
180*6a54128fSAndroid Build Coastguard Worker  */
181*6a54128fSAndroid Build Coastguard Worker struct salt {
182*6a54128fSAndroid Build Coastguard Worker 	unsigned char *salt;
183*6a54128fSAndroid Build Coastguard Worker 	char key_ref_str[EXT4_KEY_REF_STR_BUF_SIZE];
184*6a54128fSAndroid Build Coastguard Worker 	unsigned char key_desc[EXT4_KEY_DESCRIPTOR_SIZE];
185*6a54128fSAndroid Build Coastguard Worker 	unsigned char key[EXT4_MAX_KEY_SIZE];
186*6a54128fSAndroid Build Coastguard Worker 	size_t salt_len;
187*6a54128fSAndroid Build Coastguard Worker };
188*6a54128fSAndroid Build Coastguard Worker struct salt *salt_list;
189*6a54128fSAndroid Build Coastguard Worker unsigned num_salt;
190*6a54128fSAndroid Build Coastguard Worker unsigned max_salt;
191*6a54128fSAndroid Build Coastguard Worker char in_passphrase[EXT4_MAX_PASSPHRASE_SIZE];
192*6a54128fSAndroid Build Coastguard Worker 
find_by_salt(unsigned char * salt,size_t salt_len)193*6a54128fSAndroid Build Coastguard Worker static struct salt *find_by_salt(unsigned char *salt, size_t salt_len)
194*6a54128fSAndroid Build Coastguard Worker {
195*6a54128fSAndroid Build Coastguard Worker 	unsigned int i;
196*6a54128fSAndroid Build Coastguard Worker 	struct salt *p;
197*6a54128fSAndroid Build Coastguard Worker 
198*6a54128fSAndroid Build Coastguard Worker 	for (i = 0, p = salt_list; i < num_salt; i++, p++)
199*6a54128fSAndroid Build Coastguard Worker 		if ((p->salt_len == salt_len) &&
200*6a54128fSAndroid Build Coastguard Worker 		    !memcmp(p->salt, salt, salt_len))
201*6a54128fSAndroid Build Coastguard Worker 			return p;
202*6a54128fSAndroid Build Coastguard Worker 	return NULL;
203*6a54128fSAndroid Build Coastguard Worker }
204*6a54128fSAndroid Build Coastguard Worker 
add_salt(unsigned char * salt,size_t salt_len)205*6a54128fSAndroid Build Coastguard Worker static void add_salt(unsigned char *salt, size_t salt_len)
206*6a54128fSAndroid Build Coastguard Worker {
207*6a54128fSAndroid Build Coastguard Worker 	if (find_by_salt(salt, salt_len))
208*6a54128fSAndroid Build Coastguard Worker 		return;
209*6a54128fSAndroid Build Coastguard Worker 	if (num_salt >= max_salt) {
210*6a54128fSAndroid Build Coastguard Worker 		max_salt = num_salt + 10;
211*6a54128fSAndroid Build Coastguard Worker 		salt_list = realloc(salt_list, max_salt * sizeof(struct salt));
212*6a54128fSAndroid Build Coastguard Worker 		if (!salt_list) {
213*6a54128fSAndroid Build Coastguard Worker 			fprintf(stderr, "Couldn't allocate salt list\n");
214*6a54128fSAndroid Build Coastguard Worker 			exit(1);
215*6a54128fSAndroid Build Coastguard Worker 		}
216*6a54128fSAndroid Build Coastguard Worker 	}
217*6a54128fSAndroid Build Coastguard Worker 	salt_list[num_salt].salt = salt;
218*6a54128fSAndroid Build Coastguard Worker 	salt_list[num_salt].salt_len = salt_len;
219*6a54128fSAndroid Build Coastguard Worker 	num_salt++;
220*6a54128fSAndroid Build Coastguard Worker }
221*6a54128fSAndroid Build Coastguard Worker 
clear_secrets(void)222*6a54128fSAndroid Build Coastguard Worker static void clear_secrets(void)
223*6a54128fSAndroid Build Coastguard Worker {
224*6a54128fSAndroid Build Coastguard Worker 	if (salt_list) {
225*6a54128fSAndroid Build Coastguard Worker 		memset(salt_list, 0, sizeof(struct salt) * max_salt);
226*6a54128fSAndroid Build Coastguard Worker 		free(salt_list);
227*6a54128fSAndroid Build Coastguard Worker 		salt_list = NULL;
228*6a54128fSAndroid Build Coastguard Worker 	}
229*6a54128fSAndroid Build Coastguard Worker 	memset(in_passphrase, 0, sizeof(in_passphrase));
230*6a54128fSAndroid Build Coastguard Worker }
231*6a54128fSAndroid Build Coastguard Worker 
die_signal_handler(int signum EXT2FS_ATTR ((unused)),siginfo_t * siginfo EXT2FS_ATTR ((unused)),void * context EXT2FS_ATTR ((unused)))232*6a54128fSAndroid Build Coastguard Worker static void die_signal_handler(int signum EXT2FS_ATTR((unused)),
233*6a54128fSAndroid Build Coastguard Worker 			       siginfo_t *siginfo EXT2FS_ATTR((unused)),
234*6a54128fSAndroid Build Coastguard Worker 			       void *context EXT2FS_ATTR((unused)))
235*6a54128fSAndroid Build Coastguard Worker {
236*6a54128fSAndroid Build Coastguard Worker 	clear_secrets();
237*6a54128fSAndroid Build Coastguard Worker 	exit(-1);
238*6a54128fSAndroid Build Coastguard Worker }
239*6a54128fSAndroid Build Coastguard Worker 
sigcatcher_setup(void)240*6a54128fSAndroid Build Coastguard Worker static void sigcatcher_setup(void)
241*6a54128fSAndroid Build Coastguard Worker {
242*6a54128fSAndroid Build Coastguard Worker 	struct sigaction	sa;
243*6a54128fSAndroid Build Coastguard Worker 
244*6a54128fSAndroid Build Coastguard Worker 	memset(&sa, 0, sizeof(struct sigaction));
245*6a54128fSAndroid Build Coastguard Worker 	sa.sa_sigaction = die_signal_handler;
246*6a54128fSAndroid Build Coastguard Worker 	sa.sa_flags = SA_SIGINFO;
247*6a54128fSAndroid Build Coastguard Worker 
248*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGHUP, &sa, 0);
249*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGINT, &sa, 0);
250*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGQUIT, &sa, 0);
251*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGFPE, &sa, 0);
252*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGILL, &sa, 0);
253*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGBUS, &sa, 0);
254*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGSEGV, &sa, 0);
255*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGABRT, &sa, 0);
256*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGPIPE, &sa, 0);
257*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGALRM, &sa, 0);
258*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGTERM, &sa, 0);
259*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGUSR1, &sa, 0);
260*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGUSR2, &sa, 0);
261*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGPOLL, &sa, 0);
262*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGPROF, &sa, 0);
263*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGSYS, &sa, 0);
264*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGTRAP, &sa, 0);
265*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGVTALRM, &sa, 0);
266*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGXCPU, &sa, 0);
267*6a54128fSAndroid Build Coastguard Worker 	sigaction(SIGXFSZ, &sa, 0);
268*6a54128fSAndroid Build Coastguard Worker }
269*6a54128fSAndroid Build Coastguard Worker 
270*6a54128fSAndroid Build Coastguard Worker 
271*6a54128fSAndroid Build Coastguard Worker #define PARSE_FLAGS_NOTSUPP_OK	0x0001
272*6a54128fSAndroid Build Coastguard Worker #define PARSE_FLAGS_FORCE_FN	0x0002
273*6a54128fSAndroid Build Coastguard Worker 
parse_salt(char * salt_str,int flags)274*6a54128fSAndroid Build Coastguard Worker static void parse_salt(char *salt_str, int flags)
275*6a54128fSAndroid Build Coastguard Worker {
276*6a54128fSAndroid Build Coastguard Worker 	unsigned char buf[EXT4_MAX_SALT_SIZE];
277*6a54128fSAndroid Build Coastguard Worker 	char *cp = salt_str;
278*6a54128fSAndroid Build Coastguard Worker 	unsigned char *salt_buf;
279*6a54128fSAndroid Build Coastguard Worker 	int fd, ret, salt_len = 0;
280*6a54128fSAndroid Build Coastguard Worker 
281*6a54128fSAndroid Build Coastguard Worker 	if (flags & PARSE_FLAGS_FORCE_FN)
282*6a54128fSAndroid Build Coastguard Worker 		goto salt_from_filename;
283*6a54128fSAndroid Build Coastguard Worker 	if (strncmp(cp, "s:", 2) == 0) {
284*6a54128fSAndroid Build Coastguard Worker 		cp += 2;
285*6a54128fSAndroid Build Coastguard Worker 		salt_len = strlen(cp);
286*6a54128fSAndroid Build Coastguard Worker 		if (salt_len >= EXT4_MAX_SALT_SIZE)
287*6a54128fSAndroid Build Coastguard Worker 			goto invalid_salt;
288*6a54128fSAndroid Build Coastguard Worker 		strncpy((char *) buf, cp, sizeof(buf));
289*6a54128fSAndroid Build Coastguard Worker 	} else if (cp[0] == '/') {
290*6a54128fSAndroid Build Coastguard Worker 	salt_from_filename:
291*6a54128fSAndroid Build Coastguard Worker 		fd = open(cp, O_RDONLY | O_DIRECTORY);
292*6a54128fSAndroid Build Coastguard Worker 		if (fd == -1 && errno == ENOTDIR)
293*6a54128fSAndroid Build Coastguard Worker 			fd = open(cp, O_RDONLY);
294*6a54128fSAndroid Build Coastguard Worker 		if (fd == -1) {
295*6a54128fSAndroid Build Coastguard Worker 			perror(cp);
296*6a54128fSAndroid Build Coastguard Worker 			exit(1);
297*6a54128fSAndroid Build Coastguard Worker 		}
298*6a54128fSAndroid Build Coastguard Worker 		ret = ioctl(fd, EXT4_IOC_GET_ENCRYPTION_PWSALT, &buf);
299*6a54128fSAndroid Build Coastguard Worker 		close(fd);
300*6a54128fSAndroid Build Coastguard Worker 		if (ret < 0) {
301*6a54128fSAndroid Build Coastguard Worker 			if (flags & PARSE_FLAGS_NOTSUPP_OK)
302*6a54128fSAndroid Build Coastguard Worker 				return;
303*6a54128fSAndroid Build Coastguard Worker 			perror("EXT4_IOC_GET_ENCRYPTION_PWSALT");
304*6a54128fSAndroid Build Coastguard Worker 			exit(1);
305*6a54128fSAndroid Build Coastguard Worker 		}
306*6a54128fSAndroid Build Coastguard Worker 		if (options & OPT_VERBOSE) {
307*6a54128fSAndroid Build Coastguard Worker 			char tmp[80];
308*6a54128fSAndroid Build Coastguard Worker 			uuid_unparse(buf, tmp);
309*6a54128fSAndroid Build Coastguard Worker 			printf("%s has pw salt %s\n", cp, tmp);
310*6a54128fSAndroid Build Coastguard Worker 		}
311*6a54128fSAndroid Build Coastguard Worker 		salt_len = 16;
312*6a54128fSAndroid Build Coastguard Worker 	} else if (strncmp(cp, "f:", 2) == 0) {
313*6a54128fSAndroid Build Coastguard Worker 		cp += 2;
314*6a54128fSAndroid Build Coastguard Worker 		goto salt_from_filename;
315*6a54128fSAndroid Build Coastguard Worker 	} else if (strncmp(cp, "0x", 2) == 0) {
316*6a54128fSAndroid Build Coastguard Worker 		unsigned char *h, *l;
317*6a54128fSAndroid Build Coastguard Worker 
318*6a54128fSAndroid Build Coastguard Worker 		cp += 2;
319*6a54128fSAndroid Build Coastguard Worker 		if (strlen(cp) & 1)
320*6a54128fSAndroid Build Coastguard Worker 			goto invalid_salt;
321*6a54128fSAndroid Build Coastguard Worker 		while (*cp) {
322*6a54128fSAndroid Build Coastguard Worker 			if (salt_len >= EXT4_MAX_SALT_SIZE)
323*6a54128fSAndroid Build Coastguard Worker 				goto invalid_salt;
324*6a54128fSAndroid Build Coastguard Worker 			h = memchr(hexchars, *cp++, hexchars_size);
325*6a54128fSAndroid Build Coastguard Worker 			l = memchr(hexchars, *cp++, hexchars_size);
326*6a54128fSAndroid Build Coastguard Worker 			if (!h || !l)
327*6a54128fSAndroid Build Coastguard Worker 				goto invalid_salt;
328*6a54128fSAndroid Build Coastguard Worker 			buf[salt_len++] =
329*6a54128fSAndroid Build Coastguard Worker 				(((unsigned char)(h - hexchars) << 4) +
330*6a54128fSAndroid Build Coastguard Worker 				 (unsigned char)(l - hexchars));
331*6a54128fSAndroid Build Coastguard Worker 		}
332*6a54128fSAndroid Build Coastguard Worker 	} else if (uuid_parse(cp, buf) == 0) {
333*6a54128fSAndroid Build Coastguard Worker 		salt_len = 16;
334*6a54128fSAndroid Build Coastguard Worker 	} else {
335*6a54128fSAndroid Build Coastguard Worker 	invalid_salt:
336*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "Invalid salt: %s\n", salt_str);
337*6a54128fSAndroid Build Coastguard Worker 		exit(1);
338*6a54128fSAndroid Build Coastguard Worker 	}
339*6a54128fSAndroid Build Coastguard Worker 	salt_buf = malloc(salt_len);
340*6a54128fSAndroid Build Coastguard Worker 	if (!salt_buf) {
341*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "Couldn't allocate salt\n");
342*6a54128fSAndroid Build Coastguard Worker 		exit(1);
343*6a54128fSAndroid Build Coastguard Worker 	}
344*6a54128fSAndroid Build Coastguard Worker 	memcpy(salt_buf, buf, salt_len);
345*6a54128fSAndroid Build Coastguard Worker 	add_salt(salt_buf, salt_len);
346*6a54128fSAndroid Build Coastguard Worker }
347*6a54128fSAndroid Build Coastguard Worker 
set_policy(struct salt * set_salt,int pad,int argc,char * argv[],int path_start_index)348*6a54128fSAndroid Build Coastguard Worker static void set_policy(struct salt *set_salt, int pad,
349*6a54128fSAndroid Build Coastguard Worker 		       int argc, char *argv[], int path_start_index)
350*6a54128fSAndroid Build Coastguard Worker {
351*6a54128fSAndroid Build Coastguard Worker 	struct salt *salt;
352*6a54128fSAndroid Build Coastguard Worker 	struct ext4_encryption_policy policy;
353*6a54128fSAndroid Build Coastguard Worker 	uuid_t	uu;
354*6a54128fSAndroid Build Coastguard Worker 	int fd;
355*6a54128fSAndroid Build Coastguard Worker 	int x;
356*6a54128fSAndroid Build Coastguard Worker 	int rc;
357*6a54128fSAndroid Build Coastguard Worker 
358*6a54128fSAndroid Build Coastguard Worker 	if ((pad != 4) && (pad != 8) &&
359*6a54128fSAndroid Build Coastguard Worker 		 (pad != 16) && (pad != 32)) {
360*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "Invalid padding %d\n", pad);
361*6a54128fSAndroid Build Coastguard Worker 		exit(1);
362*6a54128fSAndroid Build Coastguard Worker 	}
363*6a54128fSAndroid Build Coastguard Worker 
364*6a54128fSAndroid Build Coastguard Worker 	for (x = path_start_index; x < argc; x++) {
365*6a54128fSAndroid Build Coastguard Worker 		fd = open(argv[x], O_DIRECTORY);
366*6a54128fSAndroid Build Coastguard Worker 		if (fd == -1) {
367*6a54128fSAndroid Build Coastguard Worker 			perror(argv[x]);
368*6a54128fSAndroid Build Coastguard Worker 			exit(1);
369*6a54128fSAndroid Build Coastguard Worker 		}
370*6a54128fSAndroid Build Coastguard Worker 		if (set_salt)
371*6a54128fSAndroid Build Coastguard Worker 			salt = set_salt;
372*6a54128fSAndroid Build Coastguard Worker 		else {
373*6a54128fSAndroid Build Coastguard Worker 			if (ioctl(fd, EXT4_IOC_GET_ENCRYPTION_PWSALT,
374*6a54128fSAndroid Build Coastguard Worker 				  &uu) < 0) {
375*6a54128fSAndroid Build Coastguard Worker 				perror("EXT4_IOC_GET_ENCRYPTION_PWSALT");
376*6a54128fSAndroid Build Coastguard Worker 				exit(1);
377*6a54128fSAndroid Build Coastguard Worker 			}
378*6a54128fSAndroid Build Coastguard Worker 			salt = find_by_salt(uu, sizeof(uu));
379*6a54128fSAndroid Build Coastguard Worker 			if (!salt) {
380*6a54128fSAndroid Build Coastguard Worker 				fprintf(stderr, "Couldn't find salt!?!\n");
381*6a54128fSAndroid Build Coastguard Worker 				exit(1);
382*6a54128fSAndroid Build Coastguard Worker 			}
383*6a54128fSAndroid Build Coastguard Worker 		}
384*6a54128fSAndroid Build Coastguard Worker 		policy.version = 0;
385*6a54128fSAndroid Build Coastguard Worker 		policy.contents_encryption_mode =
386*6a54128fSAndroid Build Coastguard Worker 			EXT4_ENCRYPTION_MODE_AES_256_XTS;
387*6a54128fSAndroid Build Coastguard Worker 		policy.filenames_encryption_mode =
388*6a54128fSAndroid Build Coastguard Worker 			EXT4_ENCRYPTION_MODE_AES_256_CTS;
389*6a54128fSAndroid Build Coastguard Worker 		policy.flags = int_log2(pad >> 2);
390*6a54128fSAndroid Build Coastguard Worker 		memcpy(policy.master_key_descriptor, salt->key_desc,
391*6a54128fSAndroid Build Coastguard Worker 		       EXT4_KEY_DESCRIPTOR_SIZE);
392*6a54128fSAndroid Build Coastguard Worker 		rc = ioctl(fd, EXT4_IOC_SET_ENCRYPTION_POLICY, &policy);
393*6a54128fSAndroid Build Coastguard Worker 		close(fd);
394*6a54128fSAndroid Build Coastguard Worker 		if (rc) {
395*6a54128fSAndroid Build Coastguard Worker 			printf("Error [%s] setting policy.\nThe key descriptor "
396*6a54128fSAndroid Build Coastguard Worker 			       "[%s] may not match the existing encryption "
397*6a54128fSAndroid Build Coastguard Worker 			       "context for directory [%s].\n",
398*6a54128fSAndroid Build Coastguard Worker 			       strerror(errno), salt->key_ref_str, argv[x]);
399*6a54128fSAndroid Build Coastguard Worker 			continue;
400*6a54128fSAndroid Build Coastguard Worker 		}
401*6a54128fSAndroid Build Coastguard Worker 		printf("Key with descriptor [%s] applied to %s.\n",
402*6a54128fSAndroid Build Coastguard Worker 		       salt->key_ref_str, argv[x]);
403*6a54128fSAndroid Build Coastguard Worker 	}
404*6a54128fSAndroid Build Coastguard Worker }
405*6a54128fSAndroid Build Coastguard Worker 
pbkdf2_sha512(const char * passphrase,struct salt * salt,unsigned int count,unsigned char derived_key[EXT4_MAX_KEY_SIZE])406*6a54128fSAndroid Build Coastguard Worker static void pbkdf2_sha512(const char *passphrase, struct salt *salt,
407*6a54128fSAndroid Build Coastguard Worker 			  unsigned int count,
408*6a54128fSAndroid Build Coastguard Worker 			  unsigned char derived_key[EXT4_MAX_KEY_SIZE])
409*6a54128fSAndroid Build Coastguard Worker {
410*6a54128fSAndroid Build Coastguard Worker 	size_t passphrase_size = strlen(passphrase);
411*6a54128fSAndroid Build Coastguard Worker 	unsigned char buf[SHA512_LENGTH + EXT4_MAX_PASSPHRASE_SIZE] = {0};
412*6a54128fSAndroid Build Coastguard Worker 	unsigned char tempbuf[SHA512_LENGTH] = {0};
413*6a54128fSAndroid Build Coastguard Worker 	char final[SHA512_LENGTH] = {0};
414*6a54128fSAndroid Build Coastguard Worker 	unsigned char saltbuf[EXT4_MAX_SALT_SIZE + EXT4_MAX_PASSPHRASE_SIZE] = {0};
415*6a54128fSAndroid Build Coastguard Worker 	int actual_buf_len = SHA512_LENGTH + passphrase_size;
416*6a54128fSAndroid Build Coastguard Worker 	int actual_saltbuf_len = EXT4_MAX_SALT_SIZE + passphrase_size;
417*6a54128fSAndroid Build Coastguard Worker 	unsigned int x, y;
418*6a54128fSAndroid Build Coastguard Worker 	__u32 *final_u32 = (__u32 *)final;
419*6a54128fSAndroid Build Coastguard Worker 	__u32 *temp_u32 = (__u32 *)tempbuf;
420*6a54128fSAndroid Build Coastguard Worker 
421*6a54128fSAndroid Build Coastguard Worker 	if (passphrase_size > EXT4_MAX_PASSPHRASE_SIZE) {
422*6a54128fSAndroid Build Coastguard Worker 		printf("Passphrase size is %zd; max is %d.\n", passphrase_size,
423*6a54128fSAndroid Build Coastguard Worker 		       EXT4_MAX_PASSPHRASE_SIZE);
424*6a54128fSAndroid Build Coastguard Worker 		exit(1);
425*6a54128fSAndroid Build Coastguard Worker 	}
426*6a54128fSAndroid Build Coastguard Worker 	if (salt->salt_len > EXT4_MAX_SALT_SIZE) {
427*6a54128fSAndroid Build Coastguard Worker 		printf("Salt size is %zd; max is %d.\n", salt->salt_len,
428*6a54128fSAndroid Build Coastguard Worker 		       EXT4_MAX_SALT_SIZE);
429*6a54128fSAndroid Build Coastguard Worker 		exit(1);
430*6a54128fSAndroid Build Coastguard Worker 	}
431*6a54128fSAndroid Build Coastguard Worker 	assert(EXT4_MAX_KEY_SIZE <= SHA512_LENGTH);
432*6a54128fSAndroid Build Coastguard Worker 
433*6a54128fSAndroid Build Coastguard Worker 	memcpy(saltbuf, salt->salt, salt->salt_len);
434*6a54128fSAndroid Build Coastguard Worker 	memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size);
435*6a54128fSAndroid Build Coastguard Worker 
436*6a54128fSAndroid Build Coastguard Worker 	memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size);
437*6a54128fSAndroid Build Coastguard Worker 
438*6a54128fSAndroid Build Coastguard Worker 	for (x = 0; x < count; ++x) {
439*6a54128fSAndroid Build Coastguard Worker 		if (x == 0) {
440*6a54128fSAndroid Build Coastguard Worker 			ext2fs_sha512(saltbuf, actual_saltbuf_len, tempbuf);
441*6a54128fSAndroid Build Coastguard Worker 		} else {
442*6a54128fSAndroid Build Coastguard Worker 			/*
443*6a54128fSAndroid Build Coastguard Worker 			 * buf: [previous hash || passphrase]
444*6a54128fSAndroid Build Coastguard Worker 			 */
445*6a54128fSAndroid Build Coastguard Worker 			memcpy(buf, tempbuf, SHA512_LENGTH);
446*6a54128fSAndroid Build Coastguard Worker 			ext2fs_sha512(buf, actual_buf_len, tempbuf);
447*6a54128fSAndroid Build Coastguard Worker 		}
448*6a54128fSAndroid Build Coastguard Worker 		for (y = 0; y < (sizeof(final) / sizeof(*final_u32)); ++y)
449*6a54128fSAndroid Build Coastguard Worker 			final_u32[y] = final_u32[y] ^ temp_u32[y];
450*6a54128fSAndroid Build Coastguard Worker 	}
451*6a54128fSAndroid Build Coastguard Worker 	memcpy(derived_key, final, EXT4_MAX_KEY_SIZE);
452*6a54128fSAndroid Build Coastguard Worker }
453*6a54128fSAndroid Build Coastguard Worker 
disable_echo(struct termios * saved_settings)454*6a54128fSAndroid Build Coastguard Worker static int disable_echo(struct termios *saved_settings)
455*6a54128fSAndroid Build Coastguard Worker {
456*6a54128fSAndroid Build Coastguard Worker 	struct termios current_settings;
457*6a54128fSAndroid Build Coastguard Worker 	int rc = 0;
458*6a54128fSAndroid Build Coastguard Worker 
459*6a54128fSAndroid Build Coastguard Worker 	rc = tcgetattr(0, &current_settings);
460*6a54128fSAndroid Build Coastguard Worker 	if (rc)
461*6a54128fSAndroid Build Coastguard Worker 		return rc;
462*6a54128fSAndroid Build Coastguard Worker 	*saved_settings = current_settings;
463*6a54128fSAndroid Build Coastguard Worker 	current_settings.c_lflag &= ~ECHO;
464*6a54128fSAndroid Build Coastguard Worker 	rc = tcsetattr(0, TCSANOW, &current_settings);
465*6a54128fSAndroid Build Coastguard Worker 
466*6a54128fSAndroid Build Coastguard Worker 	return rc;
467*6a54128fSAndroid Build Coastguard Worker }
468*6a54128fSAndroid Build Coastguard Worker 
get_passphrase(char * passphrase,int len)469*6a54128fSAndroid Build Coastguard Worker static void get_passphrase(char *passphrase, int len)
470*6a54128fSAndroid Build Coastguard Worker {
471*6a54128fSAndroid Build Coastguard Worker 	char *p;
472*6a54128fSAndroid Build Coastguard Worker 	struct termios current_settings;
473*6a54128fSAndroid Build Coastguard Worker 
474*6a54128fSAndroid Build Coastguard Worker 	assert(len > 0);
475*6a54128fSAndroid Build Coastguard Worker 	disable_echo(&current_settings);
476*6a54128fSAndroid Build Coastguard Worker 	p = fgets(passphrase, len, stdin);
477*6a54128fSAndroid Build Coastguard Worker 	tcsetattr(0, TCSANOW, &current_settings);
478*6a54128fSAndroid Build Coastguard Worker 	printf("\n");
479*6a54128fSAndroid Build Coastguard Worker 	if (!p) {
480*6a54128fSAndroid Build Coastguard Worker 		printf("Aborting.\n");
481*6a54128fSAndroid Build Coastguard Worker 		exit(1);
482*6a54128fSAndroid Build Coastguard Worker 	}
483*6a54128fSAndroid Build Coastguard Worker 	p = strrchr(passphrase, '\n');
484*6a54128fSAndroid Build Coastguard Worker 	if (!p)
485*6a54128fSAndroid Build Coastguard Worker 		p = passphrase + len - 1;
486*6a54128fSAndroid Build Coastguard Worker 	*p = '\0';
487*6a54128fSAndroid Build Coastguard Worker }
488*6a54128fSAndroid Build Coastguard Worker 
489*6a54128fSAndroid Build Coastguard Worker struct keyring_map {
490*6a54128fSAndroid Build Coastguard Worker 	char name[4];
491*6a54128fSAndroid Build Coastguard Worker 	size_t name_len;
492*6a54128fSAndroid Build Coastguard Worker 	int code;
493*6a54128fSAndroid Build Coastguard Worker };
494*6a54128fSAndroid Build Coastguard Worker 
495*6a54128fSAndroid Build Coastguard Worker static const struct keyring_map keyrings[] = {
496*6a54128fSAndroid Build Coastguard Worker 	{"@us", 3, KEY_SPEC_USER_SESSION_KEYRING},
497*6a54128fSAndroid Build Coastguard Worker 	{"@u", 2, KEY_SPEC_USER_KEYRING},
498*6a54128fSAndroid Build Coastguard Worker 	{"@s", 2, KEY_SPEC_SESSION_KEYRING},
499*6a54128fSAndroid Build Coastguard Worker 	{"@g", 2, KEY_SPEC_GROUP_KEYRING},
500*6a54128fSAndroid Build Coastguard Worker 	{"@p", 2, KEY_SPEC_PROCESS_KEYRING},
501*6a54128fSAndroid Build Coastguard Worker 	{"@t", 2, KEY_SPEC_THREAD_KEYRING},
502*6a54128fSAndroid Build Coastguard Worker };
503*6a54128fSAndroid Build Coastguard Worker 
get_keyring_id(const char * keyring)504*6a54128fSAndroid Build Coastguard Worker static int get_keyring_id(const char *keyring)
505*6a54128fSAndroid Build Coastguard Worker {
506*6a54128fSAndroid Build Coastguard Worker 	unsigned int x;
507*6a54128fSAndroid Build Coastguard Worker 	char *end;
508*6a54128fSAndroid Build Coastguard Worker 
509*6a54128fSAndroid Build Coastguard Worker 	/*
510*6a54128fSAndroid Build Coastguard Worker 	 * If no keyring is specified, by default use either the user
511*6a54128fSAndroid Build Coastguard Worker 	 * session keyring or the session keyring.  Fetching the
512*6a54128fSAndroid Build Coastguard Worker 	 * session keyring will return the user session keyring if no
513*6a54128fSAndroid Build Coastguard Worker 	 * session keyring has been set.
514*6a54128fSAndroid Build Coastguard Worker 	 */
515*6a54128fSAndroid Build Coastguard Worker 	if (keyring == NULL)
516*6a54128fSAndroid Build Coastguard Worker 		return KEY_SPEC_SESSION_KEYRING;
517*6a54128fSAndroid Build Coastguard Worker 	for (x = 0; x < (sizeof(keyrings) / sizeof(keyrings[0])); ++x) {
518*6a54128fSAndroid Build Coastguard Worker 		if (strcmp(keyring, keyrings[x].name) == 0) {
519*6a54128fSAndroid Build Coastguard Worker 			return keyrings[x].code;
520*6a54128fSAndroid Build Coastguard Worker 		}
521*6a54128fSAndroid Build Coastguard Worker 	}
522*6a54128fSAndroid Build Coastguard Worker 	x = strtoul(keyring, &end, 10);
523*6a54128fSAndroid Build Coastguard Worker 	if (*end == '\0') {
524*6a54128fSAndroid Build Coastguard Worker 		if (keyctl(KEYCTL_DESCRIBE, x, NULL, 0) < 0)
525*6a54128fSAndroid Build Coastguard Worker 			return 0;
526*6a54128fSAndroid Build Coastguard Worker 		return x;
527*6a54128fSAndroid Build Coastguard Worker 	}
528*6a54128fSAndroid Build Coastguard Worker 	return 0;
529*6a54128fSAndroid Build Coastguard Worker }
530*6a54128fSAndroid Build Coastguard Worker 
generate_key_ref_str(struct salt * salt)531*6a54128fSAndroid Build Coastguard Worker static void generate_key_ref_str(struct salt *salt)
532*6a54128fSAndroid Build Coastguard Worker {
533*6a54128fSAndroid Build Coastguard Worker 	unsigned char key_ref1[SHA512_LENGTH];
534*6a54128fSAndroid Build Coastguard Worker 	unsigned char key_ref2[SHA512_LENGTH];
535*6a54128fSAndroid Build Coastguard Worker 	int x;
536*6a54128fSAndroid Build Coastguard Worker 
537*6a54128fSAndroid Build Coastguard Worker 	ext2fs_sha512(salt->key, EXT4_MAX_KEY_SIZE, key_ref1);
538*6a54128fSAndroid Build Coastguard Worker 	ext2fs_sha512(key_ref1, SHA512_LENGTH, key_ref2);
539*6a54128fSAndroid Build Coastguard Worker 	memcpy(salt->key_desc, key_ref2, EXT4_KEY_DESCRIPTOR_SIZE);
540*6a54128fSAndroid Build Coastguard Worker 	for (x = 0; x < EXT4_KEY_DESCRIPTOR_SIZE; ++x) {
541*6a54128fSAndroid Build Coastguard Worker 		sprintf(&salt->key_ref_str[x * 2], "%02x",
542*6a54128fSAndroid Build Coastguard Worker 			salt->key_desc[x]);
543*6a54128fSAndroid Build Coastguard Worker 	}
544*6a54128fSAndroid Build Coastguard Worker 	salt->key_ref_str[EXT4_KEY_REF_STR_BUF_SIZE - 1] = '\0';
545*6a54128fSAndroid Build Coastguard Worker }
546*6a54128fSAndroid Build Coastguard Worker 
insert_key_into_keyring(const char * keyring,struct salt * salt)547*6a54128fSAndroid Build Coastguard Worker static void insert_key_into_keyring(const char *keyring, struct salt *salt)
548*6a54128fSAndroid Build Coastguard Worker {
549*6a54128fSAndroid Build Coastguard Worker 	int keyring_id = get_keyring_id(keyring);
550*6a54128fSAndroid Build Coastguard Worker 	struct ext4_encryption_key key;
551*6a54128fSAndroid Build Coastguard Worker 	char key_ref_full[EXT2FS_KEY_DESC_PREFIX_SIZE +
552*6a54128fSAndroid Build Coastguard Worker 			  EXT4_KEY_REF_STR_BUF_SIZE];
553*6a54128fSAndroid Build Coastguard Worker 	int rc;
554*6a54128fSAndroid Build Coastguard Worker 
555*6a54128fSAndroid Build Coastguard Worker 	if (keyring_id == 0) {
556*6a54128fSAndroid Build Coastguard Worker 		printf("Invalid keyring [%s].\n", keyring);
557*6a54128fSAndroid Build Coastguard Worker 		exit(1);
558*6a54128fSAndroid Build Coastguard Worker 	}
559*6a54128fSAndroid Build Coastguard Worker 	sprintf(key_ref_full, "%s%s", EXT2FS_KEY_DESC_PREFIX,
560*6a54128fSAndroid Build Coastguard Worker 		salt->key_ref_str);
561*6a54128fSAndroid Build Coastguard Worker 	rc = keyctl(KEYCTL_SEARCH, keyring_id, EXT2FS_KEY_TYPE_LOGON,
562*6a54128fSAndroid Build Coastguard Worker 		    key_ref_full, 0);
563*6a54128fSAndroid Build Coastguard Worker 	if (rc != -1) {
564*6a54128fSAndroid Build Coastguard Worker 		if ((options & OPT_QUIET) == 0)
565*6a54128fSAndroid Build Coastguard Worker 			printf("Key with descriptor [%s] already exists\n",
566*6a54128fSAndroid Build Coastguard Worker 			       salt->key_ref_str);
567*6a54128fSAndroid Build Coastguard Worker 		return;
568*6a54128fSAndroid Build Coastguard Worker 	} else if ((rc == -1) && (errno != ENOKEY)) {
569*6a54128fSAndroid Build Coastguard Worker 		printf("keyctl_search failed: %s\n", strerror(errno));
570*6a54128fSAndroid Build Coastguard Worker 		if (errno == EINVAL)
571*6a54128fSAndroid Build Coastguard Worker 			printf("Keyring [%s] is not available.\n", keyring);
572*6a54128fSAndroid Build Coastguard Worker 		exit(1);
573*6a54128fSAndroid Build Coastguard Worker 	}
574*6a54128fSAndroid Build Coastguard Worker 	key.mode = EXT4_ENCRYPTION_MODE_AES_256_XTS;
575*6a54128fSAndroid Build Coastguard Worker 	memcpy(key.raw, salt->key, EXT4_MAX_KEY_SIZE);
576*6a54128fSAndroid Build Coastguard Worker 	key.size = EXT4_MAX_KEY_SIZE;
577*6a54128fSAndroid Build Coastguard Worker 
578*6a54128fSAndroid Build Coastguard Worker 	/*
579*6a54128fSAndroid Build Coastguard Worker 	 * We need to do this instead of simply adding the key to
580*6a54128fSAndroid Build Coastguard Worker 	 * KEY_SPEC_SESSION_KEYRING since trying to add a key to a
581*6a54128fSAndroid Build Coastguard Worker 	 * session keyring that does not yet exist will cause the
582*6a54128fSAndroid Build Coastguard Worker 	 * kernel to create a session keyring --- which will then get
583*6a54128fSAndroid Build Coastguard Worker 	 * garbage collected as soon as e4crypt exits.
584*6a54128fSAndroid Build Coastguard Worker 	 *
585*6a54128fSAndroid Build Coastguard Worker 	 * The fact that the keyctl system call and the add_key system
586*6a54128fSAndroid Build Coastguard Worker 	 * call treats KEY_SPEC_SESSION_KEYRING differently when a
587*6a54128fSAndroid Build Coastguard Worker 	 * session keyring does not exist is very unfortunate and
588*6a54128fSAndroid Build Coastguard Worker 	 * confusing, but so it goes...
589*6a54128fSAndroid Build Coastguard Worker 	 */
590*6a54128fSAndroid Build Coastguard Worker 	if (keyring_id == KEY_SPEC_SESSION_KEYRING) {
591*6a54128fSAndroid Build Coastguard Worker 		keyring_id = keyctl(KEYCTL_GET_KEYRING_ID, keyring_id, 0);
592*6a54128fSAndroid Build Coastguard Worker 		if (keyring_id < 0) {
593*6a54128fSAndroid Build Coastguard Worker 			printf("Error getting session keyring ID: %s\n",
594*6a54128fSAndroid Build Coastguard Worker 			       strerror(errno));
595*6a54128fSAndroid Build Coastguard Worker 			exit(1);
596*6a54128fSAndroid Build Coastguard Worker 		}
597*6a54128fSAndroid Build Coastguard Worker 	}
598*6a54128fSAndroid Build Coastguard Worker 	rc = add_key(EXT2FS_KEY_TYPE_LOGON, key_ref_full, (void *)&key,
599*6a54128fSAndroid Build Coastguard Worker 		     sizeof(key), keyring_id);
600*6a54128fSAndroid Build Coastguard Worker 	if (rc == -1) {
601*6a54128fSAndroid Build Coastguard Worker 		if (errno == EDQUOT) {
602*6a54128fSAndroid Build Coastguard Worker 			printf("Error adding key to keyring; quota exceeded\n");
603*6a54128fSAndroid Build Coastguard Worker 		} else {
604*6a54128fSAndroid Build Coastguard Worker 			printf("Error adding key with key descriptor [%s]: "
605*6a54128fSAndroid Build Coastguard Worker 			       "%s\n", salt->key_ref_str, strerror(errno));
606*6a54128fSAndroid Build Coastguard Worker 		}
607*6a54128fSAndroid Build Coastguard Worker 		exit(1);
608*6a54128fSAndroid Build Coastguard Worker 	} else {
609*6a54128fSAndroid Build Coastguard Worker 		if ((options & OPT_QUIET) == 0)
610*6a54128fSAndroid Build Coastguard Worker 			printf("Added key with descriptor [%s]\n",
611*6a54128fSAndroid Build Coastguard Worker 			       salt->key_ref_str);
612*6a54128fSAndroid Build Coastguard Worker 	}
613*6a54128fSAndroid Build Coastguard Worker }
614*6a54128fSAndroid Build Coastguard Worker 
get_default_salts(void)615*6a54128fSAndroid Build Coastguard Worker static void get_default_salts(void)
616*6a54128fSAndroid Build Coastguard Worker {
617*6a54128fSAndroid Build Coastguard Worker 	FILE	*f = setmntent("/etc/mtab", "r");
618*6a54128fSAndroid Build Coastguard Worker 	struct mntent *mnt;
619*6a54128fSAndroid Build Coastguard Worker 
620*6a54128fSAndroid Build Coastguard Worker 	while (f && ((mnt = getmntent(f)) != NULL)) {
621*6a54128fSAndroid Build Coastguard Worker 		if (strcmp(mnt->mnt_type, "ext4") ||
622*6a54128fSAndroid Build Coastguard Worker 		    access(mnt->mnt_dir, R_OK))
623*6a54128fSAndroid Build Coastguard Worker 			continue;
624*6a54128fSAndroid Build Coastguard Worker 		parse_salt(mnt->mnt_dir, PARSE_FLAGS_NOTSUPP_OK);
625*6a54128fSAndroid Build Coastguard Worker 	}
626*6a54128fSAndroid Build Coastguard Worker 	endmntent(f);
627*6a54128fSAndroid Build Coastguard Worker }
628*6a54128fSAndroid Build Coastguard Worker 
629*6a54128fSAndroid Build Coastguard Worker /* Functions which implement user commands */
630*6a54128fSAndroid Build Coastguard Worker 
631*6a54128fSAndroid Build Coastguard Worker struct cmd_desc {
632*6a54128fSAndroid Build Coastguard Worker 	const char *cmd_name;
633*6a54128fSAndroid Build Coastguard Worker 	void (*cmd_func)(int, char **, const struct cmd_desc *);
634*6a54128fSAndroid Build Coastguard Worker 	const char *cmd_desc;
635*6a54128fSAndroid Build Coastguard Worker 	const char *cmd_help;
636*6a54128fSAndroid Build Coastguard Worker 	int cmd_flags;
637*6a54128fSAndroid Build Coastguard Worker };
638*6a54128fSAndroid Build Coastguard Worker 
639*6a54128fSAndroid Build Coastguard Worker #define CMD_HIDDEN 	0x0001
640*6a54128fSAndroid Build Coastguard Worker 
641*6a54128fSAndroid Build Coastguard Worker static void do_help(int argc, char **argv, const struct cmd_desc *cmd);
642*6a54128fSAndroid Build Coastguard Worker 
643*6a54128fSAndroid Build Coastguard Worker #define add_key_desc "adds a key to the user's keyring"
644*6a54128fSAndroid Build Coastguard Worker #define add_key_help \
645*6a54128fSAndroid Build Coastguard Worker "e4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ]\n\n" \
646*6a54128fSAndroid Build Coastguard Worker "Prompts the user for a passphrase and inserts it into the specified\n" \
647*6a54128fSAndroid Build Coastguard Worker "keyring.  If no keyring is specified, e4crypt will use the session\n" \
648*6a54128fSAndroid Build Coastguard Worker "keyring if it exists or the user session keyring if it does not.\n\n" \
649*6a54128fSAndroid Build Coastguard Worker "If one or more directory paths are specified, e4crypt will try to\n" \
650*6a54128fSAndroid Build Coastguard Worker "set the policy of those directories to use the key just entered by\n" \
651*6a54128fSAndroid Build Coastguard Worker "the user.\n"
652*6a54128fSAndroid Build Coastguard Worker 
do_add_key(int argc,char ** argv,const struct cmd_desc * cmd)653*6a54128fSAndroid Build Coastguard Worker static void do_add_key(int argc, char **argv, const struct cmd_desc *cmd)
654*6a54128fSAndroid Build Coastguard Worker {
655*6a54128fSAndroid Build Coastguard Worker 	struct salt *salt;
656*6a54128fSAndroid Build Coastguard Worker 	bool explicit_salt = false;
657*6a54128fSAndroid Build Coastguard Worker 	char *keyring = NULL;
658*6a54128fSAndroid Build Coastguard Worker 	int i, opt, pad = 4;
659*6a54128fSAndroid Build Coastguard Worker 	unsigned j;
660*6a54128fSAndroid Build Coastguard Worker 
661*6a54128fSAndroid Build Coastguard Worker 	while ((opt = getopt(argc, argv, "k:S:p:vq")) != -1) {
662*6a54128fSAndroid Build Coastguard Worker 		switch (opt) {
663*6a54128fSAndroid Build Coastguard Worker 		case 'k':
664*6a54128fSAndroid Build Coastguard Worker 			/* Specify a keyring. */
665*6a54128fSAndroid Build Coastguard Worker 			keyring = optarg;
666*6a54128fSAndroid Build Coastguard Worker 			break;
667*6a54128fSAndroid Build Coastguard Worker 		case 'p':
668*6a54128fSAndroid Build Coastguard Worker 			pad = atoi(optarg);
669*6a54128fSAndroid Build Coastguard Worker 			break;
670*6a54128fSAndroid Build Coastguard Worker 		case 'S':
671*6a54128fSAndroid Build Coastguard Worker 			if (explicit_salt) {
672*6a54128fSAndroid Build Coastguard Worker 				fputs("May only provide -S once\n", stderr);
673*6a54128fSAndroid Build Coastguard Worker 				exit(1);
674*6a54128fSAndroid Build Coastguard Worker 			}
675*6a54128fSAndroid Build Coastguard Worker 			/* Salt value for passphrase. */
676*6a54128fSAndroid Build Coastguard Worker 			parse_salt(optarg, 0);
677*6a54128fSAndroid Build Coastguard Worker 			explicit_salt = true;
678*6a54128fSAndroid Build Coastguard Worker 			break;
679*6a54128fSAndroid Build Coastguard Worker 		case 'v':
680*6a54128fSAndroid Build Coastguard Worker 			options |= OPT_VERBOSE;
681*6a54128fSAndroid Build Coastguard Worker 			break;
682*6a54128fSAndroid Build Coastguard Worker 		case 'q':
683*6a54128fSAndroid Build Coastguard Worker 			options |= OPT_QUIET;
684*6a54128fSAndroid Build Coastguard Worker 			break;
685*6a54128fSAndroid Build Coastguard Worker 		default:
686*6a54128fSAndroid Build Coastguard Worker 		case '?':
687*6a54128fSAndroid Build Coastguard Worker 			if (opt != '?')
688*6a54128fSAndroid Build Coastguard Worker 				fprintf(stderr, "Unrecognized option: %c\n",
689*6a54128fSAndroid Build Coastguard Worker 					opt);
690*6a54128fSAndroid Build Coastguard Worker 			fputs("USAGE:\n  ", stderr);
691*6a54128fSAndroid Build Coastguard Worker 			fputs(cmd->cmd_help, stderr);
692*6a54128fSAndroid Build Coastguard Worker 			exit(1);
693*6a54128fSAndroid Build Coastguard Worker 		}
694*6a54128fSAndroid Build Coastguard Worker 	}
695*6a54128fSAndroid Build Coastguard Worker 	if (num_salt == 0)
696*6a54128fSAndroid Build Coastguard Worker 		get_default_salts();
697*6a54128fSAndroid Build Coastguard Worker 	if (num_salt == 0) {
698*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "No salt values available\n");
699*6a54128fSAndroid Build Coastguard Worker 		exit(1);
700*6a54128fSAndroid Build Coastguard Worker 	}
701*6a54128fSAndroid Build Coastguard Worker 	validate_paths(argc, argv, optind);
702*6a54128fSAndroid Build Coastguard Worker 	if (!explicit_salt)
703*6a54128fSAndroid Build Coastguard Worker 		for (i = optind; i < argc; i++)
704*6a54128fSAndroid Build Coastguard Worker 			parse_salt(argv[i], PARSE_FLAGS_FORCE_FN);
705*6a54128fSAndroid Build Coastguard Worker 	printf("Enter passphrase (echo disabled): ");
706*6a54128fSAndroid Build Coastguard Worker 	get_passphrase(in_passphrase, sizeof(in_passphrase));
707*6a54128fSAndroid Build Coastguard Worker 	for (j = 0, salt = salt_list; j < num_salt; j++, salt++) {
708*6a54128fSAndroid Build Coastguard Worker 		pbkdf2_sha512(in_passphrase, salt,
709*6a54128fSAndroid Build Coastguard Worker 			      EXT4_PBKDF2_ITERATIONS, salt->key);
710*6a54128fSAndroid Build Coastguard Worker 		generate_key_ref_str(salt);
711*6a54128fSAndroid Build Coastguard Worker 		insert_key_into_keyring(keyring, salt);
712*6a54128fSAndroid Build Coastguard Worker 	}
713*6a54128fSAndroid Build Coastguard Worker 	if (optind != argc) {
714*6a54128fSAndroid Build Coastguard Worker 		salt = explicit_salt ? salt_list : NULL;
715*6a54128fSAndroid Build Coastguard Worker 		set_policy(salt, pad, argc, argv, optind);
716*6a54128fSAndroid Build Coastguard Worker 	}
717*6a54128fSAndroid Build Coastguard Worker 	clear_secrets();
718*6a54128fSAndroid Build Coastguard Worker 	exit(0);
719*6a54128fSAndroid Build Coastguard Worker }
720*6a54128fSAndroid Build Coastguard Worker 
721*6a54128fSAndroid Build Coastguard Worker #define set_policy_desc "sets a policy for directories"
722*6a54128fSAndroid Build Coastguard Worker #define set_policy_help \
723*6a54128fSAndroid Build Coastguard Worker "e4crypt set_policy [ -p pad ] policy path ... \n\n" \
724*6a54128fSAndroid Build Coastguard Worker "Sets the policy for the directories specified on the command line.\n" \
725*6a54128fSAndroid Build Coastguard Worker "All directories must be empty to set the policy; if the directory\n" \
726*6a54128fSAndroid Build Coastguard Worker "already has a policy established, e4crypt will validate that it the\n" \
727*6a54128fSAndroid Build Coastguard Worker "policy matches what was specified.  A policy is an encryption key\n" \
728*6a54128fSAndroid Build Coastguard Worker "identifier consisting of 16 hexadecimal characters.\n"
729*6a54128fSAndroid Build Coastguard Worker 
do_set_policy(int argc,char ** argv,const struct cmd_desc * cmd)730*6a54128fSAndroid Build Coastguard Worker static void do_set_policy(int argc, char **argv, const struct cmd_desc *cmd)
731*6a54128fSAndroid Build Coastguard Worker {
732*6a54128fSAndroid Build Coastguard Worker 	struct salt saltbuf;
733*6a54128fSAndroid Build Coastguard Worker 	int c, pad = 4;
734*6a54128fSAndroid Build Coastguard Worker 
735*6a54128fSAndroid Build Coastguard Worker 	while ((c = getopt (argc, argv, "p:")) != EOF) {
736*6a54128fSAndroid Build Coastguard Worker 		switch (c) {
737*6a54128fSAndroid Build Coastguard Worker 		case 'p':
738*6a54128fSAndroid Build Coastguard Worker 			pad = atoi(optarg);
739*6a54128fSAndroid Build Coastguard Worker 			break;
740*6a54128fSAndroid Build Coastguard Worker 		}
741*6a54128fSAndroid Build Coastguard Worker 	}
742*6a54128fSAndroid Build Coastguard Worker 
743*6a54128fSAndroid Build Coastguard Worker 	if (argc < optind + 2) {
744*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "Missing required argument(s).\n\n");
745*6a54128fSAndroid Build Coastguard Worker 		fputs("USAGE:\n  ", stderr);
746*6a54128fSAndroid Build Coastguard Worker 		fputs(cmd->cmd_help, stderr);
747*6a54128fSAndroid Build Coastguard Worker 		exit(1);
748*6a54128fSAndroid Build Coastguard Worker 	}
749*6a54128fSAndroid Build Coastguard Worker 
750*6a54128fSAndroid Build Coastguard Worker 	if ((strlen(argv[optind]) != (EXT4_KEY_DESCRIPTOR_SIZE * 2)) ||
751*6a54128fSAndroid Build Coastguard Worker 	    hex2byte(argv[optind], (EXT4_KEY_DESCRIPTOR_SIZE * 2),
752*6a54128fSAndroid Build Coastguard Worker 		     saltbuf.key_desc, EXT4_KEY_DESCRIPTOR_SIZE)) {
753*6a54128fSAndroid Build Coastguard Worker 		printf("Invalid key descriptor [%s]. Valid characters "
754*6a54128fSAndroid Build Coastguard Worker 		       "are 0-9 and a-f, lower case.  "
755*6a54128fSAndroid Build Coastguard Worker 		       "Length must be %d.\n",
756*6a54128fSAndroid Build Coastguard Worker 		       argv[optind], (EXT4_KEY_DESCRIPTOR_SIZE * 2));
757*6a54128fSAndroid Build Coastguard Worker 			exit(1);
758*6a54128fSAndroid Build Coastguard Worker 	}
759*6a54128fSAndroid Build Coastguard Worker 	validate_paths(argc, argv, optind+1);
760*6a54128fSAndroid Build Coastguard Worker 	strcpy(saltbuf.key_ref_str, argv[optind]);
761*6a54128fSAndroid Build Coastguard Worker 	set_policy(&saltbuf, pad, argc, argv, optind+1);
762*6a54128fSAndroid Build Coastguard Worker 	exit(0);
763*6a54128fSAndroid Build Coastguard Worker }
764*6a54128fSAndroid Build Coastguard Worker 
765*6a54128fSAndroid Build Coastguard Worker #define get_policy_desc "get the encryption for directories"
766*6a54128fSAndroid Build Coastguard Worker #define get_policy_help \
767*6a54128fSAndroid Build Coastguard Worker "e4crypt get_policy path ... \n\n" \
768*6a54128fSAndroid Build Coastguard Worker "Gets the policy for the directories specified on the command line.\n"
769*6a54128fSAndroid Build Coastguard Worker 
do_get_policy(int argc,char ** argv,const struct cmd_desc * cmd)770*6a54128fSAndroid Build Coastguard Worker static void do_get_policy(int argc, char **argv, const struct cmd_desc *cmd)
771*6a54128fSAndroid Build Coastguard Worker {
772*6a54128fSAndroid Build Coastguard Worker 	struct ext4_encryption_policy policy;
773*6a54128fSAndroid Build Coastguard Worker 	int i, j, fd, rc;
774*6a54128fSAndroid Build Coastguard Worker 
775*6a54128fSAndroid Build Coastguard Worker 	if (argc < 2) {
776*6a54128fSAndroid Build Coastguard Worker 		fprintf(stderr, "Missing required argument(s).\n\n");
777*6a54128fSAndroid Build Coastguard Worker 		fputs("USAGE:\n  ", stderr);
778*6a54128fSAndroid Build Coastguard Worker 		fputs(cmd->cmd_help, stderr);
779*6a54128fSAndroid Build Coastguard Worker 		exit(1);
780*6a54128fSAndroid Build Coastguard Worker 	}
781*6a54128fSAndroid Build Coastguard Worker 
782*6a54128fSAndroid Build Coastguard Worker 	for (i = 1; i < argc; i++) {
783*6a54128fSAndroid Build Coastguard Worker 		fd = open(argv[i], O_RDONLY);
784*6a54128fSAndroid Build Coastguard Worker 		if (fd == -1) {
785*6a54128fSAndroid Build Coastguard Worker 			perror(argv[i]);
786*6a54128fSAndroid Build Coastguard Worker 			exit(1);
787*6a54128fSAndroid Build Coastguard Worker 		}
788*6a54128fSAndroid Build Coastguard Worker 		rc = ioctl(fd, EXT4_IOC_GET_ENCRYPTION_POLICY, &policy);
789*6a54128fSAndroid Build Coastguard Worker 		close(fd);
790*6a54128fSAndroid Build Coastguard Worker 		if (rc) {
791*6a54128fSAndroid Build Coastguard Worker 			printf("Error getting policy for %s: %s\n",
792*6a54128fSAndroid Build Coastguard Worker 			       argv[i], strerror(errno));
793*6a54128fSAndroid Build Coastguard Worker 			continue;
794*6a54128fSAndroid Build Coastguard Worker 		}
795*6a54128fSAndroid Build Coastguard Worker 		printf("%s: ", argv[i]);
796*6a54128fSAndroid Build Coastguard Worker 		for (j = 0; j < EXT4_KEY_DESCRIPTOR_SIZE; j++) {
797*6a54128fSAndroid Build Coastguard Worker 			printf("%02x", (unsigned char) policy.master_key_descriptor[j]);
798*6a54128fSAndroid Build Coastguard Worker 		}
799*6a54128fSAndroid Build Coastguard Worker 		fputc('\n', stdout);
800*6a54128fSAndroid Build Coastguard Worker 	}
801*6a54128fSAndroid Build Coastguard Worker 	exit(0);
802*6a54128fSAndroid Build Coastguard Worker }
803*6a54128fSAndroid Build Coastguard Worker 
804*6a54128fSAndroid Build Coastguard Worker #define new_session_desc "give the invoking process a new session keyring"
805*6a54128fSAndroid Build Coastguard Worker #define new_session_help \
806*6a54128fSAndroid Build Coastguard Worker "e4crypt new_session\n\n" \
807*6a54128fSAndroid Build Coastguard Worker "Give the invoking process (typically a shell) a new session keyring,\n" \
808*6a54128fSAndroid Build Coastguard Worker "discarding its old session keyring.\n"
809*6a54128fSAndroid Build Coastguard Worker 
do_new_session(int argc,char ** argv EXT2FS_ATTR ((unused)),const struct cmd_desc * cmd)810*6a54128fSAndroid Build Coastguard Worker static void do_new_session(int argc, char **argv EXT2FS_ATTR((unused)),
811*6a54128fSAndroid Build Coastguard Worker 			   const struct cmd_desc *cmd)
812*6a54128fSAndroid Build Coastguard Worker {
813*6a54128fSAndroid Build Coastguard Worker 	long keyid, ret;
814*6a54128fSAndroid Build Coastguard Worker 
815*6a54128fSAndroid Build Coastguard Worker 	if (argc > 1) {
816*6a54128fSAndroid Build Coastguard Worker 		fputs("Excess arguments\n\n", stderr);
817*6a54128fSAndroid Build Coastguard Worker 		fputs(cmd->cmd_help, stderr);
818*6a54128fSAndroid Build Coastguard Worker 		exit(1);
819*6a54128fSAndroid Build Coastguard Worker 	}
820*6a54128fSAndroid Build Coastguard Worker 	keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL);
821*6a54128fSAndroid Build Coastguard Worker 	if (keyid < 0) {
822*6a54128fSAndroid Build Coastguard Worker 		perror("KEYCTL_JOIN_SESSION_KEYRING");
823*6a54128fSAndroid Build Coastguard Worker 		exit(1);
824*6a54128fSAndroid Build Coastguard Worker 	}
825*6a54128fSAndroid Build Coastguard Worker 	ret = keyctl(KEYCTL_SESSION_TO_PARENT, NULL);
826*6a54128fSAndroid Build Coastguard Worker 	if (ret < 0) {
827*6a54128fSAndroid Build Coastguard Worker 		perror("KEYCTL_SESSION_TO_PARENT");
828*6a54128fSAndroid Build Coastguard Worker 		exit(1);
829*6a54128fSAndroid Build Coastguard Worker 	}
830*6a54128fSAndroid Build Coastguard Worker 	printf("Switched invoking process to new session keyring %ld\n", keyid);
831*6a54128fSAndroid Build Coastguard Worker 	exit(0);
832*6a54128fSAndroid Build Coastguard Worker }
833*6a54128fSAndroid Build Coastguard Worker 
834*6a54128fSAndroid Build Coastguard Worker #define CMD(name) { #name, do_##name, name##_desc, name##_help, 0 }
835*6a54128fSAndroid Build Coastguard Worker #define _CMD(name) { #name, do_##name, NULL, NULL, CMD_HIDDEN }
836*6a54128fSAndroid Build Coastguard Worker 
837*6a54128fSAndroid Build Coastguard Worker const struct cmd_desc cmd_list[] = {
838*6a54128fSAndroid Build Coastguard Worker 	_CMD(help),
839*6a54128fSAndroid Build Coastguard Worker 	CMD(add_key),
840*6a54128fSAndroid Build Coastguard Worker 	CMD(get_policy),
841*6a54128fSAndroid Build Coastguard Worker 	CMD(new_session),
842*6a54128fSAndroid Build Coastguard Worker 	CMD(set_policy),
843*6a54128fSAndroid Build Coastguard Worker 	{ NULL, NULL, NULL, NULL, 0 }
844*6a54128fSAndroid Build Coastguard Worker };
845*6a54128fSAndroid Build Coastguard Worker 
do_help(int argc,char ** argv,const struct cmd_desc * cmd EXT2FS_ATTR ((unused)))846*6a54128fSAndroid Build Coastguard Worker static void do_help(int argc, char **argv,
847*6a54128fSAndroid Build Coastguard Worker 		    const struct cmd_desc *cmd EXT2FS_ATTR((unused)))
848*6a54128fSAndroid Build Coastguard Worker {
849*6a54128fSAndroid Build Coastguard Worker 	const struct cmd_desc *p;
850*6a54128fSAndroid Build Coastguard Worker 
851*6a54128fSAndroid Build Coastguard Worker 	if (argc > 1) {
852*6a54128fSAndroid Build Coastguard Worker 		for (p = cmd_list; p->cmd_name; p++) {
853*6a54128fSAndroid Build Coastguard Worker 			if (p->cmd_flags & CMD_HIDDEN)
854*6a54128fSAndroid Build Coastguard Worker 				continue;
855*6a54128fSAndroid Build Coastguard Worker 			if (strcmp(p->cmd_name, argv[1]) == 0) {
856*6a54128fSAndroid Build Coastguard Worker 				putc('\n', stdout);
857*6a54128fSAndroid Build Coastguard Worker 				fputs("USAGE:\n  ", stdout);
858*6a54128fSAndroid Build Coastguard Worker 				fputs(p->cmd_help, stdout);
859*6a54128fSAndroid Build Coastguard Worker 				exit(0);
860*6a54128fSAndroid Build Coastguard Worker 			}
861*6a54128fSAndroid Build Coastguard Worker 		}
862*6a54128fSAndroid Build Coastguard Worker 		printf("Unknown command: %s\n\n", argv[1]);
863*6a54128fSAndroid Build Coastguard Worker 	}
864*6a54128fSAndroid Build Coastguard Worker 
865*6a54128fSAndroid Build Coastguard Worker 	fputs("Available commands:\n", stdout);
866*6a54128fSAndroid Build Coastguard Worker 	for (p = cmd_list; p->cmd_name; p++) {
867*6a54128fSAndroid Build Coastguard Worker 		if (p->cmd_flags & CMD_HIDDEN)
868*6a54128fSAndroid Build Coastguard Worker 			continue;
869*6a54128fSAndroid Build Coastguard Worker 		printf("  %-20s %s\n", p->cmd_name, p->cmd_desc);
870*6a54128fSAndroid Build Coastguard Worker 	}
871*6a54128fSAndroid Build Coastguard Worker 	printf("\nTo get more information on a command, "
872*6a54128fSAndroid Build Coastguard Worker 	       "type 'e4crypt help cmd'\n");
873*6a54128fSAndroid Build Coastguard Worker 	exit(0);
874*6a54128fSAndroid Build Coastguard Worker }
875*6a54128fSAndroid Build Coastguard Worker 
main(int argc,char * argv[])876*6a54128fSAndroid Build Coastguard Worker int main(int argc, char *argv[])
877*6a54128fSAndroid Build Coastguard Worker {
878*6a54128fSAndroid Build Coastguard Worker 	const struct cmd_desc *cmd;
879*6a54128fSAndroid Build Coastguard Worker 
880*6a54128fSAndroid Build Coastguard Worker 	if (argc < 2)
881*6a54128fSAndroid Build Coastguard Worker 		do_help(argc, argv, cmd_list);
882*6a54128fSAndroid Build Coastguard Worker 
883*6a54128fSAndroid Build Coastguard Worker 	sigcatcher_setup();
884*6a54128fSAndroid Build Coastguard Worker 	for (cmd = cmd_list; cmd->cmd_name; cmd++) {
885*6a54128fSAndroid Build Coastguard Worker 		if (strcmp(cmd->cmd_name, argv[1]) == 0) {
886*6a54128fSAndroid Build Coastguard Worker 			cmd->cmd_func(argc-1, argv+1, cmd);
887*6a54128fSAndroid Build Coastguard Worker 			exit(0);
888*6a54128fSAndroid Build Coastguard Worker 		}
889*6a54128fSAndroid Build Coastguard Worker 	}
890*6a54128fSAndroid Build Coastguard Worker 	printf("Unknown command: %s\n\n", argv[1]);
891*6a54128fSAndroid Build Coastguard Worker 	do_help(1, argv, cmd_list);
892*6a54128fSAndroid Build Coastguard Worker 	return 0;
893*6a54128fSAndroid Build Coastguard Worker }
894