3
0

luks.c 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. /*
  2. * volume_id - reads filesystem label and uuid
  3. *
  4. * Copyright (C) 2005 W. Michael Petullo <mike@flyn.org>
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, write to the Free Software
  18. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  19. */
  20. #include "volume_id_internal.h"
  21. #define LUKS_MAGIC_L 6
  22. #define UUID_STRING_L 40
  23. #define LUKS_CIPHERNAME_L 32
  24. #define LUKS_CIPHERMODE_L 32
  25. #define LUKS_HASHSPEC_L 32
  26. #define LUKS_DIGESTSIZE 20
  27. #define LUKS_SALTSIZE 32
  28. #define LUKS_NUMKEYS 8
  29. static const uint8_t LUKS_MAGIC[] = { 'L','U','K','S', 0xba, 0xbe };
  30. struct luks_phdr {
  31. uint8_t magic[LUKS_MAGIC_L];
  32. uint16_t version;
  33. uint8_t cipherName[LUKS_CIPHERNAME_L];
  34. uint8_t cipherMode[LUKS_CIPHERMODE_L];
  35. uint8_t hashSpec[LUKS_HASHSPEC_L];
  36. uint32_t payloadOffset;
  37. uint32_t keyBytes;
  38. uint8_t mkDigest[LUKS_DIGESTSIZE];
  39. uint8_t mkDigestSalt[LUKS_SALTSIZE];
  40. uint32_t mkDigestIterations;
  41. uint8_t uuid[UUID_STRING_L];
  42. struct {
  43. uint32_t active;
  44. uint32_t passwordIterations;
  45. uint8_t passwordSalt[LUKS_SALTSIZE];
  46. uint32_t keyMaterialOffset;
  47. uint32_t stripes;
  48. } keyblock[LUKS_NUMKEYS];
  49. };
  50. enum {
  51. EXPECTED_SIZE_luks_phdr = 0
  52. + 1 * LUKS_MAGIC_L
  53. + 2
  54. + 1 * LUKS_CIPHERNAME_L
  55. + 1 * LUKS_CIPHERMODE_L
  56. + 1 * LUKS_HASHSPEC_L
  57. + 4
  58. + 4
  59. + 1 * LUKS_DIGESTSIZE
  60. + 1 * LUKS_SALTSIZE
  61. + 4
  62. + 1 * UUID_STRING_L
  63. + LUKS_NUMKEYS * (0
  64. + 4
  65. + 4
  66. + 1 * LUKS_SALTSIZE
  67. + 4
  68. + 4
  69. )
  70. };
  71. struct BUG_bad_size_luks_phdr {
  72. char BUG_bad_size_luks_phdr[
  73. sizeof(struct luks_phdr) == EXPECTED_SIZE_luks_phdr ?
  74. 1 : -1];
  75. };
  76. int FAST_FUNC volume_id_probe_luks(struct volume_id *id /*,uint64_t off*/)
  77. {
  78. #define off ((uint64_t)0)
  79. struct luks_phdr *header;
  80. header = volume_id_get_buffer(id, off, sizeof(*header));
  81. if (header == NULL)
  82. return -1;
  83. if (memcmp(header->magic, LUKS_MAGIC, LUKS_MAGIC_L))
  84. return -1;
  85. // volume_id_set_usage(id, VOLUME_ID_CRYPTO);
  86. volume_id_set_uuid(id, header->uuid, UUID_DCE_STRING);
  87. // id->type = "crypto_LUKS";
  88. return 0;
  89. }