mirror of
https://github.com/koverstreet/bcachefs-tools.git
synced 2025-02-23 00:00:02 +03:00
53 lines
1.3 KiB
C
53 lines
1.3 KiB
C
#include <errno.h>
|
|
#include <unistd.h>
|
|
#include <keyutils.h>
|
|
#include <uuid/uuid.h>
|
|
|
|
#include "bcache.h"
|
|
#include "libbcache.h"
|
|
#include "crypto.h"
|
|
|
|
int cmd_unlock(int argc, char *argv[])
|
|
{
|
|
struct bcache_disk_key disk_key;
|
|
struct bcache_key key;
|
|
struct cache_sb *sb;
|
|
char *passphrase;
|
|
char uuid[40];
|
|
char description[60];
|
|
|
|
if (argc != 2)
|
|
die("please supply a single device");
|
|
|
|
sb = bcache_super_read(argv[1]);
|
|
|
|
if (!CACHE_SET_ENCRYPTION_KEY(sb))
|
|
die("filesystem is not encrypted");
|
|
|
|
memcpy(&disk_key, sb->encryption_key, sizeof(disk_key));
|
|
|
|
if (!memcmp(&disk_key, bch_key_header, sizeof(bch_key_header)))
|
|
die("filesystem does not have encryption key");
|
|
|
|
passphrase = read_passphrase("Enter passphrase: ");
|
|
|
|
derive_passphrase(&key, passphrase);
|
|
disk_key_encrypt(sb, &disk_key, &key);
|
|
|
|
if (memcmp(&disk_key, bch_key_header, sizeof(bch_key_header)))
|
|
die("incorrect passphrase");
|
|
|
|
uuid_unparse_lower(sb->user_uuid.b, uuid);
|
|
sprintf(description, "bcache:%s", uuid);
|
|
|
|
if (add_key("logon", description, &key, sizeof(key),
|
|
KEY_SPEC_USER_KEYRING) < 0)
|
|
die("add_key error: %s", strerror(errno));
|
|
|
|
memzero_explicit(&disk_key, sizeof(disk_key));
|
|
memzero_explicit(&key, sizeof(key));
|
|
memzero_explicit(passphrase, strlen(passphrase));
|
|
free(passphrase);
|
|
return 0;
|
|
}
|