2009-10-13 19:17:24 +00:00
|
|
|
/* mount.c - Mount a crypto container
|
|
|
|
* Copyright (C) 2009 Free Software Foundation, Inc.
|
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include "g13.h"
|
|
|
|
#include "i18n.h"
|
|
|
|
#include "mount.h"
|
|
|
|
|
|
|
|
#include "keyblob.h"
|
|
|
|
#include "backend.h"
|
2016-02-11 13:32:30 +01:00
|
|
|
#include "g13tuple.h"
|
2009-10-15 17:20:41 +00:00
|
|
|
#include "mountinfo.h"
|
|
|
|
#include "runner.h"
|
2015-02-11 10:27:57 +01:00
|
|
|
#include "host2net.h"
|
2016-02-23 14:32:46 +01:00
|
|
|
#include "../common/sysutils.h"
|
2009-10-13 19:17:24 +00:00
|
|
|
|
|
|
|
|
|
|
|
/* Mount the container with name FILENAME at MOUNTPOINT. */
|
|
|
|
gpg_error_t
|
|
|
|
g13_mount_container (ctrl_t ctrl, const char *filename, const char *mountpoint)
|
|
|
|
{
|
|
|
|
gpg_error_t err;
|
|
|
|
dotlock_t lock;
|
2016-02-13 17:01:45 +01:00
|
|
|
int needs_syshelp;
|
2009-10-13 19:17:24 +00:00
|
|
|
void *enckeyblob = NULL;
|
|
|
|
size_t enckeybloblen;
|
|
|
|
void *keyblob = NULL;
|
|
|
|
size_t keybloblen;
|
|
|
|
tupledesc_t tuples = NULL;
|
|
|
|
size_t n;
|
|
|
|
const unsigned char *value;
|
|
|
|
int conttype;
|
2009-10-15 17:20:41 +00:00
|
|
|
unsigned int rid;
|
2009-10-28 12:02:15 +00:00
|
|
|
char *mountpoint_buffer = NULL;
|
2009-10-13 19:17:24 +00:00
|
|
|
|
|
|
|
/* A quick check to see whether the container exists. */
|
|
|
|
if (access (filename, R_OK))
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
2016-02-13 17:01:45 +01:00
|
|
|
/* Decide whether we need to use the g13-syshelp because we can't
|
|
|
|
use lock files for them. This is most likely the case for device
|
|
|
|
files; thus we test for this. FIXME: The correct solution would
|
|
|
|
be to call g13-syshelp to match the file against the g13tab. */
|
|
|
|
needs_syshelp = !strncmp (filename, "/dev/", 5);
|
|
|
|
|
2009-10-28 12:02:15 +00:00
|
|
|
if (!mountpoint)
|
|
|
|
{
|
|
|
|
mountpoint_buffer = xtrystrdup ("/tmp/g13-XXXXXX");
|
|
|
|
if (!mountpoint_buffer)
|
|
|
|
return gpg_error_from_syserror ();
|
2014-11-11 15:14:31 +01:00
|
|
|
if (!gnupg_mkdtemp (mountpoint_buffer))
|
2009-10-28 12:02:15 +00:00
|
|
|
{
|
|
|
|
err = gpg_error_from_syserror ();
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error (_("can't create directory '%s': %s\n"),
|
2009-10-28 12:02:15 +00:00
|
|
|
"/tmp/g13-XXXXXX", gpg_strerror (err));
|
|
|
|
xfree (mountpoint_buffer);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
mountpoint = mountpoint_buffer;
|
|
|
|
}
|
|
|
|
|
2016-02-13 17:01:45 +01:00
|
|
|
err = 0;
|
|
|
|
if (needs_syshelp)
|
|
|
|
lock = NULL;
|
|
|
|
else
|
2009-10-28 12:02:15 +00:00
|
|
|
{
|
2016-02-13 17:01:45 +01:00
|
|
|
/* Try to take a lock. */
|
|
|
|
lock = dotlock_create (filename, 0);
|
|
|
|
if (!lock)
|
|
|
|
{
|
|
|
|
xfree (mountpoint_buffer);
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
}
|
2009-10-13 19:17:24 +00:00
|
|
|
|
2016-02-13 17:01:45 +01:00
|
|
|
if (dotlock_take (lock, 0))
|
|
|
|
{
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
goto leave;
|
|
|
|
}
|
2009-10-13 19:17:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check again that the file exists. */
|
|
|
|
{
|
|
|
|
struct stat sb;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-10-13 19:17:24 +00:00
|
|
|
if (stat (filename, &sb))
|
|
|
|
{
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read the encrypted keyblob. */
|
2016-02-13 17:01:45 +01:00
|
|
|
/* Fixme: Should we move this to syshelp for dm-crypt or do we
|
|
|
|
assume that the encrypted device is world readable? */
|
2016-02-23 14:32:46 +01:00
|
|
|
err = g13_keyblob_read (filename, &enckeyblob, &enckeybloblen);
|
2009-10-13 19:17:24 +00:00
|
|
|
if (err)
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
/* Decrypt that keyblob and store it in a tuple descriptor. */
|
2016-02-23 14:32:46 +01:00
|
|
|
err = g13_keyblob_decrypt (ctrl, enckeyblob, enckeybloblen,
|
|
|
|
&keyblob, &keybloblen);
|
2009-10-13 19:17:24 +00:00
|
|
|
if (err)
|
|
|
|
goto leave;
|
|
|
|
xfree (enckeyblob);
|
|
|
|
enckeyblob = NULL;
|
|
|
|
|
|
|
|
err = create_tupledesc (&tuples, keyblob, keybloblen);
|
|
|
|
if (!err)
|
|
|
|
keyblob = NULL;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_NOT_SUPPORTED)
|
|
|
|
log_error ("unknown keyblob version\n");
|
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
if (opt.verbose)
|
2016-02-11 13:57:35 +01:00
|
|
|
dump_tupledesc (tuples);
|
2009-10-13 19:17:24 +00:00
|
|
|
|
|
|
|
value = find_tuple (tuples, KEYBLOB_TAG_CONTTYPE, &n);
|
|
|
|
if (!value || n != 2)
|
|
|
|
conttype = 0;
|
|
|
|
else
|
|
|
|
conttype = (value[0] << 8 | value[1]);
|
|
|
|
if (!be_is_supported_conttype (conttype))
|
|
|
|
{
|
|
|
|
log_error ("content type %d is not supported\n", conttype);
|
|
|
|
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
goto leave;
|
|
|
|
}
|
2009-10-15 17:20:41 +00:00
|
|
|
err = be_mount_container (ctrl, conttype, filename, mountpoint, tuples, &rid);
|
2016-02-13 17:01:45 +01:00
|
|
|
if (err)
|
|
|
|
;
|
|
|
|
else if (conttype == CONTTYPE_DM_CRYPT)
|
|
|
|
g13_request_shutdown ();
|
|
|
|
else
|
2009-10-15 17:20:41 +00:00
|
|
|
{
|
2016-02-13 17:01:45 +01:00
|
|
|
/* Unless this is a DM-CRYPT mount we put it into our mounttable
|
|
|
|
so that we can manage the mounts ourselves. For dm-crypt we
|
|
|
|
do not keep a process to monitor he mounts (for now). */
|
2009-10-28 12:02:15 +00:00
|
|
|
err = mountinfo_add_mount (filename, mountpoint, conttype, rid,
|
|
|
|
!!mountpoint_buffer);
|
2009-10-15 17:20:41 +00:00
|
|
|
/* Fixme: What shall we do if this fails? Add a provisional
|
|
|
|
mountinfo entry first and remove it on error? */
|
2009-10-28 12:02:15 +00:00
|
|
|
if (!err)
|
|
|
|
{
|
|
|
|
char *tmp = percent_plus_escape (mountpoint);
|
|
|
|
if (!tmp)
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g13_status (ctrl, STATUS_MOUNTPOINT, tmp, NULL);
|
|
|
|
xfree (tmp);
|
|
|
|
}
|
|
|
|
}
|
2009-10-15 17:20:41 +00:00
|
|
|
}
|
2009-10-13 19:17:24 +00:00
|
|
|
|
|
|
|
leave:
|
|
|
|
destroy_tupledesc (tuples);
|
|
|
|
xfree (keyblob);
|
|
|
|
xfree (enckeyblob);
|
2011-09-23 14:43:58 +02:00
|
|
|
dotlock_destroy (lock);
|
2009-10-28 12:02:15 +00:00
|
|
|
xfree (mountpoint_buffer);
|
2009-10-13 19:17:24 +00:00
|
|
|
return err;
|
|
|
|
}
|
2009-10-15 17:20:41 +00:00
|
|
|
|
|
|
|
|
|
|
|
/* Unmount the container with name FILENAME or the one mounted at
|
|
|
|
MOUNTPOINT. If both are given the FILENAME takes precedence. */
|
|
|
|
gpg_error_t
|
|
|
|
g13_umount_container (ctrl_t ctrl, const char *filename, const char *mountpoint)
|
|
|
|
{
|
|
|
|
gpg_error_t err;
|
|
|
|
unsigned int rid;
|
|
|
|
runner_t runner;
|
|
|
|
|
|
|
|
(void)ctrl;
|
|
|
|
|
|
|
|
if (!filename && !mountpoint)
|
|
|
|
return gpg_error (GPG_ERR_ENOENT);
|
|
|
|
err = mountinfo_find_mount (filename, mountpoint, &rid);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-10-15 17:20:41 +00:00
|
|
|
runner = runner_find_by_rid (rid);
|
|
|
|
if (!runner)
|
|
|
|
{
|
|
|
|
log_error ("runner %u not found\n", rid);
|
|
|
|
return gpg_error (GPG_ERR_NOT_FOUND);
|
|
|
|
}
|
|
|
|
|
|
|
|
runner_cancel (runner);
|
|
|
|
runner_release (runner);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-10-15 17:20:41 +00:00
|
|
|
return 0;
|
|
|
|
}
|