1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.

use std::{path::Path, ptr};

use libc::{c_char, c_void};

use crate::{device::CryptDevice, err::LibcryptErr, mem::SafeMemHandle};

/// Contents of a keyfile that have been read
pub struct CryptKeyfileContents {
    key_mem: SafeMemHandle,
}

impl AsRef<[u8]> for CryptKeyfileContents {
    fn as_ref(&self) -> &[u8] {
        self.key_mem.as_ref()
    }
}

consts_to_from_enum!(
    /// Flags for reading keyfiles
    CryptKeyfileFlag,
    u32,
    StopEol => libcryptsetup_rs_sys::CRYPT_KEYFILE_STOP_EOL
);

bitflags_to_from_struct!(
    /// Set of flags for reading keyfiles
    CryptKeyfileFlags,
    CryptKeyfileFlag,
    u32
);

/// Handle for keyfile operations
pub struct CryptKeyfile<'a> {
    reference: &'a mut CryptDevice,
}

impl<'a> CryptKeyfile<'a> {
    /// Create a new keyfile operation handle
    pub(crate) fn new(reference: &'a mut CryptDevice) -> Self {
        CryptKeyfile { reference }
    }

    /// Read keyfile into memory - these bindings will automatically
    /// safely clean it up after `CryptKeyfileContents` is dropped
    pub fn device_read(
        &mut self,
        keyfile: &Path,
        keyfile_offset: u64,
        key_size: Option<crate::size_t>,
        flags: CryptKeyfileFlags,
    ) -> Result<CryptKeyfileContents, LibcryptErr> {
        let keyfile_cstring = path_to_cstring!(keyfile)?;
        let keyfile_size = match key_size {
            Some(i) => i,
            None => std::fs::metadata(keyfile)
                .map_err(LibcryptErr::IOError)?
                .len() as crate::size_t,
        };

        let mut key: *mut c_char = ptr::null_mut();
        let mut size: crate::size_t = 0;
        errno!(unsafe {
            libcryptsetup_rs_sys::crypt_keyfile_device_read(
                self.reference.as_ptr(),
                keyfile_cstring.as_ptr(),
                &mut key as *mut *mut c_char,
                &mut size as *mut crate::size_t,
                keyfile_offset,
                keyfile_size,
                flags.into(),
            )
        })?;
        Ok(CryptKeyfileContents {
            key_mem: unsafe { SafeMemHandle::from_ptr(key as *mut c_void, size) },
        })
    }
}