Home | History | Annotate | Line # | Download | only in cgdconfig
cgdconfig.c revision 1.21.2.1
      1  1.21.2.1  wrstuden /* $NetBSD: cgdconfig.c,v 1.21.2.1 2008/06/23 04:29:57 wrstuden Exp $ */
      2       1.1     elric 
      3       1.1     elric /*-
      4       1.5     elric  * Copyright (c) 2002, 2003 The NetBSD Foundation, Inc.
      5       1.1     elric  * All rights reserved.
      6       1.1     elric  *
      7       1.1     elric  * This code is derived from software contributed to The NetBSD Foundation
      8       1.1     elric  * by Roland C. Dowdeswell.
      9       1.1     elric  *
     10       1.1     elric  * Redistribution and use in source and binary forms, with or without
     11       1.1     elric  * modification, are permitted provided that the following conditions
     12       1.1     elric  * are met:
     13       1.1     elric  * 1. Redistributions of source code must retain the above copyright
     14       1.1     elric  *    notice, this list of conditions and the following disclaimer.
     15       1.1     elric  * 2. Redistributions in binary form must reproduce the above copyright
     16       1.1     elric  *    notice, this list of conditions and the following disclaimer in the
     17       1.1     elric  *    documentation and/or other materials provided with the distribution.
     18       1.1     elric  *
     19       1.1     elric  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20       1.1     elric  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21       1.1     elric  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22       1.1     elric  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23       1.1     elric  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24       1.1     elric  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25       1.1     elric  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26       1.1     elric  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27       1.1     elric  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28       1.1     elric  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29       1.1     elric  * POSSIBILITY OF SUCH DAMAGE.
     30       1.1     elric  */
     31       1.1     elric 
     32       1.1     elric #include <sys/cdefs.h>
     33       1.1     elric #ifndef lint
     34       1.1     elric __COPYRIGHT(
     35       1.5     elric "@(#) Copyright (c) 2002, 2003\
     36       1.1     elric 	The NetBSD Foundation, Inc.  All rights reserved.");
     37  1.21.2.1  wrstuden __RCSID("$NetBSD: cgdconfig.c,v 1.21.2.1 2008/06/23 04:29:57 wrstuden Exp $");
     38       1.1     elric #endif
     39       1.1     elric 
     40       1.5     elric #include <err.h>
     41       1.1     elric #include <errno.h>
     42       1.1     elric #include <fcntl.h>
     43       1.1     elric #include <libgen.h>
     44       1.1     elric #include <stdio.h>
     45       1.1     elric #include <stdlib.h>
     46       1.1     elric #include <string.h>
     47       1.1     elric #include <unistd.h>
     48       1.1     elric #include <util.h>
     49       1.1     elric 
     50       1.1     elric #include <sys/ioctl.h>
     51       1.3     elric #include <sys/disklabel.h>
     52      1.14     elric #include <sys/mman.h>
     53       1.1     elric #include <sys/param.h>
     54      1.13     elric #include <sys/resource.h>
     55       1.1     elric 
     56       1.1     elric #include <dev/cgdvar.h>
     57       1.1     elric 
     58       1.5     elric #include <ufs/ffs/fs.h>
     59       1.5     elric 
     60       1.1     elric #include "params.h"
     61       1.1     elric #include "pkcs5_pbkdf2.h"
     62       1.1     elric #include "utils.h"
     63       1.1     elric 
     64       1.1     elric #define CGDCONFIG_DIR		"/etc/cgd"
     65       1.1     elric #define CGDCONFIG_CFILE		CGDCONFIG_DIR "/cgd.conf"
     66       1.1     elric 
     67      1.17    cbiere enum action {
     68      1.17    cbiere 	 ACTION_DEFAULT,		/* default -> configure */
     69      1.17    cbiere 	 ACTION_CONFIGURE,		/* configure, with paramsfile */
     70      1.17    cbiere 	 ACTION_UNCONFIGURE,		/* unconfigure */
     71      1.17    cbiere 	 ACTION_GENERATE,		/* generate a paramsfile */
     72      1.17    cbiere 	 ACTION_GENERATE_CONVERT,	/* generate a ``dup'' paramsfile */
     73      1.17    cbiere 	 ACTION_CONFIGALL,		/* configure all from config file */
     74      1.17    cbiere 	 ACTION_UNCONFIGALL,		/* unconfigure all from config file */
     75      1.17    cbiere 	 ACTION_CONFIGSTDIN		/* configure, key from stdin */
     76      1.17    cbiere };
     77       1.1     elric 
     78       1.1     elric /* if nflag is set, do not configure/unconfigure the cgd's */
     79       1.1     elric 
     80       1.1     elric int	nflag = 0;
     81       1.1     elric 
     82  1.21.2.1  wrstuden /* if pflag is set to PFLAG_STDIN read from stdin rather than getpass(3) */
     83  1.21.2.1  wrstuden 
     84  1.21.2.1  wrstuden #define	PFLAG_GETPASS	0x01
     85  1.21.2.1  wrstuden #define	PFLAG_STDIN	0x02
     86  1.21.2.1  wrstuden int	pflag = PFLAG_GETPASS;
     87  1.21.2.1  wrstuden 
     88       1.3     elric static int	configure(int, char **, struct params *, int);
     89       1.1     elric static int	configure_stdin(struct params *, int argc, char **);
     90       1.1     elric static int	generate(struct params *, int, char **, const char *);
     91       1.5     elric static int	generate_convert(struct params *, int, char **, const char *);
     92       1.3     elric static int	unconfigure(int, char **, struct params *, int);
     93       1.3     elric static int	do_all(const char *, int, char **,
     94       1.3     elric 		       int (*)(int, char **, struct params *, int));
     95       1.1     elric 
     96       1.1     elric #define CONFIG_FLAGS_FROMALL	1	/* called from configure_all() */
     97       1.1     elric #define CONFIG_FLAGS_FROMMAIN	2	/* called from main() */
     98       1.1     elric 
     99       1.2     elric static int	 configure_params(int, const char *, const char *,
    100       1.2     elric 				  struct params *);
    101      1.13     elric static void	 eliminate_cores(void);
    102      1.19  christos static bits_t	*getkey(const char *, struct keygen *, size_t);
    103      1.19  christos static bits_t	*getkey_storedkey(const char *, struct keygen *, size_t);
    104      1.19  christos static bits_t	*getkey_randomkey(const char *, struct keygen *, size_t, int);
    105  1.21.2.1  wrstuden static bits_t	*getkey_pkcs5_pbkdf2(const char *, struct keygen *, size_t,
    106  1.21.2.1  wrstuden 				     int);
    107  1.21.2.1  wrstuden static bits_t	*getkey_shell_cmd(const char *, struct keygen *, size_t);
    108  1.21.2.1  wrstuden static char	*maybe_getpass(char *);
    109      1.17    cbiere static int	 opendisk_werror(const char *, char *, size_t);
    110       1.3     elric static int	 unconfigure_fd(int);
    111       1.3     elric static int	 verify(struct params *, int);
    112       1.5     elric static int	 verify_disklabel(int);
    113       1.5     elric static int	 verify_ffs(int);
    114       1.9        cb static int	 verify_reenter(struct params *);
    115       1.1     elric 
    116       1.3     elric static void	 usage(void);
    117       1.1     elric 
    118       1.1     elric /* Verbose Framework */
    119      1.17    cbiere unsigned	verbose = 0;
    120       1.1     elric 
    121       1.1     elric #define VERBOSE(x,y)	if (verbose >= x) y
    122      1.19  christos #define VPRINTF(x,y)	if (verbose >= x) (void)printf y
    123       1.1     elric 
    124       1.1     elric static void
    125       1.1     elric usage(void)
    126       1.1     elric {
    127       1.1     elric 
    128      1.19  christos 	(void)fprintf(stderr, "usage: %s [-nv] [-V vmeth] cgd dev [paramsfile]\n",
    129       1.1     elric 	    getprogname());
    130      1.19  christos 	(void)fprintf(stderr, "       %s -C [-nv] [-f configfile]\n", getprogname());
    131      1.19  christos 	(void)fprintf(stderr, "       %s -U [-nv] [-f configfile]\n", getprogname());
    132      1.19  christos 	(void)fprintf(stderr, "       %s -G [-nv] [-i ivmeth] [-k kgmeth] "
    133       1.5     elric 	    "[-o outfile] paramsfile\n", getprogname());
    134      1.19  christos 	(void)fprintf(stderr, "       %s -g [-nv] [-i ivmeth] [-k kgmeth] "
    135       1.5     elric 	    "[-o outfile] alg [keylen]\n", getprogname());
    136      1.19  christos 	(void)fprintf(stderr, "       %s -s [-nv] [-i ivmeth] cgd dev alg "
    137       1.1     elric 	    "[keylen]\n", getprogname());
    138      1.19  christos 	(void)fprintf(stderr, "       %s -u [-nv] cgd\n", getprogname());
    139      1.17    cbiere 	exit(EXIT_FAILURE);
    140      1.17    cbiere }
    141      1.17    cbiere 
    142      1.17    cbiere static int
    143      1.19  christos parse_size_t(const char *s, size_t *l)
    144      1.17    cbiere {
    145      1.17    cbiere 	char *endptr;
    146      1.17    cbiere 	long v;
    147      1.17    cbiere 
    148      1.17    cbiere 	errno = 0;
    149      1.17    cbiere 	v = strtol(s, &endptr, 10);
    150      1.17    cbiere 	if ((v == LONG_MIN || v == LONG_MAX) && errno)
    151      1.17    cbiere 		return -1;
    152      1.17    cbiere 	if (v < INT_MIN || v > INT_MAX) {
    153      1.17    cbiere 		errno = ERANGE;
    154      1.17    cbiere 		return -1;
    155      1.17    cbiere 	}
    156      1.17    cbiere 	if (endptr == s) {
    157      1.17    cbiere 		errno = EINVAL;
    158      1.17    cbiere 		return -1;
    159      1.17    cbiere 	}
    160      1.19  christos 	*l = (size_t)v;
    161      1.19  christos 	return 0;
    162      1.17    cbiere }
    163      1.17    cbiere 
    164      1.17    cbiere static void
    165      1.17    cbiere set_action(enum action *action, enum action value)
    166      1.17    cbiere {
    167      1.17    cbiere 	if (*action != ACTION_DEFAULT)
    168      1.17    cbiere 		usage();
    169      1.17    cbiere 	*action = value;
    170       1.1     elric }
    171       1.1     elric 
    172       1.1     elric int
    173       1.1     elric main(int argc, char **argv)
    174       1.1     elric {
    175       1.5     elric 	struct params *p;
    176       1.5     elric 	struct params *tp;
    177       1.5     elric 	struct keygen *kg;
    178      1.17    cbiere 	enum action action = ACTION_DEFAULT;
    179       1.1     elric 	int	ch;
    180      1.17    cbiere 	const char	*cfile = NULL;
    181      1.17    cbiere 	const char	*outfile = NULL;
    182       1.1     elric 
    183      1.15     elric 	setprogname(*argv);
    184      1.13     elric 	eliminate_cores();
    185      1.14     elric 	if (mlockall(MCL_FUTURE))
    186      1.14     elric 		err(EXIT_FAILURE, "Can't lock memory");
    187       1.5     elric 	p = params_new();
    188       1.5     elric 	kg = NULL;
    189       1.1     elric 
    190  1.21.2.1  wrstuden 	while ((ch = getopt(argc, argv, "CGUV:b:f:gi:k:no:spuv")) != -1)
    191       1.1     elric 		switch (ch) {
    192       1.1     elric 		case 'C':
    193      1.17    cbiere 			set_action(&action, ACTION_CONFIGALL);
    194       1.1     elric 			break;
    195       1.5     elric 		case 'G':
    196      1.17    cbiere 			set_action(&action, ACTION_GENERATE_CONVERT);
    197       1.5     elric 			break;
    198       1.1     elric 		case 'U':
    199      1.17    cbiere 			set_action(&action, ACTION_UNCONFIGALL);
    200       1.1     elric 			break;
    201       1.3     elric 		case 'V':
    202       1.5     elric 			tp = params_verify_method(string_fromcharstar(optarg));
    203       1.5     elric 			if (!tp)
    204       1.3     elric 				usage();
    205       1.5     elric 			p = params_combine(p, tp);
    206       1.3     elric 			break;
    207       1.1     elric 		case 'b':
    208      1.17    cbiere 			{
    209      1.19  christos 				size_t size;
    210      1.17    cbiere 
    211      1.19  christos 				if (parse_size_t(optarg, &size) == -1)
    212      1.17    cbiere 					usage();
    213      1.17    cbiere 				tp = params_bsize(size);
    214      1.17    cbiere 				if (!tp)
    215      1.17    cbiere 					usage();
    216      1.17    cbiere 				p = params_combine(p, tp);
    217      1.17    cbiere 			}
    218       1.1     elric 			break;
    219       1.1     elric 		case 'f':
    220      1.17    cbiere 			if (cfile)
    221      1.17    cbiere 				usage();
    222      1.17    cbiere 			cfile = estrdup(optarg);
    223       1.1     elric 			break;
    224       1.1     elric 		case 'g':
    225      1.17    cbiere 			set_action(&action, ACTION_GENERATE);
    226       1.1     elric 			break;
    227       1.1     elric 		case 'i':
    228       1.5     elric 			tp = params_ivmeth(string_fromcharstar(optarg));
    229       1.5     elric 			p = params_combine(p, tp);
    230       1.1     elric 			break;
    231       1.1     elric 		case 'k':
    232       1.5     elric 			kg = keygen_method(string_fromcharstar(optarg));
    233       1.5     elric 			if (!kg)
    234       1.1     elric 				usage();
    235       1.5     elric 			keygen_addlist(&p->keygen, kg);
    236       1.1     elric 			break;
    237       1.1     elric 		case 'n':
    238       1.1     elric 			nflag = 1;
    239       1.1     elric 			break;
    240       1.1     elric 		case 'o':
    241      1.17    cbiere 			if (outfile)
    242      1.17    cbiere 				usage();
    243      1.17    cbiere 			outfile = estrdup(optarg);
    244       1.1     elric 			break;
    245  1.21.2.1  wrstuden 		case 'p':
    246  1.21.2.1  wrstuden 			pflag = PFLAG_STDIN;
    247  1.21.2.1  wrstuden 			break;
    248       1.1     elric 		case 's':
    249      1.17    cbiere 			set_action(&action, ACTION_CONFIGSTDIN);
    250       1.1     elric 			break;
    251       1.1     elric 
    252       1.1     elric 		case 'u':
    253      1.17    cbiere 			set_action(&action, ACTION_UNCONFIGURE);
    254       1.1     elric 			break;
    255       1.1     elric 		case 'v':
    256       1.1     elric 			verbose++;
    257       1.1     elric 			break;
    258       1.1     elric 		default:
    259       1.1     elric 			usage();
    260       1.1     elric 			/* NOTREACHED */
    261       1.1     elric 		}
    262       1.1     elric 
    263       1.1     elric 	argc -= optind;
    264       1.1     elric 	argv += optind;
    265       1.1     elric 
    266      1.17    cbiere 	if (!outfile)
    267      1.17    cbiere 		outfile = "";
    268      1.17    cbiere 	if (!cfile)
    269      1.17    cbiere 		cfile = "";
    270      1.17    cbiere 
    271       1.1     elric 	/* validate the consistency of the arguments */
    272       1.1     elric 
    273       1.1     elric 	switch (action) {
    274      1.17    cbiere 	case ACTION_DEFAULT:	/* ACTION_CONFIGURE is the default */
    275       1.1     elric 	case ACTION_CONFIGURE:
    276       1.5     elric 		return configure(argc, argv, p, CONFIG_FLAGS_FROMMAIN);
    277       1.1     elric 	case ACTION_UNCONFIGURE:
    278       1.3     elric 		return unconfigure(argc, argv, NULL, CONFIG_FLAGS_FROMMAIN);
    279       1.1     elric 	case ACTION_GENERATE:
    280       1.5     elric 		return generate(p, argc, argv, outfile);
    281       1.5     elric 	case ACTION_GENERATE_CONVERT:
    282       1.5     elric 		return generate_convert(p, argc, argv, outfile);
    283       1.1     elric 	case ACTION_CONFIGALL:
    284       1.1     elric 		return do_all(cfile, argc, argv, configure);
    285       1.1     elric 	case ACTION_UNCONFIGALL:
    286       1.1     elric 		return do_all(cfile, argc, argv, unconfigure);
    287       1.1     elric 	case ACTION_CONFIGSTDIN:
    288       1.5     elric 		return configure_stdin(p, argc, argv);
    289      1.19  christos 	default:
    290      1.19  christos 		errx(EXIT_FAILURE, "undefined action");
    291      1.19  christos 		/* NOTREACHED */
    292       1.1     elric 	}
    293       1.1     elric }
    294       1.1     elric 
    295       1.5     elric static bits_t *
    296      1.19  christos getkey(const char *dev, struct keygen *kg, size_t len)
    297       1.1     elric {
    298       1.5     elric 	bits_t	*ret = NULL;
    299       1.5     elric 	bits_t	*tmp;
    300       1.1     elric 
    301      1.19  christos 	VPRINTF(3, ("getkey(\"%s\", %p, %zu) called\n", dev, kg, len));
    302       1.5     elric 	for (; kg; kg=kg->next) {
    303       1.5     elric 		switch (kg->kg_method) {
    304       1.5     elric 		case KEYGEN_STOREDKEY:
    305       1.5     elric 			tmp = getkey_storedkey(dev, kg, len);
    306       1.5     elric 			break;
    307       1.5     elric 		case KEYGEN_RANDOMKEY:
    308      1.12        tv 			tmp = getkey_randomkey(dev, kg, len, 1);
    309      1.12        tv 			break;
    310      1.12        tv 		case KEYGEN_URANDOMKEY:
    311      1.12        tv 			tmp = getkey_randomkey(dev, kg, len, 0);
    312       1.5     elric 			break;
    313      1.10       dan 		case KEYGEN_PKCS5_PBKDF2_SHA1:
    314      1.10       dan 			tmp = getkey_pkcs5_pbkdf2(dev, kg, len, 0);
    315      1.10       dan 			break;
    316      1.10       dan 		/* provide backwards compatibility for old config files */
    317      1.10       dan 		case KEYGEN_PKCS5_PBKDF2_OLD:
    318      1.10       dan 			tmp = getkey_pkcs5_pbkdf2(dev, kg, len, 1);
    319       1.5     elric 			break;
    320  1.21.2.1  wrstuden 		case KEYGEN_SHELL_CMD:
    321  1.21.2.1  wrstuden 			tmp = getkey_shell_cmd(dev, kg, len);
    322  1.21.2.1  wrstuden 			break;
    323       1.5     elric 		default:
    324       1.5     elric 			warnx("unrecognised keygen method %d in getkey()",
    325       1.5     elric 			    kg->kg_method);
    326       1.5     elric 			if (ret)
    327       1.5     elric 				bits_free(ret);
    328       1.5     elric 			return NULL;
    329       1.5     elric 		}
    330       1.5     elric 
    331       1.5     elric 		if (ret)
    332       1.5     elric 			ret = bits_xor_d(tmp, ret);
    333       1.5     elric 		else
    334       1.5     elric 			ret = tmp;
    335       1.1     elric 	}
    336       1.5     elric 
    337       1.5     elric 	return ret;
    338       1.5     elric }
    339       1.5     elric 
    340       1.5     elric /*ARGSUSED*/
    341       1.5     elric static bits_t *
    342      1.19  christos getkey_storedkey(const char *target, struct keygen *kg, size_t keylen)
    343       1.5     elric {
    344       1.5     elric 	return bits_dup(kg->kg_key);
    345       1.1     elric }
    346       1.1     elric 
    347       1.5     elric /*ARGSUSED*/
    348       1.5     elric static bits_t *
    349      1.19  christos getkey_randomkey(const char *target, struct keygen *kg, size_t keylen, int hard)
    350       1.1     elric {
    351      1.12        tv 	return bits_getrandombits(keylen, hard);
    352       1.1     elric }
    353       1.1     elric 
    354  1.21.2.1  wrstuden static char *
    355  1.21.2.1  wrstuden maybe_getpass(char *prompt)
    356  1.21.2.1  wrstuden {
    357  1.21.2.1  wrstuden 	char	 buf[1024];
    358  1.21.2.1  wrstuden 	char	*p = buf;
    359  1.21.2.1  wrstuden 	char	*tmp;
    360  1.21.2.1  wrstuden 
    361  1.21.2.1  wrstuden 	switch (pflag) {
    362  1.21.2.1  wrstuden 	case PFLAG_GETPASS:
    363  1.21.2.1  wrstuden 		p = getpass(prompt);
    364  1.21.2.1  wrstuden 		break;
    365  1.21.2.1  wrstuden 
    366  1.21.2.1  wrstuden 	case PFLAG_STDIN:
    367  1.21.2.1  wrstuden 		p = fgets(buf, sizeof(buf), stdin);
    368  1.21.2.1  wrstuden 		if (p) {
    369  1.21.2.1  wrstuden 			tmp = strchr(p, '\n');
    370  1.21.2.1  wrstuden 			if (tmp)
    371  1.21.2.1  wrstuden 				*tmp = '\0';
    372  1.21.2.1  wrstuden 		}
    373  1.21.2.1  wrstuden 		break;
    374  1.21.2.1  wrstuden 
    375  1.21.2.1  wrstuden 	default:
    376  1.21.2.1  wrstuden 		errx(EXIT_FAILURE, "pflag set inappropriately?");
    377  1.21.2.1  wrstuden 	}
    378  1.21.2.1  wrstuden 
    379  1.21.2.1  wrstuden 	if (!p)
    380  1.21.2.1  wrstuden 		err(EXIT_FAILURE, "failed to read passphrase");
    381  1.21.2.1  wrstuden 
    382  1.21.2.1  wrstuden 	return estrdup(p);
    383  1.21.2.1  wrstuden }
    384  1.21.2.1  wrstuden 
    385       1.5     elric /*ARGSUSED*/
    386      1.10       dan /*
    387      1.10       dan  * XXX take, and pass through, a compat flag that indicates whether we
    388      1.10       dan  * provide backwards compatibility with a previous bug.  The previous
    389      1.10       dan  * behaviour is indicated by the keygen method pkcs5_pbkdf2, and a
    390      1.10       dan  * non-zero compat flag. The new default, and correct keygen method is
    391      1.10       dan  * called pcks5_pbkdf2/sha1.  When the old method is removed, so will
    392      1.10       dan  * be the compat argument.
    393      1.10       dan  */
    394       1.5     elric static bits_t *
    395      1.19  christos getkey_pkcs5_pbkdf2(const char *target, struct keygen *kg, size_t keylen,
    396      1.19  christos     int compat)
    397       1.1     elric {
    398       1.5     elric 	bits_t		*ret;
    399  1.21.2.1  wrstuden 	u_int8_t	*passp;
    400       1.5     elric 	char		 buf[1024];
    401       1.5     elric 	u_int8_t	*tmp;
    402       1.1     elric 
    403       1.5     elric 	snprintf(buf, sizeof(buf), "%s's passphrase:", target);
    404  1.21.2.1  wrstuden 	passp = (u_int8_t *)maybe_getpass(buf);
    405       1.5     elric 	if (pkcs5_pbkdf2(&tmp, BITS2BYTES(keylen), passp, strlen(passp),
    406       1.5     elric 	    bits_getbuf(kg->kg_salt), BITS2BYTES(bits_len(kg->kg_salt)),
    407      1.10       dan 	    kg->kg_iterations, compat)) {
    408       1.5     elric 		warnx("failed to generate PKCS#5 PBKDF2 key");
    409       1.5     elric 		return NULL;
    410       1.5     elric 	}
    411       1.5     elric 
    412       1.5     elric 	ret = bits_new(tmp, keylen);
    413       1.9        cb 	kg->kg_key = bits_dup(ret);
    414  1.21.2.1  wrstuden 	free(passp);
    415       1.5     elric 	free(tmp);
    416       1.1     elric 	return ret;
    417       1.1     elric }
    418       1.1     elric 
    419       1.5     elric /*ARGSUSED*/
    420  1.21.2.1  wrstuden static bits_t *
    421  1.21.2.1  wrstuden getkey_shell_cmd(const char *target, struct keygen *kg, size_t keylen)
    422  1.21.2.1  wrstuden {
    423  1.21.2.1  wrstuden 	FILE	*f;
    424  1.21.2.1  wrstuden 	bits_t	*ret;
    425  1.21.2.1  wrstuden 
    426  1.21.2.1  wrstuden 	f = popen(string_tocharstar(kg->kg_cmd), "r");
    427  1.21.2.1  wrstuden 	ret = bits_fget(f, keylen);
    428  1.21.2.1  wrstuden 	pclose(f);
    429  1.21.2.1  wrstuden 
    430  1.21.2.1  wrstuden 	return ret;
    431  1.21.2.1  wrstuden }
    432  1.21.2.1  wrstuden 
    433  1.21.2.1  wrstuden /*ARGSUSED*/
    434       1.1     elric static int
    435       1.3     elric unconfigure(int argc, char **argv, struct params *inparams, int flags)
    436       1.1     elric {
    437       1.1     elric 	int	fd;
    438       1.1     elric 	int	ret;
    439       1.1     elric 	char	buf[MAXPATHLEN] = "";
    440       1.1     elric 
    441       1.1     elric 	/* only complain about additional arguments, if called from main() */
    442       1.1     elric 	if (flags == CONFIG_FLAGS_FROMMAIN && argc != 1)
    443       1.1     elric 		usage();
    444       1.1     elric 
    445       1.1     elric 	/* if called from do_all(), then ensure that 2 or 3 args exist */
    446       1.1     elric 	if (flags == CONFIG_FLAGS_FROMALL && (argc < 2 || argc > 3))
    447       1.1     elric 		return -1;
    448       1.1     elric 
    449       1.1     elric 	fd = opendisk(*argv, O_RDWR, buf, sizeof(buf), 1);
    450       1.1     elric 	if (fd == -1) {
    451      1.17    cbiere 		int saved_errno = errno;
    452      1.17    cbiere 
    453       1.5     elric 		warn("can't open cgd \"%s\", \"%s\"", *argv, buf);
    454       1.1     elric 
    455       1.1     elric 		/* this isn't fatal with nflag != 0 */
    456       1.1     elric 		if (!nflag)
    457      1.17    cbiere 			return saved_errno;
    458       1.1     elric 	}
    459       1.1     elric 
    460       1.1     elric 	VPRINTF(1, ("%s (%s): clearing\n", *argv, buf));
    461       1.1     elric 
    462       1.1     elric 	if (nflag)
    463       1.1     elric 		return 0;
    464       1.1     elric 
    465       1.3     elric 	ret = unconfigure_fd(fd);
    466      1.19  christos 	(void)close(fd);
    467       1.3     elric 	return ret;
    468       1.3     elric }
    469       1.3     elric 
    470       1.3     elric static int
    471       1.3     elric unconfigure_fd(int fd)
    472       1.3     elric {
    473       1.3     elric 	struct	cgd_ioctl ci;
    474       1.3     elric 
    475      1.17    cbiere 	if (ioctl(fd, CGDIOCCLR, &ci) == -1) {
    476      1.17    cbiere 		warn("ioctl");
    477       1.3     elric 		return -1;
    478       1.1     elric 	}
    479       1.1     elric 
    480       1.1     elric 	return 0;
    481       1.1     elric }
    482       1.1     elric 
    483       1.5     elric /*ARGSUSED*/
    484       1.1     elric static int
    485       1.3     elric configure(int argc, char **argv, struct params *inparams, int flags)
    486       1.1     elric {
    487       1.5     elric 	struct params	*p;
    488  1.21.2.1  wrstuden 	struct keygen	*kg;
    489       1.5     elric 	int		 fd;
    490  1.21.2.1  wrstuden 	int		 loop = 0;
    491       1.5     elric 	int		 ret;
    492       1.5     elric 	char		 cgdname[PATH_MAX];
    493       1.1     elric 
    494      1.17    cbiere 	if (argc == 2) {
    495      1.17    cbiere 		char *pfile;
    496      1.17    cbiere 
    497      1.17    cbiere 		if (asprintf(&pfile, "%s/%s",
    498      1.17    cbiere 		    CGDCONFIG_DIR, basename(argv[1])) == -1)
    499      1.17    cbiere 			return -1;
    500      1.17    cbiere 
    501      1.17    cbiere 		p = params_cget(pfile);
    502      1.17    cbiere 		free(pfile);
    503      1.17    cbiere 	} else if (argc == 3) {
    504      1.17    cbiere 		p = params_cget(argv[2]);
    505      1.17    cbiere 	} else {
    506       1.1     elric 		/* print usage and exit, only if called from main() */
    507       1.5     elric 		if (flags == CONFIG_FLAGS_FROMMAIN) {
    508       1.5     elric 			warnx("wrong number of args");
    509       1.1     elric 			usage();
    510       1.5     elric 		}
    511       1.1     elric 		return -1;
    512       1.1     elric 	}
    513       1.1     elric 
    514       1.5     elric 	if (!p)
    515       1.5     elric 		return -1;
    516       1.2     elric 
    517       1.3     elric 	/*
    518       1.5     elric 	 * over-ride with command line specifications and fill in default
    519       1.5     elric 	 * values.
    520       1.3     elric 	 */
    521       1.3     elric 
    522       1.5     elric 	p = params_combine(p, inparams);
    523       1.5     elric 	ret = params_filldefaults(p);
    524       1.5     elric 	if (ret) {
    525       1.5     elric 		params_free(p);
    526       1.5     elric 		return ret;
    527       1.5     elric 	}
    528       1.5     elric 
    529       1.5     elric 	if (!params_verify(p)) {
    530       1.5     elric 		warnx("params invalid");
    531       1.5     elric 		return -1;
    532       1.5     elric 	}
    533       1.3     elric 
    534       1.3     elric 	/*
    535       1.3     elric 	 * loop over configuring the disk and checking to see if it
    536       1.3     elric 	 * verifies properly.  We open and close the disk device each
    537       1.3     elric 	 * time, because if the user passes us the block device we
    538       1.3     elric 	 * need to flush the buffer cache.
    539  1.21.2.1  wrstuden 	 *
    540  1.21.2.1  wrstuden 	 * We only loop if one of the verification methods prompts for
    541  1.21.2.1  wrstuden 	 * a password.
    542       1.3     elric 	 */
    543       1.3     elric 
    544  1.21.2.1  wrstuden 	for (kg = p->keygen; pflag == PFLAG_GETPASS && kg; kg = kg->next)
    545  1.21.2.1  wrstuden 		if ((kg->kg_method == KEYGEN_PKCS5_PBKDF2_SHA1) ||
    546  1.21.2.1  wrstuden 		    (kg->kg_method == KEYGEN_PKCS5_PBKDF2_OLD )) {
    547  1.21.2.1  wrstuden 			loop = 1;
    548  1.21.2.1  wrstuden 			break;
    549  1.21.2.1  wrstuden 		}
    550  1.21.2.1  wrstuden 
    551       1.3     elric 	for (;;) {
    552       1.3     elric 		fd = opendisk_werror(argv[0], cgdname, sizeof(cgdname));
    553       1.3     elric 		if (fd == -1)
    554       1.3     elric 			return -1;
    555       1.3     elric 
    556       1.5     elric 		if (p->key)
    557       1.5     elric 			bits_free(p->key);
    558       1.5     elric 
    559       1.5     elric 		p->key = getkey(argv[1], p->keygen, p->keylen);
    560       1.5     elric 		if (!p->key)
    561       1.3     elric 			goto bail_err;
    562       1.3     elric 
    563       1.5     elric 		ret = configure_params(fd, cgdname, argv[1], p);
    564       1.3     elric 		if (ret)
    565       1.3     elric 			goto bail_err;
    566       1.3     elric 
    567       1.5     elric 		ret = verify(p, fd);
    568       1.3     elric 		if (ret == -1)
    569       1.3     elric 			goto bail_err;
    570       1.3     elric 		if (!ret)
    571       1.3     elric 			break;
    572       1.2     elric 
    573      1.19  christos 		(void)unconfigure_fd(fd);
    574      1.19  christos 		(void)close(fd);
    575  1.21.2.1  wrstuden 
    576  1.21.2.1  wrstuden 		if (!loop) {
    577  1.21.2.1  wrstuden 			warnx("verification failed permanently");
    578  1.21.2.1  wrstuden 			goto bail_err;
    579  1.21.2.1  wrstuden 		}
    580  1.21.2.1  wrstuden 
    581  1.21.2.1  wrstuden 		warnx("verification failed, please reenter passphrase");
    582       1.3     elric 	}
    583       1.2     elric 
    584       1.5     elric 	params_free(p);
    585      1.19  christos 	(void)close(fd);
    586       1.3     elric 	return 0;
    587       1.3     elric bail_err:
    588       1.5     elric 	params_free(p);
    589      1.19  christos 	(void)close(fd);
    590       1.3     elric 	return -1;
    591       1.1     elric }
    592       1.1     elric 
    593       1.1     elric static int
    594       1.1     elric configure_stdin(struct params *p, int argc, char **argv)
    595       1.1     elric {
    596       1.2     elric 	int	fd;
    597       1.1     elric 	int	ret;
    598       1.2     elric 	char	cgdname[PATH_MAX];
    599       1.1     elric 
    600       1.1     elric 	if (argc < 3 || argc > 4)
    601       1.1     elric 		usage();
    602       1.1     elric 
    603       1.5     elric 	p->algorithm = string_fromcharstar(argv[2]);
    604      1.17    cbiere 	if (argc > 3) {
    605      1.19  christos 		size_t keylen;
    606      1.17    cbiere 
    607      1.19  christos 		if (parse_size_t(argv[3], &keylen) == -1) {
    608      1.17    cbiere 			warn("failed to parse key length");
    609      1.17    cbiere 			return -1;
    610      1.17    cbiere 		}
    611      1.17    cbiere 		p->keylen = keylen;
    612      1.17    cbiere 	}
    613       1.1     elric 
    614       1.1     elric 	ret = params_filldefaults(p);
    615       1.1     elric 	if (ret)
    616       1.1     elric 		return ret;
    617       1.1     elric 
    618       1.2     elric 	fd = opendisk_werror(argv[0], cgdname, sizeof(cgdname));
    619       1.2     elric 	if (fd == -1)
    620       1.2     elric 		return -1;
    621       1.2     elric 
    622       1.5     elric 	p->key = bits_fget(stdin, p->keylen);
    623       1.5     elric 	if (!p->key) {
    624       1.5     elric 		warnx("failed to read key from stdin");
    625       1.1     elric 		return -1;
    626       1.5     elric 	}
    627       1.1     elric 
    628       1.2     elric 	return configure_params(fd, cgdname, argv[1], p);
    629       1.1     elric }
    630       1.1     elric 
    631       1.1     elric static int
    632      1.17    cbiere opendisk_werror(const char *cgd, char *buf, size_t buflen)
    633       1.2     elric {
    634       1.2     elric 	int	fd;
    635       1.2     elric 
    636      1.18    cbiere 	VPRINTF(3, ("opendisk_werror(%s, %s, %zu) called.\n", cgd, buf, buflen));
    637       1.5     elric 
    638       1.2     elric 	/* sanity */
    639       1.2     elric 	if (!cgd || !buf)
    640       1.2     elric 		return -1;
    641       1.2     elric 
    642       1.2     elric 	if (nflag) {
    643      1.17    cbiere 		if (strlcpy(buf, cgd, buflen) >= buflen)
    644      1.17    cbiere 			return -1;
    645       1.2     elric 		return 0;
    646       1.2     elric 	}
    647       1.2     elric 
    648       1.3     elric 	fd = opendisk(cgd, O_RDWR, buf, buflen, 0);
    649       1.2     elric 	if (fd == -1)
    650       1.5     elric 		warnx("can't open cgd \"%s\", \"%s\"", cgd, buf);
    651       1.5     elric 
    652       1.2     elric 	return fd;
    653       1.2     elric }
    654       1.2     elric 
    655       1.2     elric static int
    656       1.2     elric configure_params(int fd, const char *cgd, const char *dev, struct params *p)
    657       1.1     elric {
    658       1.1     elric 	struct cgd_ioctl ci;
    659       1.1     elric 
    660       1.1     elric 	/* sanity */
    661       1.1     elric 	if (!cgd || !dev)
    662       1.1     elric 		return -1;
    663       1.1     elric 
    664      1.19  christos 	(void)memset(&ci, 0x0, sizeof(ci));
    665      1.16  christos 	ci.ci_disk = dev;
    666      1.16  christos 	ci.ci_alg = string_tocharstar(p->algorithm);
    667      1.16  christos 	ci.ci_ivmethod = string_tocharstar(p->ivmeth);
    668      1.16  christos 	ci.ci_key = bits_getbuf(p->key);
    669       1.1     elric 	ci.ci_keylen = p->keylen;
    670       1.1     elric 	ci.ci_blocksize = p->bsize;
    671       1.1     elric 
    672      1.20    martin 	VPRINTF(1, ("    with alg %s keylen %zu blocksize %zu ivmethod %s\n",
    673       1.5     elric 	    string_tocharstar(p->algorithm), p->keylen, p->bsize,
    674       1.5     elric 	    string_tocharstar(p->ivmeth)));
    675       1.5     elric 	VPRINTF(2, ("key: "));
    676       1.5     elric 	VERBOSE(2, bits_fprint(stdout, p->key));
    677       1.5     elric 	VPRINTF(2, ("\n"));
    678       1.1     elric 
    679       1.1     elric 	if (nflag)
    680       1.1     elric 		return 0;
    681       1.1     elric 
    682      1.17    cbiere 	if (ioctl(fd, CGDIOCSET, &ci) == -1) {
    683      1.17    cbiere 		int saved_errno = errno;
    684      1.17    cbiere 		warn("ioctl");
    685      1.17    cbiere 		return saved_errno;
    686       1.1     elric 	}
    687       1.1     elric 
    688       1.1     elric 	return 0;
    689       1.1     elric }
    690       1.1     elric 
    691       1.3     elric /*
    692       1.3     elric  * verify returns 0 for success, -1 for unrecoverable error, or 1 for retry.
    693       1.3     elric  */
    694       1.3     elric 
    695       1.3     elric #define SCANSIZE	8192
    696       1.3     elric 
    697       1.3     elric static int
    698       1.3     elric verify(struct params *p, int fd)
    699       1.3     elric {
    700       1.3     elric 
    701       1.3     elric 	switch (p->verify_method) {
    702       1.3     elric 	case VERIFY_NONE:
    703       1.3     elric 		return 0;
    704       1.3     elric 	case VERIFY_DISKLABEL:
    705       1.5     elric 		return verify_disklabel(fd);
    706       1.5     elric 	case VERIFY_FFS:
    707       1.5     elric 		return verify_ffs(fd);
    708       1.9        cb 	case VERIFY_REENTER:
    709       1.9        cb 		return verify_reenter(p);
    710       1.3     elric 	default:
    711       1.5     elric 		warnx("unimplemented verification method");
    712       1.3     elric 		return -1;
    713       1.3     elric 	}
    714       1.5     elric }
    715       1.5     elric 
    716       1.5     elric static int
    717       1.5     elric verify_disklabel(int fd)
    718       1.5     elric {
    719       1.5     elric 	struct	disklabel l;
    720      1.17    cbiere 	ssize_t	ret;
    721       1.5     elric 	char	buf[SCANSIZE];
    722       1.3     elric 
    723       1.3     elric 	/*
    724       1.3     elric 	 * we simply scan the first few blocks for a disklabel, ignoring
    725       1.3     elric 	 * any MBR/filecore sorts of logic.  MSDOS and RiscOS can't read
    726       1.3     elric 	 * a cgd, anyway, so it is unlikely that there will be non-native
    727       1.3     elric 	 * partition information.
    728       1.3     elric 	 */
    729       1.3     elric 
    730       1.3     elric 	ret = pread(fd, buf, 8192, 0);
    731      1.17    cbiere 	if (ret < 0) {
    732       1.5     elric 		warn("can't read disklabel area");
    733       1.3     elric 		return -1;
    734       1.3     elric 	}
    735       1.3     elric 
    736       1.3     elric 	/* now scan for the disklabel */
    737       1.3     elric 
    738      1.17    cbiere 	return disklabel_scan(&l, buf, (size_t)ret);
    739       1.3     elric }
    740       1.3     elric 
    741       1.7      fvdl static off_t sblock_try[] = SBLOCKSEARCH;
    742       1.7      fvdl 
    743       1.1     elric static int
    744       1.5     elric verify_ffs(int fd)
    745       1.5     elric {
    746      1.19  christos 	size_t	i;
    747       1.5     elric 
    748       1.7      fvdl 	for (i = 0; sblock_try[i] != -1; i++) {
    749      1.19  christos 		union {
    750      1.19  christos 		    char	buf[SBLOCKSIZE];
    751      1.19  christos 		    struct	fs fs;
    752      1.19  christos 		} u;
    753      1.17    cbiere 		ssize_t ret;
    754      1.17    cbiere 
    755      1.19  christos 		ret = pread(fd, &u, sizeof(u), sblock_try[i]);
    756      1.17    cbiere 		if (ret < 0) {
    757       1.7      fvdl 			warn("pread");
    758      1.17    cbiere 			break;
    759      1.19  christos 		} else if ((size_t)ret < sizeof(u)) {
    760      1.17    cbiere 			warnx("pread: incomplete block");
    761      1.17    cbiere 			break;
    762       1.7      fvdl 		}
    763      1.19  christos 		switch (u.fs.fs_magic) {
    764       1.7      fvdl 		case FS_UFS1_MAGIC:
    765       1.7      fvdl 		case FS_UFS2_MAGIC:
    766       1.7      fvdl 		case FS_UFS1_MAGIC_SWAPPED:
    767       1.7      fvdl 		case FS_UFS2_MAGIC_SWAPPED:
    768       1.7      fvdl 			return 0;
    769       1.7      fvdl 		default:
    770       1.7      fvdl 			continue;
    771       1.7      fvdl 		}
    772       1.5     elric 	}
    773      1.17    cbiere 
    774      1.17    cbiere 	return 1;	/* failure */
    775       1.9        cb }
    776       1.9        cb 
    777       1.9        cb static int
    778       1.9        cb verify_reenter(struct params *p)
    779       1.9        cb {
    780       1.9        cb 	struct keygen *kg;
    781       1.9        cb 	bits_t *orig_key, *key;
    782       1.9        cb 	int ret;
    783       1.9        cb 
    784       1.9        cb 	ret = 0;
    785       1.9        cb 	for (kg = p->keygen; kg && !ret; kg = kg->next) {
    786      1.10       dan 		if ((kg->kg_method != KEYGEN_PKCS5_PBKDF2_SHA1) &&
    787      1.10       dan 		    (kg->kg_method != KEYGEN_PKCS5_PBKDF2_OLD ))
    788       1.9        cb 			continue;
    789       1.9        cb 
    790       1.9        cb 		orig_key = kg->kg_key;
    791       1.9        cb 		kg->kg_key = NULL;
    792       1.9        cb 
    793      1.10       dan 		/* add a compat flag till the _OLD method goes away */
    794       1.9        cb 		key = getkey_pkcs5_pbkdf2("re-enter device", kg,
    795      1.10       dan 			bits_len(orig_key), kg->kg_method == KEYGEN_PKCS5_PBKDF2_OLD);
    796       1.9        cb 		ret = !bits_match(key, orig_key);
    797       1.9        cb 
    798       1.9        cb 		bits_free(key);
    799       1.9        cb 		bits_free(kg->kg_key);
    800       1.9        cb 		kg->kg_key = orig_key;
    801       1.9        cb 	}
    802       1.9        cb 
    803       1.9        cb 	return ret;
    804       1.5     elric }
    805       1.5     elric 
    806       1.5     elric static int
    807       1.1     elric generate(struct params *p, int argc, char **argv, const char *outfile)
    808       1.1     elric {
    809       1.1     elric 	int	 ret;
    810       1.1     elric 
    811       1.1     elric 	if (argc < 1 || argc > 2)
    812       1.1     elric 		usage();
    813       1.1     elric 
    814       1.5     elric 	p->algorithm = string_fromcharstar(argv[0]);
    815      1.17    cbiere 	if (argc > 1) {
    816      1.19  christos 		size_t keylen;
    817      1.17    cbiere 
    818      1.19  christos 		if (parse_size_t(argv[1], &keylen) == -1) {
    819      1.17    cbiere 			warn("Failed to parse key length");
    820      1.17    cbiere 			return -1;
    821      1.17    cbiere 		}
    822      1.17    cbiere 		p->keylen = keylen;
    823      1.17    cbiere 	}
    824       1.5     elric 
    825       1.5     elric 	ret = params_filldefaults(p);
    826       1.1     elric 	if (ret)
    827       1.1     elric 		return ret;
    828       1.5     elric 
    829       1.5     elric 	if (!p->keygen) {
    830      1.10       dan 		p->keygen = keygen_generate(KEYGEN_PKCS5_PBKDF2_SHA1);
    831       1.5     elric 		if (!p->keygen)
    832       1.5     elric 			return -1;
    833       1.5     elric 	}
    834       1.5     elric 
    835       1.5     elric 	if (keygen_filldefaults(p->keygen, p->keylen)) {
    836       1.5     elric 		warnx("Failed to generate defaults for keygen");
    837       1.5     elric 		return -1;
    838       1.5     elric 	}
    839       1.5     elric 
    840       1.5     elric 	if (!params_verify(p)) {
    841       1.5     elric 		warnx("invalid parameters generated");
    842       1.5     elric 		return -1;
    843       1.5     elric 	}
    844       1.5     elric 
    845       1.5     elric 	return params_cput(p, outfile);
    846       1.5     elric }
    847       1.5     elric 
    848       1.5     elric static int
    849       1.5     elric generate_convert(struct params *p, int argc, char **argv, const char *outfile)
    850       1.5     elric {
    851       1.5     elric 	struct params	*oldp;
    852       1.5     elric 	struct keygen	*kg;
    853       1.5     elric 
    854       1.5     elric 	if (argc != 1)
    855       1.5     elric 		usage();
    856       1.5     elric 
    857       1.5     elric 	oldp = params_cget(*argv);
    858       1.5     elric 	if (!oldp)
    859       1.5     elric 		return -1;
    860       1.5     elric 
    861       1.5     elric 	/* for sanity, we ensure that none of the keygens are randomkey */
    862       1.5     elric 	for (kg=p->keygen; kg; kg=kg->next)
    863       1.5     elric 		if (kg->kg_method == KEYGEN_RANDOMKEY)
    864       1.5     elric 			goto bail;
    865       1.5     elric 	for (kg=oldp->keygen; kg; kg=kg->next)
    866       1.5     elric 		if (kg->kg_method == KEYGEN_RANDOMKEY)
    867       1.5     elric 			goto bail;
    868       1.5     elric 
    869       1.5     elric 	if (!params_verify(oldp)) {
    870       1.5     elric 		warnx("invalid old parameters file \"%s\"", *argv);
    871       1.5     elric 		return -1;
    872       1.1     elric 	}
    873       1.1     elric 
    874       1.5     elric 	oldp->key = getkey("old file", oldp->keygen, oldp->keylen);
    875       1.5     elric 
    876       1.5     elric 	/* we copy across the non-keygen info, here. */
    877       1.5     elric 
    878       1.5     elric 	string_free(p->algorithm);
    879       1.5     elric 	string_free(p->ivmeth);
    880       1.5     elric 
    881       1.5     elric 	p->algorithm = string_dup(oldp->algorithm);
    882       1.5     elric 	p->ivmeth = string_dup(oldp->ivmeth);
    883       1.5     elric 	p->keylen = oldp->keylen;
    884       1.5     elric 	p->bsize = oldp->bsize;
    885       1.5     elric 	if (p->verify_method == VERIFY_UNKNOWN)
    886       1.5     elric 		p->verify_method = oldp->verify_method;
    887       1.5     elric 
    888       1.5     elric 	params_free(oldp);
    889       1.1     elric 
    890       1.5     elric 	if (!p->keygen) {
    891      1.10       dan 		p->keygen = keygen_generate(KEYGEN_PKCS5_PBKDF2_SHA1);
    892       1.5     elric 		if (!p->keygen)
    893       1.1     elric 			return -1;
    894       1.5     elric 	}
    895      1.19  christos 	(void)params_filldefaults(p);
    896      1.19  christos 	(void)keygen_filldefaults(p->keygen, p->keylen);
    897       1.5     elric 	p->key = getkey("new file", p->keygen, p->keylen);
    898       1.5     elric 
    899       1.5     elric 	kg = keygen_generate(KEYGEN_STOREDKEY);
    900       1.5     elric 	kg->kg_key = bits_xor(p->key, oldp->key);
    901       1.5     elric 	keygen_addlist(&p->keygen, kg);
    902       1.5     elric 
    903       1.5     elric 	if (!params_verify(p)) {
    904       1.5     elric 		warnx("can't generate new parameters file");
    905       1.5     elric 		return -1;
    906       1.1     elric 	}
    907       1.1     elric 
    908       1.5     elric 	return params_cput(p, outfile);
    909       1.5     elric bail:
    910       1.5     elric 	params_free(oldp);
    911       1.5     elric 	return -1;
    912       1.1     elric }
    913       1.1     elric 
    914       1.1     elric static int
    915      1.19  christos /*ARGSUSED*/
    916       1.1     elric do_all(const char *cfile, int argc, char **argv,
    917       1.3     elric        int (*conf)(int, char **, struct params *, int))
    918       1.1     elric {
    919       1.1     elric 	FILE		 *f;
    920       1.1     elric 	size_t		  len;
    921       1.1     elric 	size_t		  lineno;
    922       1.1     elric 	int		  my_argc;
    923       1.1     elric 	int		  ret;
    924       1.1     elric 	const char	 *fn;
    925       1.1     elric 	char		 *line;
    926       1.1     elric 	char		**my_argv;
    927       1.1     elric 
    928       1.1     elric 	if (argc > 0)
    929       1.1     elric 		usage();
    930       1.1     elric 
    931       1.1     elric 	if (!cfile[0])
    932       1.1     elric 		fn = CGDCONFIG_CFILE;
    933       1.1     elric 	else
    934       1.1     elric 		fn = cfile;
    935       1.1     elric 
    936       1.1     elric 	f = fopen(fn, "r");
    937       1.1     elric 	if (!f) {
    938       1.5     elric 		warn("could not open config file \"%s\"", fn);
    939       1.1     elric 		return -1;
    940       1.1     elric 	}
    941       1.1     elric 
    942       1.5     elric 	ret = chdir(CGDCONFIG_DIR);
    943       1.5     elric 	if (ret == -1)
    944       1.5     elric 		warn("could not chdir to %s", CGDCONFIG_DIR);
    945       1.5     elric 
    946       1.1     elric 	ret = 0;
    947       1.1     elric 	lineno = 0;
    948       1.1     elric 	for (;;) {
    949       1.1     elric 		line = fparseln(f, &len, &lineno, "\\\\#", FPARSELN_UNESCALL);
    950       1.1     elric 		if (!line)
    951       1.1     elric 			break;
    952       1.1     elric 		if (!*line)
    953       1.1     elric 			continue;
    954       1.1     elric 
    955       1.1     elric 		my_argv = words(line, &my_argc);
    956       1.3     elric 		ret = conf(my_argc, my_argv, NULL, CONFIG_FLAGS_FROMALL);
    957       1.1     elric 		if (ret) {
    958       1.5     elric 			warnx("action failed on \"%s\" line %lu", fn,
    959       1.1     elric 			    (u_long)lineno);
    960       1.1     elric 			break;
    961       1.1     elric 		}
    962       1.1     elric 		words_free(my_argv, my_argc);
    963       1.1     elric 	}
    964       1.1     elric 	return ret;
    965       1.1     elric }
    966      1.13     elric 
    967      1.13     elric static void
    968      1.13     elric eliminate_cores(void)
    969      1.13     elric {
    970      1.13     elric 	struct rlimit	rlp;
    971      1.13     elric 
    972      1.13     elric 	rlp.rlim_cur = 0;
    973      1.13     elric 	rlp.rlim_max = 0;
    974      1.17    cbiere 	if (setrlimit(RLIMIT_CORE, &rlp) == -1)
    975      1.13     elric 		err(EXIT_FAILURE, "Can't disable cores");
    976      1.13     elric }
    977