50eb270fbf
- Upgraded to version 2.11.0 (jsc#7831) - Updated the cputype script and read_values program to recognize machine types up through the new z15. - Added the following patches (bsc#1151859) * s390-tools-sles15sp2-01-zkey-Separate-and-rework-CCA-host-library-loading.patch * s390-tools-sles15sp2-02-zkey-Move-utility-functions-into-separate-source-fil.patch * s390-tools-sles15sp2-03-zkey-Add-utility-function-to-get-the-serial-number-o.patch * s390-tools-sles15sp2-04-zkey-Add-utility-function-to-get-the-mkvp-of-a-crypt.patch * s390-tools-sles15sp2-05-zkey-add-function-to-iterate-over-all-available-CCA-.patch * s390-tools-sles15sp2-06-zkey-Add-function-to-print-the-MKVPs-of-APQNs.patch * s390-tools-sles15sp2-07-zkey-Add-function-to-cross-check-APQNs-for-valid-mas.patch * s390-tools-sles15sp2-08-zkey-Add-function-to-obtain-the-mkvp-of-a-secure-key.patch * s390-tools-sles15sp2-09-zkey-Display-MKVP-when-validating-a-secure-key.patch * s390-tools-sles15sp2-10-zkey-Cross-check-APQNs-when-generating-secure-keys.patch * s390-tools-sles15sp2-11-zkey-Cross-check-APQNs-when-validating-secure-keys.patch * s390-tools-sles15sp2-12-zkey-Cross-check-APQNs-when-importing-secure-keys.patch * s390-tools-sles15sp2-13-zkey-Cross-check-APQNs-when-changing-APQN-associatio.patch * s390-tools-sles15sp2-14-zkey-Add-function-to-select-a-specific-CCA-adapter.patch * s390-tools-sles15sp2-15-zkey-Add-function-to-select-a-CCA-adapter-by-mkvp.patch * s390-tools-sles15sp2-16-zkey-Select-CCA-adapter-when-re-enciphering.patch * s390-tools-sles15sp2-17-zkey-cryptsetup-Add-to-new-and-from-old-options.patch - Added the following patches (bsc#1151858) * s390-tools-sles15sp2-18-zkey-Display-key-type-with-list-and-validate-command.patch * s390-tools-sles15sp2-19-zkey-Allow-to-filter-list-output-by-key-type.patch * s390-tools-sles15sp2-20-zkey-Allow-to-specify-the-key-type-with-the-generate.patch * s390-tools-sles15sp2-21-zkey-Preparations-for-introducing-a-new-key-type.patch * s390-tools-sles15sp2-22-zkey-Introduce-the-CCA-AESCIPHER-key-type.patch * s390-tools-sles15sp2-23-zkey-Add-wrappers-for-the-new-IOCTLs-with-fallback-t.patch * s390-tools-sles15sp2-24-zkey-Add-helper-functions-to-build-lists-of-APQNs.patch * s390-tools-sles15sp2-25-zkey-Add-support-for-generating-AES-CIPHER-keys.patch * s390-tools-sles15sp2-26-zkey-Add-support-for-validating-AES-CIPHER-keys.patch * s390-tools-sles15sp2-27-zkey-Add-support-for-re-enciphering-AES-CIPHER-keys.patch * s390-tools-sles15sp2-28-zkey-Check-crypto-card-level-during-APQN-cross-check.patch * s390-tools-sles15sp2-29-zkey-Add-helper-function-to-query-the-CCA-firmware-v.patch * s390-tools-sles15sp2-30-zkey-Add-helper-function-to-convert-secure-keys-betw.patch * s390-tools-sles15sp2-31-zkey-Add-helper-function-to-restrict-export-of-secur.patch * s390-tools-sles15sp2-32-zkey-Add-helper-function-to-check-an-AES-CIPHER-key.patch * s390-tools-sles15sp2-33-zkey-Add-key-checks-when-importing-a-CCA-AESCIPHER-k.patch * s390-tools-sles15sp2-34-zkey-Add-convert-command-to-convert-keys-from-one-ty.patch * s390-tools-sles15sp2-35-zkey-Allow-zkey-cryptsetup-setkey-to-set-different-k.patch - Added the following patches (bsc#1153757) * s390-tools-sles15sp2-zcrypt-CEX7S-exploitation-support.patch * s390-tools-sles15sp2-zcryptstats-Add-support-for-CEX7.patch - Added s390-tools-sles15sp2-Close-file-descriptor-when-checking-for-read-only.patch - Forward-ported the following patches to work with the restructuring IBM did for this version * dasdfmt-retry-BIODASDINFO-if-device-is-busy.patch * s390-tools-sles12-fdasd-skip-partition-check-and-BLKRRPART-ioctl.patch * s390-tools-sles15-Allow-multiple-device-arguments.patch * s390-tools-sles15-Format-devices-in-parallel.patch * s390-tools-sles15-Implement-f-for-backwards-compability.patch * s390-tools-sles15-Implement-Y-yast_mode.patch - Removed the following obsolete patches: * s390-tools-sles15-1-lstape-fix-output-with-SCSI-lin_tape-and-multiple-pa.patch * s390-tools-sles15-2-lstape-fix-to-prefer-sysfs-to-find-lin_tape-device-n.patch * s390-tools-sles15-3-lstape-fix-output-without-SCSI-generic-sg.patch * s390-tools-sles15-4-lsluns-fix-to-prevent-error-messages-if-there-are-no.patch * s390-tools-sles15-5-lstape-fix-to-prevent-error-messages-if-there-are-no.patch * s390-tools-sles15-6-lstape-fix-description-of-type-and-devbusid-filter-f.patch * s390-tools-sles15-7-lstape-fix-SCSI-output-description-in-man-page.patch * s390-tools-sles15-8-lstape-fix-SCSI-HBA-CCW-device-bus-ID-e.g.-for-virti.patch * s390-tools-sles15-cpi-add-unit-install-section.patch * s390-tools-sles15-cpuplugd-Improve-systemctl-start-error-handling.patch * s390-tools-sles15-dbginfo-add-data-for-ps-cpprot.patch * s390-tools-sles15-Drop-device_id-parameter.patch * s390-tools-sles15-Fix-truncation-warning.patch * s390-tools-sles15-Fixup-dasdfmt_get_volser.patch * s390-tools-sles15-Fixup-device-name-handling.patch * s390-tools-sles15-hmcdrvfs-fix-parsing-of-link-count.patch * s390-tools-sles15-iucvterm-include-ctype-for-toupper.patch * s390-tools-sles15-lsluns-clarify-discovery-use-case-relation-to-NPIV-a.patch * s390-tools-sles15-lsluns-complement-alternative-tools-with-lszdev.patch * s390-tools-sles15-lsluns-document-restriction-to-zfcp-only-systems.patch * s390-tools-sles15-lsluns-do-not-print-confusing-messages-when-a-filter.patch * s390-tools-sles15-lsluns-do-not-scan-all-if-filters-match-nothing.patch * s390-tools-sles15-lsluns-enhance-usage-statement-and-man-page.patch * s390-tools-sles15-lsluns-fix-flawed-formatting-of-man-page.patch * s390-tools-sles15-lsluns-point-out-IBM-Storwize-configuration-requirem.patch * s390-tools-sles15-mon_procd-fix-parsing-of-proc-pid-stat.patch * s390-tools-sles15-mon_tools-Improve-systemctl-start-error-handling.patch * s390-tools-sles15sp1-0001-zkey-Add-properties-file-handling-routines.patch * s390-tools-sles15sp1-0002-zkey-Add-build-dependency-to-OpenSSL-libcrypto.patch * s390-tools-sles15sp1-0003-zkey-Add-helper-functions-for-comma-separated-string.patch * s390-tools-sles15sp1-0004-zkey-Externalize-secure-key-back-end-functions.patch * s390-tools-sles15sp1-0005-zkey-Add-keystore-implementation.patch * s390-tools-sles15sp1-0006-zkey-Add-keystore-related-commands.patch * s390-tools-sles15sp1-0007-zkey-Create-key-repository-and-group-during-make-ins.patch * s390-tools-sles15sp1-0008-zkey-Man-page-updates.patch * s390-tools-sles15sp1-0009-zkey-let-packaging-create-the-zkeyadm-group-and-perm.patch * s390-tools-sles15sp1-0010-zkey-Update-README-to-add-info-about-packaging-requi.patch * s390-tools-sles15sp1-0011-zkey-Typo-in-message.patch * s390-tools-sles15sp1-0012-zkey-Fix-memory-leak.patch * s390-tools-sles15sp1-0013-zkey-Fix-APQN-validation-routine.patch * s390-tools-sles15sp1-0014-zkey-Fix-generate-and-import-leaving-key-in-an-incon.patch * s390-tools-sles15sp1-0015-zkey-Add-zkey-cryptsetup-tool.patch * s390-tools-sles15sp1-0016-zkey-Add-man-page-for-zkey-cryptsetup.patch * s390-tools-sles15sp1-0017-zkey-Add-build-dependency-for-libcryptsetup-and-json.patch * s390-tools-sles15sp1-0018-zkey-Add-key-verification-pattern-property.patch * s390-tools-sles15sp1-0019-zkey-Add-volume-type-property-to-support-LUKS2-volum.patch * s390-tools-sles15sp1-01-chzcrypt-Corrections-at-the-chzcrypt-man-page.patch * s390-tools-sles15sp1-01-cpumf-Add-extended-counter-defintion-files-for-IBM-z.patch * s390-tools-sles15sp1-01-lszcrypt-CEX6S-exploitation.patch * s390-tools-sles15sp1-01-util_path-add-function-to-check-if-a-path-exists.patch * s390-tools-sles15sp1-01-zcryptctl-new-tool-zcryptctl-for-multiple-zcrypt-node.patch * s390-tools-sles15sp1-01-zdev-use-libutil-provided-path-functions.patch * s390-tools-sles15sp1-01-zkey-Include-sbin-into-PATH-when-executing-commands.patch * s390-tools-sles15sp1-02-cpumf-z14-split-counter-sets-according-to-CFVN-CSVN-.patch * s390-tools-sles15sp1-02-lszcrypt-fix-date-and-wrong-indentation.patch * s390-tools-sles15sp1-02-lszcrypt-support-for-alternate-zcrypt-device-drivers.patch * s390-tools-sles15sp1-02-util_path-Add-description-for-util_path_exists.patch * s390-tools-sles15sp1-02-zdev-Prepare-for-firmware-configuration-file-support.patch * s390-tools-sles15sp1-03-cpumf-cpumf_helper-read-split-counter-sets-part-2-2.patch * s390-tools-sles15sp1-03-util_path-Make-true-false-handling-consistent-with-o.patch * s390-tools-sles15sp1-03-zdev-Add-support-for-reading-firmware-configuration-.patch * s390-tools-sles15sp1-04-cpumf-correct-z14-counter-number.patch * s390-tools-sles15sp1-04-zdev-Implement-no-settle.patch * s390-tools-sles15sp1-04-zpcictl-Introduce-new-tool-zpcictl.patch * s390-tools-sles15sp1-05-cpumf-add-missing-Description-tag-for-z13-z14-ctr-12.patch * s390-tools-sles15sp1-05-zdev-Write-zfcp-lun-udev-rules-to-separate-files.patch * s390-tools-sles15sp1-05-zpcictl-include-sys-sysmacros.h-to-avoid-minor-major.patch * s390-tools-sles15sp1-06-cpumf-correct-counter-name-for-z13-and-z14.patch * s390-tools-sles15sp1-06-zdev-Add-support-for-handling-auto-configuration-dat.patch * s390-tools-sles15sp1-06-zpcictl-Rephrase-man-page-entries-and-tool-output.patch * s390-tools-sles15sp1-07-cpumf-Add-IBM-z14-ZR1-to-the-CPU-Measurement-Facilit.patch * s390-tools-sles15sp1-07-zdev-Integrate-firmware-auto-configuration-with-drac.patch * s390-tools-sles15sp1-07-zpcictl-Use-fopen-instead-of-open-for-writes.patch * s390-tools-sles15sp1-08-zdev-Integrate-firmware-auto-configuration-with-init.patch * s390-tools-sles15sp1-08-zpcictl-Read-device-link-to-obtain-device-address.patch * s390-tools-sles15sp1-09-zdev-Implement-internal-device-attributes.patch * s390-tools-sles15sp1-09-zpcictl-Make-device-node-for-NVMe-optional.patch * s390-tools-sles15sp1-10-zdev-Implement-support-for-early-device-configuratio.patch * s390-tools-sles15sp1-10-zpcictl-Change-wording-of-man-page-and-help-output.patch * s390-tools-sles15sp1-11-zdev-Do-not-call-zipl-on-initrd-update.patch * s390-tools-sles15sp1-dbginfo-gather-nvme-related-data.patch * s390-tools-sles15sp1-qethqoat-add-OSA-Express7S-support.patch * s390-tools-sles15sp1-zcrypt-refine-lszcrypt-man-page.patch * s390-tools-sles15sp1-zdev-Also-include-the-ctc-driver-in-the-initrd.patch * s390-tools-sles15sp1-zdev-fix-qeth-BridgePort-and-VNICC-conflict-checking.patch * s390-tools-sles15sp1-zkey-Enhance-error-message-about-missing-CCA-library.patch * s390-tools-sles15-zdev-Enable-running-chzdev-from-unknown-root-devices.patch * s390-tools-sles15-zdev-Fix-zdev-dracut-module-aborting-on-unknown-root.patch * s390-tools-sles15-zdev-Use-correct-path-to-vmcp-binary.patch * s390-tools-sles15-ziomon-re-add-missing-line.patch * s390-tools-sles15-zipl-remove-invalid-dasdview-command-line-option.patch - Added s390-tools-sles15sp1-ziomon-fix-utilization-data-recording-with-multi-dig.patch ziomon: fix utilization recording with multi-digit scsi hosts (bsc#1141876) OBS-URL: https://build.opensuse.org/request/show/750974 OBS-URL: https://build.opensuse.org/package/show/Base:System/s390-tools?expand=0&rev=83
290 lines
10 KiB
Diff
290 lines
10 KiB
Diff
Subject: zkey-cryptsetup: Add --to-new and --from-old options
|
|
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
|
|
Summary: zkey: check master key consistency
|
|
Description: Enhances the zkey tool to perform a cross check whether the
|
|
APQNs associated with a secure key have the same master key.
|
|
Display the master key verification pattern of a secure key
|
|
during the zkey validate command. This helps to better identify
|
|
which master key is the correct one, in case of master key
|
|
inconsistencies.
|
|
Select an appropriate APQN when re-enciphering a secure key.
|
|
Re-enciphering is done using the CCA host library. Special
|
|
handling is required to select an appropriate APQN for use with
|
|
the CCA host library.
|
|
Upstream-ID: a0ed6709cf3c62b1fc9dfa28358e70215c1da55a
|
|
Problem-ID: SEC1916
|
|
|
|
Upstream-Description:
|
|
|
|
zkey-cryptsetup: Add --to-new and --from-old options
|
|
|
|
To allow better control about the secure AES volume key re-enciphering
|
|
with 'zkey-cryptsetup reencipher', add options '--to-new' and '--from-old'
|
|
to specify if a re-enciphering from CURRENT to NEW, or OLD to CURRENT master
|
|
key registers is to be performed. If these options are not specified, then
|
|
it is auto-detected, based on the master key that the secure key is currently
|
|
re-enciphered with.
|
|
|
|
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
Reviewed-by: Harald Freudenberger <freude@linux.ibm.com>
|
|
Signed-off-by: Jan Hoeppner <hoeppner@linux.ibm.com>
|
|
|
|
|
|
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
---
|
|
zkey/zkey-cryptsetup.1 | 49 ++++++++++++++---
|
|
zkey/zkey-cryptsetup.c | 137 ++++++++++++++++++++++++++++++++++++-------------
|
|
2 files changed, 142 insertions(+), 44 deletions(-)
|
|
|
|
--- a/zkey/zkey-cryptsetup.1
|
|
+++ b/zkey/zkey-cryptsetup.1
|
|
@@ -91,6 +91,8 @@ behave in the same way as with \fBcrypts
|
|
.B zkey\-cryptsetup
|
|
.BR reencipher | re
|
|
.I device
|
|
+.RB [ \-\-to\-new | \-N ]
|
|
+.RB [ \-\-from\-old | \-O ]
|
|
.RB [ \-\-staged | \-s ]
|
|
.RB [ \-\-in\-place | \-i ]
|
|
.RB [ \-\-complete | \-c ]
|
|
@@ -128,17 +130,36 @@ register can still be used until the mas
|
|
The \fBNEW\fP register contains the new master key to be set.
|
|
The master key in the \fBNEW\fP register cannot be used until it is made
|
|
the current master key. You can pro-actively re-encipher a secure key with the
|
|
-\fBNEW\fP master key before this key is made the \fBCURRENT\fP key.
|
|
+\fBNEW\fP master key before this key is made the \fBCURRENT\fP key. Use the
|
|
+.B \-\-to-new
|
|
+option to do this.
|
|
.RE
|
|
.PP
|
|
-\fBzkey\-cryptsetup\fP automatically detects whether the secure volume key
|
|
-is currently enciphered with the master key in the \fBOLD\fP register or with
|
|
-the master key in the \fBCURRENT\fP register. If currently enciphered with the
|
|
-master key in the \fBOLD\fP register, it is re-enciphered with the master key
|
|
-in the \fBCURRENT\fP register. If it is currently enciphered with the master
|
|
-key in the \fBCURRENT\fP register, it is re-enciphered with the master key in
|
|
-the \fBNEW\fP register. If for this case the \fBNEW\fP register does not
|
|
-contain a valid master key, then the re-encipher operation fails.
|
|
+Use the
|
|
+.B \-\-from\-old
|
|
+option to re-encipher a secure volume key that is currently enciphered with
|
|
+the master key in the \fBOLD\fP register with the master key in the
|
|
+\fBCURRENT\fP register.
|
|
+.PP
|
|
+.PP
|
|
+If both the
|
|
+.B \-\-from-old
|
|
+and
|
|
+.B \-\-to-new
|
|
+options are specified, a secure volume key that is currently enciphered
|
|
+with the master key in the \fBOLD\fP register is re-enciphered with the
|
|
+master key in the \fBNEW\fP register.
|
|
+.RE
|
|
+.PP
|
|
+If both options are omitted, \fBzkey-cryptsetup\fP automatically detects whether
|
|
+the secure volume key is currently enciphered with the master key in the
|
|
+\fBOLD\fP register or with the master key in the \fBCURRENT\fP register.
|
|
+If currently enciphered with the master key in the \fBOLD\fP register,
|
|
+it is re-enciphered with the master key in the \fBCURRENT\fP register.
|
|
+If it is currently enciphered with the master key in the \fBCURRENT\fP
|
|
+register, it is re-enciphered with the master key in the \fBNEW\fP register.
|
|
+If for this case the \fBNEW\fP register does not contain a valid master key,
|
|
+then the re-encipher operation fails.
|
|
.PP
|
|
Re-enciphering a secure volume key of a volume encrypted with
|
|
\fBLUKS2\fP and the \fBpaes\fP cipher can be performed \fBin-place\fP, or in
|
|
@@ -326,6 +347,16 @@ relevance.
|
|
.
|
|
.SS "Options for the reencipher command"
|
|
.TP
|
|
+.BR \-N ", " \-\-to\-new
|
|
+Re-enciphers a secure volume key in the LUKS2 header that is currently
|
|
+enciphered with the master key in the CURRENT register with the master key in
|
|
+the NEW register.
|
|
+.TP
|
|
+.BR \-O ", " \-\-from\-old
|
|
+Re-enciphers a secure volume key in the LUKS2 header that is currently
|
|
+enciphered with the master key in the OLD register with the master key in the
|
|
+CURRENT register.
|
|
+.TP
|
|
.BR \-i ", " \-\-in-place
|
|
Forces an in-place re-enciphering of a secure volume key in the LUKS2
|
|
header. This option immediately replaces the secure volume key in the LUKS2
|
|
--- a/zkey/zkey-cryptsetup.c
|
|
+++ b/zkey/zkey-cryptsetup.c
|
|
@@ -95,6 +95,8 @@ static struct zkey_cryptsetup_globals {
|
|
long long keyfile_offset;
|
|
long long keyfile_size;
|
|
long long tries;
|
|
+ bool tonew;
|
|
+ bool fromold;
|
|
bool complete;
|
|
bool inplace;
|
|
bool staged;
|
|
@@ -163,6 +165,22 @@ static struct util_opt opt_vec[] = {
|
|
.command = COMMAND_REENCIPHER,
|
|
},
|
|
{
|
|
+ .option = {"to-new", 0, NULL, 'N'},
|
|
+ .desc = "Re-enciphers a secure volume key in the LUKS2 header "
|
|
+ "that is currently enciphered with the master key in "
|
|
+ "the CURRENT register with the master key in the NEW "
|
|
+ "register",
|
|
+ .command = COMMAND_REENCIPHER,
|
|
+ },
|
|
+ {
|
|
+ .option = {"from-old", 0, NULL, 'O'},
|
|
+ .desc = "Re-enciphers a secure volume key in the LUKS2 header "
|
|
+ "that is currently enciphered with the master key in "
|
|
+ "the OLD register with the master key in the CURRENT "
|
|
+ "register",
|
|
+ .command = COMMAND_REENCIPHER,
|
|
+ },
|
|
+ {
|
|
.option = {"staged", 0, NULL, 's'},
|
|
.desc = "Forces that the re-enciphering of a secure volume "
|
|
"key in the LUKS2 header is performed in staged mode",
|
|
@@ -1572,13 +1590,28 @@ static int reencipher_prepare(int token)
|
|
if (rc < 0)
|
|
goto out;
|
|
|
|
- util_asprintf(&msg, "The secure volume key of device '%s' is "
|
|
- "enciphered with the %s CCA master key and is being "
|
|
- "re-enciphered with the %s CCA master key.",
|
|
- g.pos_arg, is_old_mk ? "OLD" : "CURRENT",
|
|
- is_old_mk ? "CURRENT" : "NEW");
|
|
- util_print_indented(msg, 0);
|
|
- free(msg);
|
|
+ if (!g.fromold && !g.tonew) {
|
|
+ /* Autodetect reencipher mode */
|
|
+ if (is_old_mk) {
|
|
+ g.fromold = 1;
|
|
+ util_asprintf(&msg, "The secure volume key of device "
|
|
+ "'%s' is enciphered with the OLD CCA "
|
|
+ "master key and is being re-enciphered "
|
|
+ "with the CURRENT CCA master key.",
|
|
+ g.pos_arg);
|
|
+ util_print_indented(msg, 0);
|
|
+ free(msg);
|
|
+ } else {
|
|
+ g.tonew = 1;
|
|
+ util_asprintf(&msg, "The secure volume key of device "
|
|
+ "'%s' is enciphered with the CURRENT CCA "
|
|
+ "master key and is being re-enciphered "
|
|
+ "with the NEW CCA master key.",
|
|
+ g.pos_arg);
|
|
+ util_print_indented(msg, 0);
|
|
+ free(msg);
|
|
+ }
|
|
+ }
|
|
|
|
rc = get_master_key_verification_pattern((u8 *)key, keysize, &mkvp,
|
|
g.verbose);
|
|
@@ -1588,36 +1621,64 @@ static int reencipher_prepare(int token)
|
|
goto out;
|
|
}
|
|
|
|
- rc = select_cca_adapter_by_mkvp(&g.cca, mkvp, NULL,
|
|
- is_old_mk ? FLAG_SEL_CCA_MATCH_OLD_MKVP
|
|
- : FLAG_SEL_CCA_MATCH_CUR_MKVP |
|
|
- FLAG_SEL_CCA_NEW_MUST_BE_SET,
|
|
- g.verbose);
|
|
- if (rc == -ENOTSUP) {
|
|
- rc = 0;
|
|
- selected = 0;
|
|
- }
|
|
- if (rc != 0) {
|
|
- util_asprintf(&msg, "No APQN found that is suitable for "
|
|
- "re-enciphering the secure AES volume key%s",
|
|
- !is_old_mk ? " and has the NEW master key loaded"
|
|
- : "");
|
|
- util_print_indented(msg, 0);
|
|
- free(msg);
|
|
- goto out;
|
|
+ if (g.fromold) {
|
|
+ rc = select_cca_adapter_by_mkvp(&g.cca, mkvp, NULL,
|
|
+ FLAG_SEL_CCA_MATCH_OLD_MKVP,
|
|
+ g.verbose);
|
|
+ if (rc == -ENOTSUP) {
|
|
+ rc = 0;
|
|
+ selected = 0;
|
|
+ }
|
|
+ if (rc != 0) {
|
|
+ util_print_indented("No APQN found that is suitable "
|
|
+ "for re-enciphering the secure AES "
|
|
+ "volume key from the OLD to the "
|
|
+ "CURRENT CCA master key.", 0);
|
|
+ goto out;
|
|
+ }
|
|
+
|
|
+ rc = key_token_change(&g.cca, (u8 *)key, keysize,
|
|
+ METHOD_OLD_TO_CURRENT, g.verbose);
|
|
+ if (rc != 0) {
|
|
+ warnx("Failed to re-encipher the secure volume key of "
|
|
+ "device '%s'\n", g.pos_arg);
|
|
+ if (!selected)
|
|
+ print_msg_for_cca_envvars(
|
|
+ "secure AES volume key");
|
|
+ rc = -EINVAL;
|
|
+ goto out;
|
|
+ }
|
|
}
|
|
|
|
- rc = key_token_change(&g.cca, (u8 *)key, keysize,
|
|
- is_old_mk ? METHOD_OLD_TO_CURRENT :
|
|
- METHOD_CURRENT_TO_NEW,
|
|
- g.verbose);
|
|
- if (rc != 0) {
|
|
- warnx("Failed to re-encipher the secure volume key of device "
|
|
- "'%s'\n", g.pos_arg);
|
|
- if (!selected)
|
|
- print_msg_for_cca_envvars("secure AES volume key");
|
|
- rc = -EINVAL;
|
|
- goto out;
|
|
+ if (g.tonew) {
|
|
+ rc = select_cca_adapter_by_mkvp(&g.cca, mkvp, NULL,
|
|
+ FLAG_SEL_CCA_MATCH_CUR_MKVP |
|
|
+ FLAG_SEL_CCA_NEW_MUST_BE_SET,
|
|
+ g.verbose);
|
|
+ if (rc == -ENOTSUP) {
|
|
+ rc = 0;
|
|
+ selected = 0;
|
|
+ }
|
|
+ if (rc != 0) {
|
|
+ util_print_indented("No APQN found that is suitable "
|
|
+ "for re-enciphering the secure AES "
|
|
+ "volume key from the CURRENT to "
|
|
+ "the NEW CCA master key.", 0);
|
|
+ goto out;
|
|
+ }
|
|
+
|
|
+ rc = key_token_change(&g.cca, (u8 *)key, keysize,
|
|
+ METHOD_CURRENT_TO_NEW,
|
|
+ g.verbose);
|
|
+ if (rc != 0) {
|
|
+ warnx("Failed to re-encipher the secure volume key of "
|
|
+ "device '%s'\n", g.pos_arg);
|
|
+ if (!selected)
|
|
+ print_msg_for_cca_envvars(
|
|
+ "secure AES volume key");
|
|
+ rc = -EINVAL;
|
|
+ goto out;
|
|
+ }
|
|
}
|
|
|
|
rc = crypt_keyslot_add_by_key(g.cd, CRYPT_ANY_SLOT, key, keysize,
|
|
@@ -2276,6 +2337,12 @@ int main(int argc, char *argv[])
|
|
if (c == -1)
|
|
break;
|
|
switch (c) {
|
|
+ case 'N':
|
|
+ g.tonew = 1;
|
|
+ break;
|
|
+ case 'O':
|
|
+ g.fromold = 1;
|
|
+ break;
|
|
case 'c':
|
|
g.complete = 1;
|
|
break;
|