aboutsummaryrefslogtreecommitdiff
path: root/masterkey.go
blob: 206299716cdca3a244925ba03c74e6b0e4c637e2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
package main

import (
	"encoding/hex"
	"fmt"
	"github.com/rfjakob/gocryptfs/cryptfs"
	"os"
	"strings"
)

// printMasterKey - remind the user that he should store the master key in
// a safe place
func printMasterKey(key []byte) {
	h := hex.EncodeToString(key)
	var hChunked string

	// Try to make it less scary by splitting it up in chunks
	for i := 0; i < len(h); i += 8 {
		hChunked += h[i : i+8]
		if i < 52 {
			hChunked += "-"
		}
		if i == 24 {
			hChunked += "\n                      "
		}
	}

	cryptfs.Info.Printf(`
ATTENTION:

  Your master key is: %s

If the gocryptfs.conf file becomes corrupted or you ever forget your password,
there is only one hope for recovery: The master key. Print it to a piece of
paper and store it in a drawer.

`, hChunked)
}

// parseMasterKey - Parse a hex-encoded master key that was passed on the command line
// Calls os.Exit on failure
func parseMasterKey(masterkey string) []byte {
	masterkey = strings.Replace(masterkey, "-", "", -1)
	key, err := hex.DecodeString(masterkey)
	if err != nil {
		fmt.Printf("Could not parse master key: %v\n", err)
		os.Exit(1)
	}
	if len(key) != cryptfs.KEY_LEN {
		fmt.Printf("Master key has length %d but we require length %d\n", len(key), cryptfs.KEY_LEN)
		os.Exit(1)
	}
	return key
}