mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
146aa8b145
Merge the type-specific data with the payload data into one four-word chunk as it seems pointless to keep them separate. Use user_key_payload() for accessing the payloads of overloaded user-defined keys. Signed-off-by: David Howells <dhowells@redhat.com> cc: linux-cifs@vger.kernel.org cc: ecryptfs@vger.kernel.org cc: linux-ext4@vger.kernel.org cc: linux-f2fs-devel@lists.sourceforge.net cc: linux-nfs@vger.kernel.org cc: ceph-devel@vger.kernel.org cc: linux-ima-devel@lists.sourceforge.net
67 lines
1.8 KiB
C
67 lines
1.8 KiB
C
#ifndef __ENCRYPTED_KEY_H
|
|
#define __ENCRYPTED_KEY_H
|
|
|
|
#define ENCRYPTED_DEBUG 0
|
|
#if defined(CONFIG_TRUSTED_KEYS) || \
|
|
(defined(CONFIG_TRUSTED_KEYS_MODULE) && defined(CONFIG_ENCRYPTED_KEYS_MODULE))
|
|
extern struct key *request_trusted_key(const char *trusted_desc,
|
|
const u8 **master_key, size_t *master_keylen);
|
|
#else
|
|
static inline struct key *request_trusted_key(const char *trusted_desc,
|
|
const u8 **master_key,
|
|
size_t *master_keylen)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
#endif
|
|
|
|
#if ENCRYPTED_DEBUG
|
|
static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
|
|
{
|
|
print_hex_dump(KERN_ERR, "master key: ", DUMP_PREFIX_NONE, 32, 1,
|
|
master_key, master_keylen, 0);
|
|
}
|
|
|
|
static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
|
|
{
|
|
print_hex_dump(KERN_ERR, "decrypted data: ", DUMP_PREFIX_NONE, 32, 1,
|
|
epayload->decrypted_data,
|
|
epayload->decrypted_datalen, 0);
|
|
}
|
|
|
|
static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
|
|
unsigned int encrypted_datalen)
|
|
{
|
|
print_hex_dump(KERN_ERR, "encrypted data: ", DUMP_PREFIX_NONE, 32, 1,
|
|
epayload->encrypted_data, encrypted_datalen, 0);
|
|
}
|
|
|
|
static inline void dump_hmac(const char *str, const u8 *digest,
|
|
unsigned int hmac_size)
|
|
{
|
|
if (str)
|
|
pr_info("encrypted_key: %s", str);
|
|
print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest,
|
|
hmac_size, 0);
|
|
}
|
|
#else
|
|
static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
|
|
{
|
|
}
|
|
|
|
static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
|
|
{
|
|
}
|
|
|
|
static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
|
|
unsigned int encrypted_datalen)
|
|
{
|
|
}
|
|
|
|
static inline void dump_hmac(const char *str, const u8 *digest,
|
|
unsigned int hmac_size)
|
|
{
|
|
}
|
|
#endif
|
|
#endif
|