1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /**
3*4882a593Smuzhiyun * eCryptfs: Linux filesystem encryption layer
4*4882a593Smuzhiyun * Functions only useful for debugging.
5*4882a593Smuzhiyun *
6*4882a593Smuzhiyun * Copyright (C) 2006 International Business Machines Corp.
7*4882a593Smuzhiyun * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>
8*4882a593Smuzhiyun */
9*4882a593Smuzhiyun
10*4882a593Smuzhiyun #include "ecryptfs_kernel.h"
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun /**
13*4882a593Smuzhiyun * ecryptfs_dump_auth_tok - debug function to print auth toks
14*4882a593Smuzhiyun *
15*4882a593Smuzhiyun * This function will print the contents of an ecryptfs authentication
16*4882a593Smuzhiyun * token.
17*4882a593Smuzhiyun */
ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok * auth_tok)18*4882a593Smuzhiyun void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok)
19*4882a593Smuzhiyun {
20*4882a593Smuzhiyun char salt[ECRYPTFS_SALT_SIZE * 2 + 1];
21*4882a593Smuzhiyun char sig[ECRYPTFS_SIG_SIZE_HEX + 1];
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n",
24*4882a593Smuzhiyun auth_tok);
25*4882a593Smuzhiyun if (auth_tok->flags & ECRYPTFS_PRIVATE_KEY) {
26*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * private key type\n");
27*4882a593Smuzhiyun } else {
28*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * passphrase type\n");
29*4882a593Smuzhiyun ecryptfs_to_hex(salt, auth_tok->token.password.salt,
30*4882a593Smuzhiyun ECRYPTFS_SALT_SIZE);
31*4882a593Smuzhiyun salt[ECRYPTFS_SALT_SIZE * 2] = '\0';
32*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
33*4882a593Smuzhiyun if (auth_tok->token.password.flags &
34*4882a593Smuzhiyun ECRYPTFS_PERSISTENT_PASSWORD) {
35*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * persistent\n");
36*4882a593Smuzhiyun }
37*4882a593Smuzhiyun memcpy(sig, auth_tok->token.password.signature,
38*4882a593Smuzhiyun ECRYPTFS_SIG_SIZE_HEX);
39*4882a593Smuzhiyun sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
40*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
43*4882a593Smuzhiyun auth_tok->session_key.flags);
44*4882a593Smuzhiyun if (auth_tok->session_key.flags
45*4882a593Smuzhiyun & ECRYPTFS_USERSPACE_SHOULD_TRY_TO_DECRYPT)
46*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG,
47*4882a593Smuzhiyun " * Userspace decrypt request set\n");
48*4882a593Smuzhiyun if (auth_tok->session_key.flags
49*4882a593Smuzhiyun & ECRYPTFS_USERSPACE_SHOULD_TRY_TO_ENCRYPT)
50*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG,
51*4882a593Smuzhiyun " * Userspace encrypt request set\n");
52*4882a593Smuzhiyun if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
53*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * Contains decrypted key\n");
54*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG,
55*4882a593Smuzhiyun " * session_key.decrypted_key_size = [0x%x]\n",
56*4882a593Smuzhiyun auth_tok->session_key.decrypted_key_size);
57*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * Decrypted session key "
58*4882a593Smuzhiyun "dump:\n");
59*4882a593Smuzhiyun if (ecryptfs_verbosity > 0)
60*4882a593Smuzhiyun ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
61*4882a593Smuzhiyun ECRYPTFS_DEFAULT_KEY_BYTES);
62*4882a593Smuzhiyun }
63*4882a593Smuzhiyun if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
64*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * Contains encrypted key\n");
65*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG,
66*4882a593Smuzhiyun " * session_key.encrypted_key_size = [0x%x]\n",
67*4882a593Smuzhiyun auth_tok->session_key.encrypted_key_size);
68*4882a593Smuzhiyun ecryptfs_printk(KERN_DEBUG, " * Encrypted session key "
69*4882a593Smuzhiyun "dump:\n");
70*4882a593Smuzhiyun if (ecryptfs_verbosity > 0)
71*4882a593Smuzhiyun ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,
72*4882a593Smuzhiyun auth_tok->session_key.
73*4882a593Smuzhiyun encrypted_key_size);
74*4882a593Smuzhiyun }
75*4882a593Smuzhiyun }
76*4882a593Smuzhiyun
77*4882a593Smuzhiyun /**
78*4882a593Smuzhiyun * ecryptfs_dump_hex - debug hex printer
79*4882a593Smuzhiyun * @data: string of bytes to be printed
80*4882a593Smuzhiyun * @bytes: number of bytes to print
81*4882a593Smuzhiyun *
82*4882a593Smuzhiyun * Dump hexadecimal representation of char array
83*4882a593Smuzhiyun */
ecryptfs_dump_hex(char * data,int bytes)84*4882a593Smuzhiyun void ecryptfs_dump_hex(char *data, int bytes)
85*4882a593Smuzhiyun {
86*4882a593Smuzhiyun if (ecryptfs_verbosity < 1)
87*4882a593Smuzhiyun return;
88*4882a593Smuzhiyun
89*4882a593Smuzhiyun print_hex_dump(KERN_DEBUG, "ecryptfs: ", DUMP_PREFIX_OFFSET, 16, 1,
90*4882a593Smuzhiyun data, bytes, false);
91*4882a593Smuzhiyun }
92