xref: /OK3568_Linux_fs/kernel/security/keys/encrypted-keys/encrypted.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun #ifndef __ENCRYPTED_KEY_H
3*4882a593Smuzhiyun #define __ENCRYPTED_KEY_H
4*4882a593Smuzhiyun 
5*4882a593Smuzhiyun #define ENCRYPTED_DEBUG 0
6*4882a593Smuzhiyun #if defined(CONFIG_TRUSTED_KEYS) || \
7*4882a593Smuzhiyun   (defined(CONFIG_TRUSTED_KEYS_MODULE) && defined(CONFIG_ENCRYPTED_KEYS_MODULE))
8*4882a593Smuzhiyun extern struct key *request_trusted_key(const char *trusted_desc,
9*4882a593Smuzhiyun 				       const u8 **master_key, size_t *master_keylen);
10*4882a593Smuzhiyun #else
request_trusted_key(const char * trusted_desc,const u8 ** master_key,size_t * master_keylen)11*4882a593Smuzhiyun static inline struct key *request_trusted_key(const char *trusted_desc,
12*4882a593Smuzhiyun 					      const u8 **master_key,
13*4882a593Smuzhiyun 					      size_t *master_keylen)
14*4882a593Smuzhiyun {
15*4882a593Smuzhiyun 	return ERR_PTR(-EOPNOTSUPP);
16*4882a593Smuzhiyun }
17*4882a593Smuzhiyun #endif
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #if ENCRYPTED_DEBUG
dump_master_key(const u8 * master_key,size_t master_keylen)20*4882a593Smuzhiyun static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
21*4882a593Smuzhiyun {
22*4882a593Smuzhiyun 	print_hex_dump(KERN_ERR, "master key: ", DUMP_PREFIX_NONE, 32, 1,
23*4882a593Smuzhiyun 		       master_key, master_keylen, 0);
24*4882a593Smuzhiyun }
25*4882a593Smuzhiyun 
dump_decrypted_data(struct encrypted_key_payload * epayload)26*4882a593Smuzhiyun static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
27*4882a593Smuzhiyun {
28*4882a593Smuzhiyun 	print_hex_dump(KERN_ERR, "decrypted data: ", DUMP_PREFIX_NONE, 32, 1,
29*4882a593Smuzhiyun 		       epayload->decrypted_data,
30*4882a593Smuzhiyun 		       epayload->decrypted_datalen, 0);
31*4882a593Smuzhiyun }
32*4882a593Smuzhiyun 
dump_encrypted_data(struct encrypted_key_payload * epayload,unsigned int encrypted_datalen)33*4882a593Smuzhiyun static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
34*4882a593Smuzhiyun 				       unsigned int encrypted_datalen)
35*4882a593Smuzhiyun {
36*4882a593Smuzhiyun 	print_hex_dump(KERN_ERR, "encrypted data: ", DUMP_PREFIX_NONE, 32, 1,
37*4882a593Smuzhiyun 		       epayload->encrypted_data, encrypted_datalen, 0);
38*4882a593Smuzhiyun }
39*4882a593Smuzhiyun 
dump_hmac(const char * str,const u8 * digest,unsigned int hmac_size)40*4882a593Smuzhiyun static inline void dump_hmac(const char *str, const u8 *digest,
41*4882a593Smuzhiyun 			     unsigned int hmac_size)
42*4882a593Smuzhiyun {
43*4882a593Smuzhiyun 	if (str)
44*4882a593Smuzhiyun 		pr_info("encrypted_key: %s", str);
45*4882a593Smuzhiyun 	print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest,
46*4882a593Smuzhiyun 		       hmac_size, 0);
47*4882a593Smuzhiyun }
48*4882a593Smuzhiyun #else
dump_master_key(const u8 * master_key,size_t master_keylen)49*4882a593Smuzhiyun static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
50*4882a593Smuzhiyun {
51*4882a593Smuzhiyun }
52*4882a593Smuzhiyun 
dump_decrypted_data(struct encrypted_key_payload * epayload)53*4882a593Smuzhiyun static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
54*4882a593Smuzhiyun {
55*4882a593Smuzhiyun }
56*4882a593Smuzhiyun 
dump_encrypted_data(struct encrypted_key_payload * epayload,unsigned int encrypted_datalen)57*4882a593Smuzhiyun static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
58*4882a593Smuzhiyun 				       unsigned int encrypted_datalen)
59*4882a593Smuzhiyun {
60*4882a593Smuzhiyun }
61*4882a593Smuzhiyun 
dump_hmac(const char * str,const u8 * digest,unsigned int hmac_size)62*4882a593Smuzhiyun static inline void dump_hmac(const char *str, const u8 *digest,
63*4882a593Smuzhiyun 			     unsigned int hmac_size)
64*4882a593Smuzhiyun {
65*4882a593Smuzhiyun }
66*4882a593Smuzhiyun #endif
67*4882a593Smuzhiyun #endif
68