Lines Matching refs:epayload

269 static char *datablob_format(struct encrypted_key_payload *epayload,  in datablob_format()  argument
273 u8 *iv = epayload->iv; in datablob_format()
284 len = sprintf(ascii_buf, "%s %s %s ", epayload->format, in datablob_format()
285 epayload->master_desc, epayload->datalen); in datablob_format()
422 static struct key *request_master_key(struct encrypted_key_payload *epayload, in request_master_key() argument
427 if (!strncmp(epayload->master_desc, KEY_TRUSTED_PREFIX, in request_master_key()
429 mkey = request_trusted_key(epayload->master_desc + in request_master_key()
432 } else if (!strncmp(epayload->master_desc, KEY_USER_PREFIX, in request_master_key()
434 mkey = request_user_key(epayload->master_desc + in request_master_key()
445 epayload->master_desc); in request_master_key()
448 epayload->master_desc); in request_master_key()
458 static int derived_key_encrypt(struct encrypted_key_payload *epayload, in derived_key_encrypt() argument
470 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in derived_key_encrypt()
476 dump_decrypted_data(epayload); in derived_key_encrypt()
479 sg_set_buf(&sg_in[0], epayload->decrypted_data, in derived_key_encrypt()
480 epayload->decrypted_datalen); in derived_key_encrypt()
484 sg_set_buf(sg_out, epayload->encrypted_data, encrypted_datalen); in derived_key_encrypt()
486 memcpy(iv, epayload->iv, sizeof(iv)); in derived_key_encrypt()
495 dump_encrypted_data(epayload, encrypted_datalen); in derived_key_encrypt()
500 static int datablob_hmac_append(struct encrypted_key_payload *epayload, in datablob_hmac_append() argument
511 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append()
513 epayload->format, epayload->datablob_len); in datablob_hmac_append()
522 static int datablob_hmac_verify(struct encrypted_key_payload *epayload, in datablob_hmac_verify() argument
536 len = epayload->datablob_len; in datablob_hmac_verify()
538 p = epayload->master_desc; in datablob_hmac_verify()
539 len -= strlen(epayload->format) + 1; in datablob_hmac_verify()
541 p = epayload->format; in datablob_hmac_verify()
546 ret = crypto_memneq(digest, epayload->format + epayload->datablob_len, in datablob_hmac_verify()
551 epayload->format + epayload->datablob_len, in datablob_hmac_verify()
560 static int derived_key_decrypt(struct encrypted_key_payload *epayload, in derived_key_decrypt() argument
578 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in derived_key_decrypt()
583 dump_encrypted_data(epayload, encrypted_datalen); in derived_key_decrypt()
587 sg_set_buf(sg_in, epayload->encrypted_data, encrypted_datalen); in derived_key_decrypt()
588 sg_set_buf(&sg_out[0], epayload->decrypted_data, in derived_key_decrypt()
589 epayload->decrypted_datalen); in derived_key_decrypt()
592 memcpy(iv, epayload->iv, sizeof(iv)); in derived_key_decrypt()
600 dump_decrypted_data(epayload); in derived_key_decrypt()
612 struct encrypted_key_payload *epayload = NULL; in encrypted_key_alloc() local
649 epayload = kzalloc(sizeof(*epayload) + payload_datalen + in encrypted_key_alloc()
651 if (!epayload) in encrypted_key_alloc()
654 epayload->payload_datalen = payload_datalen; in encrypted_key_alloc()
655 epayload->decrypted_datalen = decrypted_datalen; in encrypted_key_alloc()
656 epayload->datablob_len = datablob_len; in encrypted_key_alloc()
657 return epayload; in encrypted_key_alloc()
660 static int encrypted_key_decrypt(struct encrypted_key_payload *epayload, in encrypted_key_decrypt() argument
673 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in encrypted_key_decrypt()
679 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt()
682 ret = hex2bin(epayload->encrypted_data, hex_encoded_data, in encrypted_key_decrypt()
687 hmac = epayload->format + epayload->datablob_len; in encrypted_key_decrypt()
693 mkey = request_master_key(epayload, &master_key, &master_keylen); in encrypted_key_decrypt()
697 ret = datablob_hmac_verify(epayload, format, master_key, master_keylen); in encrypted_key_decrypt()
707 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
717 static void __ekey_init(struct encrypted_key_payload *epayload, in __ekey_init() argument
724 epayload->format = epayload->payload_data + epayload->payload_datalen; in __ekey_init()
725 epayload->master_desc = epayload->format + format_len + 1; in __ekey_init()
726 epayload->datalen = epayload->master_desc + strlen(master_desc) + 1; in __ekey_init()
727 epayload->iv = epayload->datalen + strlen(datalen) + 1; in __ekey_init()
728 epayload->encrypted_data = epayload->iv + ivsize + 1; in __ekey_init()
729 epayload->decrypted_data = epayload->payload_data; in __ekey_init()
732 memcpy(epayload->format, key_format_default, format_len); in __ekey_init()
735 epayload->decrypted_data = in __ekey_init()
736 ecryptfs_get_auth_tok_key((struct ecryptfs_auth_tok *)epayload->payload_data); in __ekey_init()
738 memcpy(epayload->format, format, format_len); in __ekey_init()
741 memcpy(epayload->master_desc, master_desc, strlen(master_desc)); in __ekey_init()
742 memcpy(epayload->datalen, datalen, strlen(datalen)); in __ekey_init()
751 static int encrypted_init(struct encrypted_key_payload *epayload, in encrypted_init() argument
763 ecryptfs_fill_auth_tok((struct ecryptfs_auth_tok *)epayload->payload_data, in encrypted_init()
767 __ekey_init(epayload, format, master_desc, datalen); in encrypted_init()
769 get_random_bytes(epayload->iv, ivsize); in encrypted_init()
771 get_random_bytes(epayload->decrypted_data, in encrypted_init()
772 epayload->decrypted_datalen); in encrypted_init()
774 ret = encrypted_key_decrypt(epayload, format, hex_encoded_iv); in encrypted_init()
789 struct encrypted_key_payload *epayload = NULL; in encrypted_instantiate() local
811 epayload = encrypted_key_alloc(key, format, master_desc, in encrypted_instantiate()
813 if (IS_ERR(epayload)) { in encrypted_instantiate()
814 ret = PTR_ERR(epayload); in encrypted_instantiate()
817 ret = encrypted_init(epayload, key->description, format, master_desc, in encrypted_instantiate()
820 kzfree(epayload); in encrypted_instantiate()
824 rcu_assign_keypointer(key, epayload); in encrypted_instantiate()
832 struct encrypted_key_payload *epayload; in encrypted_rcu_free() local
834 epayload = container_of(rcu, struct encrypted_key_payload, rcu); in encrypted_rcu_free()
835 kzfree(epayload); in encrypted_rcu_free()
849 struct encrypted_key_payload *epayload = key->payload.data[0]; in encrypted_update() local
872 ret = valid_master_desc(new_master_desc, epayload->master_desc); in encrypted_update()
876 new_epayload = encrypted_key_alloc(key, epayload->format, in encrypted_update()
877 new_master_desc, epayload->datalen); in encrypted_update()
883 __ekey_init(new_epayload, epayload->format, new_master_desc, in encrypted_update()
884 epayload->datalen); in encrypted_update()
886 memcpy(new_epayload->iv, epayload->iv, ivsize); in encrypted_update()
887 memcpy(new_epayload->payload_data, epayload->payload_data, in encrypted_update()
888 epayload->payload_datalen); in encrypted_update()
891 call_rcu(&epayload->rcu, encrypted_rcu_free); in encrypted_update()
908 struct encrypted_key_payload *epayload; in encrypted_read() local
917 epayload = dereference_key_locked(key); in encrypted_read()
920 asciiblob_len = epayload->datablob_len + ivsize + 1 in encrypted_read()
921 + roundup(epayload->decrypted_datalen, blksize) in encrypted_read()
927 mkey = request_master_key(epayload, &master_key, &master_keylen); in encrypted_read()
935 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
939 ret = datablob_hmac_append(epayload, master_key, master_keylen); in encrypted_read()
943 ascii_buf = datablob_format(epayload, asciiblob_len); in encrypted_read()