Lines Matching refs:epayload
270 static char *datablob_format(struct encrypted_key_payload *epayload, in datablob_format() argument
274 u8 *iv = epayload->iv; in datablob_format()
285 len = sprintf(ascii_buf, "%s %s %s ", epayload->format, in datablob_format()
286 epayload->master_desc, epayload->datalen); in datablob_format()
422 static struct key *request_master_key(struct encrypted_key_payload *epayload, in request_master_key() argument
427 if (!strncmp(epayload->master_desc, KEY_TRUSTED_PREFIX, in request_master_key()
429 mkey = request_trusted_key(epayload->master_desc + in request_master_key()
432 } else if (!strncmp(epayload->master_desc, KEY_USER_PREFIX, in request_master_key()
434 mkey = request_user_key(epayload->master_desc + in request_master_key()
445 epayload->master_desc); in request_master_key()
448 epayload->master_desc); in request_master_key()
458 static int derived_key_encrypt(struct encrypted_key_payload *epayload, in derived_key_encrypt() argument
470 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in derived_key_encrypt()
476 dump_decrypted_data(epayload); in derived_key_encrypt()
479 sg_set_buf(&sg_in[0], epayload->decrypted_data, in derived_key_encrypt()
480 epayload->decrypted_datalen); in derived_key_encrypt()
484 sg_set_buf(sg_out, epayload->encrypted_data, encrypted_datalen); in derived_key_encrypt()
486 memcpy(iv, epayload->iv, sizeof(iv)); in derived_key_encrypt()
495 dump_encrypted_data(epayload, encrypted_datalen); in derived_key_encrypt()
500 static int datablob_hmac_append(struct encrypted_key_payload *epayload, in datablob_hmac_append() argument
511 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append()
513 epayload->format, epayload->datablob_len); in datablob_hmac_append()
522 static int datablob_hmac_verify(struct encrypted_key_payload *epayload, in datablob_hmac_verify() argument
536 len = epayload->datablob_len; in datablob_hmac_verify()
538 p = epayload->master_desc; in datablob_hmac_verify()
539 len -= strlen(epayload->format) + 1; in datablob_hmac_verify()
541 p = epayload->format; in datablob_hmac_verify()
546 ret = crypto_memneq(digest, epayload->format + epayload->datablob_len, in datablob_hmac_verify()
551 epayload->format + epayload->datablob_len, in datablob_hmac_verify()
560 static int derived_key_decrypt(struct encrypted_key_payload *epayload, in derived_key_decrypt() argument
578 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in derived_key_decrypt()
583 dump_encrypted_data(epayload, encrypted_datalen); in derived_key_decrypt()
587 sg_set_buf(sg_in, epayload->encrypted_data, encrypted_datalen); in derived_key_decrypt()
588 sg_set_buf(&sg_out[0], epayload->decrypted_data, in derived_key_decrypt()
589 epayload->decrypted_datalen); in derived_key_decrypt()
592 memcpy(iv, epayload->iv, sizeof(iv)); in derived_key_decrypt()
600 dump_decrypted_data(epayload); in derived_key_decrypt()
612 struct encrypted_key_payload *epayload = NULL; in encrypted_key_alloc() local
656 epayload = kzalloc(sizeof(*epayload) + payload_datalen + in encrypted_key_alloc()
658 if (!epayload) in encrypted_key_alloc()
661 epayload->payload_datalen = payload_datalen; in encrypted_key_alloc()
662 epayload->decrypted_datalen = decrypted_datalen; in encrypted_key_alloc()
663 epayload->datablob_len = datablob_len; in encrypted_key_alloc()
664 return epayload; in encrypted_key_alloc()
667 static int encrypted_key_decrypt(struct encrypted_key_payload *epayload, in encrypted_key_decrypt() argument
680 encrypted_datalen = roundup(epayload->decrypted_datalen, blksize); in encrypted_key_decrypt()
686 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt()
689 ret = hex2bin(epayload->encrypted_data, hex_encoded_data, in encrypted_key_decrypt()
694 hmac = epayload->format + epayload->datablob_len; in encrypted_key_decrypt()
700 mkey = request_master_key(epayload, &master_key, &master_keylen); in encrypted_key_decrypt()
704 ret = datablob_hmac_verify(epayload, format, master_key, master_keylen); in encrypted_key_decrypt()
714 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
724 static void __ekey_init(struct encrypted_key_payload *epayload, in __ekey_init() argument
731 epayload->format = epayload->payload_data + epayload->payload_datalen; in __ekey_init()
732 epayload->master_desc = epayload->format + format_len + 1; in __ekey_init()
733 epayload->datalen = epayload->master_desc + strlen(master_desc) + 1; in __ekey_init()
734 epayload->iv = epayload->datalen + strlen(datalen) + 1; in __ekey_init()
735 epayload->encrypted_data = epayload->iv + ivsize + 1; in __ekey_init()
736 epayload->decrypted_data = epayload->payload_data; in __ekey_init()
739 memcpy(epayload->format, key_format_default, format_len); in __ekey_init()
742 epayload->decrypted_data = in __ekey_init()
743 ecryptfs_get_auth_tok_key((struct ecryptfs_auth_tok *)epayload->payload_data); in __ekey_init()
745 memcpy(epayload->format, format, format_len); in __ekey_init()
748 memcpy(epayload->master_desc, master_desc, strlen(master_desc)); in __ekey_init()
749 memcpy(epayload->datalen, datalen, strlen(datalen)); in __ekey_init()
758 static int encrypted_init(struct encrypted_key_payload *epayload, in encrypted_init() argument
770 ecryptfs_fill_auth_tok((struct ecryptfs_auth_tok *)epayload->payload_data, in encrypted_init()
774 __ekey_init(epayload, format, master_desc, datalen); in encrypted_init()
776 get_random_bytes(epayload->iv, ivsize); in encrypted_init()
778 get_random_bytes(epayload->decrypted_data, in encrypted_init()
779 epayload->decrypted_datalen); in encrypted_init()
781 ret = encrypted_key_decrypt(epayload, format, hex_encoded_iv); in encrypted_init()
796 struct encrypted_key_payload *epayload = NULL; in encrypted_instantiate() local
818 epayload = encrypted_key_alloc(key, format, master_desc, in encrypted_instantiate()
820 if (IS_ERR(epayload)) { in encrypted_instantiate()
821 ret = PTR_ERR(epayload); in encrypted_instantiate()
824 ret = encrypted_init(epayload, key->description, format, master_desc, in encrypted_instantiate()
827 kzfree(epayload); in encrypted_instantiate()
831 rcu_assign_keypointer(key, epayload); in encrypted_instantiate()
839 struct encrypted_key_payload *epayload; in encrypted_rcu_free() local
841 epayload = container_of(rcu, struct encrypted_key_payload, rcu); in encrypted_rcu_free()
842 kzfree(epayload); in encrypted_rcu_free()
856 struct encrypted_key_payload *epayload = key->payload.data[0]; in encrypted_update() local
879 ret = valid_master_desc(new_master_desc, epayload->master_desc); in encrypted_update()
883 new_epayload = encrypted_key_alloc(key, epayload->format, in encrypted_update()
884 new_master_desc, epayload->datalen); in encrypted_update()
890 __ekey_init(new_epayload, epayload->format, new_master_desc, in encrypted_update()
891 epayload->datalen); in encrypted_update()
893 memcpy(new_epayload->iv, epayload->iv, ivsize); in encrypted_update()
894 memcpy(new_epayload->payload_data, epayload->payload_data, in encrypted_update()
895 epayload->payload_datalen); in encrypted_update()
898 call_rcu(&epayload->rcu, encrypted_rcu_free); in encrypted_update()
915 struct encrypted_key_payload *epayload; in encrypted_read() local
924 epayload = dereference_key_locked(key); in encrypted_read()
927 asciiblob_len = epayload->datablob_len + ivsize + 1 in encrypted_read()
928 + roundup(epayload->decrypted_datalen, blksize) in encrypted_read()
934 mkey = request_master_key(epayload, &master_key, &master_keylen); in encrypted_read()
942 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
946 ret = datablob_hmac_append(epayload, master_key, master_keylen); in encrypted_read()
950 ascii_buf = datablob_format(epayload, asciiblob_len); in encrypted_read()