root/security/keys/encrypted-keys/ecryptfs_format.c

/* [<][>][^][v][top][bottom][index][help] */

DEFINITIONS

This source file includes following definitions.
  1. ecryptfs_get_auth_tok_key
  2. ecryptfs_get_versions
  3. ecryptfs_fill_auth_tok

   1 // SPDX-License-Identifier: GPL-2.0-only
   2 /*
   3  * ecryptfs_format.c: helper functions for the encrypted key type
   4  *
   5  * Copyright (C) 2006 International Business Machines Corp.
   6  * Copyright (C) 2010 Politecnico di Torino, Italy
   7  *                    TORSEC group -- http://security.polito.it
   8  *
   9  * Authors:
  10  * Michael A. Halcrow <mahalcro@us.ibm.com>
  11  * Tyler Hicks <tyhicks@ou.edu>
  12  * Roberto Sassu <roberto.sassu@polito.it>
  13  */
  14 
  15 #include <linux/export.h>
  16 #include <linux/string.h>
  17 #include "ecryptfs_format.h"
  18 
  19 u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok)
  20 {
  21         return auth_tok->token.password.session_key_encryption_key;
  22 }
  23 EXPORT_SYMBOL(ecryptfs_get_auth_tok_key);
  24 
  25 /*
  26  * ecryptfs_get_versions()
  27  *
  28  * Source code taken from the software 'ecryptfs-utils' version 83.
  29  *
  30  */
  31 void ecryptfs_get_versions(int *major, int *minor, int *file_version)
  32 {
  33         *major = ECRYPTFS_VERSION_MAJOR;
  34         *minor = ECRYPTFS_VERSION_MINOR;
  35         if (file_version)
  36                 *file_version = ECRYPTFS_SUPPORTED_FILE_VERSION;
  37 }
  38 EXPORT_SYMBOL(ecryptfs_get_versions);
  39 
  40 /*
  41  * ecryptfs_fill_auth_tok - fill the ecryptfs_auth_tok structure
  42  *
  43  * Fill the ecryptfs_auth_tok structure with required ecryptfs data.
  44  * The source code is inspired to the original function generate_payload()
  45  * shipped with the software 'ecryptfs-utils' version 83.
  46  *
  47  */
  48 int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok,
  49                            const char *key_desc)
  50 {
  51         int major, minor;
  52 
  53         ecryptfs_get_versions(&major, &minor, NULL);
  54         auth_tok->version = (((uint16_t)(major << 8) & 0xFF00)
  55                              | ((uint16_t)minor & 0x00FF));
  56         auth_tok->token_type = ECRYPTFS_PASSWORD;
  57         strncpy((char *)auth_tok->token.password.signature, key_desc,
  58                 ECRYPTFS_PASSWORD_SIG_SIZE);
  59         auth_tok->token.password.session_key_encryption_key_bytes =
  60                 ECRYPTFS_MAX_KEY_BYTES;
  61         /*
  62          * Removed auth_tok->token.password.salt and
  63          * auth_tok->token.password.session_key_encryption_key
  64          * initialization from the original code
  65          */
  66         /* TODO: Make the hash parameterizable via policy */
  67         auth_tok->token.password.flags |=
  68                 ECRYPTFS_SESSION_KEY_ENCRYPTION_KEY_SET;
  69         /* The kernel code will encrypt the session key. */
  70         auth_tok->session_key.encrypted_key[0] = 0;
  71         auth_tok->session_key.encrypted_key_size = 0;
  72         /* Default; subject to change by kernel eCryptfs */
  73         auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;
  74         auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
  75         return 0;
  76 }
  77 EXPORT_SYMBOL(ecryptfs_fill_auth_tok);

/* [<][>][^][v][top][bottom][index][help] */