diff options
| author | Andrey Markovytch <andreym@codeaurora.org> | 2015-07-08 11:24:29 +0300 |
|---|---|---|
| committer | David Keitel <dkeitel@codeaurora.org> | 2016-03-23 21:24:07 -0700 |
| commit | 8928f8683bcd0236f5653963deee3bc225fb2206 (patch) | |
| tree | d41d250d59f85899ad1778344b3ee3be75054eac /include/linux/ecryptfs.h | |
| parent | 584531e72e48d4ef1403eaac82fa85be2135f5c7 (diff) | |
PFK: fixed issue where key in TZ was not set properly
When key is set in ICE via TZ, HLOS should send two parts, SALT and
the KEY itself according to AES standards. KEY was used for both parts.
Change-Id: I453dea289b01bdf49352d5209255966052f5dc1b
Signed-off-by: Andrey Markovytch <andreym@codeaurora.org>
Diffstat (limited to 'include/linux/ecryptfs.h')
| -rw-r--r-- | include/linux/ecryptfs.h | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/include/linux/ecryptfs.h b/include/linux/ecryptfs.h index 4f3006ae2a42..55433c6c603d 100644 --- a/include/linux/ecryptfs.h +++ b/include/linux/ecryptfs.h @@ -119,7 +119,7 @@ struct ecryptfs_auth_tok { * such as ecryptfs_get_key_size(), ecryptfs_get_cipher() etc. */ struct ecryptfs_events { - bool (*is_cipher_supported_cb)(char *cipher); + bool (*is_cipher_supported_cb)(const char *cipher); void (*open_cb)(struct inode *inode, void *ecrytpfs_data); void (*release_cb)(struct inode *inode); int (*encrypt_cb)(struct page *in_page, struct page *out_page, @@ -127,6 +127,7 @@ struct ecryptfs_events { int (*decrypt_cb)(struct page *in_page, struct page *out_page, struct inode *inode, unsigned long extent_offset); bool (*is_hw_crypt_cb)(void); + size_t (*get_salt_key_size_cb)(const char *cipher); }; @@ -138,6 +139,10 @@ const unsigned char *ecryptfs_get_key(void *ecrytpfs_data); size_t ecryptfs_get_key_size(void *ecrytpfs_data); +const unsigned char *ecryptfs_get_salt(void *ecrytpfs_data); + +size_t ecryptfs_get_salt_size(void *ecrytpfs_data); + const unsigned char *ecryptfs_get_cipher(void *ecrytpfs_data); bool ecryptfs_is_page_in_metadata(void *ecrytpfs_data, pgoff_t offset); |
