summaryrefslogtreecommitdiff
path: root/include/linux
diff options
context:
space:
mode:
authorAndrey Markovytch <andreym@codeaurora.org>2015-07-08 11:24:29 +0300
committerDavid Keitel <dkeitel@codeaurora.org>2016-03-23 21:24:07 -0700
commit8928f8683bcd0236f5653963deee3bc225fb2206 (patch)
treed41d250d59f85899ad1778344b3ee3be75054eac /include/linux
parent584531e72e48d4ef1403eaac82fa85be2135f5c7 (diff)
PFK: fixed issue where key in TZ was not set properly
When key is set in ICE via TZ, HLOS should send two parts, SALT and the KEY itself according to AES standards. KEY was used for both parts. Change-Id: I453dea289b01bdf49352d5209255966052f5dc1b Signed-off-by: Andrey Markovytch <andreym@codeaurora.org>
Diffstat (limited to 'include/linux')
-rw-r--r--include/linux/ecryptfs.h7
1 files changed, 6 insertions, 1 deletions
diff --git a/include/linux/ecryptfs.h b/include/linux/ecryptfs.h
index 4f3006ae2a42..55433c6c603d 100644
--- a/include/linux/ecryptfs.h
+++ b/include/linux/ecryptfs.h
@@ -119,7 +119,7 @@ struct ecryptfs_auth_tok {
* such as ecryptfs_get_key_size(), ecryptfs_get_cipher() etc.
*/
struct ecryptfs_events {
- bool (*is_cipher_supported_cb)(char *cipher);
+ bool (*is_cipher_supported_cb)(const char *cipher);
void (*open_cb)(struct inode *inode, void *ecrytpfs_data);
void (*release_cb)(struct inode *inode);
int (*encrypt_cb)(struct page *in_page, struct page *out_page,
@@ -127,6 +127,7 @@ struct ecryptfs_events {
int (*decrypt_cb)(struct page *in_page, struct page *out_page,
struct inode *inode, unsigned long extent_offset);
bool (*is_hw_crypt_cb)(void);
+ size_t (*get_salt_key_size_cb)(const char *cipher);
};
@@ -138,6 +139,10 @@ const unsigned char *ecryptfs_get_key(void *ecrytpfs_data);
size_t ecryptfs_get_key_size(void *ecrytpfs_data);
+const unsigned char *ecryptfs_get_salt(void *ecrytpfs_data);
+
+size_t ecryptfs_get_salt_size(void *ecrytpfs_data);
+
const unsigned char *ecryptfs_get_cipher(void *ecrytpfs_data);
bool ecryptfs_is_page_in_metadata(void *ecrytpfs_data, pgoff_t offset);