| /* SPDX-License-Identifier: GPL-2.0 */ | 
 | /* | 
 |  * fscrypt_private.h | 
 |  * | 
 |  * Copyright (C) 2015, Google, Inc. | 
 |  * | 
 |  * Originally written by Michael Halcrow, Ildar Muslukhov, and Uday Savagaonkar. | 
 |  * Heavily modified since then. | 
 |  */ | 
 |  | 
 | #ifndef _FSCRYPT_PRIVATE_H | 
 | #define _FSCRYPT_PRIVATE_H | 
 |  | 
 | #include <linux/fscrypt.h> | 
 | #include <crypto/hash.h> | 
 | #include <linux/bio-crypt-ctx.h> | 
 |  | 
 | #define CONST_STRLEN(str)	(sizeof(str) - 1) | 
 |  | 
 | #define FS_KEY_DERIVATION_NONCE_SIZE	16 | 
 |  | 
 | #define FSCRYPT_MIN_KEY_SIZE		16 | 
 | #define FSCRYPT_MAX_HW_WRAPPED_KEY_SIZE	128 | 
 |  | 
 | #define FSCRYPT_CONTEXT_V1	1 | 
 | #define FSCRYPT_CONTEXT_V2	2 | 
 |  | 
 | struct fscrypt_context_v1 { | 
 | 	u8 version; /* FSCRYPT_CONTEXT_V1 */ | 
 | 	u8 contents_encryption_mode; | 
 | 	u8 filenames_encryption_mode; | 
 | 	u8 flags; | 
 | 	u8 master_key_descriptor[FSCRYPT_KEY_DESCRIPTOR_SIZE]; | 
 | 	u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; | 
 | }; | 
 |  | 
 | struct fscrypt_context_v2 { | 
 | 	u8 version; /* FSCRYPT_CONTEXT_V2 */ | 
 | 	u8 contents_encryption_mode; | 
 | 	u8 filenames_encryption_mode; | 
 | 	u8 flags; | 
 | 	u8 __reserved[4]; | 
 | 	u8 master_key_identifier[FSCRYPT_KEY_IDENTIFIER_SIZE]; | 
 | 	u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; | 
 | }; | 
 |  | 
 | /** | 
 |  * fscrypt_context - the encryption context of an inode | 
 |  * | 
 |  * This is the on-disk equivalent of an fscrypt_policy, stored alongside each | 
 |  * encrypted file usually in a hidden extended attribute.  It contains the | 
 |  * fields from the fscrypt_policy, in order to identify the encryption algorithm | 
 |  * and key with which the file is encrypted.  It also contains a nonce that was | 
 |  * randomly generated by fscrypt itself; this is used as KDF input or as a tweak | 
 |  * to cause different files to be encrypted differently. | 
 |  */ | 
 | union fscrypt_context { | 
 | 	u8 version; | 
 | 	struct fscrypt_context_v1 v1; | 
 | 	struct fscrypt_context_v2 v2; | 
 | }; | 
 |  | 
 | /* | 
 |  * Return the size expected for the given fscrypt_context based on its version | 
 |  * number, or 0 if the context version is unrecognized. | 
 |  */ | 
 | static inline int fscrypt_context_size(const union fscrypt_context *ctx) | 
 | { | 
 | 	switch (ctx->version) { | 
 | 	case FSCRYPT_CONTEXT_V1: | 
 | 		BUILD_BUG_ON(sizeof(ctx->v1) != 28); | 
 | 		return sizeof(ctx->v1); | 
 | 	case FSCRYPT_CONTEXT_V2: | 
 | 		BUILD_BUG_ON(sizeof(ctx->v2) != 40); | 
 | 		return sizeof(ctx->v2); | 
 | 	} | 
 | 	return 0; | 
 | } | 
 |  | 
 | #undef fscrypt_policy | 
 | union fscrypt_policy { | 
 | 	u8 version; | 
 | 	struct fscrypt_policy_v1 v1; | 
 | 	struct fscrypt_policy_v2 v2; | 
 | }; | 
 |  | 
 | /* | 
 |  * Return the size expected for the given fscrypt_policy based on its version | 
 |  * number, or 0 if the policy version is unrecognized. | 
 |  */ | 
 | static inline int fscrypt_policy_size(const union fscrypt_policy *policy) | 
 | { | 
 | 	switch (policy->version) { | 
 | 	case FSCRYPT_POLICY_V1: | 
 | 		return sizeof(policy->v1); | 
 | 	case FSCRYPT_POLICY_V2: | 
 | 		return sizeof(policy->v2); | 
 | 	} | 
 | 	return 0; | 
 | } | 
 |  | 
 | /* Return the contents encryption mode of a valid encryption policy */ | 
 | static inline u8 | 
 | fscrypt_policy_contents_mode(const union fscrypt_policy *policy) | 
 | { | 
 | 	switch (policy->version) { | 
 | 	case FSCRYPT_POLICY_V1: | 
 | 		return policy->v1.contents_encryption_mode; | 
 | 	case FSCRYPT_POLICY_V2: | 
 | 		return policy->v2.contents_encryption_mode; | 
 | 	} | 
 | 	BUG(); | 
 | } | 
 |  | 
 | /* Return the filenames encryption mode of a valid encryption policy */ | 
 | static inline u8 | 
 | fscrypt_policy_fnames_mode(const union fscrypt_policy *policy) | 
 | { | 
 | 	switch (policy->version) { | 
 | 	case FSCRYPT_POLICY_V1: | 
 | 		return policy->v1.filenames_encryption_mode; | 
 | 	case FSCRYPT_POLICY_V2: | 
 | 		return policy->v2.filenames_encryption_mode; | 
 | 	} | 
 | 	BUG(); | 
 | } | 
 |  | 
 | /* Return the flags (FSCRYPT_POLICY_FLAG*) of a valid encryption policy */ | 
 | static inline u8 | 
 | fscrypt_policy_flags(const union fscrypt_policy *policy) | 
 | { | 
 | 	switch (policy->version) { | 
 | 	case FSCRYPT_POLICY_V1: | 
 | 		return policy->v1.flags; | 
 | 	case FSCRYPT_POLICY_V2: | 
 | 		return policy->v2.flags; | 
 | 	} | 
 | 	BUG(); | 
 | } | 
 |  | 
 | static inline bool | 
 | fscrypt_is_direct_key_policy(const union fscrypt_policy *policy) | 
 | { | 
 | 	return fscrypt_policy_flags(policy) & FSCRYPT_POLICY_FLAG_DIRECT_KEY; | 
 | } | 
 |  | 
 | /** | 
 |  * For encrypted symlinks, the ciphertext length is stored at the beginning | 
 |  * of the string in little-endian format. | 
 |  */ | 
 | struct fscrypt_symlink_data { | 
 | 	__le16 len; | 
 | 	char encrypted_path[1]; | 
 | } __packed; | 
 |  | 
 | /** | 
 |  * struct fscrypt_prepared_key - a key prepared for actual encryption/decryption | 
 |  * @tfm: crypto API transform object | 
 |  * @blk_key: key for blk-crypto | 
 |  * | 
 |  * Normally only one of the fields will be non-NULL. | 
 |  */ | 
 | struct fscrypt_prepared_key { | 
 | 	struct crypto_skcipher *tfm; | 
 | #ifdef CONFIG_FS_ENCRYPTION_INLINE_CRYPT | 
 | 	struct fscrypt_blk_crypto_key *blk_key; | 
 | #endif | 
 | }; | 
 |  | 
 | /* | 
 |  * fscrypt_info - the "encryption key" for an inode | 
 |  * | 
 |  * When an encrypted file's key is made available, an instance of this struct is | 
 |  * allocated and stored in ->i_crypt_info.  Once created, it remains until the | 
 |  * inode is evicted. | 
 |  */ | 
 | struct fscrypt_info { | 
 |  | 
 | 	/* The key in a form prepared for actual encryption/decryption */ | 
 | 	struct fscrypt_prepared_key	ci_key; | 
 |  | 
 | 	/* True if the key should be freed when this fscrypt_info is freed */ | 
 | 	bool ci_owns_key; | 
 |  | 
 | #ifdef CONFIG_FS_ENCRYPTION_INLINE_CRYPT | 
 | 	/* | 
 | 	 * True if this inode will use inline encryption (blk-crypto) instead of | 
 | 	 * the traditional filesystem-layer encryption. | 
 | 	 */ | 
 | 	bool ci_inlinecrypt; | 
 | #endif | 
 |  | 
 | 	/* | 
 | 	 * Encryption mode used for this inode.  It corresponds to either the | 
 | 	 * contents or filenames encryption mode, depending on the inode type. | 
 | 	 */ | 
 | 	struct fscrypt_mode *ci_mode; | 
 |  | 
 | 	/* Back-pointer to the inode */ | 
 | 	struct inode *ci_inode; | 
 |  | 
 | 	/* | 
 | 	 * The master key with which this inode was unlocked (decrypted).  This | 
 | 	 * will be NULL if the master key was found in a process-subscribed | 
 | 	 * keyring rather than in the filesystem-level keyring. | 
 | 	 */ | 
 | 	struct key *ci_master_key; | 
 |  | 
 | 	/* | 
 | 	 * Link in list of inodes that were unlocked with the master key. | 
 | 	 * Only used when ->ci_master_key is set. | 
 | 	 */ | 
 | 	struct list_head ci_master_key_link; | 
 |  | 
 | 	/* | 
 | 	 * If non-NULL, then encryption is done using the master key directly | 
 | 	 * and ci_key will equal ci_direct_key->dk_key. | 
 | 	 */ | 
 | 	struct fscrypt_direct_key *ci_direct_key; | 
 |  | 
 | 	/* The encryption policy used by this inode */ | 
 | 	union fscrypt_policy ci_policy; | 
 |  | 
 | 	/* This inode's nonce, copied from the fscrypt_context */ | 
 | 	u8 ci_nonce[FS_KEY_DERIVATION_NONCE_SIZE]; | 
 | }; | 
 |  | 
 | typedef enum { | 
 | 	FS_DECRYPT = 0, | 
 | 	FS_ENCRYPT, | 
 | } fscrypt_direction_t; | 
 |  | 
 | static inline bool fscrypt_valid_enc_modes(u32 contents_mode, | 
 | 					   u32 filenames_mode) | 
 | { | 
 | 	if (contents_mode == FSCRYPT_MODE_AES_128_CBC && | 
 | 	    filenames_mode == FSCRYPT_MODE_AES_128_CTS) | 
 | 		return true; | 
 |  | 
 | 	if (contents_mode == FSCRYPT_MODE_AES_256_XTS && | 
 | 	    filenames_mode == FSCRYPT_MODE_AES_256_CTS) | 
 | 		return true; | 
 |  | 
 | 	if (contents_mode == FSCRYPT_MODE_ADIANTUM && | 
 | 	    filenames_mode == FSCRYPT_MODE_ADIANTUM) | 
 | 		return true; | 
 |  | 
 | 	return false; | 
 | } | 
 |  | 
 | /* crypto.c */ | 
 | extern struct kmem_cache *fscrypt_info_cachep; | 
 | extern int fscrypt_initialize(unsigned int cop_flags); | 
 | extern int fscrypt_crypt_block(const struct inode *inode, | 
 | 			       fscrypt_direction_t rw, u64 lblk_num, | 
 | 			       struct page *src_page, struct page *dest_page, | 
 | 			       unsigned int len, unsigned int offs, | 
 | 			       gfp_t gfp_flags); | 
 | extern struct page *fscrypt_alloc_bounce_page(gfp_t gfp_flags); | 
 | extern const struct dentry_operations fscrypt_d_ops; | 
 |  | 
 | extern void __printf(3, 4) __cold | 
 | fscrypt_msg(const struct inode *inode, const char *level, const char *fmt, ...); | 
 |  | 
 | #define fscrypt_warn(inode, fmt, ...)		\ | 
 | 	fscrypt_msg((inode), KERN_WARNING, fmt, ##__VA_ARGS__) | 
 | #define fscrypt_err(inode, fmt, ...)		\ | 
 | 	fscrypt_msg((inode), KERN_ERR, fmt, ##__VA_ARGS__) | 
 |  | 
 | #define FSCRYPT_MAX_IV_SIZE	32 | 
 |  | 
 | union fscrypt_iv { | 
 | 	struct { | 
 | 		/* logical block number within the file */ | 
 | 		__le64 lblk_num; | 
 |  | 
 | 		/* per-file nonce; only set in DIRECT_KEY mode */ | 
 | 		u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; | 
 | 	}; | 
 | 	u8 raw[FSCRYPT_MAX_IV_SIZE]; | 
 | 	__le64 dun[FSCRYPT_MAX_IV_SIZE / sizeof(__le64)]; | 
 | }; | 
 |  | 
 | void fscrypt_generate_iv(union fscrypt_iv *iv, u64 lblk_num, | 
 | 			 const struct fscrypt_info *ci); | 
 |  | 
 | /* fname.c */ | 
 | extern int fname_encrypt(struct inode *inode, const struct qstr *iname, | 
 | 			 u8 *out, unsigned int olen); | 
 | extern bool fscrypt_fname_encrypted_size(const struct inode *inode, | 
 | 					 u32 orig_len, u32 max_len, | 
 | 					 u32 *encrypted_len_ret); | 
 |  | 
 | /* hkdf.c */ | 
 |  | 
 | struct fscrypt_hkdf { | 
 | 	struct crypto_shash *hmac_tfm; | 
 | }; | 
 |  | 
 | extern int fscrypt_init_hkdf(struct fscrypt_hkdf *hkdf, const u8 *master_key, | 
 | 			     unsigned int master_key_size); | 
 |  | 
 | /* | 
 |  * The list of contexts in which fscrypt uses HKDF.  These values are used as | 
 |  * the first byte of the HKDF application-specific info string to guarantee that | 
 |  * info strings are never repeated between contexts.  This ensures that all HKDF | 
 |  * outputs are unique and cryptographically isolated, i.e. knowledge of one | 
 |  * output doesn't reveal another. | 
 |  */ | 
 | #define HKDF_CONTEXT_KEY_IDENTIFIER	1 | 
 | #define HKDF_CONTEXT_PER_FILE_KEY	2 | 
 | #define HKDF_CONTEXT_DIRECT_KEY		3 | 
 | #define HKDF_CONTEXT_IV_INO_LBLK_64_KEY	4 | 
 |  | 
 | extern int fscrypt_hkdf_expand(struct fscrypt_hkdf *hkdf, u8 context, | 
 | 			       const u8 *info, unsigned int infolen, | 
 | 			       u8 *okm, unsigned int okmlen); | 
 |  | 
 | extern void fscrypt_destroy_hkdf(struct fscrypt_hkdf *hkdf); | 
 |  | 
 | /* inline_crypt.c */ | 
 | #ifdef CONFIG_FS_ENCRYPTION_INLINE_CRYPT | 
 | extern void fscrypt_select_encryption_impl(struct fscrypt_info *ci); | 
 |  | 
 | static inline bool | 
 | fscrypt_using_inline_encryption(const struct fscrypt_info *ci) | 
 | { | 
 | 	return ci->ci_inlinecrypt; | 
 | } | 
 |  | 
 | extern int fscrypt_prepare_inline_crypt_key( | 
 | 					struct fscrypt_prepared_key *prep_key, | 
 | 					const u8 *raw_key, | 
 | 					unsigned int raw_key_size, | 
 | 					const struct fscrypt_info *ci); | 
 |  | 
 | extern void fscrypt_destroy_inline_crypt_key( | 
 | 					struct fscrypt_prepared_key *prep_key); | 
 |  | 
 | extern int fscrypt_derive_raw_secret(struct super_block *sb, | 
 | 				     const u8 *wrapped_key, | 
 | 				     unsigned int wrapped_key_size, | 
 | 				     u8 *raw_secret, | 
 | 				     unsigned int raw_secret_size); | 
 |  | 
 | /* | 
 |  * Check whether the crypto transform or blk-crypto key has been allocated in | 
 |  * @prep_key, depending on which encryption implementation the file will use. | 
 |  */ | 
 | static inline bool | 
 | fscrypt_is_key_prepared(struct fscrypt_prepared_key *prep_key, | 
 | 			const struct fscrypt_info *ci) | 
 | { | 
 | 	/* | 
 | 	 * The READ_ONCE() here pairs with the smp_store_release() in | 
 | 	 * fscrypt_prepare_key().  (This only matters for the per-mode keys, | 
 | 	 * which are shared by multiple inodes.) | 
 | 	 */ | 
 | 	if (fscrypt_using_inline_encryption(ci)) | 
 | 		return READ_ONCE(prep_key->blk_key) != NULL; | 
 | 	return READ_ONCE(prep_key->tfm) != NULL; | 
 | } | 
 |  | 
 | #else /* CONFIG_FS_ENCRYPTION_INLINE_CRYPT */ | 
 |  | 
 | static inline void fscrypt_select_encryption_impl(struct fscrypt_info *ci) | 
 | { | 
 | } | 
 |  | 
 | static inline bool fscrypt_using_inline_encryption( | 
 | 					const struct fscrypt_info *ci) | 
 | { | 
 | 	return false; | 
 | } | 
 |  | 
 | static inline int | 
 | fscrypt_prepare_inline_crypt_key(struct fscrypt_prepared_key *prep_key, | 
 | 				 const u8 *raw_key, unsigned int raw_key_size, | 
 | 				 const struct fscrypt_info *ci) | 
 | { | 
 | 	WARN_ON(1); | 
 | 	return -EOPNOTSUPP; | 
 | } | 
 |  | 
 | static inline void | 
 | fscrypt_destroy_inline_crypt_key(struct fscrypt_prepared_key *prep_key) | 
 | { | 
 | } | 
 |  | 
 | static inline int fscrypt_derive_raw_secret(struct super_block *sb, | 
 | 					    const u8 *wrapped_key, | 
 | 					    unsigned int wrapped_key_size, | 
 | 					    u8 *raw_secret, | 
 | 					    unsigned int raw_secret_size) | 
 | { | 
 | 	fscrypt_warn(NULL, | 
 | 		     "kernel built without support for hardware-wrapped keys"); | 
 | 	return -EOPNOTSUPP; | 
 | } | 
 |  | 
 | static inline bool | 
 | fscrypt_is_key_prepared(struct fscrypt_prepared_key *prep_key, | 
 | 			const struct fscrypt_info *ci) | 
 | { | 
 | 	return READ_ONCE(prep_key->tfm) != NULL; | 
 | } | 
 | #endif /* !CONFIG_FS_ENCRYPTION_INLINE_CRYPT */ | 
 |  | 
 | /* keyring.c */ | 
 |  | 
 | /* | 
 |  * fscrypt_master_key_secret - secret key material of an in-use master key | 
 |  */ | 
 | struct fscrypt_master_key_secret { | 
 |  | 
 | 	/* | 
 | 	 * For v2 policy keys: HKDF context keyed by this master key. | 
 | 	 * For v1 policy keys: not set (hkdf.hmac_tfm == NULL). | 
 | 	 */ | 
 | 	struct fscrypt_hkdf	hkdf; | 
 |  | 
 | 	/* Size of the raw key in bytes.  Set even if ->raw isn't set. */ | 
 | 	u32			size; | 
 |  | 
 | 	/* True if the key in ->raw is a hardware-wrapped key. */ | 
 | 	bool			is_hw_wrapped; | 
 |  | 
 | 	/* | 
 | 	 * For v1 policy keys: the raw key.  Wiped for v2 policy keys, unless | 
 | 	 * ->is_hw_wrapped is true, in which case this contains the wrapped key | 
 | 	 * rather than the key with which 'hkdf' was keyed. | 
 | 	 */ | 
 | 	u8			raw[FSCRYPT_MAX_HW_WRAPPED_KEY_SIZE]; | 
 |  | 
 | } __randomize_layout; | 
 |  | 
 | /* | 
 |  * fscrypt_master_key - an in-use master key | 
 |  * | 
 |  * This represents a master encryption key which has been added to the | 
 |  * filesystem and can be used to "unlock" the encrypted files which were | 
 |  * encrypted with it. | 
 |  */ | 
 | struct fscrypt_master_key { | 
 |  | 
 | 	/* | 
 | 	 * The secret key material.  After FS_IOC_REMOVE_ENCRYPTION_KEY is | 
 | 	 * executed, this is wiped and no new inodes can be unlocked with this | 
 | 	 * key; however, there may still be inodes in ->mk_decrypted_inodes | 
 | 	 * which could not be evicted.  As long as some inodes still remain, | 
 | 	 * FS_IOC_REMOVE_ENCRYPTION_KEY can be retried, or | 
 | 	 * FS_IOC_ADD_ENCRYPTION_KEY can add the secret again. | 
 | 	 * | 
 | 	 * Locking: protected by key->sem (outer) and mk_secret_sem (inner). | 
 | 	 * The reason for two locks is that key->sem also protects modifying | 
 | 	 * mk_users, which ranks it above the semaphore for the keyring key | 
 | 	 * type, which is in turn above page faults (via keyring_read).  But | 
 | 	 * sometimes filesystems call fscrypt_get_encryption_info() from within | 
 | 	 * a transaction, which ranks it below page faults.  So we need a | 
 | 	 * separate lock which protects mk_secret but not also mk_users. | 
 | 	 */ | 
 | 	struct fscrypt_master_key_secret	mk_secret; | 
 | 	struct rw_semaphore			mk_secret_sem; | 
 |  | 
 | 	/* | 
 | 	 * For v1 policy keys: an arbitrary key descriptor which was assigned by | 
 | 	 * userspace (->descriptor). | 
 | 	 * | 
 | 	 * For v2 policy keys: a cryptographic hash of this key (->identifier). | 
 | 	 */ | 
 | 	struct fscrypt_key_specifier		mk_spec; | 
 |  | 
 | 	/* | 
 | 	 * Keyring which contains a key of type 'key_type_fscrypt_user' for each | 
 | 	 * user who has added this key.  Normally each key will be added by just | 
 | 	 * one user, but it's possible that multiple users share a key, and in | 
 | 	 * that case we need to keep track of those users so that one user can't | 
 | 	 * remove the key before the others want it removed too. | 
 | 	 * | 
 | 	 * This is NULL for v1 policy keys; those can only be added by root. | 
 | 	 * | 
 | 	 * Locking: in addition to this keyrings own semaphore, this is | 
 | 	 * protected by the master key's key->sem, so we can do atomic | 
 | 	 * search+insert.  It can also be searched without taking any locks, but | 
 | 	 * in that case the returned key may have already been removed. | 
 | 	 */ | 
 | 	struct key		*mk_users; | 
 |  | 
 | 	/* | 
 | 	 * Length of ->mk_decrypted_inodes, plus one if mk_secret is present. | 
 | 	 * Once this goes to 0, the master key is removed from ->s_master_keys. | 
 | 	 * The 'struct fscrypt_master_key' will continue to live as long as the | 
 | 	 * 'struct key' whose payload it is, but we won't let this reference | 
 | 	 * count rise again. | 
 | 	 */ | 
 | 	refcount_t		mk_refcount; | 
 |  | 
 | 	/* | 
 | 	 * List of inodes that were unlocked using this key.  This allows the | 
 | 	 * inodes to be evicted efficiently if the key is removed. | 
 | 	 */ | 
 | 	struct list_head	mk_decrypted_inodes; | 
 | 	spinlock_t		mk_decrypted_inodes_lock; | 
 |  | 
 | 	/* Per-mode keys for DIRECT_KEY policies, allocated on-demand */ | 
 | 	struct fscrypt_prepared_key mk_direct_keys[__FSCRYPT_MODE_MAX + 1]; | 
 |  | 
 | 	/* Per-mode keys for IV_INO_LBLK_64 policies, allocated on-demand */ | 
 | 	struct fscrypt_prepared_key mk_iv_ino_lblk_64_keys[__FSCRYPT_MODE_MAX + 1]; | 
 |  | 
 | } __randomize_layout; | 
 |  | 
 | static inline bool | 
 | is_master_key_secret_present(const struct fscrypt_master_key_secret *secret) | 
 | { | 
 | 	/* | 
 | 	 * The READ_ONCE() is only necessary for fscrypt_drop_inode() and | 
 | 	 * fscrypt_key_describe().  These run in atomic context, so they can't | 
 | 	 * take ->mk_secret_sem and thus 'secret' can change concurrently which | 
 | 	 * would be a data race.  But they only need to know whether the secret | 
 | 	 * *was* present at the time of check, so READ_ONCE() suffices. | 
 | 	 */ | 
 | 	return READ_ONCE(secret->size) != 0; | 
 | } | 
 |  | 
 | static inline const char *master_key_spec_type( | 
 | 				const struct fscrypt_key_specifier *spec) | 
 | { | 
 | 	switch (spec->type) { | 
 | 	case FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR: | 
 | 		return "descriptor"; | 
 | 	case FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER: | 
 | 		return "identifier"; | 
 | 	} | 
 | 	return "[unknown]"; | 
 | } | 
 |  | 
 | static inline int master_key_spec_len(const struct fscrypt_key_specifier *spec) | 
 | { | 
 | 	switch (spec->type) { | 
 | 	case FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR: | 
 | 		return FSCRYPT_KEY_DESCRIPTOR_SIZE; | 
 | 	case FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER: | 
 | 		return FSCRYPT_KEY_IDENTIFIER_SIZE; | 
 | 	} | 
 | 	return 0; | 
 | } | 
 |  | 
 | extern struct key * | 
 | fscrypt_find_master_key(struct super_block *sb, | 
 | 			const struct fscrypt_key_specifier *mk_spec); | 
 |  | 
 | extern int fscrypt_verify_key_added(struct super_block *sb, | 
 | 				    const u8 identifier[FSCRYPT_KEY_IDENTIFIER_SIZE]); | 
 |  | 
 | extern int __init fscrypt_init_keyring(void); | 
 |  | 
 | /* keysetup.c */ | 
 |  | 
 | struct fscrypt_mode { | 
 | 	const char *friendly_name; | 
 | 	const char *cipher_str; | 
 | 	int keysize; | 
 | 	int ivsize; | 
 | 	int logged_impl_name; | 
 | 	enum blk_crypto_mode_num blk_crypto_mode; | 
 | }; | 
 |  | 
 | extern struct fscrypt_mode fscrypt_modes[]; | 
 |  | 
 | static inline bool | 
 | fscrypt_mode_supports_direct_key(const struct fscrypt_mode *mode) | 
 | { | 
 | 	return mode->ivsize >= offsetofend(union fscrypt_iv, nonce); | 
 | } | 
 |  | 
 | extern int fscrypt_prepare_key(struct fscrypt_prepared_key *prep_key, | 
 | 			       const u8 *raw_key, unsigned int raw_key_size, | 
 | 			       const struct fscrypt_info *ci); | 
 |  | 
 | extern void fscrypt_destroy_prepared_key(struct fscrypt_prepared_key *prep_key); | 
 |  | 
 | extern int fscrypt_set_derived_key(struct fscrypt_info *ci, | 
 | 				   const u8 *derived_key); | 
 |  | 
 | /* keysetup_v1.c */ | 
 |  | 
 | extern void fscrypt_put_direct_key(struct fscrypt_direct_key *dk); | 
 |  | 
 | extern int fscrypt_setup_v1_file_key(struct fscrypt_info *ci, | 
 | 				     const u8 *raw_master_key); | 
 |  | 
 | extern int fscrypt_setup_v1_file_key_via_subscribed_keyrings( | 
 | 					struct fscrypt_info *ci); | 
 | /* policy.c */ | 
 |  | 
 | extern bool fscrypt_policies_equal(const union fscrypt_policy *policy1, | 
 | 				   const union fscrypt_policy *policy2); | 
 | extern bool fscrypt_supported_policy(const union fscrypt_policy *policy_u, | 
 | 				     const struct inode *inode); | 
 | extern int fscrypt_policy_from_context(union fscrypt_policy *policy_u, | 
 | 				       const union fscrypt_context *ctx_u, | 
 | 				       int ctx_size); | 
 |  | 
 | #endif /* _FSCRYPT_PRIVATE_H */ |