1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */
261cf45d0SMimi Zohar #ifndef __ENCRYPTED_KEY_H
361cf45d0SMimi Zohar #define __ENCRYPTED_KEY_H
461cf45d0SMimi Zohar 
561cf45d0SMimi Zohar #define ENCRYPTED_DEBUG 0
69c698987SMimi Zohar #if defined(CONFIG_TRUSTED_KEYS) || \
79c698987SMimi Zohar   (defined(CONFIG_TRUSTED_KEYS_MODULE) && defined(CONFIG_ENCRYPTED_KEYS_MODULE))
8982e617aSMimi Zohar extern struct key *request_trusted_key(const char *trusted_desc,
9146aa8b1SDavid Howells 				       const u8 **master_key, size_t *master_keylen);
10982e617aSMimi Zohar #else
request_trusted_key(const char * trusted_desc,const u8 ** master_key,size_t * master_keylen)11982e617aSMimi Zohar static inline struct key *request_trusted_key(const char *trusted_desc,
12146aa8b1SDavid Howells 					      const u8 **master_key,
13982e617aSMimi Zohar 					      size_t *master_keylen)
14982e617aSMimi Zohar {
15982e617aSMimi Zohar 	return ERR_PTR(-EOPNOTSUPP);
16982e617aSMimi Zohar }
17982e617aSMimi Zohar #endif
1861cf45d0SMimi Zohar 
1961cf45d0SMimi Zohar #if ENCRYPTED_DEBUG
dump_master_key(const u8 * master_key,size_t master_keylen)2061cf45d0SMimi Zohar static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
2161cf45d0SMimi Zohar {
2261cf45d0SMimi Zohar 	print_hex_dump(KERN_ERR, "master key: ", DUMP_PREFIX_NONE, 32, 1,
2361cf45d0SMimi Zohar 		       master_key, master_keylen, 0);
2461cf45d0SMimi Zohar }
2561cf45d0SMimi Zohar 
dump_decrypted_data(struct encrypted_key_payload * epayload)2661cf45d0SMimi Zohar static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
2761cf45d0SMimi Zohar {
2861cf45d0SMimi Zohar 	print_hex_dump(KERN_ERR, "decrypted data: ", DUMP_PREFIX_NONE, 32, 1,
2961cf45d0SMimi Zohar 		       epayload->decrypted_data,
3061cf45d0SMimi Zohar 		       epayload->decrypted_datalen, 0);
3161cf45d0SMimi Zohar }
3261cf45d0SMimi Zohar 
dump_encrypted_data(struct encrypted_key_payload * epayload,unsigned int encrypted_datalen)3361cf45d0SMimi Zohar static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
3461cf45d0SMimi Zohar 				       unsigned int encrypted_datalen)
3561cf45d0SMimi Zohar {
3661cf45d0SMimi Zohar 	print_hex_dump(KERN_ERR, "encrypted data: ", DUMP_PREFIX_NONE, 32, 1,
3761cf45d0SMimi Zohar 		       epayload->encrypted_data, encrypted_datalen, 0);
3861cf45d0SMimi Zohar }
3961cf45d0SMimi Zohar 
dump_hmac(const char * str,const u8 * digest,unsigned int hmac_size)4061cf45d0SMimi Zohar static inline void dump_hmac(const char *str, const u8 *digest,
4161cf45d0SMimi Zohar 			     unsigned int hmac_size)
4261cf45d0SMimi Zohar {
4361cf45d0SMimi Zohar 	if (str)
4461cf45d0SMimi Zohar 		pr_info("encrypted_key: %s", str);
4561cf45d0SMimi Zohar 	print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest,
4661cf45d0SMimi Zohar 		       hmac_size, 0);
4761cf45d0SMimi Zohar }
4861cf45d0SMimi Zohar #else
dump_master_key(const u8 * master_key,size_t master_keylen)4961cf45d0SMimi Zohar static inline void dump_master_key(const u8 *master_key, size_t master_keylen)
5061cf45d0SMimi Zohar {
5161cf45d0SMimi Zohar }
5261cf45d0SMimi Zohar 
dump_decrypted_data(struct encrypted_key_payload * epayload)5361cf45d0SMimi Zohar static inline void dump_decrypted_data(struct encrypted_key_payload *epayload)
5461cf45d0SMimi Zohar {
5561cf45d0SMimi Zohar }
5661cf45d0SMimi Zohar 
dump_encrypted_data(struct encrypted_key_payload * epayload,unsigned int encrypted_datalen)5761cf45d0SMimi Zohar static inline void dump_encrypted_data(struct encrypted_key_payload *epayload,
5861cf45d0SMimi Zohar 				       unsigned int encrypted_datalen)
5961cf45d0SMimi Zohar {
6061cf45d0SMimi Zohar }
6161cf45d0SMimi Zohar 
dump_hmac(const char * str,const u8 * digest,unsigned int hmac_size)6261cf45d0SMimi Zohar static inline void dump_hmac(const char *str, const u8 *digest,
6361cf45d0SMimi Zohar 			     unsigned int hmac_size)
6461cf45d0SMimi Zohar {
6561cf45d0SMimi Zohar }
6661cf45d0SMimi Zohar #endif
6761cf45d0SMimi Zohar #endif
68