Add routines for preparing to read or write an image, and cleaning up
afterwards.
Signed-off-by: Nigel Cunningham <[email protected]>
kernel/power/encryption.c | 61 +++++++++++++++++++++++++++++++++++++++++++++
1 files changed, 61 insertions(+), 0 deletions(-)
diff --git a/kernel/power/encryption.c b/kernel/power/encryption.c
index 45d325d..98b0114 100644
--- a/kernel/power/encryption.c
+++ b/kernel/power/encryption.c
@@ -96,3 +96,64 @@ static void free_local_buffer(void)
page_buffer = NULL;
}
+/* suspend_encrypt_rw_cleanup
+ *
+ * Description: Frees memory allocated for our labours.
+ */
+static int suspend_encrypt_rw_cleanup(int rw)
+{
+ if (suspend_encryptor_transform) {
+ crypto_free_tfm(suspend_encryptor_transform);
+ suspend_encryptor_transform = NULL;
+ }
+
+ free_local_buffer();
+
+ return 0;
+}
+
+/* suspend_crypto_prepare
+ *
+ * Description: Prepare to do some work by allocating buffers and transforms.
+ * Returns: Int: Zero if successful, 1 otherwise.
+ */
+static int suspend_encrypt_rw_prepare(int rw)
+{
+ if (!*suspend_encryptor_name) {
+ printk("Suspend2: Encryptor enabled but no name set.\n");
+ suspend_encryption_ops.disabled = 1;
+ return 1;
+ }
+
+ if (!(suspend_encryptor_transform = crypto_alloc_tfm(suspend_encryptor_name,
+ 1 << suspend_encryptor_mode))) {
+ printk("Suspend2: Failed to initialise the encryption "
+ "transform (%s, mode %d).\n",
+ suspend_encryptor_name, suspend_encryptor_mode);
+ return 1;
+ }
+
+ if (rw == READ)
+ bufofs = PAGE_SIZE;
+ else
+ bufofs = 0;
+
+ suspend_key_len = strlen(suspend_encryptor_key);
+
+ if (crypto_cipher_setkey(suspend_encryptor_transform, suspend_encryptor_key,
+ suspend_key_len)) {
+ printk("%d is an invalid key length for cipher %s.\n",
+ suspend_key_len,
+ suspend_encryptor_name);
+ return 1;
+ }
+
+ if (rw != READ) {
+ crypto_cipher_set_iv(suspend_encryptor_transform,
+ suspend_encryptor_iv,
+ crypto_tfm_alg_ivsize(suspend_encryptor_transform));
+ }
+
+ return 0;
+}
+
--
Nigel Cunningham nigel at suspend2 dot net
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]