summaryrefslogtreecommitdiffstats
path: root/src/cryptsetup/cryptsetup-tpm2.h
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 03:50:40 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 03:50:40 +0000
commitfc53809803cd2bc2434e312b19a18fa36776da12 (patch)
treeb4b43bd6538f51965ce32856e9c053d0f90919c8 /src/cryptsetup/cryptsetup-tpm2.h
parentAdding upstream version 255.5. (diff)
downloadsystemd-fc53809803cd2bc2434e312b19a18fa36776da12.tar.xz
systemd-fc53809803cd2bc2434e312b19a18fa36776da12.zip
Adding upstream version 256.upstream/256
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/cryptsetup/cryptsetup-tpm2.h')
-rw-r--r--src/cryptsetup/cryptsetup-tpm2.h126
1 files changed, 0 insertions, 126 deletions
diff --git a/src/cryptsetup/cryptsetup-tpm2.h b/src/cryptsetup/cryptsetup-tpm2.h
deleted file mode 100644
index a50a943..0000000
--- a/src/cryptsetup/cryptsetup-tpm2.h
+++ /dev/null
@@ -1,126 +0,0 @@
-/* SPDX-License-Identifier: LGPL-2.1-or-later */
-#pragma once
-
-#include <sys/types.h>
-
-#include "ask-password-api.h"
-#include "cryptsetup-util.h"
-#include "log.h"
-#include "time-util.h"
-#include "tpm2-util.h"
-
-#if HAVE_TPM2
-
-int acquire_tpm2_key(
- const char *volume_name,
- const char *device,
- uint32_t hash_pcr_mask,
- uint16_t pcr_bank,
- const void *pubkey,
- size_t pubkey_size,
- uint32_t pubkey_pcr_mask,
- const char *signature_path,
- const char *pcrlock_path,
- uint16_t primary_alg,
- const char *key_file,
- size_t key_file_size,
- uint64_t key_file_offset,
- const void *key_data,
- size_t key_data_size,
- const void *policy_hash,
- size_t policy_hash_size,
- const void *salt,
- size_t salt_size,
- const void *srk_buf,
- size_t salt_srk_buf_size,
- TPM2Flags flags,
- usec_t until,
- bool headless,
- AskPasswordFlags ask_password_flags,
- void **ret_decrypted_key,
- size_t *ret_decrypted_key_size);
-
-int find_tpm2_auto_data(
- struct crypt_device *cd,
- uint32_t search_pcr_mask,
- int start_token,
- uint32_t *ret_hash_pcr_mask,
- uint16_t *ret_pcr_bank,
- void **ret_pubkey,
- size_t *ret_pubkey_size,
- uint32_t *ret_pubkey_pcr_mask,
- uint16_t *ret_primary_alg,
- void **ret_blob,
- size_t *ret_blob_size,
- void **ret_policy_hash,
- size_t *ret_policy_hash_size,
- void **ret_salt,
- size_t *ret_salt_size,
- void **ret_srk_buf,
- size_t *ret_srk_size,
- TPM2Flags *ret_flags,
- int *ret_keyslot,
- int *ret_token);
-
-#else
-
-static inline int acquire_tpm2_key(
- const char *volume_name,
- const char *device,
- uint32_t hash_pcr_mask,
- uint16_t pcr_bank,
- const void *pubkey,
- size_t pubkey_size,
- uint32_t pubkey_pcr_mask,
- const char *signature_path,
- const char *pcrlock_path,
- uint16_t primary_alg,
- const char *key_file,
- size_t key_file_size,
- uint64_t key_file_offset,
- const void *key_data,
- size_t key_data_size,
- const void *policy_hash,
- size_t policy_hash_size,
- const void *salt,
- size_t salt_size,
- const void *srk_buf,
- size_t salt_srk_buf_size,
- TPM2Flags flags,
- usec_t until,
- bool headless,
- AskPasswordFlags ask_password_flags,
- void **ret_decrypted_key,
- size_t *ret_decrypted_key_size) {
-
- return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP),
- "TPM2 support not available.");
-}
-
-static inline int find_tpm2_auto_data(
- struct crypt_device *cd,
- uint32_t search_pcr_mask,
- int start_token,
- uint32_t *ret_hash_pcr_mask,
- uint16_t *ret_pcr_bank,
- void **ret_pubkey,
- size_t *ret_pubkey_size,
- uint32_t *ret_pubkey_pcr_mask,
- uint16_t *ret_primary_alg,
- void **ret_blob,
- size_t *ret_blob_size,
- void **ret_policy_hash,
- size_t *ret_policy_hash_size,
- void **ret_salt,
- size_t *ret_salt_size,
- void **ret_srk_buf,
- size_t *ret_srk_size,
- TPM2Flags *ret_flags,
- int *ret_keyslot,
- int *ret_token) {
-
- return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP),
- "TPM2 support not available.");
-}
-
-#endif