diff options
author | Eric Biggers <ebiggers@google.com> | 2018-05-01 00:51:46 +0200 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2018-05-20 22:21:04 +0200 |
commit | 11b8818ec09d577567f59fc1b32cfa56c756fe89 (patch) | |
tree | 297fcf6b65f411969f3546bcd3ed310096dab5c5 /fs/crypto/fname.c | |
parent | fscrypt: remove unnecessary check for non-logon key type (diff) | |
download | linux-11b8818ec09d577567f59fc1b32cfa56c756fe89.tar.xz linux-11b8818ec09d577567f59fc1b32cfa56c756fe89.zip |
fscrypt: remove internal key size constants
With one exception, the internal key size constants such as
FS_AES_256_XTS_KEY_SIZE are only used for the 'available_modes' array,
where they really only serve to obfuscate what the values are. Also
some of the constants are unused, and the key sizes tend to be in the
names of the algorithms anyway. In the past these values were also
misused, e.g. we used to have FS_AES_256_XTS_KEY_SIZE in places that
technically should have been FS_MAX_KEY_SIZE.
The exception is that FS_AES_128_ECB_KEY_SIZE is used for key
derivation. But it's more appropriate to use
FS_KEY_DERIVATION_NONCE_SIZE for that instead.
Thus, just put the sizes directly in the 'available_modes' array.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'fs/crypto/fname.c')
0 files changed, 0 insertions, 0 deletions