diff options
author | Jakob Unterwurzacher | 2021-06-21 11:32:04 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2021-06-21 11:32:04 +0200 |
commit | 6b0e63c1a86946de23f549e7d80ea933a4a105f8 (patch) | |
tree | 59bc27a3f0822f413997b8fd3bc4e512747c7725 /internal | |
parent | c5d8fa83ae702017fc90769dff178fda6a7942a3 (diff) |
Improve startup debug output
The startup debug output was very verbose but still missing some
effective crypto settings.
Diffstat (limited to 'internal')
-rw-r--r-- | internal/contentenc/content.go | 3 | ||||
-rw-r--r-- | internal/cryptocore/cryptocore.go | 16 |
2 files changed, 19 insertions, 0 deletions
diff --git a/internal/contentenc/content.go b/internal/contentenc/content.go index 747bb4c..e023492 100644 --- a/internal/contentenc/content.go +++ b/internal/contentenc/content.go @@ -73,6 +73,9 @@ type ContentEnc struct { // New returns an initialized ContentEnc instance. func New(cc *cryptocore.CryptoCore, plainBS uint64, forceDecode bool) *ContentEnc { + tlog.Debug.Printf("contentenc.New: plainBS=%d, forceDecode=%v", + plainBS, forceDecode) + if fuse.MAX_KERNEL_WRITE%plainBS != 0 { log.Panicf("unaligned MAX_KERNEL_WRITE=%d", fuse.MAX_KERNEL_WRITE) } diff --git a/internal/cryptocore/cryptocore.go b/internal/cryptocore/cryptocore.go index d66f390..9f5b9bd 100644 --- a/internal/cryptocore/cryptocore.go +++ b/internal/cryptocore/cryptocore.go @@ -36,6 +36,19 @@ const ( BackendAESSIV AEADTypeEnum = 5 ) +func (a AEADTypeEnum) String() string { + switch a { + case BackendOpenSSL: + return "BackendOpenSSL" + case BackendGoGCM: + return "BackendGoGCM" + case BackendAESSIV: + return "BackendAESSIV" + default: + return fmt.Sprintf("%d", a) + } +} + // CryptoCore is the low level crypto implementation. type CryptoCore struct { // EME is used for filename encryption. @@ -58,6 +71,9 @@ type CryptoCore struct { // Note: "key" is either the scrypt hash of the password (when decrypting // a config file) or the masterkey (when finally mounting the filesystem). func New(key []byte, aeadType AEADTypeEnum, IVBitLen int, useHKDF bool, forceDecode bool) *CryptoCore { + tlog.Debug.Printf("cryptocore.New: key=%d bytes, aeadType=%v, IVBitLen=%d, useHKDF=%v, forceDecode=%v", + len(key), aeadType, IVBitLen, useHKDF, forceDecode) + if len(key) != KeyLen { log.Panic(fmt.Sprintf("Unsupported key length %d", len(key))) } |