Function report |
Source Code:fs\crypto\keysetup.c |
Create Date:2022-07-28 20:24:01 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:fscrypt_get_encryption_info
Proto:int fscrypt_get_encryption_info(struct inode *inode)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct inode * | inode |
| 362 | struct key * master_key = NULL |
| 365 | If fscrypt_has_encryption_key(inode) Then Return 0 |
| 372 | res = get_context(inode, & ctx, size of ctx ) |
| 373 | If res < 0 Then |
| 374 | If Not fscrypt_dummy_context_enabled(inode) || IS_ENCRYPTED(inode) Then |
| 376 | fscrypt_warn(inode, "Error %d getting encryption context", res) |
| 379 | Return res |
| 383 | version = FSCRYPT_CONTEXT_V1 |
| 386 | memset(master_key_descriptor, 0x42, FSCRYPT_KEY_DESCRIPTOR_SIZE) |
| 391 | crypt_info = Shortcuts |
| 392 | If Not crypt_info Then Return -ENOMEM |
| 397 | res = fscrypt_policy_from_context( & The encryption policy used by this inode , & ctx, res) |
| 398 | If res Then |
| 399 | fscrypt_warn(inode, "Unrecognized or corrupt encryption context") |
| 401 | Go to out |
| 405 | Case version == FSCRYPT_CONTEXT_V1 |
| 406 | memcpy(This inode's nonce, copied from the fscrypt_context , nonce, FS_KEY_DERIVATION_NONCE_SIZE) |
| 408 | Break |
| 409 | Case version == FSCRYPT_CONTEXT_V2 |
| 410 | memcpy(This inode's nonce, copied from the fscrypt_context , nonce, FS_KEY_DERIVATION_NONCE_SIZE) |
| 412 | Break |
| 413 | Default |
| 419 | If Not fscrypt_supported_policy( & The encryption policy used by this inode , inode) Then |
| 429 | WARN_ON(ivsize > FSCRYPT_MAX_IV_SIZE) |
| 430 | Encryption mode used for this inode. It corresponds to either the* contents or filenames encryption mode, depending on the inode type. = mode |
| 436 | If (cmpxchg_release( & i_crypt_info, NULL, crypt_info) == NULL) Then |
| 437 | If master_key Then |
| 443 | spin_lock( & mk_decrypted_inodes_lock) |
| 446 | spin_unlock( & mk_decrypted_inodes_lock) |
| 448 | crypt_info = NULL |
| 450 | res = 0 |
| 451 | out : |
| 452 | If master_key Then |
| 460 | put_crypt_info(crypt_info) |
| 461 | Return res |
| Name | Describe |
|---|---|
| fscrypt_setup_filename | scrypt_setup_filename() - prepare to search a possibly encrypted directory*@dir: the directory that will be searched*@iname: the user-provided filename being searched for*@lookup: 1 if we're allowed to proceed without the key because it's* ->lookup() or |
| __fscrypt_prepare_symlink | |
| fscrypt_get_symlink | scrypt_get_symlink - get the target of an encrypted symlink*@inode: the symlink inode*@caddr: the on-disk contents of the symlink*@max_size: size of @caddr buffer*@done: if successful, will be set up to free the returned target if needed |
| fscrypt_has_permitted_context | scrypt_has_permitted_context() - is a file's encryption policy permitted* within its directory?*@parent: inode for parent directory*@child: inode for file being looked up, opened, or linked into @parent* Filesystems must call this before permitting access |
| fscrypt_inherit_context | scrypt_inherit_context() - Sets a child context from its parent*@parent: Parent inode from which the context is inherited |
| fscrypt_require_key | scrypt_require_key - require an inode's encryption key*@inode: the inode we need the key for* If the inode is encrypted, set up its encryption key if not already done |
| fscrypt_d_revalidate | Validate dentries in encrypted directories to make sure we aren't potentially* caching stale dentries after a key has been added. |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |