ecryptfs_kernel.h (b32e3dc7860d00124fa432dba09667e647cb9bcc) ecryptfs_kernel.h (332ab16f830f59e7621ae8eb2c353dc135a316f6)
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 * Kernel declarations.
4 *
5 * Copyright (C) 1997-2003 Erez Zadok
6 * Copyright (C) 2001-2003 Stony Brook University
7 * Copyright (C) 2004-2008 International Business Machines Corp.
8 * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>

--- 281 unchanged lines hidden (view full) ---

290 struct mutex cs_hash_tfm_mutex;
291 struct mutex cs_mutex;
292};
293
294/* inode private data. */
295struct ecryptfs_inode_info {
296 struct inode vfs_inode;
297 struct inode *wii_inode;
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 * Kernel declarations.
4 *
5 * Copyright (C) 1997-2003 Erez Zadok
6 * Copyright (C) 2001-2003 Stony Brook University
7 * Copyright (C) 2004-2008 International Business Machines Corp.
8 * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>

--- 281 unchanged lines hidden (view full) ---

290 struct mutex cs_hash_tfm_mutex;
291 struct mutex cs_mutex;
292};
293
294/* inode private data. */
295struct ecryptfs_inode_info {
296 struct inode vfs_inode;
297 struct inode *wii_inode;
298 struct mutex lower_file_mutex;
299 atomic_t lower_file_count;
298 struct file *lower_file;
299 struct ecryptfs_crypt_stat crypt_stat;
300};
301
302/* dentry private data. Each dentry must keep track of a lower
303 * vfsmount too. */
304struct ecryptfs_dentry_info {
305 struct path lower_path;

--- 446 unchanged lines hidden (view full) ---

752ecryptfs_spawn_daemon(struct ecryptfs_daemon **daemon, uid_t euid,
753 struct user_namespace *user_ns, struct pid *pid);
754int ecryptfs_init_kthread(void);
755void ecryptfs_destroy_kthread(void);
756int ecryptfs_privileged_open(struct file **lower_file,
757 struct dentry *lower_dentry,
758 struct vfsmount *lower_mnt,
759 const struct cred *cred);
300 struct file *lower_file;
301 struct ecryptfs_crypt_stat crypt_stat;
302};
303
304/* dentry private data. Each dentry must keep track of a lower
305 * vfsmount too. */
306struct ecryptfs_dentry_info {
307 struct path lower_path;

--- 446 unchanged lines hidden (view full) ---

754ecryptfs_spawn_daemon(struct ecryptfs_daemon **daemon, uid_t euid,
755 struct user_namespace *user_ns, struct pid *pid);
756int ecryptfs_init_kthread(void);
757void ecryptfs_destroy_kthread(void);
758int ecryptfs_privileged_open(struct file **lower_file,
759 struct dentry *lower_dentry,
760 struct vfsmount *lower_mnt,
761 const struct cred *cred);
760int ecryptfs_init_persistent_file(struct dentry *ecryptfs_dentry);
762int ecryptfs_get_lower_file(struct dentry *ecryptfs_dentry);
763void ecryptfs_put_lower_file(struct inode *inode);
761int
762ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes,
763 size_t *packet_size,
764 struct ecryptfs_mount_crypt_stat *mount_crypt_stat,
765 char *filename, size_t filename_size);
766int
767ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size,
768 size_t *packet_size,
769 struct ecryptfs_mount_crypt_stat *mount_crypt_stat,
770 char *data, size_t max_packet_size);
771int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat,
772 loff_t offset);
773
774#endif /* #ifndef ECRYPTFS_KERNEL_H */
764int
765ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes,
766 size_t *packet_size,
767 struct ecryptfs_mount_crypt_stat *mount_crypt_stat,
768 char *filename, size_t filename_size);
769int
770ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size,
771 size_t *packet_size,
772 struct ecryptfs_mount_crypt_stat *mount_crypt_stat,
773 char *data, size_t max_packet_size);
774int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat,
775 loff_t offset);
776
777#endif /* #ifndef ECRYPTFS_KERNEL_H */