ecryptfs_kernel.h (b32e3dc7860d00124fa432dba09667e647cb9bcc) | ecryptfs_kernel.h (332ab16f830f59e7621ae8eb2c353dc135a316f6) |
---|---|
1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * Kernel declarations. 4 * 5 * Copyright (C) 1997-2003 Erez Zadok 6 * Copyright (C) 2001-2003 Stony Brook University 7 * Copyright (C) 2004-2008 International Business Machines Corp. 8 * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com> --- 281 unchanged lines hidden (view full) --- 290 struct mutex cs_hash_tfm_mutex; 291 struct mutex cs_mutex; 292}; 293 294/* inode private data. */ 295struct ecryptfs_inode_info { 296 struct inode vfs_inode; 297 struct inode *wii_inode; | 1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * Kernel declarations. 4 * 5 * Copyright (C) 1997-2003 Erez Zadok 6 * Copyright (C) 2001-2003 Stony Brook University 7 * Copyright (C) 2004-2008 International Business Machines Corp. 8 * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com> --- 281 unchanged lines hidden (view full) --- 290 struct mutex cs_hash_tfm_mutex; 291 struct mutex cs_mutex; 292}; 293 294/* inode private data. */ 295struct ecryptfs_inode_info { 296 struct inode vfs_inode; 297 struct inode *wii_inode; |
298 struct mutex lower_file_mutex; 299 atomic_t lower_file_count; |
|
298 struct file *lower_file; 299 struct ecryptfs_crypt_stat crypt_stat; 300}; 301 302/* dentry private data. Each dentry must keep track of a lower 303 * vfsmount too. */ 304struct ecryptfs_dentry_info { 305 struct path lower_path; --- 446 unchanged lines hidden (view full) --- 752ecryptfs_spawn_daemon(struct ecryptfs_daemon **daemon, uid_t euid, 753 struct user_namespace *user_ns, struct pid *pid); 754int ecryptfs_init_kthread(void); 755void ecryptfs_destroy_kthread(void); 756int ecryptfs_privileged_open(struct file **lower_file, 757 struct dentry *lower_dentry, 758 struct vfsmount *lower_mnt, 759 const struct cred *cred); | 300 struct file *lower_file; 301 struct ecryptfs_crypt_stat crypt_stat; 302}; 303 304/* dentry private data. Each dentry must keep track of a lower 305 * vfsmount too. */ 306struct ecryptfs_dentry_info { 307 struct path lower_path; --- 446 unchanged lines hidden (view full) --- 754ecryptfs_spawn_daemon(struct ecryptfs_daemon **daemon, uid_t euid, 755 struct user_namespace *user_ns, struct pid *pid); 756int ecryptfs_init_kthread(void); 757void ecryptfs_destroy_kthread(void); 758int ecryptfs_privileged_open(struct file **lower_file, 759 struct dentry *lower_dentry, 760 struct vfsmount *lower_mnt, 761 const struct cred *cred); |
760int ecryptfs_init_persistent_file(struct dentry *ecryptfs_dentry); | 762int ecryptfs_get_lower_file(struct dentry *ecryptfs_dentry); 763void ecryptfs_put_lower_file(struct inode *inode); |
761int 762ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, 763 size_t *packet_size, 764 struct ecryptfs_mount_crypt_stat *mount_crypt_stat, 765 char *filename, size_t filename_size); 766int 767ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, 768 size_t *packet_size, 769 struct ecryptfs_mount_crypt_stat *mount_crypt_stat, 770 char *data, size_t max_packet_size); 771int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, 772 loff_t offset); 773 774#endif /* #ifndef ECRYPTFS_KERNEL_H */ | 764int 765ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, 766 size_t *packet_size, 767 struct ecryptfs_mount_crypt_stat *mount_crypt_stat, 768 char *filename, size_t filename_size); 769int 770ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, 771 size_t *packet_size, 772 struct ecryptfs_mount_crypt_stat *mount_crypt_stat, 773 char *data, size_t max_packet_size); 774int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, 775 loff_t offset); 776 777#endif /* #ifndef ECRYPTFS_KERNEL_H */ |