keystore.c (cf35ca69131d5fc8febb74629d173e0731bf49c0) | keystore.c (7762e230fd31fcc1abc03ba32ee957fadc8eafb4) |
---|---|
1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * In-kernel key management code. Includes functions to parse and 4 * write authentication token-related packets with the underlying 5 * file. 6 * 7 * Copyright (C) 2004-2006 International Business Machines Corp. 8 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com> --- 2411 unchanged lines hidden (view full) --- 2420 2421 new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL); 2422 if (!new_key_sig) { 2423 printk(KERN_ERR 2424 "Error allocating from ecryptfs_key_sig_cache\n"); 2425 return -ENOMEM; 2426 } 2427 memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX); | 1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * In-kernel key management code. Includes functions to parse and 4 * write authentication token-related packets with the underlying 5 * file. 6 * 7 * Copyright (C) 2004-2006 International Business Machines Corp. 8 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com> --- 2411 unchanged lines hidden (view full) --- 2420 2421 new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL); 2422 if (!new_key_sig) { 2423 printk(KERN_ERR 2424 "Error allocating from ecryptfs_key_sig_cache\n"); 2425 return -ENOMEM; 2426 } 2427 memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX); |
2428 new_key_sig->keysig[ECRYPTFS_SIG_SIZE_HEX] = '\0'; |
|
2428 /* Caller must hold keysig_list_mutex */ 2429 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list); 2430 2431 return 0; 2432} 2433 2434struct kmem_cache *ecryptfs_global_auth_tok_cache; 2435 --- 26 unchanged lines hidden --- | 2429 /* Caller must hold keysig_list_mutex */ 2430 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list); 2431 2432 return 0; 2433} 2434 2435struct kmem_cache *ecryptfs_global_auth_tok_cache; 2436 --- 26 unchanged lines hidden --- |