keystore.c (cf35ca69131d5fc8febb74629d173e0731bf49c0) keystore.c (7762e230fd31fcc1abc03ba32ee957fadc8eafb4)
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 * In-kernel key management code. Includes functions to parse and
4 * write authentication token-related packets with the underlying
5 * file.
6 *
7 * Copyright (C) 2004-2006 International Business Machines Corp.
8 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com>

--- 2411 unchanged lines hidden (view full) ---

2420
2421 new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL);
2422 if (!new_key_sig) {
2423 printk(KERN_ERR
2424 "Error allocating from ecryptfs_key_sig_cache\n");
2425 return -ENOMEM;
2426 }
2427 memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX);
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 * In-kernel key management code. Includes functions to parse and
4 * write authentication token-related packets with the underlying
5 * file.
6 *
7 * Copyright (C) 2004-2006 International Business Machines Corp.
8 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com>

--- 2411 unchanged lines hidden (view full) ---

2420
2421 new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL);
2422 if (!new_key_sig) {
2423 printk(KERN_ERR
2424 "Error allocating from ecryptfs_key_sig_cache\n");
2425 return -ENOMEM;
2426 }
2427 memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX);
2428 new_key_sig->keysig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
2428 /* Caller must hold keysig_list_mutex */
2429 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list);
2430
2431 return 0;
2432}
2433
2434struct kmem_cache *ecryptfs_global_auth_tok_cache;
2435

--- 26 unchanged lines hidden ---
2429 /* Caller must hold keysig_list_mutex */
2430 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list);
2431
2432 return 0;
2433}
2434
2435struct kmem_cache *ecryptfs_global_auth_tok_cache;
2436

--- 26 unchanged lines hidden ---