crypt_stat 74 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 80 fs/ecryptfs/crypto.c tfm = crypt_stat->hash_tfm; crypt_stat 125 fs/ecryptfs/crypto.c int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 134 fs/ecryptfs/crypto.c ecryptfs_dump_hex(crypt_stat->root_iv, crypt_stat->iv_bytes); crypt_stat 140 fs/ecryptfs/crypto.c memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes); crypt_stat 141 fs/ecryptfs/crypto.c memset((src + crypt_stat->iv_bytes), 0, 16); crypt_stat 142 fs/ecryptfs/crypto.c snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset); crypt_stat 145 fs/ecryptfs/crypto.c ecryptfs_dump_hex(src, (crypt_stat->iv_bytes + 16)); crypt_stat 147 fs/ecryptfs/crypto.c rc = ecryptfs_calculate_md5(dst, crypt_stat, src, crypt_stat 148 fs/ecryptfs/crypto.c (crypt_stat->iv_bytes + 16)); crypt_stat 154 fs/ecryptfs/crypto.c memcpy(iv, dst, crypt_stat->iv_bytes); crypt_stat 157 fs/ecryptfs/crypto.c ecryptfs_dump_hex(iv, crypt_stat->iv_bytes); crypt_stat 169 fs/ecryptfs/crypto.c int ecryptfs_init_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 183 fs/ecryptfs/crypto.c memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat)); crypt_stat 184 fs/ecryptfs/crypto.c INIT_LIST_HEAD(&crypt_stat->keysig_list); crypt_stat 185 fs/ecryptfs/crypto.c mutex_init(&crypt_stat->keysig_list_mutex); crypt_stat 186 fs/ecryptfs/crypto.c mutex_init(&crypt_stat->cs_mutex); crypt_stat 187 fs/ecryptfs/crypto.c mutex_init(&crypt_stat->cs_tfm_mutex); crypt_stat 188 fs/ecryptfs/crypto.c crypt_stat->hash_tfm = tfm; crypt_stat 189 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_STRUCT_INITIALIZED; crypt_stat 200 fs/ecryptfs/crypto.c void ecryptfs_destroy_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 204 fs/ecryptfs/crypto.c crypto_free_skcipher(crypt_stat->tfm); crypt_stat 205 fs/ecryptfs/crypto.c crypto_free_shash(crypt_stat->hash_tfm); crypt_stat 207 fs/ecryptfs/crypto.c &crypt_stat->keysig_list, crypt_stat_list) { crypt_stat 211 fs/ecryptfs/crypto.c memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat)); crypt_stat 305 fs/ecryptfs/crypto.c static int crypt_scatterlist(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 314 fs/ecryptfs/crypto.c if (!crypt_stat || !crypt_stat->tfm crypt_stat 315 fs/ecryptfs/crypto.c || !(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED)) crypt_stat 320 fs/ecryptfs/crypto.c crypt_stat->key_size); crypt_stat 321 fs/ecryptfs/crypto.c ecryptfs_dump_hex(crypt_stat->key, crypt_stat 322 fs/ecryptfs/crypto.c crypt_stat->key_size); crypt_stat 327 fs/ecryptfs/crypto.c mutex_lock(&crypt_stat->cs_tfm_mutex); crypt_stat 328 fs/ecryptfs/crypto.c req = skcipher_request_alloc(crypt_stat->tfm, GFP_NOFS); crypt_stat 330 fs/ecryptfs/crypto.c mutex_unlock(&crypt_stat->cs_tfm_mutex); crypt_stat 339 fs/ecryptfs/crypto.c if (!(crypt_stat->flags & ECRYPTFS_KEY_SET)) { crypt_stat 340 fs/ecryptfs/crypto.c rc = crypto_skcipher_setkey(crypt_stat->tfm, crypt_stat->key, crypt_stat 341 fs/ecryptfs/crypto.c crypt_stat->key_size); crypt_stat 346 fs/ecryptfs/crypto.c mutex_unlock(&crypt_stat->cs_tfm_mutex); crypt_stat 350 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_KEY_SET; crypt_stat 352 fs/ecryptfs/crypto.c mutex_unlock(&crypt_stat->cs_tfm_mutex); crypt_stat 373 fs/ecryptfs/crypto.c static loff_t lower_offset_for_page(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 376 fs/ecryptfs/crypto.c return ecryptfs_lower_header_size(crypt_stat) + crypt_stat 393 fs/ecryptfs/crypto.c static int crypt_extent(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 402 fs/ecryptfs/crypto.c size_t extent_size = crypt_stat->extent_size; crypt_stat 406 fs/ecryptfs/crypto.c rc = ecryptfs_derive_iv(extent_iv, crypt_stat, crypt_stat 423 fs/ecryptfs/crypto.c rc = crypt_scatterlist(crypt_stat, &dst_sg, &src_sg, extent_size, crypt_stat 455 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 463 fs/ecryptfs/crypto.c crypt_stat = crypt_stat 464 fs/ecryptfs/crypto.c &(ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat); crypt_stat 465 fs/ecryptfs/crypto.c BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)); crypt_stat 475 fs/ecryptfs/crypto.c extent_offset < (PAGE_SIZE / crypt_stat->extent_size); crypt_stat 477 fs/ecryptfs/crypto.c rc = crypt_extent(crypt_stat, enc_extent_page, page, crypt_stat 486 fs/ecryptfs/crypto.c lower_offset = lower_offset_for_page(crypt_stat, page); crypt_stat 524 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 531 fs/ecryptfs/crypto.c crypt_stat = crypt_stat 532 fs/ecryptfs/crypto.c &(ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat); crypt_stat 533 fs/ecryptfs/crypto.c BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)); crypt_stat 535 fs/ecryptfs/crypto.c lower_offset = lower_offset_for_page(crypt_stat, page); crypt_stat 548 fs/ecryptfs/crypto.c extent_offset < (PAGE_SIZE / crypt_stat->extent_size); crypt_stat 550 fs/ecryptfs/crypto.c rc = crypt_extent(crypt_stat, page, page, crypt_stat 573 fs/ecryptfs/crypto.c int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 581 fs/ecryptfs/crypto.c crypt_stat->cipher, (int)strlen(crypt_stat->cipher), crypt_stat 582 fs/ecryptfs/crypto.c crypt_stat->key_size << 3); crypt_stat 583 fs/ecryptfs/crypto.c mutex_lock(&crypt_stat->cs_tfm_mutex); crypt_stat 584 fs/ecryptfs/crypto.c if (crypt_stat->tfm) { crypt_stat 589 fs/ecryptfs/crypto.c crypt_stat->cipher, "cbc"); crypt_stat 592 fs/ecryptfs/crypto.c crypt_stat->tfm = crypto_alloc_skcipher(full_alg_name, 0, 0); crypt_stat 593 fs/ecryptfs/crypto.c if (IS_ERR(crypt_stat->tfm)) { crypt_stat 594 fs/ecryptfs/crypto.c rc = PTR_ERR(crypt_stat->tfm); crypt_stat 595 fs/ecryptfs/crypto.c crypt_stat->tfm = NULL; crypt_stat 601 fs/ecryptfs/crypto.c crypto_skcipher_set_flags(crypt_stat->tfm, crypt_stat 607 fs/ecryptfs/crypto.c mutex_unlock(&crypt_stat->cs_tfm_mutex); crypt_stat 611 fs/ecryptfs/crypto.c static void set_extent_mask_and_shift(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 615 fs/ecryptfs/crypto.c crypt_stat->extent_mask = 0xFFFFFFFF; crypt_stat 616 fs/ecryptfs/crypto.c crypt_stat->extent_shift = 0; crypt_stat 617 fs/ecryptfs/crypto.c if (crypt_stat->extent_size == 0) crypt_stat 619 fs/ecryptfs/crypto.c extent_size_tmp = crypt_stat->extent_size; crypt_stat 622 fs/ecryptfs/crypto.c crypt_stat->extent_mask <<= 1; crypt_stat 623 fs/ecryptfs/crypto.c crypt_stat->extent_shift++; crypt_stat 627 fs/ecryptfs/crypto.c void ecryptfs_set_default_sizes(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 631 fs/ecryptfs/crypto.c crypt_stat->extent_size = ECRYPTFS_DEFAULT_EXTENT_SIZE; crypt_stat 632 fs/ecryptfs/crypto.c set_extent_mask_and_shift(crypt_stat); crypt_stat 633 fs/ecryptfs/crypto.c crypt_stat->iv_bytes = ECRYPTFS_DEFAULT_IV_BYTES; crypt_stat 634 fs/ecryptfs/crypto.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) crypt_stat 635 fs/ecryptfs/crypto.c crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; crypt_stat 638 fs/ecryptfs/crypto.c crypt_stat->metadata_size = crypt_stat 641 fs/ecryptfs/crypto.c crypt_stat->metadata_size = PAGE_SIZE; crypt_stat 651 fs/ecryptfs/crypto.c int ecryptfs_compute_root_iv(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 656 fs/ecryptfs/crypto.c BUG_ON(crypt_stat->iv_bytes > MD5_DIGEST_SIZE); crypt_stat 657 fs/ecryptfs/crypto.c BUG_ON(crypt_stat->iv_bytes <= 0); crypt_stat 658 fs/ecryptfs/crypto.c if (!(crypt_stat->flags & ECRYPTFS_KEY_VALID)) { crypt_stat 664 fs/ecryptfs/crypto.c rc = ecryptfs_calculate_md5(dst, crypt_stat, crypt_stat->key, crypt_stat 665 fs/ecryptfs/crypto.c crypt_stat->key_size); crypt_stat 671 fs/ecryptfs/crypto.c memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes); crypt_stat 674 fs/ecryptfs/crypto.c memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes); crypt_stat 675 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_SECURITY_WARNING; crypt_stat 680 fs/ecryptfs/crypto.c static void ecryptfs_generate_new_key(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 682 fs/ecryptfs/crypto.c get_random_bytes(crypt_stat->key, crypt_stat->key_size); crypt_stat 683 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_KEY_VALID; crypt_stat 684 fs/ecryptfs/crypto.c ecryptfs_compute_root_iv(crypt_stat); crypt_stat 687 fs/ecryptfs/crypto.c ecryptfs_dump_hex(crypt_stat->key, crypt_stat 688 fs/ecryptfs/crypto.c crypt_stat->key_size); crypt_stat 701 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 705 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR; crypt_stat 707 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_VIEW_AS_ENCRYPTED; crypt_stat 709 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_ENCRYPT_FILENAMES; crypt_stat 712 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_ENCFN_USE_MOUNT_FNEK; crypt_stat 715 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_ENCFN_USE_FEK; crypt_stat 720 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 726 fs/ecryptfs/crypto.c mutex_lock(&crypt_stat->keysig_list_mutex); crypt_stat 734 fs/ecryptfs/crypto.c rc = ecryptfs_add_keysig(crypt_stat, global_auth_tok->sig); crypt_stat 743 fs/ecryptfs/crypto.c mutex_unlock(&crypt_stat->keysig_list_mutex); crypt_stat 755 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 758 fs/ecryptfs/crypto.c ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat, crypt_stat 760 fs/ecryptfs/crypto.c ecryptfs_set_default_sizes(crypt_stat); crypt_stat 761 fs/ecryptfs/crypto.c strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); crypt_stat 762 fs/ecryptfs/crypto.c crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; crypt_stat 763 fs/ecryptfs/crypto.c crypt_stat->flags &= ~(ECRYPTFS_KEY_VALID); crypt_stat 764 fs/ecryptfs/crypto.c crypt_stat->file_version = ECRYPTFS_FILE_VERSION; crypt_stat 765 fs/ecryptfs/crypto.c crypt_stat->mount_crypt_stat = mount_crypt_stat; crypt_stat 789 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 790 fs/ecryptfs/crypto.c &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 797 fs/ecryptfs/crypto.c ecryptfs_set_default_crypt_stat_vals(crypt_stat, mount_crypt_stat); crypt_stat 798 fs/ecryptfs/crypto.c crypt_stat->flags |= (ECRYPTFS_ENCRYPTED | ECRYPTFS_KEY_VALID); crypt_stat 799 fs/ecryptfs/crypto.c ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat, crypt_stat 801 fs/ecryptfs/crypto.c rc = ecryptfs_copy_mount_wide_sigs_to_inode_sigs(crypt_stat, crypt_stat 810 fs/ecryptfs/crypto.c memcpy(crypt_stat->cipher, crypt_stat 813 fs/ecryptfs/crypto.c crypt_stat->cipher[cipher_name_len] = '\0'; crypt_stat 814 fs/ecryptfs/crypto.c crypt_stat->key_size = crypt_stat 816 fs/ecryptfs/crypto.c ecryptfs_generate_new_key(crypt_stat); crypt_stat 817 fs/ecryptfs/crypto.c rc = ecryptfs_init_crypt_ctx(crypt_stat); crypt_stat 821 fs/ecryptfs/crypto.c crypt_stat->cipher, rc); crypt_stat 867 fs/ecryptfs/crypto.c static void ecryptfs_process_flags(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 876 fs/ecryptfs/crypto.c crypt_stat->flags |= ecryptfs_flag_map[i].local_flag; crypt_stat 878 fs/ecryptfs/crypto.c crypt_stat->flags &= ~(ecryptfs_flag_map[i].local_flag); crypt_stat 880 fs/ecryptfs/crypto.c crypt_stat->file_version = ((flags >> 24) & 0xFF); crypt_stat 904 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 911 fs/ecryptfs/crypto.c if (crypt_stat->flags & ecryptfs_flag_map[i].local_flag) crypt_stat 914 fs/ecryptfs/crypto.c flags |= ((((u8)crypt_stat->file_version) << 24) & 0xFF000000); crypt_stat 1018 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1024 fs/ecryptfs/crypto.c header_extent_size = (u32)crypt_stat->extent_size; crypt_stat 1026 fs/ecryptfs/crypto.c (u16)(crypt_stat->metadata_size / crypt_stat->extent_size); crypt_stat 1068 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1078 fs/ecryptfs/crypto.c ecryptfs_write_crypt_stat_flags((page_virt + offset), crypt_stat, crypt_stat 1081 fs/ecryptfs/crypto.c ecryptfs_write_header_metadata((page_virt + offset), crypt_stat, crypt_stat 1084 fs/ecryptfs/crypto.c rc = ecryptfs_generate_key_packet_set((page_virt + offset), crypt_stat, crypt_stat 1164 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 1165 fs/ecryptfs/crypto.c &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 1172 fs/ecryptfs/crypto.c if (likely(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { crypt_stat 1173 fs/ecryptfs/crypto.c if (!(crypt_stat->flags & ECRYPTFS_KEY_VALID)) { crypt_stat 1184 fs/ecryptfs/crypto.c virt_len = crypt_stat->metadata_size; crypt_stat 1194 fs/ecryptfs/crypto.c rc = ecryptfs_write_headers_virt(virt, virt_len, &size, crypt_stat, crypt_stat 1201 fs/ecryptfs/crypto.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) crypt_stat 1220 fs/ecryptfs/crypto.c static int parse_header_metadata(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1231 fs/ecryptfs/crypto.c crypt_stat->metadata_size = (((size_t)num_header_extents_at_front crypt_stat 1235 fs/ecryptfs/crypto.c && (crypt_stat->metadata_size crypt_stat 1239 fs/ecryptfs/crypto.c crypt_stat->metadata_size); crypt_stat 1252 fs/ecryptfs/crypto.c static void set_default_header_data(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 1254 fs/ecryptfs/crypto.c crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; crypt_stat 1260 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 1263 fs/ecryptfs/crypto.c crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; crypt_stat 1268 fs/ecryptfs/crypto.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) crypt_stat 1269 fs/ecryptfs/crypto.c file_size += crypt_stat->metadata_size; crypt_stat 1273 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_I_SIZE_INITIALIZED; crypt_stat 1289 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1297 fs/ecryptfs/crypto.c ecryptfs_set_default_sizes(crypt_stat); crypt_stat 1298 fs/ecryptfs/crypto.c crypt_stat->mount_crypt_stat = &ecryptfs_superblock_to_private( crypt_stat 1304 fs/ecryptfs/crypto.c if (!(crypt_stat->flags & ECRYPTFS_I_SIZE_INITIALIZED)) crypt_stat 1307 fs/ecryptfs/crypto.c ecryptfs_process_flags(crypt_stat, (page_virt + offset), &bytes_read); crypt_stat 1308 fs/ecryptfs/crypto.c if (crypt_stat->file_version > ECRYPTFS_SUPPORTED_FILE_VERSION) { crypt_stat 1312 fs/ecryptfs/crypto.c crypt_stat->file_version, crypt_stat 1318 fs/ecryptfs/crypto.c if (crypt_stat->file_version >= 1) { crypt_stat 1319 fs/ecryptfs/crypto.c rc = parse_header_metadata(crypt_stat, (page_virt + offset), crypt_stat 1327 fs/ecryptfs/crypto.c set_default_header_data(crypt_stat); crypt_stat 1328 fs/ecryptfs/crypto.c rc = ecryptfs_parse_packet_set(crypt_stat, (page_virt + offset), crypt_stat 1405 fs/ecryptfs/crypto.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 1406 fs/ecryptfs/crypto.c &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 1411 fs/ecryptfs/crypto.c ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat, crypt_stat 1419 fs/ecryptfs/crypto.c rc = ecryptfs_read_lower(page_virt, 0, crypt_stat->extent_size, crypt_stat 1422 fs/ecryptfs/crypto.c rc = ecryptfs_read_headers_virt(page_virt, crypt_stat, crypt_stat 1436 fs/ecryptfs/crypto.c rc = ecryptfs_read_headers_virt(page_virt, crypt_stat, crypt_stat 1445 fs/ecryptfs/crypto.c if (crypt_stat->mount_crypt_stat->flags crypt_stat 1447 fs/ecryptfs/crypto.c crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR; crypt_stat 258 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat crypt_stat; crypt_stat 266 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 360 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 424 fs/ecryptfs/ecryptfs_kernel.h ecryptfs_lower_header_size(struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 426 fs/ecryptfs/ecryptfs_kernel.h if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) crypt_stat 428 fs/ecryptfs/ecryptfs_kernel.h return crypt_stat->metadata_size; crypt_stat 579 fs/ecryptfs/ecryptfs_kernel.h int ecryptfs_compute_root_iv(struct ecryptfs_crypt_stat *crypt_stat); crypt_stat 581 fs/ecryptfs/ecryptfs_kernel.h int ecryptfs_init_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat); crypt_stat 582 fs/ecryptfs/ecryptfs_kernel.h void ecryptfs_destroy_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat); crypt_stat 585 fs/ecryptfs/ecryptfs_kernel.h int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat); crypt_stat 594 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 601 fs/ecryptfs/ecryptfs_kernel.h void ecryptfs_set_default_sizes(struct ecryptfs_crypt_stat *crypt_stat); crypt_stat 603 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 607 fs/ecryptfs/ecryptfs_kernel.h ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 647 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 649 fs/ecryptfs/ecryptfs_kernel.h int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig); crypt_stat 717 fs/ecryptfs/ecryptfs_kernel.h int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 131 fs/ecryptfs/file.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 134 fs/ecryptfs/file.c crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; crypt_stat 137 fs/ecryptfs/file.c mutex_lock(&crypt_stat->cs_mutex); crypt_stat 139 fs/ecryptfs/file.c if (crypt_stat->flags & ECRYPTFS_POLICY_APPLIED && crypt_stat 140 fs/ecryptfs/file.c crypt_stat->flags & ECRYPTFS_KEY_VALID) { crypt_stat 150 fs/ecryptfs/file.c crypt_stat->flags &= ~(ECRYPTFS_I_SIZE_INITIALIZED crypt_stat 165 fs/ecryptfs/file.c mutex_unlock(&crypt_stat->cs_mutex); crypt_stat 194 fs/ecryptfs/file.c struct ecryptfs_crypt_stat *crypt_stat = NULL; crypt_stat 209 fs/ecryptfs/file.c crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; crypt_stat 210 fs/ecryptfs/file.c mutex_lock(&crypt_stat->cs_mutex); crypt_stat 211 fs/ecryptfs/file.c if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED)) { crypt_stat 214 fs/ecryptfs/file.c crypt_stat->flags |= (ECRYPTFS_POLICY_APPLIED crypt_stat 217 fs/ecryptfs/file.c mutex_unlock(&crypt_stat->cs_mutex); crypt_stat 214 fs/ecryptfs/inode.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 215 fs/ecryptfs/inode.c &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 220 fs/ecryptfs/inode.c crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED); crypt_stat 287 fs/ecryptfs/inode.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 299 fs/ecryptfs/inode.c crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; crypt_stat 301 fs/ecryptfs/inode.c if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED)) crypt_stat 302 fs/ecryptfs/inode.c ecryptfs_set_default_sizes(crypt_stat); crypt_stat 309 fs/ecryptfs/inode.c crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR; crypt_stat 692 fs/ecryptfs/inode.c upper_size_to_lower_size(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 697 fs/ecryptfs/inode.c lower_size = ecryptfs_lower_header_size(crypt_stat); crypt_stat 701 fs/ecryptfs/inode.c num_extents = upper_size >> crypt_stat->extent_shift; crypt_stat 702 fs/ecryptfs/inode.c if (upper_size & ~crypt_stat->extent_mask) crypt_stat 704 fs/ecryptfs/inode.c lower_size += (num_extents * crypt_stat->extent_size); crypt_stat 730 fs/ecryptfs/inode.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 742 fs/ecryptfs/inode.c crypt_stat = &ecryptfs_inode_to_private(d_inode(dentry))->crypt_stat; crypt_stat 762 fs/ecryptfs/inode.c if (!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { crypt_stat 797 fs/ecryptfs/inode.c upper_size_to_lower_size(crypt_stat, i_size); crypt_stat 799 fs/ecryptfs/inode.c upper_size_to_lower_size(crypt_stat, ia->ia_size); crypt_stat 813 fs/ecryptfs/inode.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 816 fs/ecryptfs/inode.c crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; crypt_stat 817 fs/ecryptfs/inode.c lower_oldsize = upper_size_to_lower_size(crypt_stat, crypt_stat 819 fs/ecryptfs/inode.c lower_newsize = upper_size_to_lower_size(crypt_stat, offset); crypt_stat 889 fs/ecryptfs/inode.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 891 fs/ecryptfs/inode.c crypt_stat = &ecryptfs_inode_to_private(d_inode(dentry))->crypt_stat; crypt_stat 892 fs/ecryptfs/inode.c if (!(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED)) { crypt_stat 893 fs/ecryptfs/inode.c rc = ecryptfs_init_crypt_stat(crypt_stat); crypt_stat 900 fs/ecryptfs/inode.c mutex_lock(&crypt_stat->cs_mutex); crypt_stat 902 fs/ecryptfs/inode.c crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED); crypt_stat 904 fs/ecryptfs/inode.c && (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED) crypt_stat 905 fs/ecryptfs/inode.c || !(crypt_stat->flags & ECRYPTFS_KEY_VALID))) { crypt_stat 912 fs/ecryptfs/inode.c mutex_unlock(&crypt_stat->cs_mutex); crypt_stat 926 fs/ecryptfs/inode.c mutex_unlock(&crypt_stat->cs_mutex); crypt_stat 930 fs/ecryptfs/inode.c crypt_stat->flags &= ~(ECRYPTFS_I_SIZE_INITIALIZED crypt_stat 934 fs/ecryptfs/inode.c mutex_unlock(&crypt_stat->cs_mutex); crypt_stat 286 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat, char **packet, crypt_stat 305 fs/ecryptfs/keystore.c data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); crypt_stat 325 fs/ecryptfs/keystore.c rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, crypt_stat 334 fs/ecryptfs/keystore.c memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); crypt_stat 335 fs/ecryptfs/keystore.c i += crypt_stat->key_size; crypt_stat 336 fs/ecryptfs/keystore.c for (j = 0; j < crypt_stat->key_size; j++) crypt_stat 337 fs/ecryptfs/keystore.c checksum += crypt_stat->key[j]; crypt_stat 1126 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 1169 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, crypt_stat 1171 fs/ecryptfs/keystore.c crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; crypt_stat 1172 fs/ecryptfs/keystore.c rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); crypt_stat 1178 fs/ecryptfs/keystore.c crypt_stat->flags |= ECRYPTFS_KEY_VALID; crypt_stat 1181 fs/ecryptfs/keystore.c ecryptfs_dump_hex(crypt_stat->key, crypt_stat 1182 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 1223 fs/ecryptfs/keystore.c parse_tag_1_packet(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1355 fs/ecryptfs/keystore.c parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1437 fs/ecryptfs/keystore.c rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, crypt_stat 1445 fs/ecryptfs/keystore.c crypt_stat->key_size = 24; crypt_stat 1448 fs/ecryptfs/keystore.c crypt_stat->key_size = crypt_stat 1451 fs/ecryptfs/keystore.c rc = ecryptfs_init_crypt_ctx(crypt_stat); crypt_stat 1646 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 1664 fs/ecryptfs/keystore.c crypt_stat->cipher); crypt_stat 1668 fs/ecryptfs/keystore.c crypt_stat->cipher, rc); crypt_stat 1708 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 1725 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, crypt_stat 1727 fs/ecryptfs/keystore.c crypt_stat->flags |= ECRYPTFS_KEY_VALID; crypt_stat 1730 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 1731 fs/ecryptfs/keystore.c ecryptfs_dump_hex(crypt_stat->key, crypt_stat 1732 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 1752 fs/ecryptfs/keystore.c int ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1781 fs/ecryptfs/keystore.c rc = parse_tag_3_packet(crypt_stat, crypt_stat 1822 fs/ecryptfs/keystore.c crypt_stat->flags |= ECRYPTFS_ENCRYPTED; crypt_stat 1825 fs/ecryptfs/keystore.c rc = parse_tag_1_packet(crypt_stat, crypt_stat 1836 fs/ecryptfs/keystore.c crypt_stat->flags |= ECRYPTFS_ENCRYPTED; crypt_stat 1883 fs/ecryptfs/keystore.c crypt_stat->mount_crypt_stat, crypt_stat 1904 fs/ecryptfs/keystore.c crypt_stat); crypt_stat 1912 fs/ecryptfs/keystore.c candidate_auth_tok, crypt_stat); crypt_stat 1941 fs/ecryptfs/keystore.c rc = ecryptfs_compute_root_iv(crypt_stat); crypt_stat 1947 fs/ecryptfs/keystore.c rc = ecryptfs_init_crypt_ctx(crypt_stat); crypt_stat 1951 fs/ecryptfs/keystore.c crypt_stat->cipher, rc); crypt_stat 1962 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 1973 fs/ecryptfs/keystore.c crypt_stat->cipher, crypt_stat 1974 fs/ecryptfs/keystore.c crypt_stat->key_size), crypt_stat 1975 fs/ecryptfs/keystore.c crypt_stat, &payload, &payload_len); crypt_stat 2020 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 2033 fs/ecryptfs/keystore.c for (i = 0; i < crypt_stat->key_size; i++) crypt_stat 2047 fs/ecryptfs/keystore.c rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat, crypt_stat 2175 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 2188 fs/ecryptfs/keystore.c crypt_stat->mount_crypt_stat; crypt_stat 2197 fs/ecryptfs/keystore.c crypt_stat->cipher); crypt_stat 2201 fs/ecryptfs/keystore.c crypt_stat->cipher, rc); crypt_stat 2211 fs/ecryptfs/keystore.c if (crypt_stat->key_size == 0) crypt_stat 2212 fs/ecryptfs/keystore.c crypt_stat->key_size = crypt_stat 2216 fs/ecryptfs/keystore.c crypt_stat->key_size; crypt_stat 2217 fs/ecryptfs/keystore.c if (crypt_stat->key_size == 24 crypt_stat 2218 fs/ecryptfs/keystore.c && strcmp("aes", crypt_stat->cipher) == 0) { crypt_stat 2219 fs/ecryptfs/keystore.c memset((crypt_stat->key + 24), 0, 8); crypt_stat 2222 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = crypt_stat->key_size; crypt_stat 2247 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 2257 fs/ecryptfs/keystore.c rc = virt_to_scatterlist(crypt_stat->key, key_rec->enc_key_size, crypt_stat 2280 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 2303 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 2354 fs/ecryptfs/keystore.c cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, crypt_stat 2355 fs/ecryptfs/keystore.c crypt_stat->key_size); crypt_stat 2358 fs/ecryptfs/keystore.c "cipher [%s]\n", crypt_stat->cipher); crypt_stat 2399 fs/ecryptfs/keystore.c struct ecryptfs_crypt_stat *crypt_stat, crypt_stat 2414 fs/ecryptfs/keystore.c mutex_lock(&crypt_stat->keysig_list_mutex); crypt_stat 2420 fs/ecryptfs/keystore.c list_for_each_entry(key_sig, &crypt_stat->keysig_list, crypt_stat 2436 fs/ecryptfs/keystore.c crypt_stat, key_rec, crypt_stat 2459 fs/ecryptfs/keystore.c crypt_stat, key_rec, &written); crypt_stat 2486 fs/ecryptfs/keystore.c mutex_unlock(&crypt_stat->keysig_list_mutex); crypt_stat 2492 fs/ecryptfs/keystore.c int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig) crypt_stat 2503 fs/ecryptfs/keystore.c list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list); crypt_stat 69 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 71 fs/ecryptfs/mmap.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) { crypt_stat 74 fs/ecryptfs/mmap.c crypt_stat->flags &= ~ECRYPTFS_METADATA_IN_XATTR; crypt_stat 75 fs/ecryptfs/mmap.c ecryptfs_write_crypt_stat_flags(page_virt, crypt_stat, crypt_stat 77 fs/ecryptfs/mmap.c crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR; crypt_stat 109 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat) crypt_stat 113 fs/ecryptfs/mmap.c / crypt_stat->extent_size); crypt_stat 121 fs/ecryptfs/mmap.c (crypt_stat->metadata_size / crypt_stat->extent_size); crypt_stat 135 fs/ecryptfs/mmap.c strip_xattr_flag(page_virt + 16, crypt_stat); crypt_stat 137 fs/ecryptfs/mmap.c crypt_stat, crypt_stat 150 fs/ecryptfs/mmap.c ((view_extent_num * crypt_stat->extent_size) crypt_stat 151 fs/ecryptfs/mmap.c - crypt_stat->metadata_size); crypt_stat 156 fs/ecryptfs/mmap.c crypt_stat->extent_size, page->mapping->host); crypt_stat 182 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 183 fs/ecryptfs/mmap.c &ecryptfs_inode_to_private(page->mapping->host)->crypt_stat; crypt_stat 186 fs/ecryptfs/mmap.c if (!crypt_stat || !(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { crypt_stat 190 fs/ecryptfs/mmap.c } else if (crypt_stat->flags & ECRYPTFS_VIEW_AS_ENCRYPTED) { crypt_stat 191 fs/ecryptfs/mmap.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) { crypt_stat 193 fs/ecryptfs/mmap.c crypt_stat); crypt_stat 281 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 282 fs/ecryptfs/mmap.c &ecryptfs_inode_to_private(mapping->host)->crypt_stat; crypt_stat 284 fs/ecryptfs/mmap.c if (!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { crypt_stat 295 fs/ecryptfs/mmap.c } else if (crypt_stat->flags & ECRYPTFS_VIEW_AS_ENCRYPTED) { crypt_stat 296 fs/ecryptfs/mmap.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) { crypt_stat 298 fs/ecryptfs/mmap.c page, crypt_stat); crypt_stat 442 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 444 fs/ecryptfs/mmap.c crypt_stat = &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 445 fs/ecryptfs/mmap.c BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)); crypt_stat 446 fs/ecryptfs/mmap.c if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) crypt_stat 471 fs/ecryptfs/mmap.c struct ecryptfs_crypt_stat *crypt_stat = crypt_stat 472 fs/ecryptfs/mmap.c &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 477 fs/ecryptfs/mmap.c if (!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { crypt_stat 97 fs/ecryptfs/read_write.c struct ecryptfs_crypt_stat *crypt_stat; crypt_stat 104 fs/ecryptfs/read_write.c crypt_stat = &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; crypt_stat 170 fs/ecryptfs/read_write.c if (crypt_stat->flags & ECRYPTFS_ENCRYPTED) crypt_stat 187 fs/ecryptfs/read_write.c if (crypt_stat->flags & ECRYPTFS_ENCRYPTED) { crypt_stat 44 fs/ecryptfs/super.c if (ecryptfs_init_crypt_stat(&inode_info->crypt_stat)) { crypt_stat 79 fs/ecryptfs/super.c ecryptfs_destroy_crypt_stat(&inode_info->crypt_stat);