diff options
author | Michael Halcrow <mhalcrow@us.ibm.com> | 2007-02-12 03:53:47 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@woody.linux-foundation.org> | 2007-02-12 12:48:36 -0500 |
commit | e77a56ddceeec87575a13a60fc1a394af6a1f4bc (patch) | |
tree | 8be21cc4afbc0596716bc9d4d8dd145dd8c74252 /fs/ecryptfs/ecryptfs_kernel.h | |
parent | dd2a3b7ad98f8482cae481cad89dfed5eee48365 (diff) |
[PATCH] eCryptfs: Encrypted passthrough
Provide an option to provide a view of the encrypted files such that the
metadata is always in the header of the files, regardless of whether the
metadata is actually in the header or in the extended attribute. This mode of
operation is useful for applications like incremental backup utilities that do
not preserve the extended attributes when directly accessing the lower files.
With this option enabled, the files under the eCryptfs mount point will be
read-only.
Signed-off-by: Michael Halcrow <mhalcrow@us.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'fs/ecryptfs/ecryptfs_kernel.h')
-rw-r--r-- | fs/ecryptfs/ecryptfs_kernel.h | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/fs/ecryptfs/ecryptfs_kernel.h b/fs/ecryptfs/ecryptfs_kernel.h index 020abcd16f0e..ec526df4235e 100644 --- a/fs/ecryptfs/ecryptfs_kernel.h +++ b/fs/ecryptfs/ecryptfs_kernel.h | |||
@@ -559,7 +559,7 @@ ssize_t ecryptfs_getxattr(struct dentry *dentry, const char *name, void *value, | |||
559 | int | 559 | int |
560 | ecryptfs_setxattr(struct dentry *dentry, const char *name, const void *value, | 560 | ecryptfs_setxattr(struct dentry *dentry, const char *name, const void *value, |
561 | size_t size, int flags); | 561 | size_t size, int flags); |
562 | 562 | int ecryptfs_read_xattr_region(char *page_virt, struct dentry *ecryptfs_dentry); | |
563 | int ecryptfs_process_helo(unsigned int transport, uid_t uid, pid_t pid); | 563 | int ecryptfs_process_helo(unsigned int transport, uid_t uid, pid_t pid); |
564 | int ecryptfs_process_quit(uid_t uid, pid_t pid); | 564 | int ecryptfs_process_quit(uid_t uid, pid_t pid); |
565 | int ecryptfs_process_response(struct ecryptfs_message *msg, uid_t uid, | 565 | int ecryptfs_process_response(struct ecryptfs_message *msg, uid_t uid, |
@@ -582,6 +582,9 @@ int ecryptfs_send_connector(char *data, int data_len, | |||
582 | u16 msg_flags, pid_t daemon_pid); | 582 | u16 msg_flags, pid_t daemon_pid); |
583 | int ecryptfs_init_connector(void); | 583 | int ecryptfs_init_connector(void); |
584 | void ecryptfs_release_connector(void); | 584 | void ecryptfs_release_connector(void); |
585 | 585 | void | |
586 | ecryptfs_write_header_metadata(char *virt, | ||
587 | struct ecryptfs_crypt_stat *crypt_stat, | ||
588 | size_t *written); | ||
586 | 589 | ||
587 | #endif /* #ifndef ECRYPTFS_KERNEL_H */ | 590 | #endif /* #ifndef ECRYPTFS_KERNEL_H */ |