diff options
| author | Michael Halcrow <mhalcrow@google.com> | 2015-04-14 20:44:49 -0400 |
|---|---|---|
| committer | Mister Oyster <oysterized@gmail.com> | 2017-05-27 19:39:56 +0200 |
| commit | 28ab783858b0b1d17af12fba33dae72e94c3d099 (patch) | |
| tree | 8a65284c2576fabce64894241a3741b776f3b628 /include/linux | |
| parent | 5cf953d5eb04cd958cbd7ae5e2530dd15fe1e3aa (diff) | |
ext4 crypto: add ext4 encryption facilities
On encrypt, we will re-assign the buffer_heads to point to a bounce
page rather than the control_page (which is the original page to write
that contains the plaintext). The block I/O occurs against the bounce
page. On write completion, we re-assign the buffer_heads to the
original plaintext page.
On decrypt, we will attach a read completion callback to the bio
struct. This read completion will decrypt the read contents in-place
prior to setting the page up-to-date.
The current encryption mode, AES-256-XTS, lacks cryptographic
integrity. AES-256-GCM is in-plan, but we will need to devise a
mechanism for handling the integrity data.
Change-Id: I6e0569c9f19a82c75f4b545ad04ff7fdd1908d74
Signed-off-by: Michael Halcrow <mhalcrow@google.com>
Signed-off-by: Ildar Muslukhov <ildarm@google.com>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Signed-off-by: Theodore Ts'o <tytso@google.com>
Diffstat (limited to 'include/linux')
0 files changed, 0 insertions, 0 deletions
