forked from luck/tmp_suning_uos_patched
79a73d1887
The 'encrypted' key type defines its own payload format which contains a symmetric key randomly generated that cannot be used directly to mount an eCryptfs filesystem, because it expects an authentication token structure. This patch introduces the new format 'ecryptfs' that allows to store an authentication token structure inside the encrypted key payload containing a randomly generated symmetric key, as the same for the format 'default'. More details about the usage of encrypted keys with the eCryptfs filesystem can be found in the file 'Documentation/keys-ecryptfs.txt'. Signed-off-by: Roberto Sassu <roberto.sassu@polito.it> Acked-by: Gianluca Ramunno <ramunno@polito.it> Acked-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
21 lines
383 B
Makefile
21 lines
383 B
Makefile
#
|
|
# Makefile for key management
|
|
#
|
|
|
|
obj-y := \
|
|
gc.o \
|
|
key.o \
|
|
keyring.o \
|
|
keyctl.o \
|
|
permission.o \
|
|
process_keys.o \
|
|
request_key.o \
|
|
request_key_auth.o \
|
|
user_defined.o
|
|
|
|
obj-$(CONFIG_TRUSTED_KEYS) += trusted.o
|
|
obj-$(CONFIG_ENCRYPTED_KEYS) += ecryptfs_format.o encrypted.o
|
|
obj-$(CONFIG_KEYS_COMPAT) += compat.o
|
|
obj-$(CONFIG_PROC_FS) += proc.o
|
|
obj-$(CONFIG_SYSCTL) += sysctl.o
|