|
@@ -417,17 +417,6 @@ static int ecryptfs_encrypt_extent(struct page *enc_extent_page,
|
|
(unsigned long long)(extent_base + extent_offset), rc);
|
|
(unsigned long long)(extent_base + extent_offset), rc);
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
- if (unlikely(ecryptfs_verbosity > 0)) {
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "Encrypting extent "
|
|
|
|
- "with iv:\n");
|
|
|
|
- ecryptfs_dump_hex(extent_iv, crypt_stat->iv_bytes);
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "First 8 bytes before "
|
|
|
|
- "encryption:\n");
|
|
|
|
- ecryptfs_dump_hex((char *)
|
|
|
|
- (page_address(page)
|
|
|
|
- + (extent_offset * crypt_stat->extent_size)),
|
|
|
|
- 8);
|
|
|
|
- }
|
|
|
|
rc = ecryptfs_encrypt_page_offset(crypt_stat, enc_extent_page, 0,
|
|
rc = ecryptfs_encrypt_page_offset(crypt_stat, enc_extent_page, 0,
|
|
page, (extent_offset
|
|
page, (extent_offset
|
|
* crypt_stat->extent_size),
|
|
* crypt_stat->extent_size),
|
|
@@ -440,14 +429,6 @@ static int ecryptfs_encrypt_extent(struct page *enc_extent_page,
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
rc = 0;
|
|
rc = 0;
|
|
- if (unlikely(ecryptfs_verbosity > 0)) {
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "Encrypt extent [0x%.16llx]; "
|
|
|
|
- "rc = [%d]\n",
|
|
|
|
- (unsigned long long)(extent_base + extent_offset), rc);
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "First 8 bytes after "
|
|
|
|
- "encryption:\n");
|
|
|
|
- ecryptfs_dump_hex((char *)(page_address(enc_extent_page)), 8);
|
|
|
|
- }
|
|
|
|
out:
|
|
out:
|
|
return rc;
|
|
return rc;
|
|
}
|
|
}
|
|
@@ -543,17 +524,6 @@ static int ecryptfs_decrypt_extent(struct page *page,
|
|
(unsigned long long)(extent_base + extent_offset), rc);
|
|
(unsigned long long)(extent_base + extent_offset), rc);
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
- if (unlikely(ecryptfs_verbosity > 0)) {
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "Decrypting extent "
|
|
|
|
- "with iv:\n");
|
|
|
|
- ecryptfs_dump_hex(extent_iv, crypt_stat->iv_bytes);
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "First 8 bytes before "
|
|
|
|
- "decryption:\n");
|
|
|
|
- ecryptfs_dump_hex((char *)
|
|
|
|
- (page_address(enc_extent_page)
|
|
|
|
- + (extent_offset * crypt_stat->extent_size)),
|
|
|
|
- 8);
|
|
|
|
- }
|
|
|
|
rc = ecryptfs_decrypt_page_offset(crypt_stat, page,
|
|
rc = ecryptfs_decrypt_page_offset(crypt_stat, page,
|
|
(extent_offset
|
|
(extent_offset
|
|
* crypt_stat->extent_size),
|
|
* crypt_stat->extent_size),
|
|
@@ -567,16 +537,6 @@ static int ecryptfs_decrypt_extent(struct page *page,
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
rc = 0;
|
|
rc = 0;
|
|
- if (unlikely(ecryptfs_verbosity > 0)) {
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "Decrypt extent [0x%.16llx]; "
|
|
|
|
- "rc = [%d]\n",
|
|
|
|
- (unsigned long long)(extent_base + extent_offset), rc);
|
|
|
|
- ecryptfs_printk(KERN_DEBUG, "First 8 bytes after "
|
|
|
|
- "decryption:\n");
|
|
|
|
- ecryptfs_dump_hex((char *)(page_address(page)
|
|
|
|
- + (extent_offset
|
|
|
|
- * crypt_stat->extent_size)), 8);
|
|
|
|
- }
|
|
|
|
out:
|
|
out:
|
|
return rc;
|
|
return rc;
|
|
}
|
|
}
|