summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ext4_utils/ext4_crypt.cpp5
-rw-r--r--ext4_utils/ext4_crypt_init_extensions.cpp2
2 files changed, 5 insertions, 2 deletions
diff --git a/ext4_utils/ext4_crypt.cpp b/ext4_utils/ext4_crypt.cpp
index 69358ba8..886d17a1 100644
--- a/ext4_utils/ext4_crypt.cpp
+++ b/ext4_utils/ext4_crypt.cpp
@@ -31,6 +31,7 @@ struct ext4_encryption_policy {
char version;
char contents_encryption_mode;
char filenames_encryption_mode;
+ char flags;
char master_key_descriptor[EXT4_KEY_DESCRIPTOR_SIZE];
} __attribute__((__packed__));
@@ -106,6 +107,7 @@ int do_policy_set(const char *directory, const char *policy, int policy_length)
eep.version = 0;
eep.contents_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_XTS;
eep.filenames_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_CTS;
+ eep.flags = 0;
memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE);
ret = ioctl(fd, EXT4_IOC_SET_ENCRYPTION_POLICY, &eep);
auto preserve_errno = errno;
@@ -117,7 +119,8 @@ int do_policy_set(const char *directory, const char *policy, int policy_length)
return -EINVAL;
}
- KLOG_INFO(TAG, "Encryption policy for %s is set to %s\n", directory, policy);
+ KLOG_INFO(TAG, "Encryption policy for %s is set to %02x%02x%02x%02x\n",
+ directory, policy[0], policy[1], policy[2], policy[3]);
return 0;
}
diff --git a/ext4_utils/ext4_crypt_init_extensions.cpp b/ext4_utils/ext4_crypt_init_extensions.cpp
index cd0a02ac..57fc53e6 100644
--- a/ext4_utils/ext4_crypt_init_extensions.cpp
+++ b/ext4_utils/ext4_crypt_init_extensions.cpp
@@ -155,7 +155,7 @@ int e4crypt_set_directory_policy(const char* dir)
return 0;
}
- KLOG_INFO(TAG, "Setting policy %s\n", policy.c_str());
+ KLOG_INFO(TAG, "Setting policy on %s\n", dir);
int result = do_policy_set(dir, policy.c_str(), policy.size());
if (result) {
KLOG_ERROR(TAG, "Setting %s policy on %s failed!\n",