diff options
author | Eric Biggers <ebiggers@google.com> | 2022-11-25 22:20:47 +0300 |
---|---|---|
committer | Eric Biggers <ebiggers@google.com> | 2022-11-25 22:22:53 +0300 |
commit | aa997990080877c3a6dab9f25609073816378b43 (patch) | |
tree | 17dfb9f7d064280005fc96883ec4cb8a94b18408 /fs/crypto | |
parent | 02aef4225258fa6d022ce9040716aeecc3afc521 (diff) | |
download | linux-aa997990080877c3a6dab9f25609073816378b43.tar.xz |
fscrypt: add comment for fscrypt_valid_enc_modes_v1()
Make it clear that nothing new should be added to this function.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Link: https://lore.kernel.org/r/20221125192047.18916-1-ebiggers@kernel.org
Diffstat (limited to 'fs/crypto')
-rw-r--r-- | fs/crypto/policy.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/fs/crypto/policy.c b/fs/crypto/policy.c index 46757c3052ef..84fa51604b15 100644 --- a/fs/crypto/policy.c +++ b/fs/crypto/policy.c @@ -61,6 +61,13 @@ fscrypt_get_dummy_policy(struct super_block *sb) return sb->s_cop->get_dummy_policy(sb); } +/* + * Return %true if the given combination of encryption modes is supported for v1 + * (and later) encryption policies. + * + * Do *not* add anything new here, since v1 encryption policies are deprecated. + * New combinations of modes should go in fscrypt_valid_enc_modes_v2() only. + */ static bool fscrypt_valid_enc_modes_v1(u32 contents_mode, u32 filenames_mode) { if (contents_mode == FSCRYPT_MODE_AES_256_XTS && |