F2FSCRYPT(8) | System Manager's Manual | F2FSCRYPT(8) |
f2fscrypt - f2fs filesystem encryption utility
f2fscrypt add_key -S [ -k keyring ] [-v]
[-q] [ path ... ]
f2fscrypt new_session
f2fscrypt get_policy path ...
f2fscrypt set_policy policy path ...
f2fscrypt performs encryption management for f2fs file systems.
The target directory must be empty.
Formats a f2fs filesystem that supports encrypt. # mkfs.f2fs -O encrypt /dev/sdxx # mount /dev/sdxx /encrypted/ # mkdir /encrypted/dir
First create the key in the keyring use an simple salt (or generate a random salt). Then use it to set the policy for the directory to be encrypted. # f2fscrypt add_key -S 0x1234 Enter passphrase (echo disabled): Added key with descriptor [28e21cc0c4393da1] # f2fscrypt set_policy 28e21cc0c4393da1 /encrypted/dir Key with descriptor [28e21cc0c4393da1] applied to /encrypted/dir. # touch /encrypted/dir/test.txt # ls -l /encrypted/dir/ -rw-r--r--. 1 root root 0 Mar 5 21:41 test.txt
After each reboot, the same command can be used set the key for decryption of the directory and its descendants. # ls -l /encrypted/dir/ -rw-r--r--. 1 root root 0 Mar 5 21:41 zbx7tsUEMLzh+AUVMkQcnB # f2fscrypt get_policy /encrypted/dir/ /encrypted/dir/: 28e21cc0c4393da1 # f2fscrypt add_key -S 0x1234 Enter passphrase (echo disabled): Added key with descriptor [28e21cc0c4393da1] # ls -l /encrypted/dir/ -rw-r--r--. 1 root root 0 Mar 5 21:41 test.txt
Show process keyrings. # keyctl show Session Keyring 84022412 --alswrv 0 0 keyring: _ses 204615789 --alswrv 0 65534 \_ keyring: _uid.0 529474961 --alsw-v 0 0 \_ logon: f2fs:28e21cc0c4393da1
Written by Kinglong Mee <kinglongmee@gmail.com>, Migrated from e4crypt that Written by Michael Halcrow <mhalcrow@google.com>, Ildar Muslukhov <muslukhovi@gmail.com>, and Theodore Ts'o <tytso@mit.edu>
keyctl(1), mkfs.f2fs(8), mount(8).