mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2024-12-26 11:19:32 +03:00
163f3d3a1f
The approach is straightforward: for dataset ops, if a key was offered, find the encryption root and the various encryption parameters, derive a wrapping key if necessary, and then unlock the encryption root. After that all the regular dataset ops will return unencrypted data, and that's kinda the whole thing. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Reviewed-by: Jorgen Lundman <lundman@lundman.net> Signed-off-by: Rob Norris <robn@despairlabs.com> Closes #11551 Closes #12707 Closes #14503
18 lines
299 B
Makefile
18 lines
299 B
Makefile
zdb_CPPFLAGS = $(AM_CPPFLAGS) $(FORCEDEBUG_CPPFLAGS)
|
|
zdb_CFLAGS = $(AM_CFLAGS) $(LIBCRYPTO_CFLAGS)
|
|
|
|
sbin_PROGRAMS += zdb
|
|
CPPCHECKTARGETS += zdb
|
|
|
|
zdb_SOURCES = \
|
|
%D%/zdb.c \
|
|
%D%/zdb.h \
|
|
%D%/zdb_il.c
|
|
|
|
zdb_LDADD = \
|
|
libzpool.la \
|
|
libzfs_core.la \
|
|
libnvpair.la
|
|
|
|
zdb_LDADD += $(LIBCRYPTO_LIBS)
|