summaryrefslogtreecommitdiff
path: root/storage/innobase/include/fil0crypt.ic
diff options
context:
space:
mode:
Diffstat (limited to 'storage/innobase/include/fil0crypt.ic')
-rw-r--r--storage/innobase/include/fil0crypt.ic32
1 files changed, 0 insertions, 32 deletions
diff --git a/storage/innobase/include/fil0crypt.ic b/storage/innobase/include/fil0crypt.ic
index 5fafa6cd3f0..cb9ba083466 100644
--- a/storage/innobase/include/fil0crypt.ic
+++ b/storage/innobase/include/fil0crypt.ic
@@ -34,35 +34,3 @@ fil_page_is_encrypted(
{
return(mach_read_from_4(buf+FIL_PAGE_FILE_FLUSH_LSN_OR_KEY_VERSION) != 0);
}
-
-/*******************************************************************//**
-Find out whether the page can be decrypted.
-The function for decrypting the page should already be executed before this.
-@return 1 if key provider not available or key is not available
- 0 if decryption should be possible
-*/
-UNIV_INLINE
-bool
-fil_page_encryption_status(
-/*===================*/
- const byte *buf, /*!< in: page */
- ulint space_id) /*!< in: space_id */
-{
- fil_space_crypt_t *crypt_data = fil_space_get_crypt_data(space_id);
- ulint page_type = mach_read_from_2(buf+FIL_PAGE_TYPE);
-
- if (page_type == FIL_PAGE_TYPE_FSP_HDR) {
- if (crypt_data != NULL) {
- if (!encryption_key_id_exists(crypt_data->key_id)) {
- /* accessing table would surely fail, because no key or no key provider available */
- return 1;
- }
- }
- } else {
- ulint key = mach_read_from_4(buf + FIL_PAGE_FILE_FLUSH_LSN_OR_KEY_VERSION);
- if (!encryption_key_version_exists(crypt_data->key_id, key)) {
- return 1;
- }
- }
- return 0;
-}