summaryrefslogtreecommitdiffstats
path: root/fs/crypto/crypto.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* fs: Remove ->readpages address space operationMatthew Wilcox (Oracle)2022-04-011-1/+1
* fscrypt: add functions for direct I/O supportEric Biggers2022-02-081-0/+8
* fscrypt: adjust logging for in-creation inodesEric Biggers2020-09-221-1/+3
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-211-1/+1
* fscrypt: add inline encryption supportSatya Tangirala2020-07-081-1/+1
* fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-191-1/+5
* fscrypt: fix all kerneldoc warningsEric Biggers2020-05-131-2/+7
* fscrypt: document gfp_flags for bounce page allocationEric Biggers2020-01-141-1/+6
* fscrypt: move fscrypt_d_revalidate() to fname.cEric Biggers2019-12-311-50/+0
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-061-2/+8
* fscrypt: remove struct fscrypt_ctxEric Biggers2019-10-211-101/+9
* fscrypt: invoke crypto API for ESSIV handlingEric Biggers2019-10-211-4/+0
* fscrypt: v2 encryption policy supportEric Biggers2019-08-131-1/+1
* fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctlEric Biggers2019-08-131-1/+9
* fscrypt: use FSCRYPT_* definitions, not FS_*Eric Biggers2019-08-131-1/+1
* fscrypt: make fscrypt_msg() take inode instead of super_blockEric Biggers2019-08-131-7/+6
* fscrypt: remove loadable module related codeEric Biggers2019-08-131-19/+1
* fscrypt: support decrypting multiple filesystem blocks per pageEric Biggers2019-05-281-14/+32
* fscrypt: introduce fscrypt_decrypt_block_inplace()Eric Biggers2019-05-281-4/+27
* fscrypt: support encrypting multiple filesystem blocks per pageEric Biggers2019-05-281-28/+39
* fscrypt: introduce fscrypt_encrypt_block_inplace()Eric Biggers2019-05-281-19/+31
* fscrypt: clean up some BUG_ON()s in block encryption/decryptionEric Biggers2019-05-281-6/+9
* fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block()Eric Biggers2019-05-281-12/+12
* fscrypt: remove the "write" part of struct fscrypt_ctxEric Biggers2019-05-281-7/+7
* fscrypt: simplify bounce page handlingEric Biggers2019-05-281-70/+34
* treewide: Add SPDX license identifier for more missed filesThomas Gleixner2019-05-211-0/+1
* fscrypt: clean up and improve dentry revalidationEric Biggers2019-04-171-28/+30
* fscrypt: use READ_ONCE() to access ->i_crypt_infoEric Biggers2019-04-171-1/+1
* fscrypt: drop inode argument from fscrypt_get_ctx()Eric Biggers2019-04-171-11/+5
* fscrypt: add Adiantum supportEric Biggers2019-01-061-13/+15
* Merge tag 'f2fs-for-4.18' of git://git.kernel.org/pub/scm/linux/kernel/git/ja...Linus Torvalds2018-06-111-1/+7
|\
| * fscrypt: allow synchronous bio decryptionEric Biggers2018-05-021-1/+7
* | fscrypt: use a common logging functionEric Biggers2018-05-201-3/+25
* | fscrypt: remove stale comment from fscrypt_d_revalidate()Eric Biggers2018-05-201-1/+0
* | fscrypt: remove error messages for skcipher_request_alloc() failureEric Biggers2018-05-201-5/+1
* | fscrypt: clean up after fscrypt_prepare_lookup() conversionsEric Biggers2018-05-201-1/+0
* | fscrypt: use unbound workqueue for decryptionEric Biggers2018-05-201-1/+10
|/
* fscrypt: trim down fscrypt.h includesEric Biggers2018-01-121-0/+1
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2017-11-141-6/+3
|\
| * fscrypt: lock mutex before checking for bounce page poolEric Biggers2017-10-311-5/+2
| * fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()Eric Biggers2017-10-191-1/+1
* | fscrypt: move to generic async completionGilad Ben-Yossef2017-11-031-24/+4
|/
* fscrypt: add support for AES-128-CBCDaniel Walter2017-06-241-7/+16
* fscrypt: remove broken support for detecting keyring key revocationEric Biggers2017-03-151-9/+1
* fscrypt: factor out bio specific functionsRichard Weinberger2017-01-011-141/+16
* fscrypt: Rename FS_WRITE_PATH_FL to FS_CTX_HAS_BOUNCE_BUFFER_FLDavid Gstir2016-12-111-3/+3
* fscrypt: Delay bounce page pool allocation until neededDavid Gstir2016-12-111-2/+7
* fscrypt: Cleanup page locking requirements for fscrypt_{decrypt,encrypt}_page()David Gstir2016-12-111-3/+8
* fscrypt: Cleanup fscrypt_{decrypt,encrypt}_page()David Gstir2016-12-111-41/+52
* fscrypt: Never allocate fscrypt_ctx on in-place encryptionDavid Gstir2016-12-111-11/+19