summaryrefslogtreecommitdiffstats
path: root/fs/crypto/fscrypt_private.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* fscrypt: handle test_dummy_encryption in more logical wayEric Biggers2020-09-221-2/+4
* fscrypt: make "#define fscrypt_policy" user-onlyEric Biggers2020-09-221-1/+0
* fscrypt: add fscrypt_prepare_new_inode() and fscrypt_set_context()Eric Biggers2020-09-221-0/+3
* fscrypt: use smp_load_acquire() for fscrypt_prepared_keyEric Biggers2020-07-221-6/+9
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-211-6/+6
* fscrypt: add comments that describe the HKDF info stringsEric Biggers2020-07-211-7/+7
* fscrypt: add inline encryption supportSatya Tangirala2020-07-081-10/+105
* fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-191-6/+14
* fscrypt: add fscrypt_add_test_dummy_key()Eric Biggers2020-05-151-0/+3
* fscrypt: remove unnecessary extern keywordsEric Biggers2020-05-131-44/+40
* fscrypt: fix all kerneldoc warningsEric Biggers2020-05-131-2/+2
* fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-201-0/+20
* fscrypt: clarify what is meant by a per-file keyEric Biggers2020-01-221-3/+3
* fscrypt: derive dirhash key for casefolded directoriesDaniel Rosenberg2020-01-221-0/+13
* fscrypt: add "fscrypt_" prefix to fname_encrypt()Eric Biggers2020-01-221-2/+3
* fscrypt: remove fscrypt_is_direct_key_policy()Eric Biggers2019-12-311-6/+0
* fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers2019-12-311-18/+0
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-311-5/+1
* fscrypt: move fscrypt_d_revalidate() to fname.cEric Biggers2019-12-311-1/+1
* fscrypt: constify inode parameter to filename encryption functionsEric Biggers2019-12-311-1/+1
* fscrypt: constify struct fscrypt_hkdf parameter to fscrypt_hkdf_expand()Eric Biggers2019-12-311-1/+1
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-061-3/+13
* fscrypt: avoid data race on fscrypt_mode::logged_impl_nameEric Biggers2019-11-061-1/+1
* fscrypt: remove struct fscrypt_ctxEric Biggers2019-10-211-2/+0
* fscrypt: invoke crypto API for ESSIV handlingEric Biggers2019-10-211-7/+0
* fscrypt: require that key be added when setting a v2 encryption policyEric Biggers2019-08-131-0/+3
* fscrypt: allow unprivileged users to add/remove keys for v2 policiesEric Biggers2019-08-131-4/+27
* fscrypt: v2 encryption policy supportEric Biggers2019-08-131-25/+162
* fscrypt: add an HKDF-SHA512 implementationEric Biggers2019-08-131-0/+15
* fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctlEric Biggers2019-08-131-1/+52
* fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctlEric Biggers2019-08-131-1/+61
* fscrypt: rename keyinfo.c to keysetup.cEric Biggers2019-08-131-1/+1
* fscrypt: move v1 policy key setup to keysetup_v1.cEric Biggers2019-08-131-0/+17
* fscrypt: refactor key setup code in preparation for v2 policiesEric Biggers2019-08-131-3/+8
* fscrypt: rename fscrypt_master_key to fscrypt_direct_keyEric Biggers2019-08-131-4/+3
* fscrypt: add ->ci_inode to fscrypt_infoEric Biggers2019-08-131-0/+3
* fscrypt: use FSCRYPT_* definitions, not FS_*Eric Biggers2019-08-131-8/+8
* fscrypt: make fscrypt_msg() take inode instead of super_blockEric Biggers2019-08-131-5/+5
* fscrypt: remove loadable module related codeEric Biggers2019-08-131-2/+0
* fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block()Eric Biggers2019-05-281-6/+5
* fscrypt: simplify bounce page handlingEric Biggers2019-05-281-3/+1
* fscrypt: remove filesystem specific build config optionChandan Rajendra2019-01-241-1/+0
* fscrypt: add Adiantum supportEric Biggers2019-01-061-6/+61
* crypto: speck - remove SpeckJason A. Donenfeld2018-09-041-4/+0
* Merge tag 'f2fs-for-4.18' of git://git.kernel.org/pub/scm/linux/kernel/git/ja...Linus Torvalds2018-06-111-1/+0
|\
| * fscrypt: allow synchronous bio decryptionEric Biggers2018-05-021-1/+0
* | fscrypt: add Speck128/256 supportEric Biggers2018-05-201-0/+4
* | fscrypt: use a common logging functionEric Biggers2018-05-201-0/+8
* | fscrypt: remove internal key size constantsEric Biggers2018-05-201-9/+1
* | fscrypt: clean up after fscrypt_prepare_lookup() conversionsEric Biggers2018-05-201-0/+1
|/