summaryrefslogtreecommitdiffstats
path: root/fs/crypto/keysetup.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* fscrypt: optimize fscrypt_initialize()Eric Biggers2023-04-061-1/+1
* fscrypt: use WARN_ON_ONCE instead of WARN_ONEric Biggers2023-03-281-6/+6
* fscrypt: clean up fscrypt_add_test_dummy_key()Eric Biggers2023-02-081-3/+1
* fscrypt: add the test dummy encryption key on-demandEric Biggers2023-02-081-2/+23
* fscrypt: Add SM4 XTS/CTS symmetric algorithm supportTianjia Zhang2022-12-011-0/+15
* fscrypt: pass super_block to fscrypt_put_master_key_activeref()Eric Biggers2022-11-161-1/+1
* fscrypt: stop holding extra request_queue referencesEric Biggers2022-09-221-3/+5
* fscrypt: stop using keyrings subsystem for fscrypt_master_keyEric Biggers2022-09-221-49/+32
* fscrypt: Add HCTR2 support for filename encryptionNathan Huckleberry2022-06-101-0/+7
* fscrypt: factor out fscrypt_policy_to_key_spec()Eric Biggers2022-05-101-17/+3
* fscrypt: log when starting to use inline encryptionEric Biggers2022-04-141-1/+1
* fscrypt: improve a few commentsEric Biggers2021-10-261-2/+3
* fscrypt: allow 256-bit master keys with AES-256-XTSEric Biggers2021-09-221-12/+45
* fscrypt: fix derivation of SipHash keys on big endian CPUsEric Biggers2021-06-051-8/+32
* fscrypt: allow deleting files with unsupported encryption policyEric Biggers2020-12-031-2/+17
* fscrypt: unexport fscrypt_get_encryption_info()Eric Biggers2020-12-031-1/+0
* fscrypt: simplify master key lockingEric Biggers2020-11-251-11/+9
* fscrypt: remove kernel-internal constants from UAPI headerEric Biggers2020-11-161-1/+3
* fscrypt: remove reachable WARN in fscrypt_setup_iv_ino_lblk_32_key()Eric Biggers2020-11-061-3/+1
* fscrypt: handle test_dummy_encryption in more logical wayEric Biggers2020-09-221-24/+9
* fscrypt: stop pretending that key setup is nofs-safeEric Biggers2020-09-221-1/+1
* fscrypt: add fscrypt_prepare_new_inode() and fscrypt_set_context()Eric Biggers2020-09-221-45/+150
* fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers2020-07-221-1/+11
* fscrypt: use smp_load_acquire() for fscrypt_prepared_keyEric Biggers2020-07-221-2/+4
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-211-4/+3
* fscrypt: add inline encryption supportSatya Tangirala2020-07-081-22/+48
* fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-191-18/+67
* fscrypt: support test_dummy_encryption=v2Eric Biggers2020-05-191-9/+6
* fscrypt: fix all kerneldoc warningsEric Biggers2020-05-131-3/+6
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds2020-03-311-14/+2
|\
| * fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-201-14/+2
* | fscrypt: don't evict dirty inodes after removing keyEric Biggers2020-03-081-0/+9
|/
* fscrypt: clarify what is meant by a per-file keyEric Biggers2020-01-221-19/+20
* fscrypt: derive dirhash key for casefolded directoriesDaniel Rosenberg2020-01-221-14/+40
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-311-10/+4
* fscrypt: verify that the crypto_skcipher has the correct ivsizeEric Biggers2019-12-311-0/+4
* fscrypt: use crypto_skcipher_driver_name()Eric Biggers2019-12-311-2/+1
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-061-10/+35
* fscrypt: avoid data race on fscrypt_mode::logged_impl_nameEric Biggers2019-11-061-4/+2
* fscrypt: zeroize fscrypt_info before freeingEric Biggers2019-10-211-0/+1
* fscrypt: invoke crypto API for ESSIV handlingEric Biggers2019-10-211-99/+11
* fscrypt: allow unprivileged users to add/remove keys for v2 policiesEric Biggers2019-08-131-8/+10
* fscrypt: v2 encryption policy supportEric Biggers2019-08-131-44/+158
* fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctlEric Biggers2019-08-131-3/+100
* fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctlEric Biggers2019-08-131-1/+34
* fscrypt: rename keyinfo.c to keysetup.cEric Biggers2019-08-131-0/+345