summaryrefslogtreecommitdiffstats
path: root/fs/crypto/policy.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* fscrypt: use WARN_ON_ONCE instead of WARN_ONEric Biggers2023-03-281-2/+2
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/linuxLinus Torvalds2023-02-201-2/+1
|\
| * fscrypt: add the test dummy encryption key on-demandEric Biggers2023-02-081-2/+1
* | fs: port inode_owner_or_capable() to mnt_idmapChristian Brauner2023-01-191-1/+1
|/
* fscrypt: Add SM4 XTS/CTS symmetric algorithm supportTianjia Zhang2022-12-011-0/+5
* fscrypt: add comment for fscrypt_valid_enc_modes_v1()Eric Biggers2022-11-251-0/+7
* fscrypt: stop using keyrings subsystem for fscrypt_master_keyEric Biggers2022-09-221-6/+2
* fscrypt: remove fscrypt_set_test_dummy_encryption()Eric Biggers2022-08-221-13/+0
* Merge tag 'ceph-for-5.20-rc1' of https://github.com/ceph/ceph-clientLinus Torvalds2022-08-111-6/+29
|\
| * fscrypt: add fscrypt_context_for_new_inodeJeff Layton2022-08-031-6/+29
* | fscrypt: Add HCTR2 support for filename encryptionNathan Huckleberry2022-06-101-3/+11
|/
* fscrypt: add new helper functions for test_dummy_encryptionEric Biggers2022-05-101-54/+58
* fscrypt: factor out fscrypt_policy_to_key_spec()Eric Biggers2022-05-101-0/+20
* inode: make init and permission helpers idmapped mount awareChristian Brauner2021-01-241-1/+1
* fscrypt: allow deleting files with unsupported encryption policyEric Biggers2020-12-031-8/+14
* fscrypt: remove kernel-internal constants from UAPI headerEric Biggers2020-11-161-1/+4
* fscrypt: make fscrypt_set_test_dummy_encryption() take a 'const char *'Eric Biggers2020-09-221-14/+6
* fscrypt: handle test_dummy_encryption in more logical wayEric Biggers2020-09-221-44/+69
* fscrypt: remove fscrypt_inherit_context()Eric Biggers2020-09-221-37/+0
* fscrypt: add fscrypt_prepare_new_inode() and fscrypt_set_context()Eric Biggers2020-09-221-9/+53
* fscrypt: restrict IV_INO_LBLK_32 to ino_bits <= 32Eric Biggers2020-09-081-2/+7
* fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers2020-07-221-2/+2
* fscrypt: restrict IV_INO_LBLK_* to AES-256-XTSEric Biggers2020-07-211-0/+14
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-211-1/+1
* fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-191-14/+37
* fscrypt: make test_dummy_encryption use v2 by defaultEric Biggers2020-05-191-1/+1
* fscrypt: support test_dummy_encryption=v2Eric Biggers2020-05-191-0/+125
* fscrypt: fix all kerneldoc warningsEric Biggers2020-05-131-4/+15
* fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-201-1/+20
* fscrypt: don't allow v1 policies with casefoldingDaniel Rosenberg2020-01-221-0/+7
* fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers2019-12-311-0/+17
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-311-0/+30
* fscrypt: split up fscrypt_supported_policy() by policy versionEric Biggers2019-12-311-57/+59
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-061-1/+40
* fscrypt: require that key be added when setting a v2 encryption policyEric Biggers2019-08-131-1/+13
* fscrypt: v2 encryption policy supportEric Biggers2019-08-131-105/+317
* fscrypt: use FSCRYPT_* definitions, not FS_*Eric Biggers2019-08-131-7/+7
* fscrypt: don't set policy for a dead directoryHongjie Fang2019-05-281-0/+2
* fscrypt: use READ_ONCE() to access ->i_crypt_infoEric Biggers2019-04-171-3/+3
* fscrypt: return -EXDEV for incompatible rename or link into encrypted dirEric Biggers2019-01-241-2/+1
* fscrypt: add Adiantum supportEric Biggers2019-01-061-2/+3
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2017-11-141-3/+3
|\
| * fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()Eric Biggers2017-10-191-3/+3
* | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-021-0/+1
|/
* Merge tag 'ext4_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/t...Linus Torvalds2017-07-091-0/+1
|\
| * ext4: fix __ext4_new_inode() journal credits calculationTahsin Erdogan2017-07-061-0/+1
* | fscrypt: add support for AES-128-CBCDaniel Walter2017-06-241-6/+2
|/
* fscrypt: fix context consistency check when key(s) unavailableEric Biggers2017-05-041-19/+68
* fscrypt: remove unnecessary checks for NULL operationsEric Biggers2017-04-301-10/+1
* fscrypt: eliminate ->prepare_context() operationEric Biggers2017-03-151-7/+0