summaryrefslogtreecommitdiffstats
path: root/fs/crypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* fscrypt: export fscrypt_d_revalidate()Eric Biggers2020-09-281-1/+2
* fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAMEEric Biggers2020-09-242-5/+4
* fscrypt: don't call no-key names "ciphertext names"Eric Biggers2020-09-242-11/+11
* fscrypt: use sha256() instead of open codingEric Biggers2020-09-221-16/+7
* fscrypt: make fscrypt_set_test_dummy_encryption() take a 'const char *'Eric Biggers2020-09-221-14/+6
* fscrypt: handle test_dummy_encryption in more logical wayEric Biggers2020-09-225-93/+100
* fscrypt: move fscrypt_prepare_symlink() out-of-lineEric Biggers2020-09-221-4/+35
* fscrypt: make "#define fscrypt_policy" user-onlyEric Biggers2020-09-221-1/+0
* fscrypt: stop pretending that key setup is nofs-safeEric Biggers2020-09-223-10/+7
* fscrypt: require that fscrypt_encrypt_symlink() already has keyEric Biggers2020-09-221-3/+7
* fscrypt: remove fscrypt_inherit_context()Eric Biggers2020-09-221-37/+0
* fscrypt: adjust logging for in-creation inodesEric Biggers2020-09-222-3/+10
* fscrypt: add fscrypt_prepare_new_inode() and fscrypt_set_context()Eric Biggers2020-09-223-54/+206
* fscrypt: restrict IV_INO_LBLK_32 to ino_bits <= 32Eric Biggers2020-09-081-2/+7
* fscrypt: drop unused inode argument from fscrypt_fname_alloc_bufferJeff Layton2020-09-082-5/+2
* mm, treewide: rename kzfree() to kfree_sensitive()Waiman Long2020-08-073-7/+8
* fscrypt: don't load ->i_crypt_info before it's known to be validEric Biggers2020-07-301-1/+2
* fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers2020-07-222-3/+13
* fscrypt: use smp_load_acquire() for ->s_master_keysEric Biggers2020-07-221-3/+12
* fscrypt: use smp_load_acquire() for fscrypt_prepared_keyEric Biggers2020-07-223-10/+17
* fscrypt: switch fscrypt_do_sha256() to use the SHA-256 libraryEric Biggers2020-07-222-32/+11
* fscrypt: restrict IV_INO_LBLK_* to AES-256-XTSEric Biggers2020-07-211-0/+14
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-215-14/+13
* fscrypt: add comments that describe the HKDF info stringsEric Biggers2020-07-211-7/+7
* fscrypt: add inline encryption supportSatya Tangirala2020-07-0810-47/+588
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds2020-06-017-164/+444
|\
| * fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-195-41/+126
| * fscrypt: make test_dummy_encryption use v2 by defaultEric Biggers2020-05-191-1/+1
| * fscrypt: support test_dummy_encryption=v2Eric Biggers2020-05-192-9/+131
| * fscrypt: add fscrypt_add_test_dummy_key()Eric Biggers2020-05-152-43/+77
| * fscrypt: remove unnecessary extern keywordsEric Biggers2020-05-131-44/+40
| * fscrypt: fix all kerneldoc warningsEric Biggers2020-05-136-27/+70
* | fscrypt: use crypto_shash_tfm_digest()Eric Biggers2020-05-082-11/+2
|/
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds2020-03-313-15/+42
|\
| * fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-203-15/+42
* | fscrypt: don't evict dirty inodes after removing keyEric Biggers2020-03-081-0/+9
|/
* fscrypt: improve format of no-key namesDaniel Rosenberg2020-01-222-51/+168
* fscrypt: clarify what is meant by a per-file keyEric Biggers2020-01-223-24/+25
* fscrypt: derive dirhash key for casefolded directoriesDaniel Rosenberg2020-01-224-14/+90
* fscrypt: don't allow v1 policies with casefoldingDaniel Rosenberg2020-01-222-0/+35
* fscrypt: add "fscrypt_" prefix to fname_encrypt()Eric Biggers2020-01-223-8/+10
* fscrypt: don't print name of busy file when removing keyEric Biggers2020-01-221-13/+2
* fscrypt: document gfp_flags for bounce page allocationEric Biggers2020-01-141-1/+6
* fscrypt: optimize fscrypt_zeroout_range()Eric Biggers2020-01-141-31/+81
* fscrypt: remove redundant bi_status checkEric Biggers2019-12-311-2/+0
* fscrypt: Allow modular crypto algorithmsHerbert Xu2019-12-311-7/+14
* fscrypt: remove fscrypt_is_direct_key_policy()Eric Biggers2019-12-311-6/+0
* fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers2019-12-312-18/+17
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-314-30/+35
* fscrypt: split up fscrypt_supported_policy() by policy versionEric Biggers2019-12-311-57/+59