summaryrefslogtreecommitdiff
path: root/fs/crypto
Commit message (Expand)AuthorAgeFilesLines
* mm, treewide: rename kzfree() to kfree_sensitive()Waiman Long2020-08-073-7/+8
* fscrypt: don't load ->i_crypt_info before it's known to be validEric Biggers2020-07-301-1/+2
* fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers2020-07-212-3/+13
* fscrypt: use smp_load_acquire() for ->s_master_keysEric Biggers2020-07-211-3/+12
* fscrypt: use smp_load_acquire() for fscrypt_prepared_keyEric Biggers2020-07-213-10/+17
* fscrypt: switch fscrypt_do_sha256() to use the SHA-256 libraryEric Biggers2020-07-212-32/+11
* fscrypt: restrict IV_INO_LBLK_* to AES-256-XTSEric Biggers2020-07-211-0/+14
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-205-14/+13
* fscrypt: add comments that describe the HKDF info stringsEric Biggers2020-07-201-7/+7
* fscrypt: add inline encryption supportSatya Tangirala2020-07-0810-47/+588
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds2020-06-017-164/+444
|\
| * fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-195-41/+126
| * fscrypt: make test_dummy_encryption use v2 by defaultEric Biggers2020-05-181-1/+1
| * fscrypt: support test_dummy_encryption=v2Eric Biggers2020-05-182-9/+131
| * fscrypt: add fscrypt_add_test_dummy_key()Eric Biggers2020-05-152-43/+77
| * fscrypt: remove unnecessary extern keywordsEric Biggers2020-05-121-44/+40
| * fscrypt: fix all kerneldoc warningsEric Biggers2020-05-126-27/+70
* | fscrypt: use crypto_shash_tfm_digest()Eric Biggers2020-05-082-11/+2
|/
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds2020-03-313-15/+42
|\
| * fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-193-15/+42
* | fscrypt: don't evict dirty inodes after removing keyEric Biggers2020-03-071-0/+9
|/
* fscrypt: improve format of no-key namesDaniel Rosenberg2020-01-222-51/+168
* fscrypt: clarify what is meant by a per-file keyEric Biggers2020-01-223-24/+25
* fscrypt: derive dirhash key for casefolded directoriesDaniel Rosenberg2020-01-224-14/+90
* fscrypt: don't allow v1 policies with casefoldingDaniel Rosenberg2020-01-222-0/+35
* fscrypt: add "fscrypt_" prefix to fname_encrypt()Eric Biggers2020-01-223-8/+10
* fscrypt: don't print name of busy file when removing keyEric Biggers2020-01-221-13/+2
* fscrypt: document gfp_flags for bounce page allocationEric Biggers2020-01-141-1/+6
* fscrypt: optimize fscrypt_zeroout_range()Eric Biggers2020-01-141-31/+81
* fscrypt: remove redundant bi_status checkEric Biggers2019-12-311-2/+0
* fscrypt: Allow modular crypto algorithmsHerbert Xu2019-12-311-7/+14
* fscrypt: remove fscrypt_is_direct_key_policy()Eric Biggers2019-12-311-6/+0
* fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers2019-12-312-18/+17
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-314-30/+35
* fscrypt: split up fscrypt_supported_policy() by policy versionEric Biggers2019-12-311-57/+59
* fscrypt: move fscrypt_d_revalidate() to fname.cEric Biggers2019-12-313-51/+50
* fscrypt: constify inode parameter to filename encryption functionsEric Biggers2019-12-312-11/+11
* fscrypt: constify struct fscrypt_hkdf parameter to fscrypt_hkdf_expand()Eric Biggers2019-12-312-2/+2
* fscrypt: verify that the crypto_skcipher has the correct ivsizeEric Biggers2019-12-311-0/+4
* fscrypt: use crypto_skcipher_driver_name()Eric Biggers2019-12-311-2/+1
* fscrypt: support passing a keyring key to FS_IOC_ADD_ENCRYPTION_KEYEric Biggers2019-12-311-8/+124
* treewide: Use sizeof_field() macroPankaj Bharadiya2019-12-091-1/+1
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-065-18/+100
* fscrypt: avoid data race on fscrypt_mode::logged_impl_nameEric Biggers2019-11-062-5/+3
* fscrypt: zeroize fscrypt_info before freeingEric Biggers2019-10-211-0/+1
* fscrypt: remove struct fscrypt_ctxEric Biggers2019-10-213-131/+10
* fscrypt: invoke crypto API for ESSIV handlingEric Biggers2019-10-214-114/+11
* fscrypt: require that key be added when setting a v2 encryption policyEric Biggers2019-08-123-1/+63
* fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctlEric Biggers2019-08-121-5/+24
* fscrypt: allow unprivileged users to add/remove keys for v2 policiesEric Biggers2019-08-123-33/+336