summaryrefslogtreecommitdiffstats
path: root/fs/crypto
AgeCommit message (Expand)AuthorLines
2020-08-07mm, treewide: rename kzfree() to kfree_sensitive()Waiman Long-7/+8
2020-07-30fscrypt: don't load ->i_crypt_info before it's known to be validEric Biggers-1/+2
2020-07-21fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers-3/+13
2020-07-21fscrypt: use smp_load_acquire() for ->s_master_keysEric Biggers-3/+12
2020-07-21fscrypt: use smp_load_acquire() for fscrypt_prepared_keyEric Biggers-10/+17
2020-07-21fscrypt: switch fscrypt_do_sha256() to use the SHA-256 libraryEric Biggers-32/+11
2020-07-21fscrypt: restrict IV_INO_LBLK_* to AES-256-XTSEric Biggers-0/+14
2020-07-20fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers-14/+13
2020-07-20fscrypt: add comments that describe the HKDF info stringsEric Biggers-7/+7
2020-07-08fscrypt: add inline encryption supportSatya Tangirala-47/+588
2020-06-01Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds-164/+444
2020-05-19fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers-41/+126
2020-05-18fscrypt: make test_dummy_encryption use v2 by defaultEric Biggers-1/+1
2020-05-18fscrypt: support test_dummy_encryption=v2Eric Biggers-9/+131
2020-05-15fscrypt: add fscrypt_add_test_dummy_key()Eric Biggers-43/+77
2020-05-12fscrypt: remove unnecessary extern keywordsEric Biggers-44/+40
2020-05-12fscrypt: fix all kerneldoc warningsEric Biggers-27/+70
2020-05-08fscrypt: use crypto_shash_tfm_digest()Eric Biggers-11/+2
2020-03-31Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscryptLinus Torvalds-15/+42
2020-03-19fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers-15/+42
2020-03-07fscrypt: don't evict dirty inodes after removing keyEric Biggers-0/+9
2020-01-22fscrypt: improve format of no-key namesDaniel Rosenberg-51/+168
2020-01-22fscrypt: clarify what is meant by a per-file keyEric Biggers-24/+25
2020-01-22fscrypt: derive dirhash key for casefolded directoriesDaniel Rosenberg-14/+90
2020-01-22fscrypt: don't allow v1 policies with casefoldingDaniel Rosenberg-0/+35
2020-01-22fscrypt: add "fscrypt_" prefix to fname_encrypt()Eric Biggers-8/+10
2020-01-22fscrypt: don't print name of busy file when removing keyEric Biggers-13/+2
2020-01-14fscrypt: document gfp_flags for bounce page allocationEric Biggers-1/+6
2020-01-14fscrypt: optimize fscrypt_zeroout_range()Eric Biggers-31/+81
2019-12-31fscrypt: remove redundant bi_status checkEric Biggers-2/+0
2019-12-31fscrypt: Allow modular crypto algorithmsHerbert Xu-7/+14
2019-12-31fscrypt: remove fscrypt_is_direct_key_policy()Eric Biggers-6/+0
2019-12-31fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers-18/+17
2019-12-31fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers-30/+35
2019-12-31fscrypt: split up fscrypt_supported_policy() by policy versionEric Biggers-57/+59
2019-12-31fscrypt: move fscrypt_d_revalidate() to fname.cEric Biggers-51/+50
2019-12-31fscrypt: constify inode parameter to filename encryption functionsEric Biggers-11/+11
2019-12-31fscrypt: constify struct fscrypt_hkdf parameter to fscrypt_hkdf_expand()Eric Biggers-2/+2
2019-12-31fscrypt: verify that the crypto_skcipher has the correct ivsizeEric Biggers-0/+4
2019-12-31fscrypt: use crypto_skcipher_driver_name()Eric Biggers-2/+1
2019-12-31fscrypt: support passing a keyring key to FS_IOC_ADD_ENCRYPTION_KEYEric Biggers-8/+124
2019-12-09treewide: Use sizeof_field() macroPankaj Bharadiya-1/+1
2019-11-06fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers-18/+100
2019-11-06fscrypt: avoid data race on fscrypt_mode::logged_impl_nameEric Biggers-5/+3
2019-10-21fscrypt: zeroize fscrypt_info before freeingEric Biggers-0/+1
2019-10-21fscrypt: remove struct fscrypt_ctxEric Biggers-131/+10
2019-10-21fscrypt: invoke crypto API for ESSIV handlingEric Biggers-114/+11
2019-08-12fscrypt: require that key be added when setting a v2 encryption policyEric Biggers-1/+63
2019-08-12fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctlEric Biggers-5/+24
2019-08-12fscrypt: allow unprivileged users to add/remove keys for v2 policiesEric Biggers-33/+336