summaryrefslogtreecommitdiffstats
path: root/fs/crypto/policy.c
Commit message (Expand)AuthorAgeFilesLines
* inode: make init and permission helpers idmapped mount awareChristian Brauner2021-01-241-1/+1
* fscrypt: allow deleting files with unsupported encryption policyEric Biggers2020-12-021-8/+14
* fscrypt: remove kernel-internal constants from UAPI headerEric Biggers2020-11-161-1/+4
* fscrypt: make fscrypt_set_test_dummy_encryption() take a 'const char *'Eric Biggers2020-09-221-14/+6
* fscrypt: handle test_dummy_encryption in more logical wayEric Biggers2020-09-221-44/+69
* fscrypt: remove fscrypt_inherit_context()Eric Biggers2020-09-221-37/+0
* fscrypt: add fscrypt_prepare_new_inode() and fscrypt_set_context()Eric Biggers2020-09-221-9/+53
* fscrypt: restrict IV_INO_LBLK_32 to ino_bits <= 32Eric Biggers2020-09-071-2/+7
* fscrypt: use smp_load_acquire() for ->i_crypt_infoEric Biggers2020-07-211-2/+2
* fscrypt: restrict IV_INO_LBLK_* to AES-256-XTSEric Biggers2020-07-211-0/+14
* fscrypt: rename FS_KEY_DERIVATION_NONCE_SIZEEric Biggers2020-07-201-1/+1
* fscrypt: add support for IV_INO_LBLK_32 policiesEric Biggers2020-05-191-14/+37
* fscrypt: make test_dummy_encryption use v2 by defaultEric Biggers2020-05-181-1/+1
* fscrypt: support test_dummy_encryption=v2Eric Biggers2020-05-181-0/+125
* fscrypt: fix all kerneldoc warningsEric Biggers2020-05-121-4/+15
* fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctlEric Biggers2020-03-191-1/+20
* fscrypt: don't allow v1 policies with casefoldingDaniel Rosenberg2020-01-221-0/+7
* fscrypt: move fscrypt_valid_enc_modes() to policy.cEric Biggers2019-12-311-0/+17
* fscrypt: check for appropriate use of DIRECT_KEY flag earlierEric Biggers2019-12-311-0/+30
* fscrypt: split up fscrypt_supported_policy() by policy versionEric Biggers2019-12-311-57/+59
* fscrypt: add support for IV_INO_LBLK_64 policiesEric Biggers2019-11-061-1/+40
* fscrypt: require that key be added when setting a v2 encryption policyEric Biggers2019-08-121-1/+13
* fscrypt: v2 encryption policy supportEric Biggers2019-08-121-105/+317
* fscrypt: use FSCRYPT_* definitions, not FS_*Eric Biggers2019-08-121-7/+7
* fscrypt: don't set policy for a dead directoryHongjie Fang2019-05-281-0/+2
* fscrypt: use READ_ONCE() to access ->i_crypt_infoEric Biggers2019-04-161-3/+3
* fscrypt: return -EXDEV for incompatible rename or link into encrypted dirEric Biggers2019-01-231-2/+1
* fscrypt: add Adiantum supportEric Biggers2019-01-061-2/+3
* Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2017-11-141-3/+3
|\
| * fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()Eric Biggers2017-10-181-3/+3
* | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-021-0/+1
|/
* Merge tag 'ext4_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/t...Linus Torvalds2017-07-091-0/+1
|\
| * ext4: fix __ext4_new_inode() journal credits calculationTahsin Erdogan2017-07-061-0/+1
* | fscrypt: add support for AES-128-CBCDaniel Walter2017-06-231-6/+2
|/
* fscrypt: fix context consistency check when key(s) unavailableEric Biggers2017-05-041-19/+68
* fscrypt: remove unnecessary checks for NULL operationsEric Biggers2017-04-301-10/+1
* fscrypt: eliminate ->prepare_context() operationEric Biggers2017-03-151-7/+0
* fscrypt: make test_dummy_encryption require a keyring keyTheodore Ts'o2017-01-021-15/+7
* fscrypt: pass up error codes from ->get_context()Eric Biggers2016-12-311-31/+23
* fscrypt: remove user-triggerable warning messagesEric Biggers2016-12-311-13/+2
* fscrypt: use EEXIST when file already uses different policyEric Biggers2016-12-311-1/+1
* fscrypt: use ENOTDIR when setting encryption policy on nondirectoryEric Biggers2016-12-311-1/+1
* fscrypt: fix renaming and linking special filesEric Biggers2016-12-311-0/+5
* fscrypt: move non-public structures and constants to fscrypt_private.hTheodore Ts'o2016-12-111-1/+1
* fscrypto: move ioctl processing more fully into common codeEric Biggers2016-12-111-13/+21
* fscrypto: lock inode while setting encryption policyEric Biggers2016-10-151-0/+4
* fscrypto: require write access to mount to set encryption policyEric Biggers2016-09-101-13/+25
* fscrypto: only allow setting encryption policy on directoriesEric Biggers2016-09-091-0/+2
* fscrypto: add authorization check for setting encryption policyEric Biggers2016-09-091-0/+3
* fs crypto: move per-file encryption from f2fs tree to fs/cryptoJaegeuk Kim2016-03-171-0/+229