linux-fscrypt.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-12-02 16:25:54 to 2022-01-18 23:03:39 UTC [more...]

[PATCH 00/14] KEYS: Add support for PGP keys and signatures
 2022-01-18 23:03 UTC  (29+ messages)
` [PATCH 01/14] mpi: Introduce mpi_key_length()
` [PATCH 02/14] rsa: add parser of raw format
` [PATCH 03/14] PGPLIB: PGP definitions (RFC 4880)
` [PATCH 04/14] PGPLIB: Basic packet parser
` [PATCH 05/14] PGPLIB: Signature parser
` [PATCH 06/14] KEYS: PGP data parser
` [PATCH 07/14] KEYS: Provide PGP key description autogeneration
` [PATCH 08/14] KEYS: PGP-based public key signature verification
` [PATCH 09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature()
` [PATCH 10/14] KEYS: Calculate key digest and get signature of the key
` [PATCH 11/14] verification: introduce verify_pgp_signature()
` [PATCH 12/14] PGP: Provide a key type for testing PGP signatures
` [PATCH 13/14] KEYS: Provide a function to load keys from a PGP keyring blob
` [PATCH 14/14] KEYS: Introduce load_pgp_public_keyring()

[PATCH v1 0/5] ima: support fs-verity signatures stored as
 2022-01-16 17:01 UTC  (22+ messages)
` [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
` [PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
` [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
` [PATCH v1 4/5] ima: support fs-verity file digest based signatures
` [PATCH v1 5/5] fsverity: update the documentation

[RFC PATCH v10 00/48] ceph+fscrypt: full support
 2022-01-12  8:41 UTC  (51+ messages)
` [RFC PATCH v10 01/48] vfs: export new_inode_pseudo
` [RFC PATCH v10 02/48] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
` [RFC PATCH v10 03/48] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
` [RFC PATCH v10 04/48] fscrypt: add fscrypt_context_for_new_inode
` [RFC PATCH v10 05/48] ceph: preallocate inode for ops that may create one
` [RFC PATCH v10 06/48] ceph: crypto context handling for ceph
` [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
` [RFC PATCH v10 08/48] ceph: add fscrypt_* handling to caps.c
` [RFC PATCH v10 09/48] ceph: add ability to set fscrypt_auth via setattr
` [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
` [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
` [RFC PATCH v10 12/48] ceph: add fscrypt ioctls
` [RFC PATCH v10 13/48] ceph: make ceph_msdc_build_path use ref-walk
` [RFC PATCH v10 14/48] ceph: add encrypted fname handling to ceph_mdsc_build_path
` [RFC PATCH v10 15/48] ceph: send altname in MClientRequest
` [RFC PATCH v10 16/48] ceph: encode encrypted name in dentry release
` [RFC PATCH v10 17/48] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
` [RFC PATCH v10 18/48] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
` [RFC PATCH v10 19/48] ceph: add helpers for converting names for userland presentation
` [RFC PATCH v10 20/48] ceph: add fscrypt support to ceph_fill_trace
` [RFC PATCH v10 21/48] ceph: add support to readdir for encrypted filenames
` [RFC PATCH v10 22/48] ceph: create symlinks with encrypted and base64-encoded targets
` [RFC PATCH v10 23/48] ceph: make ceph_get_name decrypt filenames
` [RFC PATCH v10 24/48] ceph: add a new ceph.fscrypt.auth vxattr
` [RFC PATCH v10 25/48] ceph: add some fscrypt guardrails
` [RFC PATCH v10 26/48] ceph: don't allow changing layout on encrypted files/directories
` [RFC PATCH v10 27/48] libceph: add CEPH_OSD_OP_ASSERT_VER support
` [RFC PATCH v10 28/48] ceph: size handling for encrypted inodes in cap updates
` [RFC PATCH v10 29/48] ceph: fscrypt_file field handling in MClientRequest messages
` [RFC PATCH v10 30/48] ceph: get file size from fscrypt_file when present in inode traces
` [RFC PATCH v10 31/48] ceph: handle fscrypt fields in cap messages from MDS
` [RFC PATCH v10 32/48] ceph: add __ceph_get_caps helper support
` [RFC PATCH v10 33/48] ceph: add __ceph_sync_read "
` [RFC PATCH v10 34/48] ceph: add object version support for sync read
` [RFC PATCH v10 35/48] ceph: add infrastructure for file encryption and decryption
` [RFC PATCH v10 36/48] ceph: add truncate size handling support for fscrypt
` [RFC PATCH v10 37/48] libceph: allow ceph_osdc_new_request to accept a multi-op read
` [RFC PATCH v10 38/48] ceph: disable fallocate for encrypted inodes
` [RFC PATCH v10 39/48] ceph: disable copy offload on "
` [RFC PATCH v10 40/48] ceph: don't use special DIO path for "
` [RFC PATCH v10 41/48] ceph: set encryption context on open
` [RFC PATCH v10 42/48] ceph: align data in pages in ceph_sync_write
` [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
` [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
` [RFC PATCH v10 45/48] ceph: set i_blkbits to crypto block size for encrypted inodes
` [RFC PATCH v10 46/48] ceph: add fscrypt decryption support to ceph_netfs_issue_op
` [RFC PATCH v10 47/48] ceph: add encryption support to writepage
` [RFC PATCH v10 48/48] ceph: fscrypt support for writepages

[PATCH v8] ceph: add truncate size handling support for fscrypt
 2022-01-12  1:46 UTC 

[PATCH v2 0/6] ima: support fs-verity digests and signatures
 2022-01-11  4:48 UTC  (15+ messages)
` [PATCH v2 1/6] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
` [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
` [PATCH v2 3/6] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
` [PATCH v2 4/6] ima: include fsverity's file digests in the IMA measurement list
` [PATCH v2 5/6] ima: support fs-verity file digest based signatures
` [PATCH v2 6/6] fsverity: update the documentation

[PATCH 00/10] Add wrapped key support for Qualcomm ICE
 2022-01-06 21:14 UTC  (23+ messages)
` [PATCH 01/10] soc: qcom: new common library for ICE functionality
` [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
` [PATCH 03/10] qcom_scm: scm call for deriving a software secret
` [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
` [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
` [PATCH 06/10] soc: qcom: add wrapped key support for ICE
` [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
` [PATCH 08/10] scsi: ufs: add support for generate, import and prepare keys
` [PATCH 09/10] soc: qcom: support for generate, import and prepare key
` [PATCH 10/10] arm64: dts: qcom: sm8350: add ice and hwkm mappings

[PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
 2021-12-15 12:10 UTC  (50+ messages)
` [PATCH 01/36] vfs: export new_inode_pseudo
` [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
` [PATCH 03/36] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
` [PATCH 04/36] fscrypt: add fscrypt_context_for_new_inode
` [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
` [PATCH 06/36] ceph: preallocate inode for ops that may create one
` [PATCH 07/36] ceph: crypto context handling for ceph
` [PATCH 08/36] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
` [PATCH 09/36] ceph: add fscrypt_* handling to caps.c
` [PATCH 10/36] ceph: add ability to set fscrypt_auth via setattr
` [PATCH 11/36] ceph: implement -o test_dummy_encryption mount option
` [PATCH 12/36] ceph: decode alternate_name in lease info
` [PATCH 13/36] ceph: add fscrypt ioctls
` [PATCH 14/36] ceph: make ceph_msdc_build_path use ref-walk
` [PATCH 15/36] ceph: add encrypted fname handling to ceph_mdsc_build_path
` [PATCH 16/36] ceph: send altname in MClientRequest
` [PATCH 17/36] ceph: encode encrypted name in dentry release
` [PATCH 18/36] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
` [PATCH 19/36] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
` [PATCH 20/36] ceph: add helpers for converting names for userland presentation
` [PATCH 21/36] ceph: add fscrypt support to ceph_fill_trace
` [PATCH 22/36] ceph: add support to readdir for encrypted filenames
` [PATCH 23/36] ceph: create symlinks with encrypted and base64-encoded targets
` [PATCH 24/36] ceph: make ceph_get_name decrypt filenames
` [PATCH 25/36] ceph: add a new ceph.fscrypt.auth vxattr
` [PATCH 26/36] ceph: add some fscrypt guardrails
` [PATCH 27/36] ceph: don't allow changing layout on encrypted files/directories
` [PATCH 28/36] libceph: add CEPH_OSD_OP_ASSERT_VER support
` [PATCH 29/36] ceph: size handling for encrypted inodes in cap updates
` [PATCH 30/36] ceph: fscrypt_file field handling in MClientRequest messages
` [PATCH 31/36] ceph: get file size from fscrypt_file when present in inode traces
` [PATCH 32/36] ceph: handle fscrypt fields in cap messages from MDS
` [PATCH 33/36] ceph: add __ceph_get_caps helper support
` [PATCH 34/36] ceph: add __ceph_sync_read "
` [PATCH 35/36] ceph: add object version support for sync read
` [PATCH 36/36] ceph: add truncate size handling support for fscrypt

[PATCH 0/4] Adds wrapped key support for inline storage encryption
 2021-12-08 18:13 UTC  (5+ messages)

[RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
 2021-12-06 10:57 UTC  (9+ messages)
` [RFC][PATCH] device mapper: Add builtin function dm_get_status()

[PATCH 0/4] ima: support fs-verity signatures stored as
 2021-12-02 21:56 UTC  (7+ messages)
` [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).