linux-fscrypt.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-03-15 16:23:15 to 2023-06-29 00:35:49 UTC [more...]

[PATCH v4 0/8] fscrypt: some rearrangements of key setup
 2023-06-29  0:28 UTC  (8+ messages)
` [PATCH v4 1/8] fscrypt: move inline crypt decision to info setup
` [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
` [PATCH v4 4/8] fscrypt: move dirhash key setup away from IO key setup
` [PATCH v4 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v4 6/8] fscrypt: move all the shared mode key setup deeper
` [PATCH v4 7/8] fscrypt: make infos have a pointer to prepared keys
` [PATCH v4 8/8] fscrypt: make prepared keys record their type

[PATCH v1 00/12] fscrypt: add extent encryption
 2023-06-29  0:29 UTC  (13+ messages)
` [PATCH v1 01/12] fscrypt: factor helper for locking master key
` [PATCH v1 02/12] fscrypt: factor getting info for a specific block
` [PATCH v1 03/12] fscrypt: adjust effective lblks based on extents
` [PATCH v1 04/12] fscrypt: add a super_block pointer to fscrypt_info
` [PATCH v1 05/12] fscrypt: setup leaf inodes for extent encryption
` [PATCH v1 06/12] fscrypt: allow infos to be owned by extents
` [PATCH v1 07/12] fscrypt: notify per-extent infos if master key vanishes
` [PATCH v1 08/12] fscrypt: use an optional ino equivalent for per-extent infos
` [PATCH v1 09/12] fscrypt: add creation/usage/freeing of "
` [PATCH v1 10/12] fscrypt: allow load/save of extent contexts
` [PATCH v1 11/12] fscrypt: save session key credentials for extent infos
` [PATCH v1 12/12] fscrypt: update documentation for per-extent keys

[RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
 2023-06-28 21:09 UTC  (18+ messages)
` [RFC PATCH v10 01/17] security: add ipe lsm
` [RFC PATCH v10 02/17] ipe: add policy parser
` [RFC PATCH v10 03/17] ipe: add evaluation loop
` [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v10 06/17] security: add new securityfs delete function
` [RFC PATCH v10 07/17] ipe: add userspace interface
` [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v10 09/17] ipe: add permissive toggle
` [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
` [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v10 15/17] scripts: add boot policy generation program
` [RFC PATCH v10 16/17] ipe: kunit test for parser
` [RFC PATCH v10 17/17] documentation: add ipe documentation

[PATCH v3 0/4] crypto: LEA block cipher implementation
 2023-06-28  6:38 UTC  (6+ messages)
` [PATCH v3 1/4] "
` [PATCH v3 2/4] crypto: add LEA testmgr tests
` [PATCH v3 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
` [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support

[GIT PULL] fscrypt updates for 6.5
 2023-06-26 20:02 UTC  (2+ messages)

[PATCH v2] fscrypt: Replace 1-element array with flexible array
 2023-05-24  2:55 UTC  (2+ messages)

[PATCH] fscrypt: Replace 1-element array with flexible array
 2023-05-23  2:50 UTC  (5+ messages)

[PATCH v1 0/7] fscrypt: add pooled prepared keys facility
 2023-05-16 18:34 UTC  (14+ messages)
` [PATCH v1 1/7] fscrypt: add new pooled prepared keys
` [PATCH v1 2/7] fscrypt: set up pooled keys upon first use
` [PATCH v1 3/7] fscrypt: add pooling of pooled prepared keys
` [PATCH v1 4/7] fscrypt: add pooled prepared key locking around use
` [PATCH v1 5/7] fscrypt: reclaim pooled prepared keys under pressure
` [PATCH v1 6/7] fscrypt: add facility to shrink a pool of keys
` [PATCH v1 7/7] fscrypt: add lru mechanism to choose pooled key

fscrypt - Bug or Feature - mv file from encrypted to nonencrypted folder?
 2023-05-10  6:23 UTC 

[GIT PULL] fscrypt updates for 6.4
 2023-04-26 17:06 UTC  (2+ messages)

[PATCH 01/11] fscrypt: move inline crypt decision to info setup
 2023-04-18 17:04 UTC  (23+ messages)
` [PATCH 02/11] fscrypt: split and rename setup_file_encryption_key()
` [PATCH 03/11] fscrypt: split setup_per_mode_enc_key()
` [PATCH 04/11] fscrypt: move dirhash key setup away from IO key setup
` [PATCH 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH 06/11] fscrypt: make infos have a pointer to prepared keys
` [PATCH 07/11] fscrypt: move all the shared mode key setup deeper
` [PATCH 08/11] fscrypt: make prepared keys record their type
` [PATCH 09/11] fscrypt: lock every time a info needs a mode key
` [PATCH 10/11] fscrypt: split key alloc and preparation
` [PATCH 11/11] fscrypt: factor helper for locking master key
` [PATCH v3 00/11] fscrypt: rearrangements preliminary to extent encryption
  ` [PATCH v3 01/11] fscrypt: move inline crypt decision to info setup
  ` [PATCH v3 02/11] fscrypt: split and rename setup_file_encryption_key()
  ` [PATCH v3 03/11] fscrypt: split setup_per_mode_enc_key()
  ` [PATCH v3 04/11] fscrypt: move dirhash key setup away from IO key setup
  ` [PATCH v3 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
  ` [PATCH v3 06/11] fscrypt: make infos have a pointer to prepared keys
  ` [PATCH v3 07/11] fscrypt: move all the shared mode key setup deeper
  ` [PATCH v3 08/11] fscrypt: make prepared keys record their type
  ` [PATCH v3 09/11] fscrypt: lock every time a info needs a mode key
  ` [PATCH v3 10/11] fscrypt: split key alloc and preparation
  ` [PATCH v3 11/11] fscrypt: factor helper for locking master key

[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
 2023-04-17 21:31 UTC  (34+ messages)
` [RFC PATCH v9 01/16] security: add ipe lsm
` [RFC PATCH v9 02/16] ipe: add policy parser
` [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
` [RFC PATCH v9 05/16] ipe: add userspace interface
` [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider

[PATCH v2 00/11] fscrypt: rearrangements preliminary to extent encryption
 2023-04-11 21:21 UTC  (24+ messages)
` [PATCH v2 01/11] fscrypt: move inline crypt decision to info setup
` [PATCH v2 02/11] fscrypt: split and rename setup_file_encryption_key()
` [PATCH v2 03/11] fscrypt: split and rename setup_per_mode_enc_key()
` [PATCH v2 04/11] fscrypt: move dirhash key setup away from IO key setup
` [PATCH v2 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
` [PATCH v2 07/11] fscrypt: move all the shared mode key setup deeper
` [PATCH v2 08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
` [PATCH v2 09/11] fscrypt: make prepared keys record their type
` [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
` [PATCH v2 11/11] fscrypt: split key alloc and preparation

[PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
 2023-04-10 19:40 UTC  (13+ messages)
` [PATCH v1 01/10] fscrypt: split and rename setup_file_encryption_key()
` [PATCH v1 02/10] fscrypt: split and rename setup_per_mode_enc_key()
` [PATCH v1 03/10] fscrypt: move dirhash key setup away from IO key setup
` [PATCH v1 04/10] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v1 05/10] fscrypt: make infos have a pointer to prepared keys
` [PATCH v1 06/10] fscrypt: move all the shared mode key setup deeper
` [PATCH v1 07/10] fscrypt: make ci->ci_direct_key a bool not a pointer
` [PATCH v1 08/10] fscrypt: make prepared keys record their type
` [PATCH v1 09/10] fscrypt: explicitly track prepared parts of key
` [PATCH v1 10/10] fscrypt: split key alloc and preparation

[PATCH] fscrypt: optimize fscrypt_initialize()
 2023-04-06 18:12 UTC 

[GIT PULL] fscrypt fix for v6.3-rc4
 2023-03-21 19:03 UTC  (6+ messages)

[PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
 2023-03-21 12:13 UTC  (10+ messages)
` [PATCH v3 1/3] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
` [PATCH v3 2/3] ceph: switch ceph_open() to use new fscrypt helper
` [PATCH v3 3/3] ceph: switch ceph_open_atomic() to use the "

Is there any userland implementations of fscrypt
 2023-03-21  1:21 UTC  (3+ messages)

[PATCH] fscrypt: use WARN_ON_ONCE instead of WARN_ON
 2023-03-20 23:39 UTC 

[PATCH v4] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
 2023-03-20 22:01 UTC 

[PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
 2023-03-20 16:20 UTC  (6+ messages)
` [PATCH 1/3] fscrypt-crypt-util: fix HKDF self-test with latest OpenSSL
` [PATCH 2/3] fscrypt-crypt-util: use OpenSSL EVP API for AES self-tests
` [PATCH 3/3] fscrypt-crypt-util: fix XTS self-test with latest OpenSSL

[PATCH v3 0/6] Fix blk-crypto keyslot race condition
 2023-03-16 15:35 UTC  (16+ messages)
` [PATCH v3 1/6] blk-mq: release crypto keyslot before reporting I/O complete
` [PATCH v3 2/6] blk-crypto: make blk_crypto_evict_key() return void
` [PATCH v3 3/6] blk-crypto: make blk_crypto_evict_key() more robust
` [PATCH v3 4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
` [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
` [PATCH v3 6/6] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()

[PATCH v2 0/4] Fix blk-crypto keyslot race condition
 2023-03-15 18:27 UTC  (9+ messages)
` [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
` [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
` [PATCH v2 4/4] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()

[PATCH 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories
 2023-03-15 17:59 UTC  (8+ messages)
` [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).