Filesystem Crypto
[Prev Page][Next Page]
- [RFC PATCH 00/25] fscrypt: filesystem-level keyring and v2 policy support
- Re: [PATCH v2 00/11] fscrypt: add some higher-level helper functions
- [PATCH v10 00/20] simplify crypto wait for async op
- [PATCH v10 02/20] crypto: ccp: use -ENOSPC for transient busy indication
- [PATCH v10 01/20] crypto: change transient busy return code to -ENOSPC
- [PATCH v10 06/20] crypto: introduce crypto wait for async op
- [PATCH v10 07/20] crypto: move algif to generic async completion
- [PATCH v10 08/20] crypto: move pub key to generic async completion
- [PATCH v10 09/20] crypto: move drbg to generic async completion
- [PATCH v10 10/20] crypto: move gcm to generic async completion
- [PATCH v10 11/20] crypto: move testmgr to generic async completion
- [PATCH v10 12/20] fscrypt: move to generic async completion
- [PATCH v10 04/20] crypto: remove redundant backlog checks on EBUSY
- [PATCH v10 13/20] dm: move dm-verity to generic async completion
- [PATCH v10 14/20] cifs: move to generic async completion
- [PATCH v10 15/20] ima: move to generic async completion
- [PATCH v10 16/20] crypto: tcrypt: move to generic async completion
- [PATCH v10 17/20] crypto: talitos: move to generic async completion
- [PATCH v10 18/20] crypto: qce: move to generic async completion
- [PATCH v10 19/20] crypto: mediatek: move to generic async completion
- [PATCH v10 20/20] crypto: adapt api sample to use async. op wait
- [PATCH v10 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v10 03/20] net: use -ENOSPC for transient busy indication
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Russell King - ARM Linux
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- Re: [PATCH v9 17/20] crypto: talitos: move to generic async completion
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- [PATCH v9 00/20] simplify crypto wait for async op
- [PATCH v9 01/20] crypto: change transient busy return code to -EAGAIN
- [PATCH v9 02/20] crypto: ccp: use -EAGAIN for transient busy indication
- [PATCH v9 03/20] net: use -EAGAIN for transient busy indication
- [PATCH v9 04/20] crypto: remove redundant backlog checks on EBUSY
- [PATCH v9 06/20] crypto: introduce crypto wait for async op
- [PATCH v9 07/20] crypto: move algif to generic async completion
- [PATCH v9 09/20] crypto: move drbg to generic async completion
- [PATCH v9 10/20] crypto: move gcm to generic async completion
- [PATCH v9 11/20] crypto: move testmgr to generic async completion
- [PATCH v9 12/20] fscrypt: move to generic async completion
- [PATCH v9 14/20] cifs: move to generic async completion
- [PATCH v9 15/20] ima: move to generic async completion
- [PATCH v9 17/20] crypto: talitos: move to generic async completion
- [PATCH v9 18/20] crypto: qce: move to generic async completion
- [PATCH v9 19/20] crypto: mediatek: move to generic async completion
- [PATCH v9 20/20] crypto: adapt api sample to use async. op wait
- [PATCH v9 16/20] crypto: tcrypt: move to generic async completion
- [PATCH v9 13/20] dm: move dm-verity to generic async completion
- [PATCH v9 08/20] crypto: move pub key to generic async completion
- [PATCH v9 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- Re: [PATCH] fscrypt: lock mutex before checking for bounce page pool
- Re: [PATCH v3] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH v2] fscrypt: fix dereference of NULL user_key_payload
- [PATCH v2 07/11] fscrypt: new helper function - fscrypt_file_open()
- [PATCH v2 02/11] fs, fscrypt: add an S_ENCRYPTED inode flag
- [PATCH v2 08/11] fscrypt: new helper function - fscrypt_prepare_link()
- [PATCH v2 01/11] fscrypt: clean up include file mess
- [PATCH v2 09/11] fscrypt: new helper function - fscrypt_prepare_rename()
- [PATCH v2 04/11] fscrypt: remove ->is_encrypted()
- [PATCH v2 11/11] fscrypt: new helper function - fscrypt_prepare_setattr()
- [PATCH v2 10/11] fscrypt: new helper function - fscrypt_prepare_lookup()
- [PATCH v2 06/11] fscrypt: new helper function - fscrypt_require_key()
- [PATCH v2 05/11] fscrypt: remove unneeded empty fscrypt_operations structs
- [PATCH v2 03/11] fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()
- [PATCH v2 00/11] fscrypt: add some higher-level helper functions
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- Re: Issue with encrypted filenames on UBIFS
- Re: Issue with encrypted filenames on UBIFS
- Re: Issue with encrypted filenames on UBIFS
- Re: Issue with encrypted filenames on UBIFS
- Issue with encrypted filenames on UBIFS
- Re: [PATCH 7/7] ecryptfs: move key payload accessor functions into keystore.c
- Re: [PATCH 6/7] ecryptfs: fix out-of-bounds read of key payload
- Re: [PATCH 5/7] ecryptfs: fix dereference of NULL user_key_payload
- Re: [PATCH 4/7] fscrypt: fix dereference of NULL user_key_payload
- Re: [PATCH 3/7] lib/digsig: fix dereference of NULL user_key_payload
- Re: [PATCH 2/7] FS-Cache: fix dereference of NULL user_key_payload
- Re: [PATCH 1/7] KEYS: encrypted: fix dereference of NULL user_key_payload
- [PATCH 1/7] KEYS: encrypted: fix dereference of NULL user_key_payload
- [PATCH 6/7] ecryptfs: fix out-of-bounds read of key payload
- [PATCH 2/7] FS-Cache: fix dereference of NULL user_key_payload
- [PATCH 7/7] ecryptfs: move key payload accessor functions into keystore.c
- [PATCH 3/7] lib/digsig: fix dereference of NULL user_key_payload
- [PATCH 5/7] ecryptfs: fix dereference of NULL user_key_payload
- [PATCH 4/7] fscrypt: fix dereference of NULL user_key_payload
- [PATCH 0/7] Fix dereferencing payload of revoked keys
- Re: [PATCH 00/25] fscrypt: add some higher-level helper functions
- Re: [PATCH 00/25] fscrypt: add some higher-level helper functions
- Re: [f2fs-dev] [PATCH 00/25] fscrypt: add some higher-level helper functions
- Re: [PATCH 00/25] fscrypt: add some higher-level helper functions
- [PATCH 05/25] fscrypt: new helper function - fscrypt_require_key()
- [PATCH 04/25] fscrypt: remove unneeded empty fscrypt_operations structs
- [PATCH 06/25] fscrypt: new helper function - fscrypt_file_open()
- [PATCH 10/25] fscrypt: new helper function - fscrypt_prepare_setattr()
- [PATCH 09/25] fscrypt: new helper function - fscrypt_prepare_lookup()
- [PATCH 03/25] fscrypt: remove ->is_encrypted()
- [PATCH 11/25] ext4: switch to fscrypt_file_open()
- [PATCH 15/25] ext4: switch to fscrypt_prepare_setattr()
- [PATCH 08/25] fscrypt: new helper function - fscrypt_prepare_rename()
- [PATCH 14/25] ext4: switch to fscrypt_prepare_lookup()
- [PATCH 12/25] ext4: switch to fscrypt_prepare_link()
- [PATCH 07/25] fscrypt: new helper function - fscrypt_prepare_link()
- [PATCH 13/25] ext4: switch to fscrypt_prepare_rename()
- [PATCH 21/25] ubifs: switch to fscrypt_file_open()
- [PATCH 20/25] f2fs: switch to fscrypt_prepare_setattr()
- [PATCH 17/25] f2fs: switch to fscrypt_prepare_link()
- [PATCH 22/25] ubifs: switch to fscrypt_prepare_link()
- [PATCH 16/25] f2fs: switch to fscrypt_file_open()
- [PATCH 23/25] ubifs: switch to fscrypt_prepare_rename()
- [PATCH 25/25] ubifs: switch to fscrypt_prepare_setattr()
- [PATCH 24/25] ubifs: switch to fscrypt_prepare_lookup()
- [PATCH 19/25] f2fs: switch to fscrypt_prepare_lookup()
- [PATCH 18/25] f2fs: switch to fscrypt_prepare_rename()
- [PATCH 02/25] fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()
- [PATCH 01/25] fs, fscrypt: add an S_ENCRYPTED inode flag
- [PATCH 00/25] fscrypt: add some higher-level helper functions
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH] fscrypt: lock mutex before checking for bounce page pool
- [PATCH v3] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH 0/3] fscrypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- [PATCH 3/3] UBIFS crypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts
- [PATCH 2/3] F2FS crypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts
- [PATCH 1/3] ext4 crypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts
- [PATCH 0/3] fscrypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH v2] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH v2] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- [PATCH v8 04/20] crypto: remove redundant backlog checks on EBUSY
- [PATCH v8 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v8 10/20] crypto: move gcm to generic async completion
- [PATCH v8 11/20] crypto: move testmgr to generic async completion
- [PATCH v8 12/20] fscrypt: move to generic async completion
- [PATCH v8 13/20] dm: move dm-verity to generic async completion
- [PATCH v8 14/20] cifs: move to generic async completion
- [PATCH v8 15/20] ima: move to generic async completion
- [PATCH v8 16/20] crypto: tcrypt: move to generic async completion
- [PATCH v8 17/20] crypto: talitos: move to generic async completion
- [PATCH v8 20/20] crypto: adapt api sample to use async. op wait
- [PATCH v8 19/20] crypto: mediatek: move to generic async completion
- [PATCH v8 18/20] crypto: qce: move to generic async completion
- [PATCH v8 09/20] crypto: move drbg to generic async completion
- [PATCH v8 08/20] crypto: move pub key to generic async completion
- [PATCH v8 07/20] crypto: move algif to generic async completion
- [PATCH v8 06/20] crypto: introduce crypto wait for async op
- [PATCH v8 03/20] net: use -EAGAIN for transient busy indication
- [PATCH v8 02/20] crypto: ccp: use -EAGAIN for transient busy indication
- [PATCH v8 00/20] simplify crypto wait for async op
- Re: [PATCH v7 00/19] simplify crypto wait for async op
- Re: [PATCH v7 00/19] simplify crypto wait for async op
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH v7 00/19] simplify crypto wait for async op
- Re: [PATCH v2] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH v2] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH v7 00/19] simplify crypto wait for async op
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH v7 00/19] simplify crypto wait for async op
- [PATCH v7 01/19] crypto: change transient busy return code to -EAGAIN
- [PATCH v7 02/19] crypto: ccp: use -EAGAIN for transient busy indication
- [PATCH v7 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v7 05/19] crypto: introduce crypto wait for async op
- [PATCH v7 06/19] crypto: move algif to generic async completion
- [PATCH v7 07/19] crypto: move pub key to generic async completion
- [PATCH v7 08/19] crypto: move drbg to generic async completion
- [PATCH v7 10/19] crypto: move testmgr to generic async completion
- [PATCH v7 12/19] dm: move dm-verity to generic async completion
- [PATCH v7 11/19] fscrypt: move to generic async completion
- [PATCH v7 13/19] cifs: move to generic async completion
- [PATCH v7 14/19] ima: move to generic async completion
- [PATCH v7 15/19] crypto: tcrypt: move to generic async completion
- [PATCH v7 16/19] crypto: talitos: move to generic async completion
- [PATCH v7 18/19] crypto: mediatek: move to generic async completion
- [PATCH v7 19/19] crypto: adapt api sample to use async. op wait
- [PATCH v7 17/19] crypto: qce: move to generic async completion
- [PATCH v7 09/19] crypto: move gcm to generic async completion
- [PATCH v7 03/19] crypto: remove redundant backlog checks on EBUSY
- Re: [PATCH v6 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- Re: [PATCH v6 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH v6 00/19] simplify crypto wait for async op
- [PATCH v6 01/19] crypto: change transient busy return code to -EAGAIN
- [PATCH v6 03/19] crypto: remove redundant backlog checks on EBUSY
- [PATCH v6 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v6 06/19] crypto: move algif to generic async completion
- [PATCH v6 05/19] crypto: introduce crypto wait for async op
- [PATCH v6 07/19] crypto: move pub key to generic async completion
- [PATCH v6 10/19] crypto: move testmgr to generic async completion
- [PATCH v6 11/19] fscrypt: move to generic async completion
- [PATCH v6 12/19] dm: move dm-verity to generic async completion
- [PATCH v6 13/19] cifs: move to generic async completion
- [PATCH v6 14/19] ima: move to generic async completion
- [PATCH v6 15/19] crypto: tcrypt: move to generic async completion
- [PATCH v6 16/19] crypto: talitos: move to generic async completion
- [PATCH v6 17/19] crypto: qce: move to generic async completion
- [PATCH v6 18/19] crypto: mediatek: move to generic async completion
- [PATCH v6 19/19] crypto: adapt api sample to use async. op wait
- [PATCH v6 09/19] crypto: move gcm to generic async completion
- [PATCH v6 08/19] crypto: move drbg to generic async completion
- [PATCH v6 02/19] crypto: ccp: use -EAGAIN for transient busy indication
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH v5 05/19] crypto: introduce crypto wait for async op
- Re: [dm-devel] [PATCH v5 12/19] dm: move dm-verity to generic async completion
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [dm-devel] [PATCH v5 12/19] dm: move dm-verity to generic async completion
- Re: [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- [PATCH] fscrypt: add a documentation file for filesystem-level encryption
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- [PATCH v2] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH v5 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- Re: [PATCH v5 18/19] crypto: mediatek: move to generic async completion
- Re: [PATCH v5 05/19] crypto: introduce crypto wait for async op
- Re: [PATCH v5 02/19] crypto: ccp: use -EAGAIN for transient busy indication
- [PATCH v5 00/19] simplify crypto wait for async op
- [PATCH v5 01/19] crypto: change transient busy return code to -EAGAIN
- [PATCH v5 06/19] crypto: move algif to generic async completion
- [PATCH v5 05/19] crypto: introduce crypto wait for async op
- [PATCH v5 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v5 03/19] crypto: remove redundant backlog checks on EBUSY
- [PATCH v5 07/19] crypto: move pub key to generic async completion
- [PATCH v5 12/19] dm: move dm-verity to generic async completion
- [PATCH v5 11/19] fscrypt: move to generic async completion
- [PATCH v5 10/19] crypto: move testmgr to generic async completion
- [PATCH v5 13/19] cifs: move to generic async completion
- [PATCH v5 15/19] crypto: tcrypt: move to generic async completion
- [PATCH v5 16/19] crypto: talitos: move to generic async completion
- [PATCH v5 18/19] crypto: mediatek: move to generic async completion
- [PATCH v5 19/19] crypto: adapt api sample to use async. op wait
- [PATCH v5 17/19] crypto: qce: move to generic async completion
- [PATCH v5 14/19] ima: move to generic async completion
- [PATCH v5 09/19] crypto: move gcm to generic async completion
- [PATCH v5 08/19] crypto: move drbg to generic async completion
- [PATCH v5 02/19] crypto: ccp: use -EAGAIN for transient busy indication
- Re: [PATCH v4 02/19] crypto: ccm: use -EAGAIN for transient busy indication
- Re: [PATCH v4 02/19] crypto: ccm: use -EAGAIN for transient busy indication
- Re: [PATCH v4 06/19] crypto: move algif to generic async completion
- [PATCH v4 00/19] simplify crypto wait for async op
- [PATCH v4 01/19] crypto: change transient busy return code to -EAGAIN
- [PATCH v4 02/19] crypto: ccm: use -EAGAIN for transient busy indication
- [PATCH v4 03/19] crypto: remove redundant backlog checks on EBUSY
- [PATCH v4 04/19] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- [PATCH v4 06/19] crypto: move algif to generic async completion
- [PATCH v4 05/19] crypto: introduce crypto wait for async op
- [PATCH v4 07/19] crypto: move pub key to generic async completion
- [PATCH v4 10/19] crypto: move testmgr to generic async completion
- [PATCH v4 09/19] crypto: move gcm to generic async completion
- [PATCH v4 08/19] crypto: move drbg to generic async completion
- [PATCH v4 12/19] dm: move dm-verity to generic async completion
- [PATCH v4 11/19] fscrypt: move to generic async completion
- [PATCH v4 13/19] cifs: move to generic async completion
- [PATCH v4 14/19] ima: move to generic async completion
- [PATCH v4 15/19] crypto: tcrypt: move to generic async completion
- [PATCH v4 17/19] crypto: qce: move to generic async completion
- [PATCH v4 16/19] crypto: talitos: move to generic async completion
- [PATCH v4 19/19] crypto: adapt api sample to use async. op wait
- [PATCH v4 18/19] crypto: mediatek: move to generic async completion
- Re: [GIT PULL] ext4 bug fixes for 4.13
- Re: [GIT PULL] ext4 bug fixes for 4.13
- [GIT PULL] ext4 bug fixes for 4.13
- [PATCH v2 2/7] fscrypt: rename ->ci_master_key to ->ci_master_key_descriptor
- [PATCH v2 1/7] fscrypt: add v2 encryption context and policy
- [PATCH v2 6/7] fscrypt: cache the HMAC transform for each master key
- [PATCH v2 7/7] fscrypt: for v2 policies, support "fscrypt:" key prefix only
- [PATCH v2 4/7] fscrypt: validate modes and flags earlier when setting policy
- [PATCH v2 3/7] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- [PATCH v2 5/7] fscrypt: verify that the correct master key was supplied
- [PATCH v2 0/7] fscrypt: key verification and KDF improvement
- Re: [PATCH 5/6] fscrypt: cache the HMAC transform for each master key
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: fscrypt request_module() deadlock
- Re: fscrypt request_module() deadlock
- Re: fscrypt request_module() deadlock
- [PATCH] fscrypt: trim down fscrypt_common.h
- Re: [PATCH 6/6] fscrypt: for v2 policies, support "fscrypt:" key prefix only
- Re: [PATCH 5/6] fscrypt: cache the HMAC transform for each master key
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 2/6] fscrypt: rename ->ci_master_key to ->ci_master_key_descriptor
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- [PATCH 1/6] fscrypt: add v2 encryption context and policy
- [PATCH 2/6] fscrypt: rename ->ci_master_key to ->ci_master_key_descriptor
- [PATCH 5/6] fscrypt: cache the HMAC transform for each master key
- [PATCH 6/6] fscrypt: for v2 policies, support "fscrypt:" key prefix only
- [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- [PATCH 0/6] fscrypt: key verification and KDF improvement
- [GIT PULL] fscrypt updates for 4.13
- Re: [PATCH 2/2] ext4: fix __ext4_new_inode() journal credits calculation
- [PATCH] fscrypt: lock mutex before checking for bounce page pool
- [PATCH 1/2] ext4: skip ext4_init_security() and encryption on ea_inodes
- [PATCH 2/2] ext4: fix __ext4_new_inode() journal credits calculation
- Re: [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- Re: [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- [PATCH v3 08/28] crypto: talitos: use -EIOCBQUEUED for backlog indication
- [PATCH v3 05/28] crypto: mediatek: use -EIOCBQUEUED for backlog indication
- [PATCH v3 10/28] fscrypt: use -EIOCBQUEUED for backlog indication
- [PATCH v3 12/28] ima: use -EIOCBQUEUED for backlog indication
- [PATCH v3 18/28] crypto: move gcm to generic async completion
- [PATCH v3 22/28] cifs: move to generic async completion
- [PATCH v3 20/28] dm: move dm-verity to generic async completion
- [PATCH v3 27/28] crypto: mediatek: move to generic async completion
- [PATCH v3 28/28] crypto: adapt api sample to use async. op wait
- [PATCH v3 26/28] crypto: qce: move to generic async completion
- [PATCH v3 25/28] crypto: talitos: move to generic async completion
- [PATCH v3 24/28] crypto: tcrypt: move to generic async completion
- [PATCH v3 23/28] ima: move to generic async completion
- [PATCH v3 21/28] fscrypt: move to generic async completion
- [PATCH v3 19/28] crypto: move testmgr to generic async completion
- [PATCH v3 17/28] crypto: move drbg to generic async completion
- [PATCH v3 16/28] crypto: move pub key to generic async completion
- [PATCH v3 15/28] crypto: move algif to generic async completion
- [PATCH v3 14/28] crypto: introduce crypto wait for async op
- [PATCH v3 13/28] crypto: adapt api sample to -EIOCBQUEUED as backlog indication
- [PATCH v3 11/28] cifs: use -EIOCBQUEUED for backlog indication
- [PATCH v3 09/28] dm: verity: use -EIOCBQUEUED for backlog indication
- [PATCH v3 07/28] crypto: qce: use -EIOCBQUEUED for backlog indication
- [PATCH v3 06/28] crypto: omap: use -EIOCBQUEUED for backlog indication
- [PATCH v3 04/28] crypto: marvell/cesa: use -EIOCBQUEUED for backlog indication
- [PATCH v3 03/28] crypto: ccm: use -EIOCBQUEUED for backlog indication
- [PATCH v3 02/28] crypto: atmel: use -EIOCBQUEUED for backlog indication
- [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- [PATCH v3 00/28] simplify crypto wait for async op
- fscrypt request_module() deadlock
- Re: fscrypt: make ->dummy_context() return bool
- Re: [PATCH v5] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] fscrypt: inline fscrypt_free_filename()
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/4] ext4: don't bother checking for encryption key in ->mmap()
- Re: [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- Re: [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- Re: [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- Re: [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- Re: [PATCH v2] ext4: forbid encrypting root directory
- [PATCH] fscrypt: make ->dummy_context() return bool
- Re: [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [PATCH v2] ext4: forbid encrypting root directory
- [PATCH v5] fscrypt: Add support for AES-128-CBC
- Re: [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- [PATCH v2] ext4: forbid encrypting root directory
- Re: [PATCH] ext4: forbid encrypting root directory
- Re: [dm-crypt] [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [dm-crypt] [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- Re: [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- Re: [PATCH] ext4: forbid encrypting root directory
- Re: [PATCH] ext4: forbid encrypting root directory
- Re: [PATCH] ext4: forbid encrypting root directory
- [RFC PATCH 3/4] ext4: Set the bio REQ_NOENCRYPT flag
- [RFC PATCH 1/4] block: Add bio req flag to disable encryption in block
- [RFC PATCH 4/4] f2fs: Set the bio REQ_NOENCRYPT flag
- [RFC PATCH 2/4] dm-crypt: Skip encryption of file system-encrypted blocks
- [RFC PATCH 0/4] Allow file systems to selectively bypass dm-crypt
- [PATCH] ext4: forbid encrypting root directory
- Re: [f2fs-dev] [PATCH 2/3] f2fs: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- Re: [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- [PATCH 3/3] ubifs: require key for truncate(2) of encrypted file
- [PATCH 2/3] f2fs: require key for truncate(2) of encrypted file
- [PATCH 1/3] ext4: require key for truncate(2) of encrypted file
- [PATCH 0/3] fscrypt: forbid truncate(2) without key
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- [PATCH] generic: test for buggy fscrypt context consistency check
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- [PATCH v2 00/11] introduce crypto wait for async op
- [PATCH v2 01/11] crypto: introduce crypto wait for async op
- [PATCH v2 02/11] crypto: move algif to generic async completion
- [PATCH v2 03/11] crypto: move pub key to generic async completion
- [PATCH v2 04/11] crypto: move drbg to generic async completion
- [PATCH v2 05/11] crypto: move gcm to generic async completion
- [PATCH v2 06/11] crypto: move testmgr to generic async completion
- [PATCH v2 09/11] cifs: move to generic async completion
- [PATCH v2 07/11] dm: move dm-verity to generic async completion
- [PATCH v2 11/11] crypto: adapt api sample to use async. op wait
- [PATCH v2 10/11] ima: move to generic async completion
- [PATCH v2 08/11] fscrypt: move to generic async completion
- Re: [PATCH] ext4: remove redundant check for encrypted file on dio write path
- Re: [PATCH] ext4: remove redundant check for encrypted file on dio write path
- Re: [PATCH v4] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] ext4: remove redundant check for encrypted file on dio write path
- Re: [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- Re: [f2fs-dev] [PATCH 4/4] f2fs: don't bother checking for encryption key in ->write_iter()
- Re: [f2fs-dev] [PATCH 2/4] f2fs: don't bother checking for encryption key in ->mmap()
- Re: [PATCH] ext4: remove redundant check for encrypted file on dio write path
- Re: [PATCH] ext4: remove redundant check for encrypted file on dio write path
- Re: [PATCH] fscrypt: inline fscrypt_free_filename()
- Re: [PATCH 0/4] fscrypt: remove checks for encryption key after file open
- [PATCH v4] fscrypt: Add support for AES-128-CBC
- [PATCH] fscrypt: inline fscrypt_free_filename()
- [PATCH] ext4: remove redundant check for encrypted file on dio write path
- [PATCH 4/4] f2fs: don't bother checking for encryption key in ->write_iter()
- [PATCH 3/4] ubifs: don't bother checking for encryption key in ->mmap()
- [PATCH 2/4] f2fs: don't bother checking for encryption key in ->mmap()
- [PATCH 1/4] ext4: don't bother checking for encryption key in ->mmap()
- [PATCH 0/4] fscrypt: remove checks for encryption key after file open
- Re: [PATCH v3] fscrypt: Add support for AES-128-CBC
- Re: [PATCH v3] fscrypt: Add support for AES-128-CBC
- [PATCH] ubifs: Don't encrypt special files on creation
- [PATCH v3] fscrypt: Add support for AES-128-CBC
- [PATCH v2] generic: test that encrypted filenames are presented without collisions
- Re: [PATCH] generic: test that encrypted filenames are presented without collisions
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: [PATCH] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Re: Question on fscrypt_d_revalidate() and fstest generic/429
- Question on fscrypt_d_revalidate() and fstest generic/429
- [GIT PULL] fscrypt updates for 4.12
- Re: [PATCH] generic: test revalidation of encrypted dentries
- [PATCH] generic: test revalidation of encrypted dentries
- Re: [1/4] fscrypt: fix context consistency check when key(s) unavailable
- Re: [PATCH] fscrypt: correct collision claim for digested names
- Re: [PATCH] generic: test that encrypted filenames are presented without collisions
- Re: [PATCH 1/6] f2fs: check entire encrypted bigname when finding a dentry
- Re: [PATCH 1/6] f2fs: check entire encrypted bigname when finding a dentry
- Re: [1/4] fscrypt: fix context consistency check when key(s) unavailable
- Re: [PATCH] ext4: inherit encryption xattr before other xattrs
- [PATCH] generic: test that encrypted filenames are presented without collisions
- Re: [PATCH] ext4: inherit encryption xattr before other xattrs
- [PATCH] fscrypt: correct collision claim for digested names
- Re: MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [6/6] ext4: clean up ext4_match() and callers
- Re: [5/6] f2fs: switch to using fscrypt_match_name()
- Re: [4/6] ext4: switch to using fscrypt_match_name()
- Re: [3/6] fscrypt: introduce helper function for filename matching
- Re: [2/6] fscrypt: avoid collisions when presenting long encrypted filenames
- Re: [1/6] f2fs: check entire encrypted bigname when finding a dentry
- Re: [4/4] ubifs: check for consistent encryption contexts in ubifs_lookup()
- Re: [3/4] f2fs: sync f2fs_lookup() with ext4_lookup()
- Re: [2/4] ext4: remove "nokey" check from ext4_lookup()
- Re: [1/4] fscrypt: fix context consistency check when key(s) unavailable
- Re: [v2] fscrypt: Remove __packed from fscrypt_policy
- Re: [v2] fscrypt: Move key structure and constants to uapi
- Re: fscrypt: remove fscrypt_symlink_data_len()
- Re: fscrypt: remove unnecessary checks for NULL operations
- Re: [PATCH 3/6] fscrypt: introduce helper function for filename matching
- Re: [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- Re: [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- From: David Oberhollenzer
- Re: [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- [PATCH] MAINTAINERS: fscrypt: update mailing list, patchwork, and git
- Re: [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- Re: [PATCH v2] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- From: David Oberhollenzer
- Re: [PATCH v2] fscrypt: Add support for AES-128-CBC
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- Re: [PATCH v2] fscrypt: Add support for AES-128-CBC
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- Re: [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- [PATCH v2] fscrypt: Add support for AES-128-CBC
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- Re: [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- Re: [PATCH 1/6] f2fs: check entire encrypted bigname when finding a dentry
- [PATCH] ubifs: Return -ENOKEY from rename if encryption keys are missing
- Re: [PATCH] ubifs: Correctly handle 0 value hashes in ubifs_lookup()
- [PATCH] ubifs: Correctly handle 0 value hashes in ubifs_lookup()
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- [PATCH 5/6] f2fs: switch to using fscrypt_match_name()
- [PATCH 4/6] ext4: switch to using fscrypt_match_name()
- [PATCH 6/6] ext4: clean up ext4_match() and callers
- [PATCH 2/6] fscrypt: avoid collisions when presenting long encrypted filenames
- [PATCH 3/6] fscrypt: introduce helper function for filename matching
- [PATCH 1/6] f2fs: check entire encrypted bigname when finding a dentry
- [PATCH 0/6] fscrypt: fixes for presentation of long encrypted filenames
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- From: David Oberhollenzer
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [f2fs-dev] [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- Re: [PATCH] fscrypt: use 32 bytes of encrypted filename
- [PATCH] fscrypt: use 32 bytes of encrypted filename
- [PATCH 4/4] ubifs: check for consistent encryption contexts in ubifs_lookup()
- [PATCH 3/4] f2fs: sync f2fs_lookup() with ext4_lookup()
- [PATCH 2/4] ext4: remove "nokey" check from ext4_lookup()
- [PATCH 1/4] fscrypt: fix context consistency check when key(s) unavailable
- [PATCH 0/4] fscrypt context consistency check fixes
- Re: [PATCH v2] fscrypt: Remove __packed from fscrypt_policy
- [PATCH v2] fscrypt: Remove __packed from fscrypt_policy
- [PATCH v2] fscrypt: Move key structure and constants to uapi
- Re: [PATCH] fscrypt: remove unnecessary checks for NULL operations
- Re: [PATCH] fscrypt: remove fscrypt_symlink_data_len()
- Re: [PATCH] fscrypt: Move key structure and constants to uapi
- Re: [PATCH] fscrypt: Remove __packed from fscrypt_policy
- [PATCH] fscrypt: Remove __packed from fscrypt_policy
- [PATCH] fscrypt: Move key structure and constants to uapi
- [PATCH] fscrypt: remove fscrypt_symlink_data_len()
- [PATCH] fscrypt: remove unnecessary checks for NULL operations
- Re: [PATCH] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: [PATCH] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] fscrypt: Add support for AES-128-CBC
- Re: [PATCH] fscrypt: Add support for AES-128-CBC
- [PATCH] KEYS: make keyctl_invalidate() also require Setattr permission
- Re: Creating a mailing list, git tree, and patchwork project for fscrypt
- Re: [GIT PULL] fscrypt bug fixes for 4.11
- Re: [PATCH] fscrypt: eliminate ->prepare_context() operation
- Re: [PATCH] ext4: mark inode dirty after converting inline directory
- Re: [PATCH] ext4: mark inode dirty after converting inline directory
- Re: [PATCH] generic: test encryption key revocation during concurrent I/O
- Re: [PATCH] fscrypt: remove broken support for detecting keyring key revocation
- Re: [PATCH] generic: test encryption key revocation during concurrent I/O
- [PATCH] generic: test encryption key revocation during concurrent I/O
- Re: [PATCH] fscrypt: remove broken support for detecting keyring key revocation
- Re: [PATCH] fscrypt: remove broken support for detecting keyring key revocation
- Re: Why does keyctl_invalidate() only require Search permission?
- New kvm-xfstests images uploaded
- Re: [PATCH] ext4: inherit encryption xattr before other xattrs
- Re: [PATCH] ext4: inherit encryption xattr before other xattrs
- Re: [PATCH] ext4: inherit encryption xattr before other xattrs
- [PATCH] fscrypt: eliminate ->prepare_context() operation
- [PATCH] ext4: mark inode dirty after converting inline directory
- Why does keyctl_invalidate() only require Search permission?
- [PATCH] fscrypt: remove broken support for detecting keyring key revocation
- [GIT PULL] fscrypt update for 4.11
- [PATCH] ext4: inherit encryption xattr before other xattrs
- Re: [PATCH v2] fscrypt: constify struct fscrypt_operations
- [PATCH v2] fscrypt: constify struct fscrypt_operations
- Re: [PATCH] fscrypt: split supp and notsupp declarations into their own headers
- Re: [PATCH] ext4: fix use-after-iput when fscrypt contexts are inconsistent
- [PATCH] ext4: fix use-after-iput when fscrypt contexts are inconsistent
- [PATCH] fscrypt: split supp and notsupp declarations into their own headers
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]