Filesystem Crypto
[Prev Page][Next Page]
- [PATCH v7 0/5] ima: support fs-verity digests and signatures
- [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
- [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
- [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
- [PATCH v7 5/5] fsverity: update the documentation
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- Re: [RFC PATCH v11 02/51] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [RFC PATCH v11 00/51] ceph+fscrypt : full support
- Re: [RFC PATCH v11 02/51] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [RFC PATCH v11 02/51] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [RFC PATCH v11 08/51] ceph: add support for fscrypt_auth/fscrypt_file to cap messages
- Re: [RFC PATCH v11 02/51] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [GIT PULL] fscrypt updates for 5.18
- Re: [RFC PATCH v11 00/51] ceph+fscrypt : full support
- [RFC PATCH v11 51/51] ceph: fscrypt support for writepages
- [RFC PATCH v11 38/51] ceph: add object version support for sync read
- [RFC PATCH v11 50/51] ceph: add encryption support to writepage
- [RFC PATCH v11 06/51] ceph: crypto context handling for ceph
- [RFC PATCH v11 13/51] ceph: make the ioctl cmd more readable in debug log
- [RFC PATCH v11 08/51] ceph: add support for fscrypt_auth/fscrypt_file to cap messages
- [RFC PATCH v11 14/51] ceph: make ceph_msdc_build_path use ref-walk
- [RFC PATCH v11 07/51] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [RFC PATCH v11 12/51] ceph: add fscrypt ioctls
- [RFC PATCH v11 09/51] ceph: add ability to set fscrypt_auth via setattr
- [RFC PATCH v11 15/51] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [RFC PATCH v11 21/51] ceph: fix base64 encoded name's length check in ceph_fname_to_usr()
- [RFC PATCH v11 46/51] ceph: add read/modify/write to ceph_sync_write
- [RFC PATCH v11 30/51] ceph: don't allow changing layout on encrypted files/directories
- [RFC PATCH v11 20/51] ceph: add helpers for converting names for userland presentation
- [RFC PATCH v11 48/51] ceph: add fscrypt decryption support to ceph_netfs_issue_op
- [RFC PATCH v11 45/51] ceph: align data in pages in ceph_sync_write
- [RFC PATCH v11 47/51] ceph: plumb in decryption during sync reads
- [RFC PATCH v11 49/51] ceph: set i_blkbits to crypto block size for encrypted inodes
- [RFC PATCH v11 43/51] ceph: disable copy offload on encrypted inodes
- [RFC PATCH v11 39/51] ceph: add infrastructure for file encryption and decryption
- [RFC PATCH v11 37/51] ceph: add __ceph_sync_read helper support
- [RFC PATCH v11 41/51] libceph: allow ceph_osdc_new_request to accept a multi-op read
- [RFC PATCH v11 40/51] ceph: add truncate size handling support for fscrypt
- [RFC PATCH v11 44/51] ceph: don't use special DIO path for encrypted inodes
- [RFC PATCH v11 42/51] ceph: disable fallocate for encrypted inodes
- [RFC PATCH v11 36/51] ceph: add __ceph_get_caps helper support
- [RFC PATCH v11 34/51] ceph: get file size from fscrypt_file when present in inode traces
- [RFC PATCH v11 32/51] ceph: size handling for encrypted inodes in cap updates
- [RFC PATCH v11 35/51] ceph: handle fscrypt fields in cap messages from MDS
- [RFC PATCH v11 33/51] ceph: fscrypt_file field handling in MClientRequest messages
- [RFC PATCH v11 26/51] ceph: create symlinks with encrypted and base64-encoded targets
- [RFC PATCH v11 29/51] ceph: add some fscrypt guardrails
- [RFC PATCH v11 31/51] libceph: add CEPH_OSD_OP_ASSERT_VER support
- [RFC PATCH v11 28/51] ceph: add a new ceph.fscrypt.auth vxattr
- [RFC PATCH v11 27/51] ceph: make ceph_get_name decrypt filenames
- [RFC PATCH v11 25/51] ceph: add support to readdir for encrypted filenames
- [RFC PATCH v11 24/51] ceph: add ceph_encode_encrypted_dname() helper
- [RFC PATCH v11 23/51] ceph: pass the request to parse_reply_info_readdir()
- [RFC PATCH v11 17/51] ceph: encode encrypted name in dentry release
- [RFC PATCH v11 18/51] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [RFC PATCH v11 19/51] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [RFC PATCH v11 16/51] ceph: send altname in MClientRequest
- [RFC PATCH v11 22/51] ceph: add fscrypt support to ceph_fill_trace
- [RFC PATCH v11 10/51] ceph: implement -o test_dummy_encryption mount option
- [RFC PATCH v11 11/51] ceph: decode alternate_name in lease info
- [RFC PATCH v11 03/51] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [RFC PATCH v11 04/51] fscrypt: add fscrypt_context_for_new_inode
- [RFC PATCH v11 05/51] ceph: preallocate inode for ops that may create one
- [RFC PATCH v11 00/51] ceph+fscrypt : full support
- [RFC PATCH v11 01/51] vfs: export new_inode_pseudo
- [RFC PATCH v11 02/51] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- Re: [PATCH v6 5/5] fsverity: update the documentation
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- [GIT PULL] fscrypt updates for 5.18
- Re: [PATCH v6 5/5] fsverity: update the documentation
- [PATCH v6 5/5] fsverity: update the documentation
- [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- [PATCH v6 1/5] fs-verity: define a function to return the integrity protected file digest
- [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- [PATCH v6 0/5] ima: support fs-verity digests and signatures
- Re: [PATCH v8 0/5] tests for btrfs fsverity
- Re: [PATCH v8 5/5] generic: test fs-verity EFBIG scenarios
- Re: [PATCH v8 2/5] common/verity: support btrfs in generic fsverity tests
- Re: [PATCH v8 1/5] common/verity: require corruption functionality
- Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
- Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
- [PATCH v8 4/5] btrfs: test verity orphans with dmlogwrites
- [PATCH v8 5/5] generic: test fs-verity EFBIG scenarios
- [PATCH v8 3/5] btrfs: test btrfs specific fsverity corruption
- [PATCH v8 2/5] common/verity: support btrfs in generic fsverity tests
- [PATCH v8 1/5] common/verity: require corruption functionality
- [PATCH v8 0/5] tests for btrfs fsverity
- Re: [PATCH v7 2/5] btrfs: test btrfs specific fsverity corruption
- Re: [PATCH v7 5/5] generic: test fs-verity EFBIG scenarios
- Re: [PATCH v7 3/5] generic/574: corrupt btrfs merkle tree data
- Re: [PATCH v7 2/5] btrfs: test btrfs specific fsverity corruption
- Re: [PATCH v7 1/5] verity: require corruption functionality
- [PATCH v7 5/5] generic: test fs-verity EFBIG scenarios
- [PATCH v7 4/5] btrfs: test verity orphans with dmlogwrites
- [PATCH v7 3/5] generic/574: corrupt btrfs merkle tree data
- [PATCH v7 2/5] btrfs: test btrfs specific fsverity corruption
- [PATCH v7 1/5] verity: require corruption functionality
- [PATCH v7 0/5] tests for btrfs fsverity
- Re: [PATCH v6 4/4] generic: test fs-verity EFBIG scenarios
- Re: [PATCH v6 1/4] btrfs: test btrfs specific fsverity corruption
- Re: [PATCH v6 4/4] generic: test fs-verity EFBIG scenarios
- Re: [PATCH v6 2/4] generic/574: corrupt btrfs merkle tree data
- Re: [PATCH v6 1/4] btrfs: test btrfs specific fsverity corruption
- [PATCH v2 2/5] fscrypt-crypt-util: refactor get_key_and_iv()
- [PATCH v2 5/5] common/encrypt: verify the key identifiers
- [PATCH v2 1/5] fscrypt-crypt-util: use an explicit --direct-key option
- [PATCH v2 4/5] common/encrypt: log full ciphertext verification params
- [PATCH v2 0/5] xfstests: fscrypt test cleanups
- [PATCH v2 3/5] fscrypt-crypt-util: add support for dumping key identifier
- Re: [PATCH v5 3/3] fscrypt: add support for hardware-wrapped keys
- Re: [PATCH v5 1/3] block: add basic hardware-wrapped key support
- Re: [PATCH v5 3/3] fscrypt: add support for hardware-wrapped keys
- Re: [PATCH v5 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- Re: [PATCH v5 1/3] block: add basic hardware-wrapped key support
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- Re: [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- [RFC PATCH 6/8] fscrypt-crypt-util: add hardware KDF support
- [RFC PATCH 0/8] xfstests: test the fscrypt hardware-wrapped key support
- [RFC PATCH 3/8] fscrypt-crypt-util: add support for dumping key identifier
- [RFC PATCH 8/8] generic: verify ciphertext with hardware-wrapped keys
- [RFC PATCH 7/8] common/encrypt: support hardware-wrapped key testing
- [RFC PATCH 5/8] common/encrypt: verify the key identifiers
- [RFC PATCH 4/8] common/encrypt: log full ciphertext verification params
- [RFC PATCH 2/8] fscrypt-crypt-util: refactor get_key_and_iv()
- [RFC PATCH 1/8] fscrypt-crypt-util: use an explicit --direct-key option
- [PATCH v5 3/3] fscrypt: add support for hardware-wrapped keys
- [PATCH v5 0/3] Support for hardware-wrapped inline encryption keys
- [PATCH v5 1/3] block: add basic hardware-wrapped key support
- [PATCH v5 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- Re: [PATCH v3 1/2] fs/proc: Optimize arrays defined by struct ctl_path
- Re: [PATCH v3 2/2] fs/proc: Optimize arrays defined by struct ctl_path
- Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v3 2/2] fs/proc: Optimize arrays defined by struct ctl_path
- [PATCH v3 1/2] fs/proc: Optimize arrays defined by struct ctl_path
- RE: [PATCH v2] fs/proc: Optimize arrays defined by struct ctl_path
- [PATCH v2] fs/proc: Optimize arrays defined by struct ctl_path
- Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v5 6/8] ima: define signature version 3
- Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
- Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
- [PATCH] fs/proc: Optimize arrays defined by struct ctl_path
- Re: [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- [PATCH v6 4/4] generic: test fs-verity EFBIG scenarios
- [PATCH v6 3/4] btrfs: test verity orphans with dmlogwrites
- [PATCH v6 1/4] btrfs: test btrfs specific fsverity corruption
- [PATCH v6 2/4] generic/574: corrupt btrfs merkle tree data
- [PATCH v6 0/4] tests for btrfs fsverity
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
- [PATCH v5 8/8] fsverity: update the documentation
- [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
- [PATCH v5 0/8] ima: support fs-verity digests and signatures
- [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v5 6/8] ima: define signature version 3
- [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
- [PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
- [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
- Re: [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
- Re: [RFC PATCH 1/7] statx: add I/O alignment information
- Re: [RFC PATCH 1/7] statx: add I/O alignment information
- Re: [PATCH v11 0/5] add support for direct I/O with fscrypt using blk-crypto
- [RFC PATCH 6/7] f2fs: simplify f2fs_force_buffered_io()
- [RFC PATCH 2/7] fscrypt: change fscrypt_dio_supported() to prepare for STATX_IOALIGN
- [RFC PATCH 0/7] make statx() return I/O alignment information
- [RFC PATCH 7/7] f2fs: support STATX_IOALIGN
- [RFC PATCH 1/7] statx: add I/O alignment information
- [RFC PATCH 4/7] f2fs: move f2fs_force_buffered_io() into file.c
- [RFC PATCH 3/7] ext4: support STATX_IOALIGN
- [RFC PATCH 5/7] f2fs: don't allow DIO reads but not DIO writes
- Re: [PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- [no subject]
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v5 0/4] tests for btrfs fsverity
- Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v5 0/4] tests for btrfs fsverity
- [PATCH v4 8/8] fsverity: update the documentation
- [PATCH v4 3/8] fs-verity: define a function to return the integrity protected file digest
- [PATCH v4 0/8] ima: support fs-verity digests and signatures
- [PATCH v4 2/8] ima: define ima_max_digest_data struct without a flexible array variable
- [PATCH v4 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
- [PATCH v4 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v4 6/8] ima: define signature version 3
- [PATCH v4 5/8] ima: permit fsverity's file digests in the IMA measurement list
- [ANNOUNCE] fsverity-utils v1.5
- Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v11 5/5] fscrypt: update documentation for direct I/O support
- Re: [PATCH v11 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
- Re: [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [PATCH v11 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 5/5] fscrypt: update documentation for direct I/O support
- [PATCH v11 3/5] ext4: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 1/5] fscrypt: add functions for direct I/O support
- [PATCH v11 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- [RFC][PATCH v3a 10/11] evm: Include fsverity formatted digest in the HMAC/digest calculation
- [RFC][PATCH v3a 09/11] ima: Add support for fsverity signatures
- [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- [RFC][PATCH v3a 06/11] fsverity: Introduce fsverity_get_formatted_digest()
- [RFC][PATCH v3a 07/11] fsverity: Introduce fsverity_get_signature()
- [RFC][PATCH v3a 08/11] fsverity: Completely disable signature verification if not requested
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 03/48] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- Re: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: fscrypt and potential issues from file sparseness
- fscrypt and potential issues from file sparseness
- [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- [PATCH v3 6/8] ima: define signature version 3
- [PATCH v3 8/8] fsverity: update the documentation
- [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
- [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
- [PATCH v3 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v3 2/8] ima: define ima_max_digest_data struct without a flexible array variable
- [PATCH v3 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- [PATCH v10 3/5] ext4: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 5/5] fscrypt: update documentation for direct I/O support
- [PATCH v10 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [RFC PATCH v10 36/48] ceph: add truncate size handling support for fscrypt
- [PATCH v8] ceph: add truncate size handling support for fscrypt
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- [RFC PATCH v10 45/48] ceph: set i_blkbits to crypto block size for encrypted inodes
- [RFC PATCH v10 48/48] ceph: fscrypt support for writepages
- [RFC PATCH v10 46/48] ceph: add fscrypt decryption support to ceph_netfs_issue_op
- [RFC PATCH v10 27/48] libceph: add CEPH_OSD_OP_ASSERT_VER support
- [RFC PATCH v10 33/48] ceph: add __ceph_sync_read helper support
- [RFC PATCH v10 37/48] libceph: allow ceph_osdc_new_request to accept a multi-op read
- [RFC PATCH v10 36/48] ceph: add truncate size handling support for fscrypt
- [RFC PATCH v10 34/48] ceph: add object version support for sync read
- [RFC PATCH v10 35/48] ceph: add infrastructure for file encryption and decryption
- [RFC PATCH v10 40/48] ceph: don't use special DIO path for encrypted inodes
- [RFC PATCH v10 38/48] ceph: disable fallocate for encrypted inodes
- [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- [RFC PATCH v10 42/48] ceph: align data in pages in ceph_sync_write
- [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- [RFC PATCH v10 41/48] ceph: set encryption context on open
- [RFC PATCH v10 39/48] ceph: disable copy offload on encrypted inodes
- [RFC PATCH v10 32/48] ceph: add __ceph_get_caps helper support
- [RFC PATCH v10 30/48] ceph: get file size from fscrypt_file when present in inode traces
- [RFC PATCH v10 31/48] ceph: handle fscrypt fields in cap messages from MDS
- [RFC PATCH v10 29/48] ceph: fscrypt_file field handling in MClientRequest messages
- [RFC PATCH v10 28/48] ceph: size handling for encrypted inodes in cap updates
- [RFC PATCH v10 20/48] ceph: add fscrypt support to ceph_fill_trace
- [RFC PATCH v10 18/48] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [RFC PATCH v10 19/48] ceph: add helpers for converting names for userland presentation
- [RFC PATCH v10 22/48] ceph: create symlinks with encrypted and base64-encoded targets
- [RFC PATCH v10 23/48] ceph: make ceph_get_name decrypt filenames
- [RFC PATCH v10 25/48] ceph: add some fscrypt guardrails
- [RFC PATCH v10 21/48] ceph: add support to readdir for encrypted filenames
- [RFC PATCH v10 47/48] ceph: add encryption support to writepage
- [RFC PATCH v10 15/48] ceph: send altname in MClientRequest
- [RFC PATCH v10 17/48] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [RFC PATCH v10 16/48] ceph: encode encrypted name in dentry release
- [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- [RFC PATCH v10 26/48] ceph: don't allow changing layout on encrypted files/directories
- [RFC PATCH v10 24/48] ceph: add a new ceph.fscrypt.auth vxattr
- [RFC PATCH v10 14/48] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [RFC PATCH v10 13/48] ceph: make ceph_msdc_build_path use ref-walk
- [RFC PATCH v10 12/48] ceph: add fscrypt ioctls
- [RFC PATCH v10 08/48] ceph: add fscrypt_* handling to caps.c
- [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
- [RFC PATCH v10 09/48] ceph: add ability to set fscrypt_auth via setattr
- [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [RFC PATCH v10 05/48] ceph: preallocate inode for ops that may create one
- [RFC PATCH v10 06/48] ceph: crypto context handling for ceph
- [RFC PATCH v10 02/48] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- [RFC PATCH v10 04/48] fscrypt: add fscrypt_context_for_new_inode
- [RFC PATCH v10 03/48] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [RFC PATCH v10 00/48] ceph+fscrypt: full support
- [RFC PATCH v10 01/48] vfs: export new_inode_pseudo
- [PATCH 14/14] KEYS: Introduce load_pgp_public_keyring()
- [PATCH 05/14] PGPLIB: Signature parser
- [PATCH 08/14] KEYS: PGP-based public key signature verification
- [PATCH 12/14] PGP: Provide a key type for testing PGP signatures
- [PATCH 11/14] verification: introduce verify_pgp_signature()
- [PATCH 06/14] KEYS: PGP data parser
- [PATCH 07/14] KEYS: Provide PGP key description autogeneration
- [PATCH 04/14] PGPLIB: Basic packet parser
- [PATCH 03/14] PGPLIB: PGP definitions (RFC 4880)
- [PATCH 13/14] KEYS: Provide a function to load keys from a PGP keyring blob
- [PATCH 10/14] KEYS: Calculate key digest and get signature of the key
- [PATCH 02/14] rsa: add parser of raw format
- [PATCH 09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature()
- [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- [PATCH 01/14] mpi: Introduce mpi_key_length()
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- [PATCH v2 6/6] fsverity: update the documentation
- [PATCH v2 3/6] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v2 4/6] ima: include fsverity's file digests in the IMA measurement list
- [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- [PATCH v2 1/6] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v2 0/6] ima: support fs-verity digests and signatures
- RE: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 09/10] soc: qcom: support for generate, import and prepare key
- Re: [PATCH 08/10] scsi: ufs: add support for generate, import and prepare keys
- Re: [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH 06/10] soc: qcom: add wrapped key support for ICE
- Re: [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
- Re: [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
- Re: [PATCH 03/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
- Re: [PATCH 01/10] soc: qcom: new common library for ICE functionality
- Re: [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 04/36] fscrypt: add fscrypt_context_for_new_inode
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- Re: [PATCH 03/36] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- Re: [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- [PATCH 32/36] ceph: handle fscrypt fields in cap messages from MDS
- [PATCH 34/36] ceph: add __ceph_sync_read helper support
- [PATCH 36/36] ceph: add truncate size handling support for fscrypt
- [PATCH 33/36] ceph: add __ceph_get_caps helper support
- [PATCH 35/36] ceph: add object version support for sync read
- [PATCH 31/36] ceph: get file size from fscrypt_file when present in inode traces
- [PATCH 29/36] ceph: size handling for encrypted inodes in cap updates
- [PATCH 27/36] ceph: don't allow changing layout on encrypted files/directories
- [PATCH 30/36] ceph: fscrypt_file field handling in MClientRequest messages
- [PATCH 28/36] libceph: add CEPH_OSD_OP_ASSERT_VER support
- [PATCH 26/36] ceph: add some fscrypt guardrails
- [PATCH 25/36] ceph: add a new ceph.fscrypt.auth vxattr
- [PATCH 24/36] ceph: make ceph_get_name decrypt filenames
- [PATCH 23/36] ceph: create symlinks with encrypted and base64-encoded targets
- [PATCH 20/36] ceph: add helpers for converting names for userland presentation
- [PATCH 21/36] ceph: add fscrypt support to ceph_fill_trace
- [PATCH 22/36] ceph: add support to readdir for encrypted filenames
- [PATCH 18/36] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [PATCH 17/36] ceph: encode encrypted name in dentry release
- [PATCH 16/36] ceph: send altname in MClientRequest
- [PATCH 19/36] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [PATCH 15/36] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [PATCH 14/36] ceph: make ceph_msdc_build_path use ref-walk
- [PATCH 11/36] ceph: implement -o test_dummy_encryption mount option
- [PATCH 10/36] ceph: add ability to set fscrypt_auth via setattr
- [PATCH 13/36] ceph: add fscrypt ioctls
- [PATCH 12/36] ceph: decode alternate_name in lease info
- [PATCH 09/36] ceph: add fscrypt_* handling to caps.c
- [PATCH 08/36] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [PATCH 07/36] ceph: crypto context handling for ceph
- [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- [PATCH 06/36] ceph: preallocate inode for ops that may create one
- [PATCH 04/36] fscrypt: add fscrypt_context_for_new_inode
- [PATCH 03/36] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- [PATCH 01/36] vfs: export new_inode_pseudo
- [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- RE: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- RE: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [PATCH 01/10] soc: qcom: new common library for ICE functionality
- [PATCH 09/10] soc: qcom: support for generate, import and prepare key
- [PATCH 10/10] arm64: dts: qcom: sm8350: add ice and hwkm mappings
- [PATCH 08/10] scsi: ufs: add support for generate, import and prepare keys
- [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH 06/10] soc: qcom: add wrapped key support for ICE
- [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
- [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
- [PATCH 03/10] qcom_scm: scm call for deriving a software secret
- [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
- [PATCH 01/10] soc: qcom: new common library for ICE functionality
- [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 5/5] fsverity: update the documentation
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v1 0/5] ima: support fs-verity signatures stored as
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH v1 5/5] fsverity: update the documentation
- [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- [PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- From: Lakshmi Ramasubramanian
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Lakshmi Ramasubramanian
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Lakshmi Ramasubramanian
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH 4/4] ima: support fs-verity file digest based signatures
- [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- [PATCH 0/4] ima: support fs-verity signatures stored as
- RE: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- [RFC PATCH v4 1/3] block: add basic hardware-wrapped key support
- [RFC PATCH v4 3/3] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v4 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v4 0/3] Support for hardware-wrapped inline encryption keys
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- RE: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- Re: [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- [RFC][PATCH 5/5] shmem: Add fsverity support
- [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- [RFC][PATCH 3/5] fsverity: Do initialization earlier
- [RFC][PATCH 1/5] fsverity: Introduce fsverity_get_file_digest()
- [RFC][PATCH 0/5] shmem/fsverity: Prepare for mandatory integrity enforcement
- Re: [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.14 025/138] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.15 027/146] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH] generic/574: remove invalid test of read completely past EOF
- Re: [PATCH 4/4] soc: qcom: add wrapped key support for ICE
- Re: [PATCH 3/4] soc: qcom: add HWKM library for storage encryption
- Re: [PATCH 2/4] qcom_scm: scm call for deriving a software secret
- Re: [PATCH 1/4] ufs: move ICE functionality to a common library
- Re: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- Re: [RFC PATCH v7 04/16] ipe: add userspace interface
- [PATCH 4/4] soc: qcom: add wrapped key support for ICE
- [PATCH 3/4] soc: qcom: add HWKM library for storage encryption
- [PATCH 2/4] qcom_scm: scm call for deriving a software secret
- [PATCH 1/4] ufs: move ICE functionality to a common library
- [PATCH 0/4] Adds wrapped key support for inline storage encryption
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 04/16] ipe: add userspace interface
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [GIT PULL] fscrypt updates for 5.16
- [GIT PULL] fscrypt updates for 5.16
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- [PATCH] fscrypt: improve a few comments
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: Btrfs Fscrypt Design Document
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: Btrfs Fscrypt Design Document
- Btrfs Fscrypt Design Document
- [RFC PATCH v3 3/3] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v3 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v3 1/3] block: add basic hardware-wrapped key support
- [RFC PATCH v3 0/3] Support for hardware-wrapped inline encryption keys
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- [RFC PATCH v7 08/16] ipe: add permissive toggle
- [RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions
- [RFC PATCH v7 07/16] ipe: add auditing support
- [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v7 09/16] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- [RFC PATCH v7 14/16] scripts: add boot policy generation program
- [RFC PATCH v7 13/16] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v7 16/16] documentation: add ipe documentation
- [RFC PATCH v7 15/16] ipe: kunit tests
- [RFC PATCH v7 10/16] fs|dm-verity: add block_dev LSM blob and submit dm-verity data
- [RFC PATCH v7 02/16] ipe: add policy parser
- [RFC PATCH v7 03/16] ipe: add evaluation loop
- [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- [RFC PATCH v7 04/16] ipe: add userspace interface
- [RFC PATCH v7 01/16] security: add ipe lsm & initial context creation
- Re: [GIT PULL] fsverity fix for 5.15-rc4
- Re: [GIT PULL] fsverity fix for 5.15-rc4
- [GIT PULL] fsverity fix for 5.15-rc4
- Re: [RFC PATCH v2 0/5] Support for hardware-wrapped inline encryption keys
- Re: [fsverity-utils] 1.4: test suite does not build
- Re: [PATCH] fs-verity: fix signed integer overflow with i_size near S64_MAX
- Re: [PATCH] fscrypt: clean up comments in bio.c
- Re: [PATCH] fscrypt: remove fscrypt_operations::max_namelen
- Re: [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [RFC PATCH v2 3/5] fscrypt: improve documentation for inline encryption
- [PATCH v3] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [fsverity-utils] 1.4: test suite does not build
- From: Aleksander Adamowski
- Re: [fsverity-utils] 1.4: test suite does not build
- Re: [fsverity-utils] 1.4: test suite does not build
- From: Aleksander Adamowski
- Re: [fsverity-utils] 1.4: test suite does not build
- 1.4: test suite does not build
- Re: [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [PATCH v5 4/4] generic: test fs-verity EFBIG scenarios
- [PATCH] fs-verity: fix signed integer overflow with i_size near S64_MAX
- [RFC PATCH v2 5/5] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v2 3/5] fscrypt: improve documentation for inline encryption
- [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- [RFC PATCH v2 2/5] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v2 1/5] block: add basic hardware-wrapped key support
- [RFC PATCH v2 0/5] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [RFC PATCH] fsverity: add enable sysctl
- Re: [RFC PATCH] fsverity: add enable sysctl
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]