public inbox for linux-fscrypt@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2023-04-18 17:05:33 to 2023-07-17 03:53:20 UTC [more...]

[PATCH v2 00/17] btrfs: add encryption feature
 2023-07-17  3:52 UTC  (6+ messages)
` [PATCH v2 01/17] btrfs: disable various operations on encrypted inodes
` [PATCH v2 02/17] btrfs: disable verity "
` [PATCH v2 03/17] fscrypt: expose fscrypt_nokey_name
` [PATCH v2 04/17] btrfs: start using fscrypt hooks
` [PATCH v2 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag

[PATCH v1 00/17] btrfs: add encryption feature
 2023-07-17  1:43 UTC  (23+ messages)
` [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
` [PATCH v1 02/17] btrfs: disable verity "
` [PATCH v1 03/17] fscrypt: expose fscrypt_nokey_name
` [PATCH v1 04/17] btrfs: start using fscrypt hooks
` [PATCH v1 05/17] btrfs: add inode encryption contexts
` [PATCH v1 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
` [PATCH v1 07/17] btrfs: adapt readdir for encrypted and nokey names
` [PATCH v1 08/17] btrfs: use correct name hash for "
` [PATCH v1 09/17] btrfs: implement fscrypt ioctls
` [PATCH v1 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
` [PATCH v1 11/17] btrfs: add get_devices hook for fscrypt
` [PATCH v1 12/17] btrfs: turn on inlinecrypt mount option for encrypt
` [PATCH v1 13/17] btrfs: turn on the encryption ioctls
` [PATCH v1 14/17] btrfs: create and free extent fscrypt_infos
` [PATCH v1 15/17] btrfs: start tracking extent encryption context info
` [PATCH v1 16/17] btrfs: explicitly track file extent length and encryption
` [PATCH v1 17/17] btrfs: save and load fscrypt extent contexts

[RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
 2023-07-15  4:00 UTC  (39+ messages)
` [RFC PATCH v10 01/17] security: add ipe lsm
  ` [PATCH RFC v10 1/17] "
` [RFC PATCH v10 02/17] ipe: add policy parser
  ` [PATCH RFC v10 2/17] "
` [RFC PATCH v10 03/17] ipe: add evaluation loop
  ` [PATCH RFC v10 3/17] "
` [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
  ` [PATCH RFC v10 4/17] "
` [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
  ` [PATCH RFC v10 5/17] "
` [RFC PATCH v10 06/17] security: add new securityfs delete function
  ` [PATCH RFC v10 6/17] "
` [RFC PATCH v10 07/17] ipe: add userspace interface
  ` [PATCH RFC v10 7/17] "
` [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
  ` [PATCH RFC v10 8/17] "
` [RFC PATCH v10 09/17] ipe: add permissive toggle
  ` [PATCH RFC v10 9/17] "
` [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
` [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
  ` [PATCH RFC "
` [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v10 15/17] scripts: add boot policy generation program
` [RFC PATCH v10 16/17] ipe: kunit test for parser
` [RFC PATCH v10 17/17] documentation: add ipe documentation

[PATCH v2 00/14] fscrypt: add extent encryption
 2023-07-14 18:16 UTC  (17+ messages)
` [PATCH v2 01/14] fscrypt: factor helper for locking master key
` [PATCH v2 02/14] fscrypt: factor getting info for a specific block
` [PATCH v2 03/14] fscrypt: adjust effective lblks based on extents
` [PATCH v2 04/14] fscrypt: add a super_block pointer to fscrypt_info
` [PATCH v2 05/14] fscrypt: setup leaf inodes for extent encryption
` [PATCH v2 06/14] fscrypt: allow infos to be owned by extents
` [PATCH v2 07/14] fscrypt: notify per-extent infos if master key vanishes
` [PATCH v2 08/14] fscrypt: use an optional ino equivalent for per-extent infos
` [PATCH v2 09/14] fscrypt: move function call warning of busy inodes
` [PATCH v2 10/14] fscrypt: revamp key removal for extent encryption
` [PATCH v2 11/14] fscrypt: add creation/usage/freeing of per-extent infos
` [PATCH v2 12/14] fscrypt: allow load/save of extent contexts
` [PATCH v2 13/14] fscrypt: save session key credentials for extent infos
` [PATCH v2 14/14] fscrypt: update documentation for per-extent keys

[RFC PATCH v2 0/8] fstests: add btrfs encryption testing
 2023-07-10  5:20 UTC  (10+ messages)
` [RFC PATCH v2 1/8] common/encrypt: separate data and inode nonces
` [RFC PATCH v2 2/8] common/encrypt: add btrfs to get_encryption_*nonce
` [RFC PATCH v2 3/8] common/encrypt: add btrfs to get_ciphertext_filename
` [RFC PATCH v2 4/8] common/encrypt: enable making a encrypted btrfs filesystem
` [RFC PATCH v2 5/8] generic/613: write some actual data for btrfs
` [RFC PATCH v2 6/8] tests: adjust generic/429 for extent encryption
` [RFC PATCH v2 7/8] common/verity: explicitly don't allow btrfs encryption
` [RFC PATCH v2 8/8] btrfs: add simple test of reflink of encrypted data

[PATCH v5 0/8] fscrypt: some rearrangements of key setup
 2023-07-09 18:53 UTC  (9+ messages)
` [PATCH v5 1/8] fscrypt: move inline crypt decision to info setup
` [PATCH v5 2/8] fscrypt: split and rename setup_file_encryption_key()
` [PATCH v5 3/8] fscrypt: split setup_per_mode_enc_key()
` [PATCH v5 4/8] fscrypt: move dirhash key setup away from IO key setup
` [PATCH v5 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v5 6/8] fscrypt: move all the shared mode key setup deeper
` [PATCH v5 7/8] fscrypt: make infos have a pointer to prepared keys
` [PATCH v5 8/8] fscrypt: make prepared keys record their type

[PATCH v1 00/12] fscrypt: add extent encryption
 2023-07-05 19:41 UTC  (24+ messages)
` [PATCH v1 01/12] fscrypt: factor helper for locking master key
` [PATCH v1 02/12] fscrypt: factor getting info for a specific block
` [PATCH v1 03/12] fscrypt: adjust effective lblks based on extents
` [PATCH v1 04/12] fscrypt: add a super_block pointer to fscrypt_info
` [PATCH v1 05/12] fscrypt: setup leaf inodes for extent encryption
` [PATCH v1 06/12] fscrypt: allow infos to be owned by extents
` [PATCH v1 07/12] fscrypt: notify per-extent infos if master key vanishes
` [PATCH v1 08/12] fscrypt: use an optional ino equivalent for per-extent infos
` [PATCH v1 09/12] fscrypt: add creation/usage/freeing of "
` [PATCH v1 10/12] fscrypt: allow load/save of extent contexts
` [PATCH v1 11/12] fscrypt: save session key credentials for extent infos
` [PATCH v1 12/12] fscrypt: update documentation for per-extent keys

[RFC PATCH 0/8] fstests: add btrfs encryption testing
 2023-07-03 17:12 UTC  (10+ messages)
` [RFC PATCH 1/8] common/encrypt: separate data and inode nonces
` [RFC PATCH 2/8] common/encrypt: add btrfs to get_encryption_*nonce
` [RFC PATCH 3/8] common/encrypt: add btrfs to get_ciphertext_filename
` [RFC PATCH 4/8] common/encrypt: enable making a encrypted btrfs filesystem
` [RFC PATCH 5/8] generic/613: write some actual data for btrfs
` [RFC PATCH 6/8] tests: adjust encryption tests for extent encryption
` [RFC PATCH 7/8] common/verity: explicitly don't allow btrfs encryption
` [RFC PATCH 8/8] btrfs: add simple test of reflink of encrypted data

[PATCH v3 0/4] crypto: LEA block cipher implementation
 2023-06-30  7:53 UTC  (11+ messages)
` [PATCH v3 1/4] "
` [PATCH v3 2/4] crypto: add LEA testmgr tests
` [PATCH v3 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
` [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support

[PATCH 0/2] fscrypt: update the encryption mode docs
 2023-06-30  6:48 UTC  (3+ messages)
` [PATCH 1/2] fscrypt: improve the "Encryption modes and usage" section
` [PATCH 2/2] fscrypt: document the LEA support

[PATCH v4 0/4] crypto: LEA block cipher implementation
 2023-06-30  5:03 UTC  (5+ messages)
` [PATCH v4 1/4] "
` [PATCH v4 2/4] crypto: add LEA testmgr tests
` [PATCH v4 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
` [PATCH v4 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support

[PATCH v4 0/8] fscrypt: some rearrangements of key setup
 2023-06-29  2:44 UTC  (10+ messages)
` [PATCH v4 1/8] fscrypt: move inline crypt decision to info setup
` [PATCH v4 2/8] fscrypt: split and rename setup_file_encryption_key()
` [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
` [PATCH v4 4/8] fscrypt: move dirhash key setup away from IO key setup
` [PATCH v4 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v4 6/8] fscrypt: move all the shared mode key setup deeper
` [PATCH v4 7/8] fscrypt: make infos have a pointer to prepared keys
` [PATCH v4 8/8] fscrypt: make prepared keys record their type

[GIT PULL] fscrypt updates for 6.5
 2023-06-26 20:02 UTC  (2+ messages)

[PATCH v2] fscrypt: Replace 1-element array with flexible array
 2023-05-24  2:55 UTC  (2+ messages)

[PATCH] fscrypt: Replace 1-element array with flexible array
 2023-05-23  2:50 UTC  (5+ messages)

[PATCH v1 0/7] fscrypt: add pooled prepared keys facility
 2023-05-16 18:34 UTC  (14+ messages)
` [PATCH v1 1/7] fscrypt: add new pooled prepared keys
` [PATCH v1 2/7] fscrypt: set up pooled keys upon first use
` [PATCH v1 3/7] fscrypt: add pooling of pooled prepared keys
` [PATCH v1 4/7] fscrypt: add pooled prepared key locking around use
` [PATCH v1 5/7] fscrypt: reclaim pooled prepared keys under pressure
` [PATCH v1 6/7] fscrypt: add facility to shrink a pool of keys
` [PATCH v1 7/7] fscrypt: add lru mechanism to choose pooled key

fscrypt - Bug or Feature - mv file from encrypted to nonencrypted folder?
 2023-05-10  6:23 UTC 

[GIT PULL] fscrypt updates for 6.4
 2023-04-26 17:06 UTC  (2+ messages)

[PATCH v3 00/11] fscrypt: rearrangements preliminary to extent encryption
 2023-04-18 17:04 UTC  (8+ messages)
` [PATCH v3 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
` [PATCH v3 06/11] fscrypt: make infos have a pointer to prepared keys
` [PATCH v3 07/11] fscrypt: move all the shared mode key setup deeper
` [PATCH v3 08/11] fscrypt: make prepared keys record their type
` [PATCH v3 09/11] fscrypt: lock every time a info needs a mode key
` [PATCH v3 10/11] fscrypt: split key alloc and preparation
` [PATCH v3 11/11] fscrypt: factor helper for locking master key


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox