lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Fri, 29 Oct 2010 14:44:50 -0500
From:	Tyler Hicks <tyhicks@...ux.vnet.ibm.com>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org, ecryptfs-devel@...ts.launchpad.net
Subject: [GIT PULL] eCryptfs updates

Hi Linus,

The following changes since commit f6f94e2ab1b33f0082ac22d71f66385a60d8157f:

  Linux 2.6.36 (2010-10-20 13:30:22 -0700)

are available in the git repository at:
  git://git.kernel.org/pub/scm/linux/kernel/git/ecryptfs/ecryptfs-2.6.git for-linus

Roberto Sassu (4):
      ecryptfs: call vfs_setxattr() in ecryptfs_setxattr()
      ecryptfs: release keys loaded in ecryptfs_keyring_auth_tok_for_sig()
      ecryptfs: checking return code of ecryptfs_find_auth_tok_for_sig()
      ecryptfs: added ecryptfs_mount_auth_tok_only mount parameter

Tyler Hicks (2):
      eCryptfs: Clear LOOKUP_OPEN flag when creating lower file
      eCryptfs: Print mount_auth_tok_only param in ecryptfs_show_options

 fs/ecryptfs/ecryptfs_kernel.h |    1 +
 fs/ecryptfs/inode.c           |   11 ++++++---
 fs/ecryptfs/keystore.c        |   45 ++++++++++++++++++++++++++++++++++------
 fs/ecryptfs/main.c            |    8 ++++++-
 fs/ecryptfs/super.c           |    2 +
 5 files changed, 55 insertions(+), 12 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ