Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Skip to content
Commit b73e822d authored by Srinivasarao P's avatar Srinivasarao P
Browse files

Reverting crypto patches



c57952b0 UPSTREAM: ubifs: wire up FS_IOC_GET_ENCRYPTION_NONCE
379237bb UPSTREAM: f2fs: wire up FS_IOC_GET_ENCRYPTION_NONCE
10e5acfb UPSTREAM: ext4: wire up FS_IOC_GET_ENCRYPTION_NONCE
63bf2738 ANDROID: scsi: ufs: add ->map_sg_crypto() variant op
10d45125 FROMLIST: f2fs: Handle casefolding with Encryption
4efb7e21 ANDROID: fscrypt: fall back to filesystem-layer crypto when needed
a14fa7bc ANDROID: block: require drivers to declare supported crypto key type(s)
5578beab ANDROID: block: make blk_crypto_start_using_mode() properly check for support
e9c80bd9 UPSTREAM: fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctl
9e469e71 UPSTREAM: fscrypt: don't evict dirty inodes after removing key
53f2446e fscrypt: don't evict dirty inodes after removing key
207be96a FROMLIST: fscrypt: Have filesystems handle their d_ops
06ab7409 ANDROID: dm: Add wrapped key support in dm-default-key
23e670a1 ANDROID: dm: add support for passing through derive_raw_secret
166fda7a ANDROID: block: Prevent crypto fallback for wrapped keys
fe6e8558 fscrypt: improve format of no-key names
216d8cab fscrypt: clarify what is meant by a per-file key
7e250323 fscrypt: derive dirhash key for casefolded directories
e16d8494 fscrypt: don't allow v1 policies with casefolding
0bc68c18 fscrypt: add "fscrypt_" prefix to fname_encrypt()
85b9c3e4 fscrypt: don't print name of busy file when removing key
9c5c8c52 fscrypt: document gfp_flags for bounce page allocation
bee5bd5b fscrypt: optimize fscrypt_zeroout_range()
1c88eea9 fscrypt: remove redundant bi_status check
04f51847 fscrypt: Allow modular crypto algorithms
737ae902 fscrypt: include <linux/ioctl.h> in UAPI header
8842133f fscrypt: don't check for ENOKEY from fscrypt_get_encryption_info()
b21b79d7 fscrypt: remove fscrypt_is_direct_key_policy()
19b132ba fscrypt: move fscrypt_valid_enc_modes() to policy.c
add6ac48 fscrypt: check for appropriate use of DIRECT_KEY flag earlier
2454b5bb fscrypt: split up fscrypt_supported_policy() by policy version
bfa4ca6e fscrypt: introduce fscrypt_needs_contents_encryption()
38719777 fscrypt: move fscrypt_d_revalidate() to fname.c
39a0accb fscrypt: constify inode parameter to filename encryption functions
39422290 fscrypt: constify struct fscrypt_hkdf parameter to fscrypt_hkdf_expand()
a7b6398d fscrypt: verify that the crypto_skcipher has the correct ivsize
9c1b3af1 fscrypt: use crypto_skcipher_driver_name()
35290265 fscrypt: support passing a keyring key to FS_IOC_ADD_ENCRYPTION_KEY

Change-Id: Ib1abe832e16d5f40bfcc9e34bdccbb063b37dbbc
Signed-off-by: default avatarSrinivasarao P <spathi@codeaurora.org>
parent 975fd062
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment