1. 27 Jun, 2012 1 commit
  2. 01 May, 2012 2 commits
  3. 27 Apr, 2012 2 commits
    • Ken Sumrall's avatar
      Changes to encryption to work with the new filesystem manager · f0679f0d
      Ken Sumrall authored
      The new filesystem manager is in charge of mounting the block devices now,
      removing much of the knowledge from init.<device>.rc.  This also let us
      clean up some init code dealing with encryption, so this change updates
      vold to work with that.  More cleanup is possible, but the main goal of the
      filesystem manager was to enable e2fsck, not a full cleanup of encryption.
      
      Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
      f0679f0d
    • Kenny Root's avatar
      Fix truncation of ASEC ids · 7b0bc857
      Kenny Root authored
      Change-Id: I1e6bfcc6b0a5be47e6fd19922fc81669f61b5dba
      7b0bc857
  4. 25 Apr, 2012 1 commit
    • Kenny Root's avatar
      Add in ext4 support for ASEC containers · 344ca108
      Kenny Root authored
      Now forward locked applications will be in ASEC containers both internal
      to the system and externally.
      
      This change adds support for putting applications in ext4-based ASECs.
      
      Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
      344ca108
  5. 21 Mar, 2012 2 commits
  6. 10 Mar, 2012 3 commits
  7. 07 Mar, 2012 1 commit
  8. 05 Mar, 2012 1 commit
  9. 01 Mar, 2012 1 commit
    • Robert Greenwalt's avatar
      Use the new command numbering scheme. · 149aa3eb
      Robert Greenwalt authored
      Support multiple commands on a single socket via command numbers.
      NativeDaemonConnector has been changed, so we need to use it here
      too.
      
      bug:5864209
      Change-Id: Ie06e966d50057d122a958377731c0385ea367b69
      149aa3eb
  10. 23 Feb, 2012 1 commit
    • Nick Kralevich's avatar
      vold: add -Werror=format · 9713ed46
      Nick Kralevich authored
      Stop format string bugs from creeping into root level processes.
      
      Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
      9713ed46
  11. 16 Feb, 2012 1 commit
  12. 15 Feb, 2012 1 commit
  13. 15 Dec, 2011 1 commit
    • Ken Sumrall's avatar
      Fix to not return a bogus decryption error when a device is not encrypted. · e1a45857
      Ken Sumrall authored
      If there is filesystem damage on a non-encrypted device, and /data is not
      mountable, and if the device stores the keys in a file on a different
      partition (like on Crespo) then, vold would return an error which caused
      the crypto UI to present an option to the user to wipe the device because
      it assumed encryption had failed.  This fixes it to not do that.
      
      Change-Id: Ibff6299787b45768416dbc4052de7db3b140b808
      e1a45857
  14. 28 Oct, 2011 1 commit
  15. 26 Oct, 2011 2 commits
  16. 25 Oct, 2011 2 commits
  17. 13 Oct, 2011 1 commit
    • Ken Sumrall's avatar
      Add the new verifypw command to vold/cryptfs · 3ad9072a
      Ken Sumrall authored
      This vold command returns 0 if the given password matches the password
      used to decrypt the device on boot.  It returns 1 if they don't match,
      and it returns -1 on an internal error, and -2 if the device is not encrypted.
      
      Also check the uid of the sender of the command and only allow the root and
      system users to issue cryptfs commands.
      
      Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
      3ad9072a
  18. 14 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Fix cryptfs to work with a raw block device for key storage · 3be890f5
      Ken Sumrall authored
      If a raw block is specified for key storage, do not try to force the size
      of the file to 16 Kbytes when writing the keys, and do not complain if
      the size is not 16 Kbytes when reading the keys.  Only do them if the
      keyfile is a regular file.
      
      Change-Id: I4de1cb7c3614479d93289d4f2767ca6ce1bbbc73
      3be890f5
  19. 01 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Add the ability to revert a crypto mapping when unmounting a volume · 0b8b5971
      Ken Sumrall authored
      Add the force_and_revert option to the unmount command which will force
      the unmount, and revert a crypto mapping.  This is used during factory
      reset so that when the internal sdcard volume is formatted, it formats
      the raw device, not the encrypted mapping.
      
      Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
      0b8b5971
  20. 18 Jul, 2011 1 commit
  21. 14 Jul, 2011 3 commits
  22. 12 Jul, 2011 2 commits
  23. 11 Jul, 2011 4 commits
  24. 08 Jul, 2011 2 commits
  25. 07 Jul, 2011 2 commits