1. 08 Jul, 2011 1 commit
  2. 09 Jun, 2011 1 commit
  3. 18 Apr, 2011 2 commits
  4. 28 Oct, 2010 1 commit
  5. 01 Oct, 2010 1 commit
  6. 26 Sep, 2010 1 commit
    • Kenny Root's avatar
      Track type of container mounted · cbacf78e
      Kenny Root authored
      OBB and ASEC are tracked in the same active container list, but when it
      comes time to unmount everything, it was trying to unmount the OBBs
      according to ASEC rules. This led to the OBB not being unmounted and the
      volume unmount failing.
      
      Change-Id: I12c1d4d387b8022185d552b63edd61a50b9c0fc3
      cbacf78e
  7. 21 Sep, 2010 1 commit
  8. 20 Sep, 2010 1 commit
  9. 17 Sep, 2010 1 commit
  10. 02 Sep, 2010 1 commit
  11. 16 Jul, 2010 1 commit
    • Kenny Root's avatar
      Fix loop_info/loop_info64 impedance mismatch · e17e91f6
      Kenny Root authored
      LOOP_GET_STATUS64 isn't useful here since the data contained within
      isn't actually checked, so stick with the regular LOOP_GET_STATUS here
      to match the struct loop_info we're using.
      
      Change-Id: I4f9ff06fa44d4ae3aed046d423054554f9cf450b
      e17e91f6
  12. 15 Jul, 2010 1 commit
    • Kenny Root's avatar
      Additional Obb functionality · 508c0e16
      Kenny Root authored
      * Rename all functions dealing with OBB files to mention Obb
      
      * Add 'path' and 'list' functionality to OBB commands
      
      * Store hashed filename in loop's lo_crypt_name and keep lo_file_name
        for the real source filename. That way we can recover it later with an
        ioctl call.
      
      Change-Id: I29e468265988bfb931d981532d86d7be7b3adfc8
      508c0e16
  13. 07 Jul, 2010 1 commit
    • Kenny Root's avatar
      Add image mounting commands for OBB files · fb7c4d5a
      Kenny Root authored
      Allow the mounting of OBB filesystem images if they're encrypted with
      twofish and in FAT filesystem format.
      
      Change-Id: I54804e598f46b1f3a784ffe517ebd9d7626de7aa
      fb7c4d5a
  14. 28 Jun, 2010 1 commit
  15. 21 Jun, 2010 1 commit
  16. 14 May, 2010 1 commit
  17. 15 Apr, 2010 1 commit
  18. 25 Mar, 2010 2 commits
  19. 24 Mar, 2010 1 commit
    • Kenny Root's avatar
      Prevent null pointer deref in DirectVolume · a9f423dd
      Kenny Root authored
      There's a possibility that if something were messed up a call to
      NetlinkEvent::findParam could return a NULL. Passing NULL as the
      argument into atoi() would cause a null pointer dereference.
      
      Change-Id: Ib071afbbe2adc341108c245ffa596cc8730bd8fd
      a9f423dd
  20. 23 Mar, 2010 1 commit
  21. 17 Mar, 2010 1 commit
  22. 15 Mar, 2010 2 commits
  23. 14 Mar, 2010 3 commits
  24. 10 Mar, 2010 1 commit
  25. 09 Mar, 2010 1 commit
  26. 03 Mar, 2010 1 commit
    • San Mehat's avatar
      vold: Add a versioned superblock to secure containers. · fcf24fe6
      San Mehat authored
      
      Add an un-encrypted superblock to the end of a secure container to
      help identify the crypto cipher used. This is required in order to
      provide some semblence of versioning, in case we have cause to
      change the crypto type on an update - say for example switching
      from software to hardware encryption, or from 128 -> a zillion
      bit keys.
      
      NOTE: This format is incompatible with previous secure containers.
      After this change they will no longer be mountable.
      Signed-off-by: default avatarSan Mehat <san@google.com>
      fcf24fe6
  27. 02 Mar, 2010 2 commits
  28. 01 Mar, 2010 1 commit
  29. 24 Feb, 2010 5 commits
  30. 20 Feb, 2010 1 commit
    • San Mehat's avatar
      vold: Stage the mounting of media to hide the ASEC imagefile directory · 3bb6020e
      San Mehat authored
      
        In order to protect the '/android_secure' directory on VFAT removable media
      from being mucked with by 3rd party applications on the device, we hide the
      directory with a read-only, zero-sized tmpfs mounted on-top. A reference to the
      hidden directory is kept by a bind-mount which is mounted at a location which
      only root can access.
      
      Staging consists of:
        1. Mount checked media at a secure location (/mnt/secure/staging)
        2. Ensure /android_secure exists on the media, (creating if it doesnt)
        3. Bind-mount /mnt/secure/staging/android_secure -> /mnt/secure/asec
           (where only root can access it)
        4. Mount an RDONLY zero-sized tmpfs over /mnt/secure/staging/android_secure
        5. Atomically move /mnt/secure/staging to the publicly accessable storage
           directory (/mnt/sdcard)
      Signed-off-by: default avatarSan Mehat <san@google.com>
      3bb6020e