1. 14 Jul, 2011 2 commits
  2. 08 Jul, 2011 1 commit
  3. 29 Jun, 2011 2 commits
  4. 27 Jun, 2011 1 commit
  5. 09 Jun, 2011 1 commit
  6. 07 Jun, 2011 2 commits
  7. 06 Jun, 2011 1 commit
  8. 09 May, 2011 2 commits
  9. 04 May, 2011 6 commits
  10. 26 Apr, 2011 3 commits
  11. 25 Apr, 2011 1 commit
  12. 19 Apr, 2011 3 commits
  13. 18 Apr, 2011 5 commits
  14. 10 Mar, 2011 2 commits
  15. 15 Feb, 2011 1 commit
    • Ken Sumrall's avatar
      Enable detection of failed encryption process, for bug 3384231. · cd235da6
      Ken Sumrall authored
      Need to detect if the encryption process didn't finish successfully, and if
      so, provide a way for the UI to detect that and give the user an option to
      wipe the system clean.  Otherwise, the user is stuck in a reboot loop, and
      they will need to do magic button presses to enter recovery and wipe the
      device to get out of it.
      
      Change-Id: I58253e1e523ee42bdd1a59aa7d8a9d20071bd18b
      cd235da6
  16. 02 Feb, 2011 4 commits
  17. 01 Feb, 2011 3 commits
    • Ken Sumrall's avatar
      Improve detection of incomplete encryption · 7f7dbaa2
      Ken Sumrall authored
      Bug 3384231 is punted to MR1, but the code to set the flag is already
      in the tree, so this CL does 3 things:
      
      1.  Comments out the lines that set the flag
      2.  Removes the change to the checkpw that was added in the last change.
      3.  Implements a new command to check the flag (which no one is calling
          yet and the flag won't be set anyhow).
      
      When MR1 comes, it will be a simple matter to enable the flag setting
      code and start testing it.
      
      The fear is a false positive detection of incomplete encryption could
      cause people to be prompted to wipe their data when MR1 comes out and
      the flag is checked.  Not setting this for first release, and testing
      this more before MR1, will give us confidence that the code will not
      detect false positives of encryption failure.
      
      Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
      7f7dbaa2
    • Ken Sumrall's avatar
      am d33d417e: Detect when encryption failed to complete · 71fac1e0
      Ken Sumrall authored
      * commit 'd33d417e':
        Detect when encryption failed to complete
      71fac1e0
    • Ken Sumrall's avatar
      Detect when encryption failed to complete · d33d417e
      Ken Sumrall authored
      For the case there encryption failes to complete because of a kernel
      crash or the user power cycling the device, define a flag in the
      crypto footer that says encryption is in progress.  Set it when starting
      the actual encryption, and clear it when it successfully completes.
      
      When the user is asked for the disk password, if the flag is set,
      return a special error to the caller so the UI can know to tell the
      user there is no valid data on the disk, and present a button to
      wipe and reset the device.
      
      Change-Id: I3723ec77f33437d94b3ac9ad5db0a5c950d11648
      d33d417e