- 26 Oct, 2012 1 commit
-
-
Elliott Hughes authored
Change-Id: I805a1799755429dd1f6f3bdc2e6a02f483587b35
-
- 25 Sep, 2012 1 commit
-
-
Jeff Sharkey authored
Mount OBB containers using shared app GID, so that an app can read the mount point across users. Bug: 7212801 Change-Id: Ia1be52df9854c259b20728111f3a2c9facf4beaa
-
- 27 Apr, 2012 2 commits
-
-
Kenny Root authored
Change-Id: I1e6bfcc6b0a5be47e6fd19922fc81669f61b5dba
-
Kenny Root authored
Change-Id: I1e6bfcc6b0a5be47e6fd19922fc81669f61b5dba
-
- 25 Apr, 2012 1 commit
-
-
Kenny Root authored
Now forward locked applications will be in ASEC containers both internal to the system and externally. This change adds support for putting applications in ext4-based ASECs. Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
-
- 01 Mar, 2012 1 commit
-
-
Robert Greenwalt authored
Support multiple commands on a single socket via command numbers. NativeDaemonConnector has been changed, so we need to use it here too. bug:5864209 Change-Id: Ie06e966d50057d122a958377731c0385ea367b69
-
- 13 Oct, 2011 1 commit
-
-
Ken Sumrall authored
This vold command returns 0 if the given password matches the password used to decrypt the device on boot. It returns 1 if they don't match, and it returns -1 on an internal error, and -2 if the device is not encrypted. Also check the uid of the sender of the command and only allow the root and system users to issue cryptfs commands. Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
-
- 01 Sep, 2011 1 commit
-
-
Ken Sumrall authored
Add the force_and_revert option to the unmount command which will force the unmount, and revert a crypto mapping. This is used during factory reset so that when the internal sdcard volume is formatted, it formats the raw device, not the encrypted mapping. Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
-
- 27 Jun, 2011 1 commit
-
-
Dianne Hackborn authored
Change-Id: Ife15628ed6e2493c9e85a2ade6d59a194fdddde5
-
- 07 Jun, 2011 1 commit
-
-
Mike Lockwood authored
Change-Id: I8ac8900b3135f03b7717540b825ff6df76f31c0b Signed-off-by:
Mike Lockwood <lockwood@android.com>
-
- 01 Feb, 2011 1 commit
-
-
Ken Sumrall authored
Bug 3384231 is punted to MR1, but the code to set the flag is already in the tree, so this CL does 3 things: 1. Comments out the lines that set the flag 2. Removes the change to the checkpw that was added in the last change. 3. Implements a new command to check the flag (which no one is calling yet and the flag won't be set anyhow). When MR1 comes, it will be a simple matter to enable the flag setting code and start testing it. The fear is a false positive detection of incomplete encryption could cause people to be prompted to wipe their data when MR1 comes out and the flag is checked. Not setting this for first release, and testing this more before MR1, will give us confidence that the code will not detect false positives of encryption failure. Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
-
- 28 Jan, 2011 1 commit
-
-
Jason parks authored
The master key is now stored unhashed in memory. This is needed because certain operation like remote reseting of passwords the old password is not avaliable. The changepw interface has been changed to only take the new password as the only argument. When this is called we reencrypt the master key with the new password and old salt. Bug: 3382129 Change-Id: I9a596b89013194605d6d7790067691aa0dc75e72
-
- 22 Jan, 2011 1 commit
-
-
Jason parks authored
The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller. Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
-
- 21 Jan, 2011 1 commit
-
-
Jason parks authored
The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller. Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
-
- 18 Jan, 2011 1 commit
-
-
Ken Sumrall authored
Change-Id: I87ff9788a56de6d461002407bf6c3cd4c6f900ee
-
- 17 Jan, 2011 1 commit
-
-
Ken Sumrall authored
Update the enable inplace API to allow the UI to show a progress bar. Add new command changepw (whichis currently not working) Internal restructuring of code to support these two features. Some minor cleanup of the code as well. Change-Id: I11461fc9ce66965bea6cd0b6bb2ff48bcf607b97
-
- 14 Jan, 2011 1 commit
-
-
Ken Sumrall authored
In order to make the animations and the UI look right, we need to change the cryptfs checkpw command to return a status if the password was correct or not, and not have it automatically restart if it's correct. There is a new command restart that will restart the framework with the encrypted filesystem. Change-Id: Ia8ae00d7ed8667699aa58d05ad8ba953cca9316e
-
- 19 Dec, 2010 1 commit
-
-
Ken Sumrall authored
There are still a few hacks and performance issues related to shutting down the framework in this code, but it is functional and tested. Without the UI changes, it requires cryptic adb shell commands to enable, which I shall not utter here. Change-Id: I0b8f90afd707e17fbdb0373d156236946633cf8b
-
- 16 Nov, 2010 1 commit
-
-
Olivier Bailly authored
Change-Id: I9f71b5e871671d1d64ad37f78a8944653409b8e1
-
- 15 Jul, 2010 1 commit
-
-
Kenny Root authored
* Rename all functions dealing with OBB files to mention Obb * Add 'path' and 'list' functionality to OBB commands * Store hashed filename in loop's lo_crypt_name and keep lo_file_name for the real source filename. That way we can recover it later with an ioctl call. Change-Id: I29e468265988bfb931d981532d86d7be7b3adfc8
-
- 07 Jul, 2010 1 commit
-
-
Kenny Root authored
Allow the mounting of OBB filesystem images if they're encrypted with twofish and in FAT filesystem format. Change-Id: I54804e598f46b1f3a784ffe517ebd9d7626de7aa
-
- 25 Mar, 2010 1 commit
-
-
San Mehat authored
Change-Id: I48ee8bd90b47f5845f069cdf4d1b8ba6ecdb1b39 Signed-off-by:
San Mehat <san@google.com>
-
- 23 Mar, 2010 1 commit
-
-
San Mehat authored
Change-Id: Icbe3de7c28505f7496c8f8edea126c7b616de475 Signed-off-by:
San Mehat <san@google.com>
-
- 17 Mar, 2010 1 commit
-
-
San Mehat authored
Change-Id: If025e7ee10a79ff089920a6d0c1a52358b2d2c22 Signed-off-by:
San Mehat <san@google.com>
-
- 14 Mar, 2010 2 commits
-
-
San Mehat authored
Change-Id: I74aa63ff9f9bc32bd871e6c53ab50b6baf79e650 Signed-off-by:
San Mehat <san@google.com>
-
San Mehat authored
- Fix issue where container-names > 64 bytes were getting truncated in the kernel. lo_name is only 64 bytes in length, so we now hash the container id via md5 - Add 'dump' command to dump loop and devicemapper status - Add 'debug' command to enable more detailed logging at runtime - Log vold IPC arguments (minus encryption keys) - Fix premature return from Loop::lookupActive() and friends Change-Id: I0e833261a445ce9dc1a8187e5501d27daba1ca76 Signed-off-by:
San Mehat <san@google.com>
-
- 02 Mar, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 20 Feb, 2010 1 commit
-
-
San Mehat authored
In order to protect the '/android_secure' directory on VFAT removable media from being mucked with by 3rd party applications on the device, we hide the directory with a read-only, zero-sized tmpfs mounted on-top. A reference to the hidden directory is kept by a bind-mount which is mounted at a location which only root can access. Staging consists of: 1. Mount checked media at a secure location (/mnt/secure/staging) 2. Ensure /android_secure exists on the media, (creating if it doesnt) 3. Bind-mount /mnt/secure/staging/android_secure -> /mnt/secure/asec (where only root can access it) 4. Mount an RDONLY zero-sized tmpfs over /mnt/secure/staging/android_secure 5. Atomically move /mnt/secure/staging to the publicly accessable storage directory (/mnt/sdcard) Signed-off-by:
San Mehat <san@google.com>
-
- 18 Feb, 2010 2 commits
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 17 Feb, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 04 Feb, 2010 1 commit
-
-
San Mehat authored
- share command was taking wrong arguments - shared command was returning two termination codes - Force FAT32 cluster size to 4k when formatting Signed-off-by:
San Mehat <san@google.com>
-
- 03 Feb, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 02 Feb, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 23 Jan, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 18 Jan, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 11 Jan, 2010 3 commits
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-
- 06 Jan, 2010 1 commit
-
-
San Mehat authored
Signed-off-by:
San Mehat <san@google.com>
-