1. 04 May, 2011 4 commits
  2. 26 Apr, 2011 3 commits
  3. 25 Apr, 2011 1 commit
  4. 19 Apr, 2011 3 commits
  5. 18 Apr, 2011 5 commits
  6. 10 Mar, 2011 2 commits
  7. 15 Feb, 2011 1 commit
    • Ken Sumrall's avatar
      Enable detection of failed encryption process, for bug 3384231. · cd235da6
      Ken Sumrall authored
      Need to detect if the encryption process didn't finish successfully, and if
      so, provide a way for the UI to detect that and give the user an option to
      wipe the system clean.  Otherwise, the user is stuck in a reboot loop, and
      they will need to do magic button presses to enter recovery and wipe the
      device to get out of it.
      
      Change-Id: I58253e1e523ee42bdd1a59aa7d8a9d20071bd18b
      cd235da6
  8. 02 Feb, 2011 4 commits
  9. 01 Feb, 2011 3 commits
    • Ken Sumrall's avatar
      Improve detection of incomplete encryption · 7f7dbaa2
      Ken Sumrall authored
      Bug 3384231 is punted to MR1, but the code to set the flag is already
      in the tree, so this CL does 3 things:
      
      1.  Comments out the lines that set the flag
      2.  Removes the change to the checkpw that was added in the last change.
      3.  Implements a new command to check the flag (which no one is calling
          yet and the flag won't be set anyhow).
      
      When MR1 comes, it will be a simple matter to enable the flag setting
      code and start testing it.
      
      The fear is a false positive detection of incomplete encryption could
      cause people to be prompted to wipe their data when MR1 comes out and
      the flag is checked.  Not setting this for first release, and testing
      this more before MR1, will give us confidence that the code will not
      detect false positives of encryption failure.
      
      Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
      7f7dbaa2
    • Ken Sumrall's avatar
      am d33d417e: Detect when encryption failed to complete · 71fac1e0
      Ken Sumrall authored
      * commit 'd33d417e':
        Detect when encryption failed to complete
      71fac1e0
    • Ken Sumrall's avatar
      Detect when encryption failed to complete · d33d417e
      Ken Sumrall authored
      For the case there encryption failes to complete because of a kernel
      crash or the user power cycling the device, define a flag in the
      crypto footer that says encryption is in progress.  Set it when starting
      the actual encryption, and clear it when it successfully completes.
      
      When the user is asked for the disk password, if the flag is set,
      return a special error to the caller so the UI can know to tell the
      user there is no valid data on the disk, and present a button to
      wipe and reset the device.
      
      Change-Id: I3723ec77f33437d94b3ac9ad5db0a5c950d11648
      d33d417e
  10. 31 Jan, 2011 2 commits
    • Ken Sumrall's avatar
      am 5d4c68e4: Have vold grab a partial wakelock when encrypting · 3f0c0a28
      Ken Sumrall authored
      * commit '5d4c68e4':
        Have vold grab a partial wakelock when encrypting
      3f0c0a28
    • Ken Sumrall's avatar
      Have vold grab a partial wakelock when encrypting · 5d4c68e4
      Ken Sumrall authored
      The Progress bar UI grabs a full wakelock when encrypting, but we've seen
      a case where it looks like the progress bar UI crashes, and the wakelock is
      lost, and then all hell breaks loose.  The enablecrypto command has a lot of
      work to do, and it will take some time, so it should grab a wakelock to
      ensure it can finish without being interrupted and put to sleep.
      
      It grabs a partial wake lock, as it doesn't need the screen to be on to do
      its work.  If the UI wants to keep it on, it should also grab a full wakelock,
      which it does.  If the UI crashes, the screen may turn off, but the encryption
      will keep going, and vold will reboot the device when it's done.
      
      Change-Id: I51d3a72b8c77383044a3facb1604c1ee510733ae
      5d4c68e4
  11. 30 Jan, 2011 2 commits
  12. 29 Jan, 2011 2 commits
  13. 28 Jan, 2011 1 commit
    • Jason parks's avatar
      Change cryptfs changepw to only require a new password. · 70a4b3fd
      Jason parks authored
      The master key is now stored unhashed in memory. This
      is needed because certain operation like remote reseting
      of passwords the old password is not avaliable.
      The changepw interface has been changed to only take
      the new password as the only argument. When this is
      called we reencrypt the master key with the new password
      and old salt.
      
      Bug: 3382129
      Change-Id: I9a596b89013194605d6d7790067691aa0dc75e72
      70a4b3fd
  14. 21 Jan, 2011 2 commits
  15. 19 Jan, 2011 5 commits