1. 07 Feb, 2015 2 commits
  2. 06 Feb, 2015 4 commits
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      VolumeManager: don't use faccessat(AT_SYMLINK_NOFOLLOW) · 25e581a1
      Nick Kralevich authored
      Don't use faccessat(AT_SYMLINK_NOFOLLOW). In Android, AT_SYMLINK_NOFOLLOW
      is ignored. In glibc, it returns counter intuitive results when a
      symbolic link is encountered, returning true all the time even though
      an open(O_NOFOLLOW) will eventually fail.
      
      Instead, stat the file and check to see if it's a regular file,
      not a directory or symlink or some other weirdness.
      
      In addition, fix a bug where isAsecInDirectory would return
      true ("-1") if the asec directory didn't exist. It should return
      false.
      
      Bug: 18867827
      Change-Id: I33d90e9095fad36ce0f83fde105b70f72e4eaef4
      25e581a1
    • Henrik Baard's avatar
      Change strncpy to strlcpy · 2152266d
      Henrik Baard authored
      Change all function calls to strncpy to strlcpy.
      
      Change-Id: I2bbefb7829d715847c5b26f4b9f0faddbd4c89d0
      2152266d
    • Marek Pola's avatar
      prevent ioctl_init() to write outside buffer · 5e6b9141
      Marek Pola authored
      The strncpy operation does not write a 0 termination
      if the name is larger than the target buffer.
      
      Ensure that zero termination is always written using
      safe strlcpy function.
      
      Change-Id: Idb68cdff7cd1a860c1dfac7494fa99f3d382cb91
      5e6b9141
  3. 05 Feb, 2015 4 commits
  4. 28 Jan, 2015 4 commits
  5. 23 Jan, 2015 2 commits
    • Kenny Root's avatar
      26970299
    • Adam Langley's avatar
      Remove superfluous OpenSSL include paths. · 41405bb3
      Adam Langley authored
      The libcrypto and libssl modules (and their respective static and host
      versions) use LOCAL_EXPORT_C_INCLUDE_DIRS thus just including the module
      is sufficient.
      
      Additionally, cryptfs.h was including an OpenSSL header just to get the
      length of a SHA-256 hash. Rather than force all users of this header to
      also depend on libcrypto, it's easier just to define that value in the
      header file.
      
      Change-Id: I3e3e0db906a212e1093944b298e4a8ff2e2fb07d
      41405bb3
  6. 06 Jan, 2015 2 commits
  7. 29 Dec, 2014 2 commits
  8. 18 Dec, 2014 4 commits
  9. 13 Dec, 2014 2 commits
    • Dan Albert's avatar
      Merge "Move vold to GCC." · a20bb17e
      Dan Albert authored
      a20bb17e
    • Dan Albert's avatar
      Move vold to GCC. · 084f0b3d
      Dan Albert authored
      It looks like clang might have a miscompile that is causing SIGBUS in
      `ioctl_init` when the device is encrypted. Move back to GCC until we
      can sort this out.
      
      Bug: 18736778
      Change-Id: I21ae3b9d7d9ebff8679ecc1a828b7c59f27d0903
      084f0b3d
  10. 06 Nov, 2014 3 commits
  11. 05 Nov, 2014 1 commit
  12. 21 Oct, 2014 2 commits
  13. 18 Oct, 2014 2 commits
  14. 17 Oct, 2014 1 commit
  15. 16 Oct, 2014 2 commits
  16. 10 Oct, 2014 1 commit
  17. 06 Oct, 2014 2 commits
    • Paul Lawrence's avatar
      am fc615041: Remove possibility of zero chars from passwords · fd2180a9
      Paul Lawrence authored
      * commit 'fc615041':
        Remove possibility of zero chars from passwords
      fd2180a9
    • Paul Lawrence's avatar
      Remove possibility of zero chars from passwords · fc615041
      Paul Lawrence authored
      scrypt pads the password with zeros. Our patterns use 0 to represent
      the top left dot. So patterns that end there are equivalent to ones
      that end one short.
      
      After much thought, the best solution is to change the way we
      represent patterns in keyguard. This, however, is a big change.
      
      The short term solution is to change the pattern representation in vold
      so that we are storing the correct thing. Later we will change keyguard
      to handle patterns correctly and remove quite a few hacks from vold
      (use of hex, this code). b/17840293 created to track this.
      
      Bug: 17751714
      Change-Id: I30cdffb0f0db406d2e2b6c54d4153d120d975318
      fc615041