- 09 Mar, 2016 1 commit
-
-
Paul Crowley authored
The formatting here is inconsistent with Android house style; use clang-format to bring it back into line. Change-Id: Id1fe6ff54e9b668ca88c3fc021ae0a5bdd1327eb
-
- 09 Feb, 2016 2 commits
-
-
Paul Crowley authored
Change-Id: Ib3592b598ee07bc71a6f9507570bf4623c1cdd6a
-
Paul Crowley authored
Change-Id: I4d6156332cfc847e25e7c8863fd6a50fa325fb87
-
- 08 Feb, 2016 1 commit
-
-
Paul Crowley authored
Added a new call change_user_key which changes the way that disk encryption keys are protected; a key can now be protected with a combination of an auth token and a secret which is a hashed password. Both of these are passed to unlock_user_key. This change introduces a security bug, b/26948053, which must be fixed before we ship. Bug: 22950892 Change-Id: Iac1e45bb6f86f2af5c472c70a0fe3228b02115bf
-
- 05 Feb, 2016 1 commit
-
-
Jeff Sharkey authored
Give callers the option of preparing CE and/or DE storage. The framework will only prepare CE storage after the CE keys have been unlocked for that user. When init is calling enablecrypto, kick off the work in a thread so that we can make other calls back into vold without causing deadlock. Leaves blocking call intact for framework callers. Clean up 'vdc' tool to send useful transaction numbers, and actually watch for the matching result to come back. This fixes race conditions when there are multiple 'vdc' callers. Also add other system and misc directories to match spec. Bug: 25796509 Change-Id: Ie4f853db6e387916b845d2b5fb92925d743b063d
-
- 03 Feb, 2016 1 commit
-
-
Paul Lawrence authored
New style logging Remove set/get field from e4crypt Save keys to temp file then rename See https://googleplex-android-review.git.corp.google.com/#/c/858922/ Change-Id: I454c3f78489b491ffc1230a70dce64935e4e0f8a
-
- 02 Feb, 2016 1 commit
-
-
Paul Lawrence authored
Change-Id: Ie179cb09f9f24382afd0fe0f3aa2a1ad943a7f5d
-
- 01 Feb, 2016 1 commit
-
-
Paul Crowley authored
Change-Id: Icf746ec1968a073fde707ecc788b648f5803fd38
-
- 20 Jan, 2016 1 commit
-
-
Paul Crowley authored
Major rework and refactor of FBE code to load the keys at the right time and in a natural way. The old code was aimed at our goals for M, with patches on top, and didn't quite work. Bug: 22358539 Change-Id: I9bf7a0a86ee3f2abf0edbd5966f93efac2474c2c
-
- 11 Dec, 2015 1 commit
-
-
Lenka Trochtova authored
Add the serial parameter to prepare_user_storage to avoid confusion when parsing parameters and passing them around. Change-Id: Id5516c248401ad50585aa8f6e8b1545a6cded549
-
- 10 Dec, 2015 1 commit
-
-
Paul Crowley authored
Following around the call graph in code search is hard enough as it is! Change-Id: I09d3513664423aafe0d99f9158acfbbb6c79b590
-
- 09 Dec, 2015 1 commit
-
-
Paul Lawrence authored
Change-Id: Ied03e2ee404a1b4f386740213e6ab01f18ec09b9
-
- 08 Dec, 2015 1 commit
-
-
Lenka Trochtova authored
BUG: 24883058 Change-Id: I77d4757f87214166e7c41c7eb0d06b1cd5f06b20
-
- 10 Nov, 2015 1 commit
-
-
Jeff Sharkey authored
We now have separate methods for key creation/destruction and unlocking/locking. Key unlocking can pass through an opaque token, but it's left empty for now. Extend user storage setup to also create system_ce and user_de paths. Bring over some path generation logic from installd. Use strong type checking on user arguments. Bug: 22358539 Change-Id: I00ba15c7b10dd682640b3f082feade4fb7cbbb5d
-
- 13 Jul, 2015 2 commits
-
-
Paul Crowley authored
Bug: 19706593 (cherry-picked from commit eebf4456) Change-Id: I50dc4c39595c06bf0016d6a490130bbbc25de91b
-
Paul Crowley authored
directories Bug: 19704432 (cherry-picked from commit 75a5202d) Change-Id: I733e8745ec21f8e53c2cc6d8a98313275db7d897
-
- 03 Jun, 2015 1 commit
-
-
Paul Crowley authored
Bug: 19706593 Change-Id: I8c97f23316d1a122e24e7627a0422fa180504ba1
-
- 29 May, 2015 3 commits
-
-
Paul Lawrence authored
(cherry-picked from commit 00f4aade) Bug: 18151196 Change-Id: Iee0f932c61ff4a309dc2861725b24bf976adb4c7
-
Paul Lawrence authored
(cherry-picked from 4e727455) Enables OwnerInfo and pattern suppression Bug: 18151196 Change-Id: I46144e16cb00319deeb5492ab82c67f5dd43d6d3
-
Paul Lawrence authored
(cherry-picked from commit 707fd6c7cccc31c0ab0ec1a6ac8b6077c632fc35) Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
-
- 13 May, 2015 1 commit
-
-
Paul Crowley authored
directories Bug: 19704432 Change-Id: I15980eed8e4960ca270cf0f8db4e480a8c2ca832
-
- 06 May, 2015 1 commit
-
-
Paul Lawrence authored
Bug: 18151196 Change-Id: Iee0f932c61ff4a309dc2861725b24bf976adb4c7
-
- 01 May, 2015 1 commit
-
-
Paul Lawrence authored
Enables OwnerInfo and pattern suppression Bug: 18151196 Change-Id: I46144e16cb00319deeb5492ab82c67f5dd43d6d3
-
- 28 Apr, 2015 2 commits
-
-
Paul Lawrence authored
Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
-
Paul Lawrence authored
This reverts commit 7053e9cd. Change-Id: I77ed4dbdff8643c80629d2126cb29f85c24c7b43
-
- 27 Apr, 2015 1 commit
-
-
Paul Lawrence authored
Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/144586/ https://android-review.googlesource.com/#/c/144663/ https://android-review.googlesource.com/#/c/144672/ https://android-review.googlesource.com/#/c/144673/ Bug: 18151196 Change-Id: I9a162b90afe5f46a4ff15b3878e2ab503795425e
-