1. 27 Jan, 2014 1 commit
    • Nick Kralevich's avatar
      Validate asec names. · 0de7c611
      Nick Kralevich authored
      Make sure asec names only contain alphanumeric, underscores,
      dots, or dashes. Don't allow double dots.
      
      Bug: 12504045
      
      (cherry picked from commit 66962609)
      
      Change-Id: Ia9d04f373aa95878b2e81584c4167dc2d4aa0c78
      0de7c611
  2. 13 Aug, 2012 1 commit
    • Kenny Root's avatar
      Only cleanup ASECs in external storage DO NOT MERGE · eacf7e03
      Kenny Root authored
      Any ASEC or OBB files were unmounted when USB storage was set to UMS
      mode. This changes it so only ASEC files on external storage and OBB
      files mounted from external storage are unmounted.
      
      (Cherry-pick of 93ecb38d)
      
      Bug: 6948035
      Change-Id: Ib60727bd360caa32173797ff5b4e1e21fcf20054
      eacf7e03
  3. 15 Jun, 2012 1 commit
    • Ken Sumrall's avatar
      Unmount all asec apps before encrypting · 425524db
      Ken Sumrall authored
      Now that forward locked apps are stored on /data as asec image files
      that are mounted, they need to be unmounted before /data can be unmounted
      so it can be encrypted.
      
      Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
      425524db
  4. 11 May, 2012 2 commits
    • Kenny Root's avatar
      41836711
    • Kenny Root's avatar
      Sleep to wait for dm to create node · cdc2a1c8
      Kenny Root authored
      There appears to be a race condition from when the device mapper is
      asked to create a device and when it actually appears. When we moved
      ASECs to use Ext4, mount started winning the race more often.
      
      Just insert a sleep-retry loop here to counter-act this race. We should
      ideally look at the uevent replies, but it takes a bit more effort to
      separate them out.
      
      Change-Id: Ie8a5b36b1c9a26f2320a178d37312059d03a1281
      cdc2a1c8
  5. 10 May, 2012 2 commits
    • Kenny Root's avatar
      Native library loading needs to read directory · 1a673c86
      Kenny Root authored
      When calling System.loadLibrary(), it needs to be able to read the
      directory to load the file. We could probably fix that, but changing
      permissions here is faster.
      
      Bug: 6478606
      Change-Id: I296b0805839da5a19950157f9a16755a4d258ca8
      1a673c86
    • Kenny Root's avatar
      Only set permissions on dirs or files · 348c8aba
      Kenny Root authored
      Traversal would mark directories with the correct permissions, but
      they're visited again in post-order which is a different fts_info flag.
      Then it would set that to regular file permissions.
      
      Explicitly check to make sure we're looking at a file instead.
      
      Bug: 6478606
      Change-Id: I13cab3e69f451da6a994fa974d575ef366f82025
      348c8aba
  6. 01 May, 2012 1 commit
    • Ken Sumrall's avatar
      Changes to encryption to work with the new filesystem manager · e5032c42
      Ken Sumrall authored
      The new filesystem manager is in charge of mounting the block devices now,
      removing much of the knowledge from init.<device>.rc.  This also let us
      clean up some init code dealing with encryption, so this change updates
      vold to work with that.  More cleanup is possible, but the main goal of the
      filesystem manager was to enable e2fsck, not a full cleanup of encryption.
      
      Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
      e5032c42
  7. 27 Apr, 2012 1 commit
  8. 25 Apr, 2012 1 commit
    • Kenny Root's avatar
      Add in ext4 support for ASEC containers · 344ca108
      Kenny Root authored
      Now forward locked applications will be in ASEC containers both internal
      to the system and externally.
      
      This change adds support for putting applications in ext4-based ASECs.
      
      Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
      344ca108
  9. 21 Mar, 2012 2 commits
  10. 10 Mar, 2012 3 commits
  11. 07 Mar, 2012 1 commit
  12. 05 Mar, 2012 1 commit
  13. 01 Mar, 2012 1 commit
    • Robert Greenwalt's avatar
      Use the new command numbering scheme. · 149aa3eb
      Robert Greenwalt authored
      Support multiple commands on a single socket via command numbers.
      NativeDaemonConnector has been changed, so we need to use it here
      too.
      
      bug:5864209
      Change-Id: Ie06e966d50057d122a958377731c0385ea367b69
      149aa3eb
  14. 23 Feb, 2012 1 commit
    • Nick Kralevich's avatar
      vold: add -Werror=format · 9713ed46
      Nick Kralevich authored
      Stop format string bugs from creeping into root level processes.
      
      Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
      9713ed46
  15. 16 Feb, 2012 1 commit
  16. 15 Feb, 2012 1 commit
  17. 15 Dec, 2011 1 commit
    • Ken Sumrall's avatar
      Fix to not return a bogus decryption error when a device is not encrypted. · e1a45857
      Ken Sumrall authored
      If there is filesystem damage on a non-encrypted device, and /data is not
      mountable, and if the device stores the keys in a file on a different
      partition (like on Crespo) then, vold would return an error which caused
      the crypto UI to present an option to the user to wipe the device because
      it assumed encryption had failed.  This fixes it to not do that.
      
      Change-Id: Ibff6299787b45768416dbc4052de7db3b140b808
      e1a45857
  18. 28 Oct, 2011 1 commit
  19. 26 Oct, 2011 2 commits
  20. 25 Oct, 2011 2 commits
  21. 13 Oct, 2011 1 commit
    • Ken Sumrall's avatar
      Add the new verifypw command to vold/cryptfs · 3ad9072a
      Ken Sumrall authored
      This vold command returns 0 if the given password matches the password
      used to decrypt the device on boot.  It returns 1 if they don't match,
      and it returns -1 on an internal error, and -2 if the device is not encrypted.
      
      Also check the uid of the sender of the command and only allow the root and
      system users to issue cryptfs commands.
      
      Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
      3ad9072a
  22. 14 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Fix cryptfs to work with a raw block device for key storage · 3be890f5
      Ken Sumrall authored
      If a raw block is specified for key storage, do not try to force the size
      of the file to 16 Kbytes when writing the keys, and do not complain if
      the size is not 16 Kbytes when reading the keys.  Only do them if the
      keyfile is a regular file.
      
      Change-Id: I4de1cb7c3614479d93289d4f2767ca6ce1bbbc73
      3be890f5
  23. 01 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Add the ability to revert a crypto mapping when unmounting a volume · 0b8b5971
      Ken Sumrall authored
      Add the force_and_revert option to the unmount command which will force
      the unmount, and revert a crypto mapping.  This is used during factory
      reset so that when the internal sdcard volume is formatted, it formats
      the raw device, not the encrypted mapping.
      
      Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
      0b8b5971
  24. 18 Jul, 2011 1 commit
  25. 14 Jul, 2011 3 commits
  26. 12 Jul, 2011 2 commits
  27. 11 Jul, 2011 4 commits