- 16 Nov, 2013 3 commits
-
-
JP Abgrall authored
Prior to this, the Key derivation function would get blindly updated even if the user entered the wrong password. Now, we only attempt to upgrade the KDF if the pwd/key have been verified (i.e. after a successful mount). Bug: 11460197 Change-Id: I0469228cc9b87c47754e8ca3c7146651da177da5
-
The Android Automerger authored
-
JP Abgrall authored
Prior to this, the Key derivation function would get blindly updated even if the user entered the wrong password. Now, we only attempt to upgrade the KDF if the pwd/key have been verified (i.e. after a successful mount). Bug: 11460197 Change-Id: I0469228cc9b87c47754e8ca3c7146651da177da5
-
- 09 Oct, 2013 1 commit
-
-
The Android Automerger authored
-
- 08 Oct, 2013 2 commits
-
-
Ed Heyl authored
-
Jeff Sharkey authored
We now run an sdcard fuse daemon on top of a physical SD card. Add support for that. Bug: 10330128 Change-Id: I6a291f861ccb0f2911c07cc8f659e2cec4e6d76c
-
- 22 Sep, 2013 1 commit
-
-
The Android Automerger authored
-
- 20 Sep, 2013 1 commit
-
-
Jeff Sharkey authored
Apps without sdcard_r or sdcard_rw need to have someone create package-specific directories on their behalf. If apps have trouble creating on their own, they now delegate through system to have vold create the paths. Requires that the requested path is actually managed by vold. Bug: 10577808 Change-Id: I6835fc8f52240f9de07f89742a426a153e3ca32a
-
- 23 Aug, 2013 1 commit
-
-
Ken Sumrall authored
With the recent selinux changes imposed on vold, it no longer has permission to run a shell, so invoking the filesystem formatting commands with system(3) gives an error. So change to using android_fork_execvp(). Bug: 10279958 Change-Id: Ifa18b28867618858ec7c5cfcc67935e377de38fb
-
- 21 Aug, 2013 1 commit
-
-
Ken Sumrall authored
With the recent selinux changes imposed on vold, it no longer has permission to run a shell, so invoking the filesystem formatting commands with system(3) gives an error. So change to using android_fork_execvp(). Bug: 10279958 Change-Id: Ifa18b28867618858ec7c5cfcc67935e377de38fb
-
- 15 Aug, 2013 2 commits
-
-
Ken Sumrall authored
-
Ken Sumrall authored
A quick fix to a broken build resulted in using a static library to build vold when a shared library was available. This fixes that. Bug: 10332978 Change-Id: I31c2b4a87c7b37647e71f7f3c93b0d64dd52da44
-
- 14 Aug, 2013 1 commit
-
-
Kenny Root authored
Iterator wasn't initialized in scrypt parameter scanning. Bug: 10330227 Change-Id: If41fc25d9f827106fa8329bdb5966b7d786fddcb
-
- 07 Aug, 2013 1 commit
-
-
Geremy Condra authored
This accomodates verity changes, which now utilize these libraries. Change-Id: I1ff8c012e972e245cf3e4bc3a02bef0989165d75
-
- 02 Jul, 2013 7 commits
-
-
Jean-Baptiste Queru authored
* commit '5d09126a': vold: fix potential socket leak
-
Nick Kralevich authored
* commit '0002a85f': Fix spelling.
-
Jean-Baptiste Queru authored
* commit 'f99dfdb5': vold: fix potential socket leak
-
Nick Kralevich authored
* commit '5d27f0a7': Fix spelling.
-
Jean-Baptiste Queru authored
-
Kaspter Ju authored
Change-Id: Icdb4500fc1e055b058974087e1e518c878dc6b22 Signed-off-by:
Kaspter Ju <kaspter@gmail.com>
-
Nick Kralevich authored
-
- 29 Jun, 2013 1 commit
-
-
Nick Kralevich authored
Change-Id: I81debc5063716d7cbea060a0abb34c646d7cda93
-
- 28 Jun, 2013 1 commit
-
-
Ken Sumrall authored
-
- 27 Jun, 2013 1 commit
-
-
Ken Sumrall authored
Change-Id: I7fd5f1048c3cf43fa14597f079c929690cac367c
-
- 24 Jun, 2013 1 commit
-
-
Kenny Root authored
scrypt is a sequential memory-hard key derivation algorithm that makes it more difficult for adversaries to brute force passwords using specialized equipment. See http://www.tarsnap.com/scrypt/scrypt.pdf for more details of the algorithm. This adds support for initializing disk encryption using scrypt and upgrading from the previous PBKDF2 algorithm. Change-Id: I1d26db4eb9d27fea7310be3e49c8e6219e6d2c3b
-
- 14 Jun, 2013 2 commits
-
-
Kenny Root authored
In order to make it easier to upgrade the crypto footer, extract some constants to a header file instead. Then the header can control what the current version is and the upgrade_crypto_ftr code should be the only thing that needs to be updated. Change-Id: I3ed5a7d3b640419cd8af91388d94a00de8cc09db
-
Kenny Root authored
In the future, we'd like to have the ability to upgrade from any supported version to any future version. Change the upgrade function slightly to support this. Change-Id: I3b20ccfff51c4c86f1e5e08690c263dc95ff5ce4
-
- 13 Jun, 2013 1 commit
-
-
Ken Sumrall authored
The new wipe option to the vold format command will invoke BLKDISCARD on the partition before invoking newfs_msdos. This will be used whenever a full wipe of the device is wanted, as this is more secure than just doing newfs_msdos. Bug: 9392982 Change-Id: Ie106f1b9cc70abc61206006d1821641c27c7ccae
-
- 16 May, 2013 2 commits
-
-
The Android Open Source Project authored
* commit '9420c0b3': Grab a partial wakelock when doing fstrim
-
The Android Open Source Project authored
Change-Id: I58dee084939bd1b49432bfb4e460dddeb4f6e15a
-
- 15 May, 2013 2 commits
-
-
The Android Automerger authored
-
Ken Sumrall authored
* commit 'c587269c': vold: Increase timeout due to selinux changes
-
- 14 May, 2013 1 commit
-
-
Ken Sumrall authored
The new selinux_reload_policy command can take a while to complete on some systems. The reason is being investigated, and hopefully a fix can be found to improve performance, but for now, increase the timeout that vold waits for the post_fs_data section to complete when decrypting a device on boot. Also, emit a decent error message if the device times out. Bug: 8967715 Change-Id: Ifb01c983dffe095a9de752c17c467a1751e9ce99
-
- 10 May, 2013 1 commit
-
-
Alex Klyubin authored
Change-Id: Ibb9667d762189849ebcbefef4ba70ffd34cf885e
-
- 08 May, 2013 3 commits
-
-
Ken Sumrall authored
* commit 'bc7d5088': vold: Have the fstrim log start and finish times in the event log
-
The Android Automerger authored
-
Ken Sumrall authored
bug: 8688454 Change-Id: I5540ab27d3ade2c42ee8fd0de6fbfc1d1e19e36f
-
- 02 May, 2013 3 commits
-
-
Ken Sumrall authored
Fstrim can take a while, so grab a wakelock so it finishes now, not when the user picks up the device and wakes it back up. This change does not protect against multiple calls to fstrim before the first one completes. When the first one completes, it will release the wakelock, and the device will go to sleep. However, normal usage is this will not be invoked by the framework more than once a day, so this should not be an issue. Bug: 8781133 Change-Id: I8065d1380eaf52ca8a7ca308af66fb6e86d60a66
-
Ken Sumrall authored
* commit 'e78cd4f3': Grab a partial wakelock when doing fstrim
-
Ken Sumrall authored
Fstrim can take a while, so grab a wakelock so it finishes now, not when the user picks up the device and wakes it back up. This change does not protect against multiple calls to fstrim before the first one completes. When the first one completes, it will release the wakelock, and the device will go to sleep. However, normal usage is this will not be invoked by the framework more than once a day, so this should not be an issue. Bug: 8781133 Change-Id: I8065d1380eaf52ca8a7ca308af66fb6e86d60a66
-