Paul Crowley
eebf44563b
Add "cryptfs deleteuserkey" command to vold.
...
Bug: 19706593
Change-Id: I8c97f23316d1a122e24e7627a0422fa180504ba1
9 years ago
Paul Crowley
75a5202d9f
Add vold commands for setting up per-user encrypted user
...
directories
Bug: 19704432
Change-Id: I15980eed8e4960ca270cf0f8db4e480a8c2ca832
9 years ago
Paul Crowley
1da96dc549
Break key installation into its own function so we can install
...
non-master keys.
Bug: 19704432
Change-Id: I5050d0e79c37f2a1366260e3f892d5b59e77b14b
9 years ago
Paul Lawrence
00f4aade5c
Delete password as per block encryption
...
Bug: 18151196
Change-Id: Iee0f932c61ff4a309dc2861725b24bf976adb4c7
9 years ago
Paul Lawrence
75c922f49b
Fix problem that reading/writing crypto footers wasn't identity
...
Bug: 18151196
Change-Id: Ideef6bcdbccf068a64ed3e042be50c4837a373f8
9 years ago
Paul Lawrence
29b54aab8e
Retry unmounts in ext4 encryption
...
Bug: 18151196
Change-Id: I52ca23b2ce3adcff44bd003d4a12243a0bd6ac34
9 years ago
Paul Lawrence
1190a26f6d
Use default key permissions for ext4enc
...
As per discussion default permissions are the correct ones.
Note that since we use logon keys, they cannot be read outside
the kernel.
Note also that we limit who can read/write keys in selinux policy.
Bug: 18151196
Change-Id: Icc916f430a70eff22e6b74c20ec361c8f3789c1c
9 years ago
Paul Lawrence
aaccfac344
Simplify password checking logic
...
Bug: 18151196
Change-Id: I07ffde534dee7d1032149cfcbaa1a61c5246d759
9 years ago
Paul Lawrence
4e7274551c
Enable properties in ext4enc
...
Enables OwnerInfo and pattern suppression
Bug: 18151196
Change-Id: I46144e16cb00319deeb5492ab82c67f5dd43d6d3
9 years ago
Paul Lawrence
3ca21e227a
Check password is correct by checking hash
...
Handle failures gracefully
Change-Id: Ifb6da8c11a86c50fb11964c18cc1be1326461f78
9 years ago
Paul Lawrence
5e7f004231
New ext4enc kernel switching from xattrs to ioctl
...
This is one of three changes to enable this functionality:
https://android-review.googlesource.com/#/c/146259/
https://android-review.googlesource.com/#/c/146264/
https://android-review.googlesource.com/#/c/146265/
Bug: 18151196
Change-Id: Iba5146b8be1e15050ae901e08b3aaa26d96dcf7e
9 years ago
Paul Lawrence
707fd6c7cc
Securely encrypt the master key
...
Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys.
Use ro.crypto.type flag to determine crypto type, which prevents
any issues when running in block encrypted mode, as well as speeding
up boot in block or no encryption.
This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/148586/
https://android-review.googlesource.com/#/c/148604/
https://android-review.googlesource.com/#/c/148606/
https://android-review.googlesource.com/#/c/148607/
Bug: 18151196
Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
9 years ago
Paul Lawrence
beadcb6ec0
Revert "Securely encrypt the master key"
...
This reverts commit 7053e9cd5e
.
Change-Id: I77ed4dbdff8643c80629d2126cb29f85c24c7b43
9 years ago
Paul Lawrence
7053e9cd5e
Securely encrypt the master key
...
Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys
This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/144586/
https://android-review.googlesource.com/#/c/144663/
https://android-review.googlesource.com/#/c/144672/
https://android-review.googlesource.com/#/c/144673/
Bug: 18151196
Change-Id: I9a162b90afe5f46a4ff15b3878e2ab503795425e
9 years ago