From 223fd1cad8d627dc36e11da8cdd342c1a810d226 Mon Sep 17 00:00:00 2001 From: Paul Lawrence Date: Fri, 6 Feb 2015 16:56:13 +0000 Subject: [PATCH] Revert "Make encryption configurable" This reverts commit 6a69cfc411c086f15d59b7dc105763af16620414. The original fix seems to have led to boot failures in QA. Rather than risk shipping, revert the change. Bug 18764230 reopened. Requires change https://googleplex-android-review.git.corp.google.com/#/c/629950/ Bug: 19278390 Bug: 19199624 Change-Id: Ia858c4db0abb917f9364ec8048f59ca4fb48e233 --- CommandListener.cpp | 8 -------- cryptfs.c | 43 ------------------------------------------- cryptfs.h | 1 - 3 files changed, 52 deletions(-) diff --git a/CommandListener.cpp b/CommandListener.cpp index 226d064..f135a01 100644 --- a/CommandListener.cpp +++ b/CommandListener.cpp @@ -619,14 +619,6 @@ int CommandListener::CryptfsCmd::runCommand(SocketClient *cli, Process::killProcessesWithOpenFiles(DATA_MNT_POINT, 2); } } - } else if (!strcmp(argv[1], "maybeenabledefaultcrypto")) { - if (argc != 2) { - cli->sendMsg(ResponseCode::CommandSyntaxError, - "Usage: cryptfs maybeenabledefaultcrypto", false); - return 0; - } - dumpArgs(argc, argv, -1); - rc = cryptfs_maybe_enable_default_crypto(); } else if (!strcmp(argv[1], "changepw")) { const char* syntax = "Usage: cryptfs changepw " "default|password|pin|pattern [newpasswd]"; diff --git a/cryptfs.c b/cryptfs.c index 2458149..a424b69 100644 --- a/cryptfs.c +++ b/cryptfs.c @@ -3310,49 +3310,6 @@ int cryptfs_enable_default(char *howarg, int allow_reboot) DEFAULT_PASSWORD, allow_reboot); } -static int device_is_force_encrypted() { - int ret = -1; - char value[PROP_VALUE_MAX]; - ret = __system_property_get("ro.vold.forceencryption", value); - if (ret < 0) - return 0; - return strcmp(value, "1") ? 0 : 1; -} - -int cryptfs_maybe_enable_default_crypto() -{ - // Enable default crypt if /forceencrypt or /encryptable and - // ro.vold.forceencrypt=1, else mount data and continue unencrypted - struct fstab_rec *fstab_rec = 0; - fstab_rec = fs_mgr_get_entry_for_mount_point(fstab, DATA_MNT_POINT); - if (!fstab_rec) { - SLOGE("Error getting fstab record"); - return -1; - } - - // See if we should encrypt? - if ( !fs_mgr_is_encryptable(fstab_rec) - || (!fs_mgr_is_force_encrypted(fstab_rec) - && !device_is_force_encrypted())) { - int rc = 0; - - rc = fs_mgr_do_mount(fstab, DATA_MNT_POINT, fstab_rec->blk_device, 0); - property_set("vold.decrypt", "trigger_load_persist_props"); - - /* Create necessary paths on /data */ - if (prep_data_fs()) { - return -1; - } - - property_set("ro.crypto.state", "unencrypted"); - property_set("vold.decrypt", "trigger_restart_framework"); - SLOGD("Unencrypted - restart_framework\n"); - return rc; - } - - return cryptfs_enable_default("inplace", 0); -} - int cryptfs_changepw(int crypt_type, const char *newpw) { struct crypt_mnt_ftr crypt_ftr; diff --git a/cryptfs.h b/cryptfs.h index eba864c..d873c26 100644 --- a/cryptfs.h +++ b/cryptfs.h @@ -232,7 +232,6 @@ extern "C" { int cryptfs_enable(char *flag, int type, char *passwd, int allow_reboot); int cryptfs_changepw(int type, const char *newpw); int cryptfs_enable_default(char *flag, int allow_reboot); - int cryptfs_maybe_enable_default_crypto(); int cryptfs_setup_volume(const char *label, int major, int minor, char *crypto_dev_path, unsigned int max_pathlen, int *new_major, int *new_minor); -- 2.11.0