summaryrefslogtreecommitdiffstats
path: root/partition.cpp
diff options
context:
space:
mode:
authorEthan Yonker <dees_troy@teamw.in>2015-08-09 19:48:14 +0200
committerEthan Yonker <dees_troy@teamw.in>2015-08-09 19:48:14 +0200
commitbc85b63e78e5a68cc5c3a54e11a5c35e9349387a (patch)
tree2e96ad898eddd5b3c66bfda38e73215b07b879ba /partition.cpp
parentORS: Report success if AOSP script succeeds (diff)
downloadandroid_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar.gz
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar.bz2
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar.lz
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar.xz
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.tar.zst
android_bootable_recovery-bc85b63e78e5a68cc5c3a54e11a5c35e9349387a.zip
Diffstat (limited to 'partition.cpp')
-rw-r--r--partition.cpp42
1 files changed, 42 insertions, 0 deletions
diff --git a/partition.cpp b/partition.cpp
index e612be34f..8c5b412a7 100644
--- a/partition.cpp
+++ b/partition.cpp
@@ -52,6 +52,8 @@ extern "C" {
#ifdef TW_INCLUDE_CRYPTO
#include "crypto/lollipop/cryptfs.h"
+#else
+ #define CRYPT_FOOTER_OFFSET 0x4000
#endif
}
#ifdef HAVE_SELINUX
@@ -1529,6 +1531,46 @@ bool TWPartition::Wipe_Encryption() {
Is_Decrypted = false;
Is_Encrypted = false;
Find_Actual_Block_Device();
+ if (Crypto_Key_Location == "footer") {
+ int newlen, fd;
+ if (Length != 0) {
+ newlen = Length;
+ if (newlen < 0)
+ newlen = newlen * -1;
+ } else {
+ newlen = CRYPT_FOOTER_OFFSET;
+ }
+ if ((fd = open(Actual_Block_Device.c_str(), O_RDWR)) < 0) {
+ gui_print_color("warning", "Unable to open '%s' to wipe crypto key\n", Actual_Block_Device.c_str());
+ } else {
+ unsigned int block_count;
+ if ((ioctl(fd, BLKGETSIZE, &block_count)) == -1) {
+ gui_print_color("warning", "Unable to get block size for wiping crypto footer.\n");
+ } else {
+ off64_t offset = ((off64_t)block_count * 512) - newlen;
+ if (lseek64(fd, offset, SEEK_SET) == -1) {
+ gui_print_color("warning", "Unable to lseek64 for wiping crypto footer.\n");
+ } else {
+ void* buffer = malloc(newlen);
+ if (!buffer) {
+ gui_print_color("warning", "Failed to malloc for wiping crypto footer.\n");
+ } else {
+ memset(buffer, 0, newlen);
+ int ret = write(fd, buffer, newlen);
+ if (ret != newlen) {
+ gui_print_color("warning", "Failed to wipe crypto footer.\n");
+ } else {
+ LOGINFO("Successfully wiped crypto footer.\n");
+ }
+ }
+ }
+ }
+ close(fd);
+ }
+ } else {
+ string Command = "flash_image " + Crypto_Key_Location + " /dev/zero";
+ TWFunc::Exec_Cmd(Command);
+ }
if (Wipe(Fstab_File_System)) {
Has_Data_Media = Save_Data_Media;
if (Has_Data_Media && !Symlink_Mount_Point.empty()) {