{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":542565391,"defaultBranch":"android-12.1","name":"android_system_vold","ownerLogin":"PitchBlackRecoveryProject","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2022-09-28T11:53:43.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/37493898?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1680598633.0","currentOid":""},"activityList":{"items":[{"before":"d3b689e166777150aba6e655d4adb037d2031d3f","after":"976f56e48b2ee47ffd76803bb5d7eb4eced8dba3","ref":"refs/heads/android-12.1","pushedAt":"2024-04-11T17:38:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rezaadi0105","name":"Reza Adi Pangestu","path":"/rezaadi0105","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/39455862?s=80&v=4"},"commit":{"message":"vold: Decrypt: Simplify CE decrypt\n\n - Create separated functions\n\nSigned-off-by: zainarbani \nChange-Id: I6992a2b5f3277a59f93131a214d4d59cc6484319","shortMessageHtmlLink":"vold: Decrypt: Simplify CE decrypt"}},{"before":"bb4366e022dac64f586602ffe799bfc564b3f310","after":"d3b689e166777150aba6e655d4adb037d2031d3f","ref":"refs/heads/android-12.1","pushedAt":"2023-10-12T20:54:04.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"rezaadi0105","name":"Reza Adi Pangestu","path":"/rezaadi0105","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/39455862?s=80&v=4"},"commit":{"message":"Stop using the \"stretching\" file\n\nAs a small optimization and code simplification, stop reading and\nwriting the \"stretching\" file alongside each stored key. vold never\ndoes key stretching anymore.\n\nThere was one special case in the code where if the stretching file\nexisted and contained \"nopassword\", then the secret was ignored.\nHowever, this didn't seem to be of any use, especially since it didn't\ncause Keystore to be used, so it did *not* allow a key stored with no\nsecret to be read if a secret was unexpectedly provided.\n\nBug: 232452368\nBug: 251131631\nBug: 251147505\nChange-Id: I5a7cbba7492526e51c451f222b9413d9fae6bce5\nSigned-off-by: zainarbani ","shortMessageHtmlLink":"Stop using the \"stretching\" file"}},{"before":"148cca409a26244f85b2c6f3a6c67c6284478178","after":"bb4366e022dac64f586602ffe799bfc564b3f310","ref":"refs/heads/android-12.1","pushedAt":"2023-10-12T20:51:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rezaadi0105","name":"Reza Adi Pangestu","path":"/rezaadi0105","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/39455862?s=80&v=4"},"commit":{"message":"libvold: de-duplicate keystore2 in shared_libs\n\nSigned-off-by: Bharat Dev Burman \nChange-Id: I99963c38e04b48caeae368963b7dd3c837af2d84\nSigned-off-by: rezaadi0105 ","shortMessageHtmlLink":"libvold: de-duplicate keystore2 in shared_libs"}},{"before":"316c6692c4961f4f8136cceea329a2655c2a1b27","after":"148cca409a26244f85b2c6f3a6c67c6284478178","ref":"refs/heads/android-12.1","pushedAt":"2023-05-29T12:25:22.978Z","pushType":"push","commitsCount":1,"pusher":{"login":"AndroiableDroid","name":"Mohd Faraz","path":"/AndroiableDroid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23701297?s=80&v=4"},"commit":{"message":"decryption: Fetch file encryption from applied fstab [2/2]\n\nChange-Id: Ic90d47db338c13639cdac8e007cecd18d8e568e2\nSigned-off-by: Mohd Faraz ","shortMessageHtmlLink":"decryption: Fetch file encryption from applied fstab [2/2]"}},{"before":null,"after":"148cca409a26244f85b2c6f3a6c67c6284478178","ref":"refs/heads/fbe-patches","pushedAt":"2023-04-04T08:57:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AndroiableDroid","name":"Mohd Faraz","path":"/AndroiableDroid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23701297?s=80&v=4"},"commit":{"message":"decryption: Fetch file encryption from applied fstab [2/2]\n\nChange-Id: Ic90d47db338c13639cdac8e007cecd18d8e568e2\nSigned-off-by: Mohd Faraz ","shortMessageHtmlLink":"decryption: Fetch file encryption from applied fstab [2/2]"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAELlv_eAA","startCursor":null,"endCursor":null}},"title":"Activity ยท PitchBlackRecoveryProject/android_system_vold"}