- 14 Aug, 2015 4 commits
-
-
Stephen Hines authored
* commit '2ac5cb65': Fix pessimizing move.
-
Stephen Hines authored
-
Stephen Hines authored
The std::move() here is unnecessary, and prohibits the compiler from performing copy elision. Change-Id: Ibdf515c4c0b0c07ff966c696e671a0526be1528e
-
Dan Albert authored
Using std::move here prevents the compiler from performing copy elision. Change-Id: I21ad9dfec4fe36dd935403c9fd0af5e20e131036 (cherry picked from commit 17ee05c5)
-
- 13 Aug, 2015 2 commits
-
- 12 Aug, 2015 8 commits
-
-
Chad Brubaker authored
* commit '48d998cd': Properly check for Blob max length
-
Chad Brubaker authored
* commit 'aca71139': Properly check for Blob max length
-
Chad Brubaker authored
* commit '738d1e9d': Properly check for Blob max length
-
Chad Brubaker authored
* commit '1b8885ba': Properly check for Blob max length
-
Chad Brubaker authored
* commit '0d593526': Properly check for Blob max length
-
Chad Brubaker authored
* commit '54b1e9ad': Properly check for Blob max length
-
Chad Brubaker authored
sizeof(mBlob.value) is incorrect because writeBlob pads up to the next AES_BLOCK_SIZE Bug:22802399 Change-Id: I377edca2c7ea2cf4455f22f5f927fdad79893729
-
Chad Brubaker authored
sizeof(mBlob.value) is incorrect because writeBlob pads up to the next AES_BLOCK_SIZE Bug:22802399 Change-Id: I377edca2c7ea2cf4455f22f5f927fdad79893729
-
- 05 Aug, 2015 3 commits
-
- 03 Aug, 2015 4 commits
-
-
Chad Brubaker authored
* commit '853b8d79': Fix unchecked length in Blob creation
-
Chad Brubaker authored
* commit 'fd1ad379': Fix unchecked length in Blob creation
-
Chad Brubaker authored
* commit '1c73457a': Fix unchecked length in Blob creation
-
Chad Brubaker authored
* commit 'b124c9e8': Fix unchecked length in Blob creation
-
- 30 Jul, 2015 1 commit
-
-
Chad Brubaker authored
* commit '803f37f5': Fix unchecked length in Blob creation
-
- 29 Jul, 2015 3 commits
-
-
Chad Brubaker authored
Applications can specify arbitrary blobs using insert(), check their length to prevent overflow issues. Bug:22802399 Change-Id: I4097bd891c733914df70da5e2c58783081d913bf
-
Chad Brubaker authored
Applications can specify arbitrary blobs using insert(), check their length to prevent overflow issues. Bug:22802399 Change-Id: I4097bd891c733914df70da5e2c58783081d913bf
-
Shawn Willden authored
* commit '2de8b758': Add all digests and padding modes to legacy keys
-
- 27 Jul, 2015 1 commit
-
-
Shawn Willden authored
Bug: 22556114 Change-Id: I44fda03305ddd50cb4ba3c6f6b24cfd9c2af9659
-
- 23 Jul, 2015 1 commit
-
-
Chad Brubaker authored
* commit 'a9a17eec': Mark 0 length files as corrupt
-
- 17 Jul, 2015 1 commit
-
-
Chad Brubaker authored
Files created by keystore should never be 0 length however a vendor ran into such a case when testing their keymaster and a side effect of how keystore parses files leads to these keys being considered encrypted and ulitmately undeletable. Now mark 0 length files as corrupt in readKey and when deleting a key if the key fails to read in because it was corrupt simply rm the file since it is not possible to feed the key blob to keymaster's delete method. Bug: 22561219 Change-Id: Ie8c1ffe97d1d89c202cdab7a6b4b5efc914cbbff
-
- 02 Jul, 2015 1 commit
-
-
Shawn Willden authored
* commit '06114e6a': Fix erroneous reporting of all tokens as timed out.
-
- 01 Jul, 2015 1 commit
-
-
Shawn Willden authored
Bug: 22205545 Change-Id: I170e798b327020ff741031ec05e875c685a49e9d
-
- 25 Jun, 2015 3 commits
-
-
Shawn Willden authored
* commit '5f042153': Rename keymaster tag types to clarify that integers are unsigned.
-
Shawn Willden authored
-
Shawn Willden authored
Bug: 22008538 Change-Id: Id6e3ca5c1defc8149b7ae7de5787b3635e2a4262
-
- 24 Jun, 2015 2 commits
-
-
Shawn Willden authored
* commit '0ebf13db': Rename keymaster tag types to clarify that integers are unsigned.
-
Shawn Willden authored
Bug: 22008538 Change-Id: Id6e3ca5c1defc8149b7ae7de5787b3635e2a4262
-
- 23 Jun, 2015 5 commits
-
-
Alex Klyubin authored
* commit 'b913aa57': Abort operation pruning only if it fails to make space.
-
Alex Klyubin authored
* commit '4e88f9be': Don't ignore errors from begin operation.
-
Alex Klyubin authored
-
Alex Klyubin authored
keystore service's begin operation may sometimes encounter a situation where the underlying device's begin operation fails because of too many operations in progress. In that case, keystore attempts to prune the oldest pruneable operation by invoking the underlying device's abort operation. Regardless of whether the abort operation fails, keystore then removes the operation from the list of in-progress prunable operations. The issue is that when the underlying device's abort operation fails, keystore fails the begin operation that caused all this prunining. This is despite the fact that keystore has managed to make space for one more operation. The fix is to fail the begin operation only if the pruning attempt did not make space for a a new operation. Bug: 22040842 Change-Id: Id98b2c6690de3cfb2a7b1d3bdd10742cc59ecbfa
-
Alex Klyubin authored
This fixes a bug introduced by 9221bff2 which invoked authorization checks after begin operation, while ignoring any errors returned by that operation. This CL restrores the correct order: authorization checks are followed by begin operation. Bug: 22039986 Change-Id: I3516cb120c21b9659289faa5d1ca0225df35a06d
-