1. 16 Oct, 2015 2 commits
    • Shawn Willden's avatar
    • Shawn Willden's avatar
      Wrap incomplete keymaster1 implementations with sw keymaster. · 76193b0a
      Shawn Willden authored
      SoftKeymasteDevice can provide software digesting and padding for
      keymaster1 implementations that don't provide all of the required
      digests.  This CL modifies keymaster to check for such keymaster1
      implementations and add a SoftKeymasterDevice wrapper.
      
      The SoftKeymasterDevice work necessary to make this function would have
      required adding an implementation of the keymaster0 API import_keypair
      in terms of keymaster1 API calls (import_key).  Rather than do that, I
      instead implemented the relevant keystore function directly on the
      keymaster1 API.  This approach is cleaner than adding the same code into
      the translation layer, and allows removal of the last vestiges of
      keymaster0 API usage from keystore.
      
      Bug: 24873723
      Change-Id: Ie4c7bba7943a549f35df3086dccea001edb5bb2b
      76193b0a
  2. 10 Oct, 2015 1 commit
  3. 05 Oct, 2015 1 commit
  4. 03 Sep, 2015 1 commit
  5. 02 Sep, 2015 2 commits
    • Kenny Root's avatar
      Merge "Prepare for BoringSSL update." · db441ea6
      Kenny Root authored
      db441ea6
    • Adam Langley's avatar
      Prepare for BoringSSL update. · 9eb9295d
      Adam Langley authored
      This change tweaks things as needed so that the code will compile
      against both the BoringSSL that's currently in Android and a version
      from upstream. The BORINGSSL_201509 define is temporary to allow the
      switch to happen without breaking the build and a followup change will
      remove it.
      
      Change-Id: I3d09b5644661353723803bcbda937d34455849a5
      9eb9295d
  6. 21 Aug, 2015 2 commits
  7. 20 Aug, 2015 1 commit
  8. 14 Aug, 2015 4 commits
  9. 13 Aug, 2015 2 commits
  10. 12 Aug, 2015 8 commits
  11. 05 Aug, 2015 3 commits
  12. 03 Aug, 2015 4 commits
  13. 30 Jul, 2015 1 commit
  14. 29 Jul, 2015 3 commits
  15. 27 Jul, 2015 1 commit
  16. 23 Jul, 2015 1 commit
  17. 17 Jul, 2015 1 commit
    • Chad Brubaker's avatar
      Mark 0 length files as corrupt · a9a17eec
      Chad Brubaker authored
      Files created by keystore should never be 0 length however a vendor ran
      into such a case when testing their keymaster and a side effect of how
      keystore parses files leads to these keys being considered encrypted and
      ulitmately undeletable.
      
      Now mark 0 length files as corrupt in readKey and when deleting a key if
      the key fails to read in because it was corrupt simply rm the file since
      it is not possible to feed the key blob to keymaster's delete method.
      
      Bug: 22561219
      Change-Id: Ie8c1ffe97d1d89c202cdab7a6b4b5efc914cbbff
      a9a17eec
  18. 02 Jul, 2015 1 commit
  19. 01 Jul, 2015 1 commit