1. 14 Aug, 2015 1 commit
    • Dan Albert's avatar
      Fix pessimizing move. · 8533cf8d
      Dan Albert authored
      Using std::move here prevents the compiler from performing copy
      elision.
      
      Change-Id: I21ad9dfec4fe36dd935403c9fd0af5e20e131036
      (cherry picked from commit 17ee05c5)
      8533cf8d
  2. 13 Aug, 2015 2 commits
  3. 12 Aug, 2015 8 commits
  4. 05 Aug, 2015 3 commits
  5. 03 Aug, 2015 4 commits
  6. 30 Jul, 2015 1 commit
  7. 29 Jul, 2015 3 commits
  8. 27 Jul, 2015 1 commit
  9. 23 Jul, 2015 1 commit
  10. 17 Jul, 2015 1 commit
    • Chad Brubaker's avatar
      Mark 0 length files as corrupt · a9a17eec
      Chad Brubaker authored
      Files created by keystore should never be 0 length however a vendor ran
      into such a case when testing their keymaster and a side effect of how
      keystore parses files leads to these keys being considered encrypted and
      ulitmately undeletable.
      
      Now mark 0 length files as corrupt in readKey and when deleting a key if
      the key fails to read in because it was corrupt simply rm the file since
      it is not possible to feed the key blob to keymaster's delete method.
      
      Bug: 22561219
      Change-Id: Ie8c1ffe97d1d89c202cdab7a6b4b5efc914cbbff
      a9a17eec
  11. 02 Jul, 2015 1 commit
  12. 01 Jul, 2015 1 commit
  13. 25 Jun, 2015 3 commits
  14. 24 Jun, 2015 2 commits
  15. 23 Jun, 2015 7 commits
    • Alex Klyubin's avatar
      am b913aa57: Merge "Abort operation pruning only if it fails to make space." into mnc-dev · c71e6f0d
      Alex Klyubin authored
      * commit 'b913aa57':
        Abort operation pruning only if it fails to make space.
      c71e6f0d
    • Alex Klyubin's avatar
      am 4e88f9be: Don\'t ignore errors from begin operation. · a9d3b157
      Alex Klyubin authored
      * commit '4e88f9be':
        Don't ignore errors from begin operation.
      a9d3b157
    • Alex Klyubin's avatar
    • Alex Klyubin's avatar
      Abort operation pruning only if it fails to make space. · 700c1a35
      Alex Klyubin authored
      keystore service's begin operation may sometimes encounter a situation
      where the underlying device's begin operation fails because of too
      many operations in progress. In that case, keystore attempts to prune
      the oldest pruneable operation by invoking the underlying device's
      abort operation. Regardless of whether the abort operation fails,
      keystore then removes the operation from the list of in-progress
      prunable operations.
      
      The issue is that when the underlying device's abort operation fails,
      keystore fails the begin operation that caused all this prunining.
      This is despite the fact that keystore has managed to make space for
      one more operation.
      
      The fix is to fail the begin operation only if the pruning attempt
      did not make space for a a new operation.
      
      Bug: 22040842
      Change-Id: Id98b2c6690de3cfb2a7b1d3bdd10742cc59ecbfa
      700c1a35
    • Alex Klyubin's avatar
      Don't ignore errors from begin operation. · 4e88f9be
      Alex Klyubin authored
      This fixes a bug introduced by
      9221bff2 which invoked authorization
      checks after begin operation, while ignoring any errors returned by
      that operation. This CL restrores the correct order: authorization
      checks are followed by begin operation.
      
      Bug: 22039986
      Change-Id: I3516cb120c21b9659289faa5d1ca0225df35a06d
      4e88f9be
    • Alex Klyubin's avatar
      am 53752414: Fully support uint64 key validity dates. · 322307bd
      Alex Klyubin authored
      * commit '53752414':
        Fully support uint64 key validity dates.
      322307bd
    • Alex Klyubin's avatar
      Fully support uint64 key validity dates. · 53752414
      Alex Klyubin authored
      This fixes the issue where, on 32-bit platforms, keys expiring after
      about 2^31 - 1 seconds since epoch (Jan 19 2038) might be treated as
      already expired.
      
      The issue was caused by using time_t (signed 32-bit on 32-bit
      platforms) as current time and downcasting uint64 activation and
      expiration time instants to time_t to compare them to current time.
      This downcasting could make future time instants appear to be in the
      past on 32-bit platforms.
      
      Bug: 22015107
      Change-Id: Iae12019c3c019beb92d791fda80b622fa5c4ac4e
      53752414
  16. 20 Jun, 2015 1 commit