c0ff10d48be65cbf498636539316cc378b1c9424 |
|
17-May-2012 |
Kenny Root <kroot@google.com> |
Make sure delete_all function pointer is NULL The peril of not using calloc mean delete_all is not initialized until we explcitly set it. Explicitly set delete_all to NULL to avoid that. Change-Id: Ic370453e6142c6d1b2566df9844b4fac4bc53042
/system/security/softkeymaster/keymaster_openssl.cpp
|
98c2f8fcc1263a9d94adac66994fffc96c0df699 |
|
28-Mar-2012 |
Colin Cross <ccross@android.com> |
use UniquePtr.h from frameworks/native Use the UniquePtr.h include from frameworks/native/include/utils to fix the pdk build. Change-Id: Ic415b43d2eb8c0b7ef54b6f3f75b7fa0d5f7a058
/system/security/softkeymaster/keymaster_openssl.cpp
|
822c3a99d930e9299e2fad2fb3e0ff91b119b95a |
|
24-Mar-2012 |
Kenny Root <kroot@google.com> |
Add support for upgrading key types Old key types were not distinguished by the keystore itself. This change takes some of the reserved fields in the old format and changes it to a version number and key type. Change-Id: I45bd4cdce042617641fe7bd742bbe26da6024996
/system/security/softkeymaster/keymaster_openssl.cpp
|
70e3a86abd2c412d602a018967c01c177eb6cf4e |
|
16-Feb-2012 |
Kenny Root <kroot@google.com> |
Add keymaster to keystore with soft implementation Add hardware crypto capabilities to keystore. This allows hardware escrow of private key material. There is also an OpenSSL engine that connects to keystore to allow use of the keystore keys from native code built into the platform. This includes a software implementation of keymaster using OpenSSL as the backend. This is just as insecure as the previous solution, but it's needed so devices without hardware support can continue to operate in the new scheme without a lot of compatibility code. Change-Id: I2bc67766e1f633ef1cbbd2874a65962074e84f4f
/system/security/softkeymaster/keymaster_openssl.cpp
|