0f906ec40f6ade7955c6b967ea522aade54ea2e4 |
|
20-Jun-2015 |
Shawn Willden <swillden@google.com> |
Add buffer wrap checks and disable throwing of std::bad_alloc. Android is built with exceptions disabled, but "operator new" and "operator new[]" still throw std::bad_alloc on failure rather than returning new. In general this is a good thing, because it will cause an immediate crash of the process rather than assigning a null pointer which is probably not checked. But most memory allocations in Keymaster are checked, because it's written to run in an environment where new does *not* throw. This CL updates the code to explicitly use the non-throwing new. A handful of throwing news remain, but only in places where a crash on failure is appropriate. In addition, this CL also inserts buffer wrap checks in key locations and changes the development-machine Makefile to build in 32-bit mode, to make memory problems more apparent. Bug: 21888473 Change-Id: I8ebc5ec12053e4f5274f6f57ce312abc10611cef
/system/keymaster/hmac.cpp
|
c3326552d973ce34f0f3138333a05a4a1865a699 |
|
28-Apr-2015 |
Adam Langley <agl@google.com> |
keymaster: support building with tip-of-tree BoringSSL. Change-Id: Ie9bcbcb33f7904fbffef9dee4f5b4203b1d8f888 (cherry picked from commit b17720bd6675de8d3925ea7fb2ea5c7a8f773ac4)
/system/keymaster/hmac.cpp
|
d79791b0c7123b3fc5db61a0805d7593f19ca8d9 |
|
09-May-2015 |
Shawn Willden <swillden@google.com> |
Revert "Remove compatibility with OpenSSL." This created a build breakage in Trusty, and so was reverted in AOSP. Reverting here to sync. This reverts commit de4ffa99837df492faca1ded33b14446c4a5c9be. Change-Id: I80ffcb8f432e4af849aae49f40d313dd475d47fc
/system/keymaster/hmac.cpp
|
de4ffa99837df492faca1ded33b14446c4a5c9be |
|
05-May-2015 |
Shawn Willden <swillden@google.com> |
Remove compatibility with OpenSSL. Android has switched from OpenSSL to BoringSSL. There were various accommodations in the code for supporting both, but coming changes make maintaining that support more difficult than it's worth, I'm abandoning OpenSSL. Change-Id: I9203c0215537c7f7aa2a89859ea52ff0f0582a9e (cherry picked from commit 9011d1ae960beb29ba50634813c28892e738aac7)
/system/keymaster/hmac.cpp
|
60eebdc0b92724cd550aeba92d124cd50c4db5ae |
|
26-Mar-2015 |
Thai Duong <thaidn@google.com> |
ECIES: fix memory leaks and add malloc checks in HKDF. Use fixed-timing memcmp in HmacOperation. Change-Id: Ia059730ae31976a684f957c6dcc8c975c06f05a5
/system/keymaster/hmac.cpp
|
7689ed6e95e5cb712c4983cb30ad383520cfaa33 |
|
21-Mar-2015 |
Thai Duong <thaidn@google.com> |
ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256 Change-Id: I18cf63b6454d3d11386e9de93d934d759e0abc0e
/system/keymaster/hmac.cpp
|
aab6d5768e89cc6b1af249ff2e4b9f90e788ef58 |
|
24-Mar-2015 |
Alex Klyubin <klyubin@google.com> |
Revert "ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256" This reverts commit 207b505371394dbf2118ca2beb8817cf4c617988. Change-Id: I2ff88a283517b4829b9a48e064f73373638d0e36
/system/keymaster/hmac.cpp
|
207b505371394dbf2118ca2beb8817cf4c617988 |
|
21-Mar-2015 |
Thai Duong <thaidn@google.com> |
ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256 Change-Id: I5dafc61aecdfd4d38aba0c1beb1b03716e212723
/system/keymaster/hmac.cpp
|