History log of /system/keymaster/hmac.cpp
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
0f906ec40f6ade7955c6b967ea522aade54ea2e4 20-Jun-2015 Shawn Willden <swillden@google.com> Add buffer wrap checks and disable throwing of std::bad_alloc.

Android is built with exceptions disabled, but "operator new" and
"operator new[]" still throw std::bad_alloc on failure rather than
returning new. In general this is a good thing, because it will cause
an immediate crash of the process rather than assigning a null pointer
which is probably not checked. But most memory allocations in Keymaster
are checked, because it's written to run in an environment where new
does *not* throw. This CL updates the code to explicitly use the
non-throwing new.

A handful of throwing news remain, but only in places where a crash on
failure is appropriate.

In addition, this CL also inserts buffer wrap checks in key locations
and changes the development-machine Makefile to build in 32-bit mode, to
make memory problems more apparent.

Bug: 21888473
Change-Id: I8ebc5ec12053e4f5274f6f57ce312abc10611cef
/system/keymaster/hmac.cpp
c3326552d973ce34f0f3138333a05a4a1865a699 28-Apr-2015 Adam Langley <agl@google.com> keymaster: support building with tip-of-tree BoringSSL.

Change-Id: Ie9bcbcb33f7904fbffef9dee4f5b4203b1d8f888
(cherry picked from commit b17720bd6675de8d3925ea7fb2ea5c7a8f773ac4)
/system/keymaster/hmac.cpp
d79791b0c7123b3fc5db61a0805d7593f19ca8d9 09-May-2015 Shawn Willden <swillden@google.com> Revert "Remove compatibility with OpenSSL."

This created a build breakage in Trusty, and so was reverted in AOSP. Reverting here to sync.

This reverts commit de4ffa99837df492faca1ded33b14446c4a5c9be.

Change-Id: I80ffcb8f432e4af849aae49f40d313dd475d47fc
/system/keymaster/hmac.cpp
de4ffa99837df492faca1ded33b14446c4a5c9be 05-May-2015 Shawn Willden <swillden@google.com> Remove compatibility with OpenSSL.

Android has switched from OpenSSL to BoringSSL. There were various
accommodations in the code for supporting both, but coming changes make
maintaining that support more difficult than it's worth, I'm abandoning
OpenSSL.

Change-Id: I9203c0215537c7f7aa2a89859ea52ff0f0582a9e
(cherry picked from commit 9011d1ae960beb29ba50634813c28892e738aac7)
/system/keymaster/hmac.cpp
60eebdc0b92724cd550aeba92d124cd50c4db5ae 26-Mar-2015 Thai Duong <thaidn@google.com> ECIES: fix memory leaks and add malloc checks in HKDF. Use fixed-timing
memcmp in HmacOperation.

Change-Id: Ia059730ae31976a684f957c6dcc8c975c06f05a5
/system/keymaster/hmac.cpp
7689ed6e95e5cb712c4983cb30ad383520cfaa33 21-Mar-2015 Thai Duong <thaidn@google.com> ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256

Change-Id: I18cf63b6454d3d11386e9de93d934d759e0abc0e
/system/keymaster/hmac.cpp
aab6d5768e89cc6b1af249ff2e4b9f90e788ef58 24-Mar-2015 Alex Klyubin <klyubin@google.com> Revert "ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256"

This reverts commit 207b505371394dbf2118ca2beb8817cf4c617988.

Change-Id: I2ff88a283517b4829b9a48e064f73373638d0e36
/system/keymaster/hmac.cpp
207b505371394dbf2118ca2beb8817cf4c617988 21-Mar-2015 Thai Duong <thaidn@google.com> ECIES: add HKDF (specified in RFC 5869) using HMAC-SHA256

Change-Id: I5dafc61aecdfd4d38aba0c1beb1b03716e212723
/system/keymaster/hmac.cpp