- b492f70 Fix incorrect initializer in keymaster tests. by Shawn Willden · 10 years ago
- 2ff74dc Do digesting, and sometimes padding, in SW when HW doesnt. by Shawn Willden · 10 years ago
- b2ca663 am 80892075: system/keymaster: remove BORINGSSL_201509 support. by Adam Langley · 10 years ago
- 8089207 system/keymaster: remove BORINGSSL_201509 support. by Adam Langley · 10 years ago
- e4c6aed am 481722ef: Avoid fuzzer instrumentation for keymaster as it currently crashes Clang by Ivan Krasin · 10 years ago
- 481722e Avoid fuzzer instrumentation for keymaster as it currently crashes Clang by Ivan Krasin · 10 years ago
- 70c2148 am c5a9391b: Left-pad messages when doing "unpadded" RSA operations. by Shawn Willden · 10 years ago
- 2f2447a am ff6623c4: Report keymaster0 keys as hardware-backed, origin unknown. by Shawn Willden · 10 years ago
- 150b9df am 7a2067b4: Make NONE mean NONE only (not ANY) by Shawn Willden · 10 years ago
- a7fa1f3 am 2a0e8056: Use minimum 20 bytes salt for RSA PSS. by Shawn Willden · 10 years ago
- c5a9391 Left-pad messages when doing "unpadded" RSA operations. by Shawn Willden · 10 years ago
- ff6623c Report keymaster0 keys as hardware-backed, origin unknown. by Shawn Willden · 10 years ago
- 7a2067b Make NONE mean NONE only (not ANY) by Shawn Willden · 10 years ago
- 2a0e805 Use minimum 20 bytes salt for RSA PSS. by Shawn Willden · 10 years ago
- 2f660b7 am 5500d778: (-s ours) Add support for KM_TAG_MIN_MAC_LENGTH. by Shawn Willden · 10 years ago
- b3a0796 am b9b189be: (-s ours) Use specified digest for RSA OAEP. by Shawn Willden · 10 years ago
- 29e3943 am 9a1cd6d8: Truncate too-long digests for keymaster 0 ECDSA sign operations by Shawn Willden · 10 years ago
- 5500d77 Add support for KM_TAG_MIN_MAC_LENGTH. by Shawn Willden · 10 years ago
- b9b189b Use specified digest for RSA OAEP. by Shawn Willden · 10 years ago
- 9a1cd6d Truncate too-long digests for keymaster 0 ECDSA sign operations by Shawn Willden · 10 years ago
- bc92877 am 607b0e06: Prepare for BoringSSL update. by Adam Langley · 10 years ago
- 607b0e0 Prepare for BoringSSL update. by Adam Langley · 10 years ago
- 607dbee am c0a63805: Left-pad messages when doing "unpadded" RSA operations. by Shawn Willden · 10 years ago
- c0a6380 Left-pad messages when doing "unpadded" RSA operations. by Shawn Willden · 10 years ago
- 3941b52 am df5eec89: Merge "Revert "Revert "Report keymaster0 keys as hardware-backed, origin unknown.""" into mnc-dev by Shawn Willden · 10 years ago
- df5eec8 Merge "Revert "Revert "Report keymaster0 keys as hardware-backed, origin unknown.""" into mnc-dev by Shawn Willden · 10 years ago
- 34f09c5 Revert "Revert "Report keymaster0 keys as hardware-backed, origin unknown."" by Shawn Willden · 10 years ago
- 24df5e7 am 5cf45028: Make NONE mean NONE only (not ANY) by Shawn Willden · 10 years ago
- 0d6f8df am 3ac35814: Merge "Use minimum 20 bytes salt for RSA PSS." into mnc-dev by Shawn Willden · 10 years ago
- 5cf4502 Make NONE mean NONE only (not ANY) by Shawn Willden · 10 years ago
- 3ac3581 Merge "Use minimum 20 bytes salt for RSA PSS." into mnc-dev by Shawn Willden · 10 years ago
- 2355b7f am 0e0cea3b: Revert "Report keymaster0 keys as hardware-backed, origin unknown." by Shawn Willden · 10 years ago
- 0e0cea3 Revert "Report keymaster0 keys as hardware-backed, origin unknown." by Shawn Willden · 10 years ago
- 081b369 am 9972a539: Report keymaster0 keys as hardware-backed, origin unknown. by Shawn Willden · 10 years ago
- f40e975 am 33ab0389: Add support for KM_TAG_MIN_MAC_LENGTH. by Shawn Willden · 10 years ago
- 53488c6 Use minimum 20 bytes salt for RSA PSS. by Shawn Willden · 10 years ago
- 9972a53 Report keymaster0 keys as hardware-backed, origin unknown. by Shawn Willden · 10 years ago
- 33ab038 Add support for KM_TAG_MIN_MAC_LENGTH. by Shawn Willden · 10 years ago
- 0e2c2bb am 7d05d88d: Use specified digest for RSA OAEP. by Shawn Willden · 10 years ago
- 7d05d88 Use specified digest for RSA OAEP. by Shawn Willden · 10 years ago
- 2a55ee5 am f2441b9f: Implement delete_key and delete_all_keys in SoftKeymasterDevice. by Shawn Willden · 10 years ago
- 8f30eaf am faa9a1b6: Check overflow in authorization set deserialization. by Shawn Willden · 10 years ago
- 8fe29ad am 3897f692: Don\'t enforce authorizations on public keys. by Shawn Willden · 10 years ago
- f4bf12a am 5fccf9dd: Fix enforcement of block mode and MAC length on AES ops by Shawn Willden · 10 years ago
- 67b0a03 am 9e7d723f: Allow any padding mode to be used with keys with KM_PAD_NONE. by Shawn Willden · 10 years ago
- 2f8c816 am b5422432: Support creation and use of HMAC keys with KM_DIGEST_NONE by Shawn Willden · 10 years ago
- 186db81 am d811c0f8: Mark the message about invalid unversioned blobs informational. by Shawn Willden · 10 years ago
- 1bf550d am 8c46a913: (-s ours) Add authorization enforcement to AndroidKeymaster. by Shawn Willden · 10 years ago
- 7384592 am cfd289cf: Use wrapped keymaster0 device\'s value of KEYMASTER_SOFTWARE_ONLY by Chad Brubaker · 10 years ago
- 9636b49 am 31eaa481: Fix missing delete_keypair and delete_all by Chad Brubaker · 10 years ago
- 7bac724 am 0d061c80: Truncate too-long digests for keymaster 0 ECDSA sign operations by Shawn Willden · 10 years ago
- 0d061c8 Truncate too-long digests for keymaster 0 ECDSA sign operations by Shawn Willden · 10 years ago
- f2441b9 Implement delete_key and delete_all_keys in SoftKeymasterDevice. by Shawn Willden · 10 years ago
- faa9a1b Check overflow in authorization set deserialization. by Shawn Willden · 10 years ago
- 3897f69 Don't enforce authorizations on public keys. by Shawn Willden · 10 years ago
- 5fccf9d Fix enforcement of block mode and MAC length on AES ops by Shawn Willden · 10 years ago
- 9e7d723 Allow any padding mode to be used with keys with KM_PAD_NONE. by Shawn Willden · 10 years ago
- b542243 Support creation and use of HMAC keys with KM_DIGEST_NONE by Shawn Willden · 10 years ago
- d811c0f Mark the message about invalid unversioned blobs informational. by Shawn Willden · 10 years ago
- 8c46a91 Add authorization enforcement to AndroidKeymaster. by Shawn Willden · 10 years ago
- cfd289c Use wrapped keymaster0 device's value of KEYMASTER_SOFTWARE_ONLY by Chad Brubaker · 10 years ago
- 31eaa48 Fix missing delete_keypair and delete_all by Chad Brubaker · 10 years ago
- 027034b am 12248fd3: Merge "Implement delete_key and delete_all_keys in SoftKeymasterDevice." into mnc-dev by Shawn Willden · 10 years ago
- 2997fe3 am 28f2e729: Check overflow in authorization set deserialization. by Shawn Willden · 10 years ago
- da5a83b am fafb4442: Don\'t enforce authorizations on public keys. by Shawn Willden · 10 years ago
- 935a25e am e23a2c91: Fix enforcement of block mode and MAC length on AES ops by Shawn Willden · 10 years ago
- 12248fd Merge "Implement delete_key and delete_all_keys in SoftKeymasterDevice." into mnc-dev by Shawn Willden · 10 years ago
- 28f2e72 Check overflow in authorization set deserialization. by Shawn Willden · 10 years ago
- fafb444 Don't enforce authorizations on public keys. by Shawn Willden · 10 years ago
- e23a2c9 Fix enforcement of block mode and MAC length on AES ops by Shawn Willden · 10 years ago
- d091b0a Implement delete_key and delete_all_keys in SoftKeymasterDevice. by Shawn Willden · 10 years ago
- 19743d4 am 5532a085: Allow any padding mode to be used with keys with KM_PAD_NONE. by Shawn Willden · 10 years ago
- 5532a08 Allow any padding mode to be used with keys with KM_PAD_NONE. by Shawn Willden · 10 years ago
- 4ec726d am ebc99a15: Support creation and use of HMAC keys with KM_DIGEST_NONE by Shawn Willden · 10 years ago
- 69b9f84 am 08eab179: Mark the message about invalid unversioned blobs informational. by Shawn Willden · 10 years ago
- c5a25a7 am da643715: (-s ours) Apply authorization checks only during begin(). by Shawn Willden · 10 years ago
- f870a65 am f6f9aeb4: Add a missing bounds check. by Shawn Willden · 10 years ago
- b37fd02 am 97dc69aa: (-s ours) Allow decryption operations to use caller nonce/IV. by Shawn Willden · 10 years ago
- 5f09e91 am ada48506: Add authorization enforcement to AndroidKeymaster. by Shawn Willden · 10 years ago
- 5c465d2 am b9f3abbd: Limit dup_buffer to 16 MiB allocations. by Shawn Willden · 10 years ago
- da64371 Apply authorization checks only during begin(). by Shawn Willden · 10 years ago
- f6f9aeb Add a missing bounds check. by Shawn Willden · 10 years ago
- 97dc69a Allow decryption operations to use caller nonce/IV. by Shawn Willden · 10 years ago
- b9f3abb Limit dup_buffer to 16 MiB allocations. by Shawn Willden · 10 years ago
- db0ec35 am bf9fa996: Apply authorization checks only during begin(). by Shawn Willden · 10 years ago
- ebc99a1 Support creation and use of HMAC keys with KM_DIGEST_NONE by Shawn Willden · 10 years ago
- 08eab17 Mark the message about invalid unversioned blobs informational. by Shawn Willden · 10 years ago
- ada4850 Add authorization enforcement to AndroidKeymaster. by Shawn Willden · 10 years ago
- bf9fa99 Apply authorization checks only during begin(). by Shawn Willden · 10 years ago
- 235a72d am 5cc765aa: Add a missing bounds check. by Shawn Willden · 10 years ago
- 89e1741 am 73e71591: Allow decryption operations to use caller nonce/IV. by Shawn Willden · 10 years ago
- 4f2e566 am e3e33cc8: Limit dup_buffer to 16 MiB allocations. by Shawn Willden · 10 years ago
- 5cc765a Add a missing bounds check. by Shawn Willden · 10 years ago
- 73e7159 Allow decryption operations to use caller nonce/IV. by Shawn Willden · 10 years ago
- e3e33cc Limit dup_buffer to 16 MiB allocations. by Shawn Willden · 10 years ago
- 3f3ad93 am b5db8cd7: Rename keymaster tag types to clarify that integers are unsigned. by Shawn Willden · 10 years ago
- 7bee775 am b83aa361: Handle ECDSA messages that may be a few bits longer than the key. by Shawn Willden · 10 years ago
- 1c94c96 am 391dceda: Require and handle digest for OAEP mode. by Shawn Willden · 10 years ago
- 68774c4 am 528fa1ee: (-s ours) Validate input sizes for RSA and ECDSA signing/verification ops. by Shawn Willden · 10 years ago
- 098d903 am 661b2b1b: (-s ours) Add buffer wrap checks and disable throwing of std::bad_alloc. by Shawn Willden · 10 years ago