Request rollback resistance for SP protector keys
When supported, use rollback resistance for synthetic password (SP)
protector keys, i.e. the Keystore keys that encrypt the SP for a user.
This allows SP protectors to be securely deleted on devices that don't
support Weaver, but do support rollback-resistant Keystore keys. Secure
deletion of SP protectors is necessary to guarantee that user data
cannot be accessed using old LSKFs or deactivated escrow tokens.
This also aligns LockSettingsService with vold, which already uses
rollback-resistant Keystore keys (when supported) to encrypt all storage
keys that aren't bound to the SP.
Bug: 239632930
Test: atest com.android.server.locksettings (on Cuttlefish)
Test: On Cuttlefish, which doesn't support rollback-resistant keys, set
an LSKF and checked for the expected log message from
SyntheticPasswordCrypto ("Rollback-resistant keys unavailable..").
Test: On Raven, which supports rollback-resistant keys, set an LSKF and
checked for the expected log message from SyntheticPasswordCrypto
("Using rollback-resistant key"). Also made some temporary
changes to log the rollback resistance property of the key, and
verified that it really got set.
Change-Id: I05f3b7e5c139471febe5c266a39e3dc3bca4831f
Loading
Please register or sign in to comment