Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 82c115a8 authored by Treehugger Robot's avatar Treehugger Robot Committed by Automerger Merge Worker
Browse files

Merge "Updated the description on Root of Trust Binding." am: 0ba85312 am:...

Merge "Updated the description on Root of Trust Binding." am: 0ba85312 am: f6c6fc78 am: da911123 am: dcbd1ef8 am: 8d9d690f

Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/2080599



Change-Id: I079a00ff7ec2bb40224c4cfd074f7f10f9b89f45
Signed-off-by: default avatarAutomerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
parents 4710ce82 8d9d690f
Loading
Loading
Loading
Loading
+6 −6
Original line number Diff line number Diff line
@@ -196,12 +196,12 @@ import android.hardware.security.secureclock.TimeStampToken;
 * derive a key that is used to encrypt the private/secret key material.
 *
 * The root of trust consists of a bitstring that must be derived from the public key used by
 * Verified Boot to verify the signature on the boot image and from the lock state of the
 * device.  If the public key is changed to allow a different system image to be used or if the
 * lock state is changed, then all of the IKeyMintDevice-protected keys created by the previous
 * system state must be unusable, unless the previous state is restored.  The goal is to increase
 * the value of the software-enforced key access controls by making it impossible for an attacker-
 * installed operating system to use IKeyMintDevice keys.
 * Verified Boot to verify the signature on the boot image, from the lock state and from the
 * Verified Boot state of the device.  If the public key is changed to allow a different system
 * image to be used or if the lock state is changed, then all of the IKeyMintDevice-protected keys
 * created by the previous system state must be unusable, unless the previous state is restored.
 * The goal is to increase the value of the software-enforced key access controls by making it
 * impossible for an attacker-installed operating system to use IKeyMintDevice keys.
 *
 * == Version Binding ==
 *