Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit dcbd1ef8 authored by Treehugger Robot's avatar Treehugger Robot Committed by Automerger Merge Worker
Browse files

Merge "Updated the description on Root of Trust Binding." am: 0ba85312 am:...

Merge "Updated the description on Root of Trust Binding." am: 0ba85312 am: f6c6fc78 am: da911123

Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/2080599



Change-Id: I3408bb57db0c1170eb3eb523ff733993fa81d3de
Signed-off-by: default avatarAutomerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
parents 3645f804 da911123
Loading
Loading
Loading
Loading
+6 −6
Original line number Diff line number Diff line
@@ -196,12 +196,12 @@ import android.hardware.security.secureclock.TimeStampToken;
 * derive a key that is used to encrypt the private/secret key material.
 *
 * The root of trust consists of a bitstring that must be derived from the public key used by
 * Verified Boot to verify the signature on the boot image and from the lock state of the
 * device.  If the public key is changed to allow a different system image to be used or if the
 * lock state is changed, then all of the IKeyMintDevice-protected keys created by the previous
 * system state must be unusable, unless the previous state is restored.  The goal is to increase
 * the value of the software-enforced key access controls by making it impossible for an attacker-
 * installed operating system to use IKeyMintDevice keys.
 * Verified Boot to verify the signature on the boot image, from the lock state and from the
 * Verified Boot state of the device.  If the public key is changed to allow a different system
 * image to be used or if the lock state is changed, then all of the IKeyMintDevice-protected keys
 * created by the previous system state must be unusable, unless the previous state is restored.
 * The goal is to increase the value of the software-enforced key access controls by making it
 * impossible for an attacker-installed operating system to use IKeyMintDevice keys.
 *
 * == Version Binding ==
 *