Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit f371c5ea authored by David Drysdale's avatar David Drysdale Committed by Automerger Merge Worker
Browse files

Merge "KeyMint HAL: clarify ATTEST_KEY is like SIGN" am: afa73442 am: bbbc2783 am: be65672e

Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/2033928

Change-Id: I49d1939007b771ad90fed66b475d3034272ff291
parents 5c74cb3d be65672e
Loading
Loading
Loading
Loading
+8 −7
Original line number Diff line number Diff line
@@ -78,15 +78,16 @@ parcelable KeyCreationResult {
     *     provided, otherwise ATTESTATION_APPLICATION_ID_MISSING will be returned.
     *
     * 3.  Asymmetric key non-attestation with signing key.  If Tag::ATTESTATION_CHALLENGE is not
     *     provided and the generated/imported key has KeyPurpose::SIGN, then the returned
     *     certificate chain must contain only a single self-signed certificate with no attestation
     *     extension.  Tag::ATTESTATION_APPLICATION_ID will be ignored if provided.
     *     provided and the generated/imported key has KeyPurpose::SIGN or KeyPurpose::ATTEST_KEY,
     *     then the returned certificate chain must contain only a single self-signed certificate
     *     with no attestation extension.  Tag::ATTESTATION_APPLICATION_ID will be ignored if
     *     provided.
     *
     * 4.  Asymmetric key non-attestation with non-signing key.  If TAG::ATTESTATION_CHALLENGE is
     *     not provided and the generated/imported key does not have KeyPurpose::SIGN, then the
     *     returned certificate chain must contain only a single certificate with an empty signature
     *     and no attestation extension.  Tag::ATTESTATION_APPLICATION_ID will be ignored if
     *     provided.
     *     not provided and the generated/imported key does not have KeyPurpose::SIGN nor
     *     KeyPurpose::ATTEST_KEY, then the returned certificate chain must contain only a single
     *     certificate with an empty signature and no attestation extension.
     *     Tag::ATTESTATION_APPLICATION_ID will be ignored if provided.
     *
     * 5.  Symmetric key.  If the generated/imported key is symmetric, the certificate chain must
     *     return empty, any Tag::ATTESTATION_CHALLENGE or Tag::ATTESTATION_APPLICATION_ID inputs,