Loading init/mount_namespace.cpp +2 −1 Original line number Diff line number Diff line Loading @@ -158,7 +158,8 @@ static bool ActivateFlattenedApexesIfPossible() { auto on_activate = [&](const std::string& apex_path, const apex::proto::ApexManifest& apex_manifest) { apex_infos.emplace_back(apex_manifest.name(), apex_path, apex_path, apex_manifest.version(), apex_manifest.versionname(), /*isFactory=*/true, /*isActive=*/true); apex_manifest.versionname(), /*isFactory=*/true, /*isActive=*/true, /* lastUpdateMillis= */ 0); }; for (const auto& dir : kBuiltinDirsForApexes) { Loading libprocessgroup/processgroup.cpp +5 −1 Original line number Diff line number Diff line Loading @@ -224,7 +224,11 @@ void removeAllProcessGroups() { * transferred for the user/group passed as uid/gid before system_server can properly access them. */ static bool MkdirAndChown(const std::string& path, mode_t mode, uid_t uid, gid_t gid) { if (mkdir(path.c_str(), mode) == -1 && errno != EEXIST) { if (mkdir(path.c_str(), mode) == -1) { if (errno == EEXIST) { // Directory already exists and permissions have been set at the time it was created return true; } return false; } Loading trusty/keymaster/Android.bp +1 −1 Original line number Diff line number Diff line Loading @@ -100,6 +100,7 @@ cc_binary { "ipc/trusty_keymaster_ipc.cpp", "keymint/TrustyKeyMintDevice.cpp", "keymint/TrustyKeyMintOperation.cpp", "keymint/TrustyRemotelyProvisionedComponentDevice.cpp", "keymint/TrustySecureClock.cpp", "keymint/TrustySharedSecret.cpp", "keymint/service.cpp", Loading @@ -118,7 +119,6 @@ cc_binary { "libtrusty", ], required: [ "RemoteProvisioner", "android.hardware.hardware_keystore.xml", ], } Loading trusty/keymaster/TrustyKeymaster.cpp +10 −0 Original line number Diff line number Diff line Loading @@ -158,6 +158,16 @@ void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request, } } void TrustyKeymaster::GenerateRkpKey(const GenerateRkpKeyRequest& request, GenerateRkpKeyResponse* response) { ForwardCommand(KM_GENERATE_RKP_KEY, request, response); } void TrustyKeymaster::GenerateCsr(const GenerateCsrRequest& request, GenerateCsrResponse* response) { ForwardCommand(KM_GENERATE_CSR, request, response); } void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, GetKeyCharacteristicsResponse* response) { ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response); Loading trusty/keymaster/include/trusty_keymaster/TrustyKeymaster.h +2 −0 Original line number Diff line number Diff line Loading @@ -42,6 +42,8 @@ class TrustyKeymaster { void AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response); void Configure(const ConfigureRequest& request, ConfigureResponse* response); void GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response); void GenerateRkpKey(const GenerateRkpKeyRequest& request, GenerateRkpKeyResponse* response); void GenerateCsr(const GenerateCsrRequest& request, GenerateCsrResponse* response); void GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, GetKeyCharacteristicsResponse* response); void ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response); Loading Loading
init/mount_namespace.cpp +2 −1 Original line number Diff line number Diff line Loading @@ -158,7 +158,8 @@ static bool ActivateFlattenedApexesIfPossible() { auto on_activate = [&](const std::string& apex_path, const apex::proto::ApexManifest& apex_manifest) { apex_infos.emplace_back(apex_manifest.name(), apex_path, apex_path, apex_manifest.version(), apex_manifest.versionname(), /*isFactory=*/true, /*isActive=*/true); apex_manifest.versionname(), /*isFactory=*/true, /*isActive=*/true, /* lastUpdateMillis= */ 0); }; for (const auto& dir : kBuiltinDirsForApexes) { Loading
libprocessgroup/processgroup.cpp +5 −1 Original line number Diff line number Diff line Loading @@ -224,7 +224,11 @@ void removeAllProcessGroups() { * transferred for the user/group passed as uid/gid before system_server can properly access them. */ static bool MkdirAndChown(const std::string& path, mode_t mode, uid_t uid, gid_t gid) { if (mkdir(path.c_str(), mode) == -1 && errno != EEXIST) { if (mkdir(path.c_str(), mode) == -1) { if (errno == EEXIST) { // Directory already exists and permissions have been set at the time it was created return true; } return false; } Loading
trusty/keymaster/Android.bp +1 −1 Original line number Diff line number Diff line Loading @@ -100,6 +100,7 @@ cc_binary { "ipc/trusty_keymaster_ipc.cpp", "keymint/TrustyKeyMintDevice.cpp", "keymint/TrustyKeyMintOperation.cpp", "keymint/TrustyRemotelyProvisionedComponentDevice.cpp", "keymint/TrustySecureClock.cpp", "keymint/TrustySharedSecret.cpp", "keymint/service.cpp", Loading @@ -118,7 +119,6 @@ cc_binary { "libtrusty", ], required: [ "RemoteProvisioner", "android.hardware.hardware_keystore.xml", ], } Loading
trusty/keymaster/TrustyKeymaster.cpp +10 −0 Original line number Diff line number Diff line Loading @@ -158,6 +158,16 @@ void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request, } } void TrustyKeymaster::GenerateRkpKey(const GenerateRkpKeyRequest& request, GenerateRkpKeyResponse* response) { ForwardCommand(KM_GENERATE_RKP_KEY, request, response); } void TrustyKeymaster::GenerateCsr(const GenerateCsrRequest& request, GenerateCsrResponse* response) { ForwardCommand(KM_GENERATE_CSR, request, response); } void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, GetKeyCharacteristicsResponse* response) { ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response); Loading
trusty/keymaster/include/trusty_keymaster/TrustyKeymaster.h +2 −0 Original line number Diff line number Diff line Loading @@ -42,6 +42,8 @@ class TrustyKeymaster { void AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response); void Configure(const ConfigureRequest& request, ConfigureResponse* response); void GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response); void GenerateRkpKey(const GenerateRkpKeyRequest& request, GenerateRkpKeyResponse* response); void GenerateCsr(const GenerateCsrRequest& request, GenerateCsrResponse* response); void GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, GetKeyCharacteristicsResponse* response); void ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response); Loading