mirror of
https://github.com/Evolution-X/hardware_interfaces
synced 2026-02-01 16:50:18 +00:00
Merge "Updated the description on Root of Trust Binding." am: 0ba8531279 am: f6c6fc7830 am: da91112339
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/2080599 Change-Id: I3408bb57db0c1170eb3eb523ff733993fa81d3de Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
@@ -196,12 +196,12 @@ import android.hardware.security.secureclock.TimeStampToken;
|
||||
* derive a key that is used to encrypt the private/secret key material.
|
||||
*
|
||||
* The root of trust consists of a bitstring that must be derived from the public key used by
|
||||
* Verified Boot to verify the signature on the boot image and from the lock state of the
|
||||
* device. If the public key is changed to allow a different system image to be used or if the
|
||||
* lock state is changed, then all of the IKeyMintDevice-protected keys created by the previous
|
||||
* system state must be unusable, unless the previous state is restored. The goal is to increase
|
||||
* the value of the software-enforced key access controls by making it impossible for an attacker-
|
||||
* installed operating system to use IKeyMintDevice keys.
|
||||
* Verified Boot to verify the signature on the boot image, from the lock state and from the
|
||||
* Verified Boot state of the device. If the public key is changed to allow a different system
|
||||
* image to be used or if the lock state is changed, then all of the IKeyMintDevice-protected keys
|
||||
* created by the previous system state must be unusable, unless the previous state is restored.
|
||||
* The goal is to increase the value of the software-enforced key access controls by making it
|
||||
* impossible for an attacker-installed operating system to use IKeyMintDevice keys.
|
||||
*
|
||||
* == Version Binding ==
|
||||
*
|
||||
|
||||
Reference in New Issue
Block a user