Shawn Willden
aef2a7562e
Merge "Added a new test case to validate AES algorithm with invalid key sizes."
2021-05-05 19:48:28 +00:00
Jooyung Han
9c3ebfc83f
aidl: Set explicit default values
...
This fixes warnings in AIDL files(-Wenum-explicit-default).
No semantic changes. (Explicit values are all zero enumerators.)
Fixes: 179853367
Test: mma in hardware/interfaces/keymaster
Change-Id: If5a70da3efd05a344c39ef1d2e73b7ec2b894f33
2021-04-27 18:33:17 +09:00
BKSSM Venkateswarlu
4bed95e355
Added a new test case to validate AES algorithm with invalid key sizes.
...
Strongbox keymaster does not support keysize of length 192 for AES algorithm.
Test: Executed keymaster vts test cases.
Change-Id: I3db310f4e2353761c68a4c94aa19d9fa71aa9215
2021-04-19 18:47:00 +01:00
Janis Danisevskis
9d363652af
KeyMaster 4.0: Add missing tags to support library.
...
keymaster_tags.h was missing the tags
ATTESTATION_ID_SERIAL/IMEI/MEID.
Test: N/A
Bug: 183412538
Change-Id: I7216971a30fa1f42f152035bf79959f21bdbc09b
2021-04-06 12:54:57 -07:00
David Zeuthen
7f8ccb5caf
KeyMint + KeyMaster: Include permissions for FEATURE_HARDWARE_KEYSTORE.
...
This change includes permission files for the new permission
FEATURE_HARDWARE_KEYSTORE for the default KeyMaster and KeyMint
implementations.
Test: Manually inspected that permission files are installed.
Test: atest android.keystore.cts.KeyAttestationTest#testAttestationKmVersionMatchesFeatureVersion
Bug: 160616951
Change-Id: Ia35e1ba6c894624999eed62e8434a20ebc833b97
2021-03-25 08:07:03 -04:00
Treehugger Robot
ac85c24b77
Merge "vts: Correct the test RSA key format"
2021-03-09 06:05:50 +00:00
Tommy Chiu
e5a78a77cb
vts: Correct the test RSA key format
...
The format of test key was not PKCS8.
Correct it and add the generating command for reference.
Fixed: 181701819
Test: VtsHalKeymasterV4_0TargetTest --gtest_filter=*strongbox*
Change-Id: I7793c781eee976bc813b6fea77762b173f95e06a
2021-03-07 03:43:19 +00:00
Bill Richardson
478715818f
Fix segfault in EncryptionOperationsTest.RsaPkcs1Success
...
This test tries to modify an encrypted message to ensure that the
result can't be decrypted, but if encrypting the messsage fails
first then there's nothing to modify.
Bug: None
Test: Ran against a Strongbox implementation that refuses to
encrypt the message using Digest::NONE
Signed-off-by: Bill Richardson <wfrichar@google.com>
Change-Id: Ib4d389a47702edd56a4e7d2b334dc89d0c3972a1
2021-03-01 19:50:36 +00:00
Chirag Pathak
2f408e5e3b
Changes for Vts related to Strongbox. Strongbox is only required to supports 2048 bit keys and optionally required to support Device Unique Attestations.
...
Test: atest VtsHalKeymasterV4_0TargetTest and atest VtsHalKeymasterV4_1TargetTest.
Bug: Related to b/150122447.
Signed-off-by: Chirag Pathak <pathakc@google.com>
Change-Id: I46993aff322dff12af4ce88a46c00316f14f3227
2021-02-24 18:33:24 +00:00
Bob Badour
b224b363de
[LSC] Add LOCAL_LICENSE_KINDS to hardware/interfaces
...
Added SPDX-license-identifier-Apache-2.0 to:
atrace/1.0/Android.bp
atrace/1.0/default/Android.bp
atrace/1.0/vts/functional/Android.bp
audio/2.0/Android.bp
audio/2.0/config/Android.bp
audio/4.0/Android.bp
audio/4.0/config/Android.bp
audio/5.0/Android.bp
audio/5.0/config/Android.bp
audio/6.0/Android.bp
audio/6.0/config/Android.bp
audio/7.0/Android.bp
audio/7.0/config/Android.bp
audio/common/2.0/Android.bp
audio/common/4.0/Android.bp
audio/common/5.0/Android.bp
audio/common/6.0/Android.bp
audio/common/7.0/Android.bp
audio/common/7.0/example/Android.bp
audio/common/all-versions/default/Android.bp
audio/common/all-versions/default/service/Android.bp
audio/common/all-versions/test/utility/Android.bp
audio/common/all-versions/util/Android.bp
audio/core/all-versions/default/Android.bp
audio/core/all-versions/default/util/Android.bp
audio/core/all-versions/vts/functional/Android.bp
audio/effect/2.0/Android.bp
audio/effect/2.0/xml/Android.bp
audio/effect/4.0/Android.bp
audio/effect/4.0/xml/Android.bp
audio/effect/5.0/Android.bp
audio/effect/5.0/xml/Android.bp
audio/effect/6.0/Android.bp
audio/effect/6.0/xml/Android.bp
audio/effect/7.0/Android.bp
audio/effect/7.0/xml/Android.bp
audio/effect/all-versions/default/Android.bp
audio/effect/all-versions/default/util/Android.bp
audio/effect/all-versions/vts/functional/Android.bp
audio/policy/1.0/vts/functional/Android.bp
audio/policy/1.0/xml/Android.bp
audio/policy/1.0/xml/pfw_schemas/Android.bp
authsecret/1.0/Android.bp
authsecret/1.0/default/Android.bp
authsecret/1.0/vts/functional/Android.bp
authsecret/aidl/Android.bp
authsecret/aidl/default/Android.bp
authsecret/aidl/vts/Android.bp
automotive/audiocontrol/1.0/Android.bp
automotive/audiocontrol/1.0/default/Android.bp
automotive/audiocontrol/1.0/vts/functional/Android.bp
automotive/audiocontrol/2.0/Android.bp
automotive/audiocontrol/2.0/default/Android.bp
automotive/audiocontrol/2.0/vts/functional/Android.bp
automotive/can/1.0/default/libnetdevice/Android.bp
automotive/can/1.0/hidl-utils/Android.bp
automotive/can/1.0/tools/Android.bp
automotive/can/1.0/tools/configurator/Android.bp
automotive/can/1.0/tools/configurator/proto/Android.bp
automotive/can/1.0/tools/libcanhaltools/Android.bp
automotive/can/1.0/vts/functional/Android.bp
automotive/can/1.0/vts/utils/Android.bp
automotive/evs/1.0/Android.bp
automotive/evs/1.0/default/Android.bp
automotive/evs/1.0/vts/functional/Android.bp
automotive/evs/1.1/Android.bp
automotive/evs/1.1/default/Android.bp
automotive/evs/1.1/vts/functional/Android.bp
automotive/evs/1.1/vts/fuzzing/Android.bp
automotive/evs/common/utils/default/Android.bp
automotive/evs/common/utils/default/test/fuzz/Android.bp
automotive/occupant_awareness/aidl/Android.bp
automotive/occupant_awareness/aidl/default/Android.bp
automotive/occupant_awareness/aidl/mock/Android.bp
automotive/occupant_awareness/aidl/vts/functional/Android.bp
automotive/sv/1.0/Android.bp
automotive/sv/1.0/default/Android.bp
automotive/sv/1.0/vts/functional/Android.bp
automotive/vehicle/2.0/Android.bp
automotive/vehicle/2.0/default/Android.bp
automotive/vehicle/2.0/default/impl/vhal_v2_0/proto/Android.bp
automotive/vehicle/2.0/utils/Android.bp
biometrics/face/1.0/Android.bp
biometrics/face/1.0/default/Android.bp
biometrics/face/1.0/vts/functional/Android.bp
biometrics/fingerprint/2.1/Android.bp
biometrics/fingerprint/2.1/default/Android.bp
biometrics/fingerprint/2.1/vts/functional/Android.bp
biometrics/fingerprint/2.2/Android.bp
biometrics/fingerprint/2.2/vts/functional/Android.bp
bluetooth/1.0/Android.bp
bluetooth/1.0/default/Android.bp
bluetooth/1.0/vts/functional/Android.bp
bluetooth/1.1/Android.bp
bluetooth/1.1/default/Android.bp
bluetooth/1.1/vts/functional/Android.bp
bluetooth/a2dp/1.0/Android.bp
bluetooth/a2dp/1.0/default/Android.bp
bluetooth/a2dp/1.0/vts/functional/Android.bp
bluetooth/audio/2.0/Android.bp
bluetooth/audio/2.0/default/Android.bp
bluetooth/audio/2.0/vts/functional/Android.bp
bluetooth/audio/2.1/Android.bp
bluetooth/audio/2.1/default/Android.bp
bluetooth/audio/2.1/vts/functional/Android.bp
bluetooth/audio/utils/Android.bp
boot/1.0/Android.bp
boot/1.0/default/Android.bp
boot/1.0/vts/functional/Android.bp
boot/1.1/Android.bp
boot/1.1/default/Android.bp
boot/1.1/default/boot_control/Android.bp
boot/1.1/vts/functional/Android.bp
boot/1.2/Android.bp
boot/1.2/default/Android.bp
boot/1.2/vts/functional/Android.bp
broadcastradio/1.0/Android.bp
broadcastradio/1.0/default/Android.bp
broadcastradio/1.0/vts/functional/Android.bp
broadcastradio/1.1/Android.bp
broadcastradio/1.1/default/Android.bp
broadcastradio/1.1/vts/functional/Android.bp
broadcastradio/2.0/Android.bp
broadcastradio/2.0/default/Android.bp
broadcastradio/2.0/vts/functional/Android.bp
broadcastradio/common/tests/Android.bp
broadcastradio/common/utils/Android.bp
broadcastradio/common/utils1x/Android.bp
broadcastradio/common/utils2x/Android.bp
broadcastradio/common/vts/utils/Android.bp
camera/common/1.0/Android.bp
camera/common/1.0/default/Android.bp
camera/device/1.0/Android.bp
camera/device/1.0/default/Android.bp
camera/device/3.2/Android.bp
camera/device/3.2/default/Android.bp
camera/device/3.3/Android.bp
camera/device/3.3/default/Android.bp
camera/device/3.4/Android.bp
camera/device/3.4/default/Android.bp
camera/device/3.5/Android.bp
camera/device/3.5/default/Android.bp
camera/device/3.6/Android.bp
camera/device/3.6/default/Android.bp
camera/metadata/3.2/Android.bp
camera/metadata/3.3/Android.bp
camera/metadata/3.4/Android.bp
camera/metadata/3.5/Android.bp
camera/provider/2.4/Android.bp
camera/provider/2.4/default/Android.bp
camera/provider/2.4/vts/functional/Android.bp
camera/provider/2.5/Android.bp
camera/provider/2.5/default/Android.bp
camera/provider/2.6/Android.bp
cas/1.0/Android.bp
cas/1.0/default/Android.bp
cas/1.0/vts/functional/Android.bp
cas/1.1/Android.bp
cas/1.1/default/Android.bp
cas/1.1/vts/functional/Android.bp
cas/1.2/Android.bp
cas/1.2/default/Android.bp
cas/1.2/vts/functional/Android.bp
cas/native/1.0/Android.bp
common/aidl/Android.bp
common/fmq/aidl/Android.bp
common/support/Android.bp
compatibility_matrices/Android.bp
compatibility_matrices/Android.mk
compatibility_matrices/build/Android.bp
compatibility_matrices/exclude/Android.bp
configstore/1.0/Android.bp
configstore/1.0/vts/functional/Android.bp
configstore/1.1/Android.bp
configstore/1.1/default/Android.mk
configstore/utils/Android.bp
confirmationui/1.0/Android.bp
confirmationui/1.0/default/Android.bp
confirmationui/1.0/vts/functional/Android.bp
confirmationui/support/Android.bp
contexthub/1.0/Android.bp
contexthub/1.0/default/Android.bp
contexthub/1.0/vts/functional/Android.bp
contexthub/1.1/Android.bp
contexthub/1.1/default/Android.bp
contexthub/1.1/vts/functional/Android.bp
contexthub/common/vts/Android.bp
drm/1.0/Android.bp
drm/1.0/default/Android.bp
drm/1.0/vts/functional/Android.bp
drm/1.1/Android.bp
drm/1.1/vts/functional/Android.bp
drm/1.2/Android.bp
drm/1.2/vts/functional/Android.bp
drm/1.3/Android.bp
drm/1.3/vts/functional/Android.bp
dumpstate/1.0/Android.bp
dumpstate/1.0/default/Android.bp
dumpstate/1.0/vts/functional/Android.bp
dumpstate/1.1/Android.bp
dumpstate/1.1/default/Android.bp
dumpstate/1.1/vts/functional/Android.bp
fastboot/1.0/Android.bp
fastboot/1.0/default/Android.bp
fastboot/1.1/Android.bp
fastboot/1.1/default/Android.bp
gatekeeper/1.0/Android.bp
gatekeeper/1.0/default/Android.bp
gatekeeper/1.0/software/Android.bp
gatekeeper/1.0/software/tests/Android.bp
gatekeeper/1.0/vts/functional/Android.bp
gnss/1.0/Android.bp
gnss/1.0/default/Android.bp
gnss/1.0/vts/functional/Android.bp
gnss/1.1/Android.bp
gnss/1.1/default/Android.bp
gnss/1.1/vts/functional/Android.bp
gnss/2.0/Android.bp
gnss/2.0/default/Android.bp
gnss/2.0/vts/functional/Android.bp
gnss/2.1/Android.bp
gnss/2.1/default/Android.bp
gnss/2.1/vts/functional/Android.bp
gnss/common/utils/default/Android.bp
gnss/common/utils/vts/Android.bp
gnss/measurement_corrections/1.0/Android.bp
gnss/measurement_corrections/1.1/Android.bp
gnss/visibility_control/1.0/Android.bp
graphics/allocator/2.0/Android.bp
graphics/allocator/2.0/default/Android.bp
graphics/allocator/2.0/utils/gralloc1-adapter/Android.bp
graphics/allocator/2.0/utils/hal/Android.bp
graphics/allocator/2.0/utils/passthrough/Android.bp
graphics/allocator/3.0/Android.bp
graphics/allocator/4.0/Android.bp
graphics/bufferqueue/1.0/Android.bp
graphics/bufferqueue/2.0/Android.bp
graphics/common/1.0/Android.bp
graphics/common/1.1/Android.bp
graphics/common/1.2/Android.bp
graphics/common/aidl/Android.bp
graphics/composer/2.1/Android.bp
graphics/composer/2.1/default/Android.bp
graphics/composer/2.1/utils/command-buffer/Android.bp
graphics/composer/2.1/utils/hal/Android.bp
graphics/composer/2.1/utils/hwc2on1adapter/Android.bp
graphics/composer/2.1/utils/hwc2onfbadapter/Android.bp
graphics/composer/2.1/utils/passthrough/Android.bp
graphics/composer/2.1/utils/resources/Android.bp
graphics/composer/2.1/utils/vts/Android.bp
graphics/composer/2.1/vts/functional/Android.bp
graphics/composer/2.2/Android.bp
graphics/composer/2.2/default/Android.mk
graphics/composer/2.2/utils/command-buffer/Android.bp
graphics/composer/2.2/utils/hal/Android.bp
graphics/composer/2.2/utils/passthrough/Android.bp
graphics/composer/2.2/utils/resources/Android.bp
graphics/composer/2.2/utils/vts/Android.bp
graphics/composer/2.2/vts/functional/Android.bp
graphics/composer/2.3/Android.bp
graphics/composer/2.3/default/Android.bp
graphics/composer/2.3/utils/command-buffer/Android.bp
graphics/composer/2.3/utils/hal/Android.bp
graphics/composer/2.3/utils/passthrough/Android.bp
graphics/composer/2.3/utils/vts/Android.bp
graphics/composer/2.3/vts/functional/Android.bp
graphics/composer/2.4/Android.bp
graphics/composer/2.4/default/Android.bp
graphics/composer/2.4/utils/command-buffer/Android.bp
graphics/composer/2.4/utils/hal/Android.bp
graphics/composer/2.4/utils/passthrough/Android.bp
graphics/composer/2.4/utils/vts/Android.bp
graphics/composer/2.4/vts/functional/Android.bp
graphics/mapper/2.0/Android.bp
graphics/mapper/2.0/default/Android.bp
graphics/mapper/2.0/utils/hal/Android.bp
graphics/mapper/2.0/utils/passthrough/Android.bp
graphics/mapper/2.0/utils/vts/Android.bp
graphics/mapper/2.0/vts/functional/Android.bp
graphics/mapper/2.1/Android.bp
graphics/mapper/2.1/default/Android.bp
graphics/mapper/2.1/utils/hal/Android.bp
graphics/mapper/2.1/utils/passthrough/Android.bp
graphics/mapper/2.1/utils/vts/Android.bp
graphics/mapper/2.1/vts/functional/Android.bp
graphics/mapper/3.0/Android.bp
graphics/mapper/3.0/utils/vts/Android.bp
graphics/mapper/3.0/vts/functional/Android.bp
graphics/mapper/4.0/Android.bp
graphics/mapper/4.0/utils/vts/Android.bp
graphics/mapper/4.0/vts/functional/Android.bp
health/1.0/Android.bp
health/1.0/default/Android.bp
health/2.0/Android.bp
health/2.0/default/Android.bp
health/2.0/utils/libhealthhalutils/Android.bp
health/2.0/utils/libhealthservice/Android.bp
health/2.0/utils/libhealthstoragedefault/Android.bp
health/2.0/vts/functional/Android.bp
health/2.1/Android.bp
health/2.1/default/Android.bp
health/2.1/vts/functional/Android.bp
health/storage/1.0/Android.bp
health/storage/1.0/default/Android.bp
health/storage/1.0/vts/functional/Android.bp
health/storage/aidl/Android.bp
health/storage/aidl/default/Android.bp
health/storage/aidl/vts/functional/Android.bp
health/storage/impl_common/Android.bp
health/storage/test_common/Android.bp
health/utils/libhealth2impl/Android.bp
health/utils/libhealthloop/Android.bp
identity/aidl/Android.bp
identity/aidl/default/Android.bp
identity/aidl/vts/Android.bp
identity/support/Android.bp
input/classifier/1.0/Android.bp
input/classifier/1.0/default/Android.bp
input/classifier/1.0/vts/functional/Android.bp
input/common/1.0/Android.bp
ir/1.0/Android.bp
ir/1.0/default/Android.bp
ir/1.0/vts/functional/Android.bp
keymaster/3.0/Android.bp
keymaster/3.0/default/Android.mk
keymaster/3.0/vts/functional/Android.bp
keymaster/4.0/Android.bp
keymaster/4.0/default/Android.bp
keymaster/4.0/support/Android.bp
keymaster/4.0/vts/functional/Android.bp
keymaster/4.0/vts/performance/Android.bp
keymaster/4.1/Android.bp
keymaster/4.1/default/Android.bp
keymaster/4.1/support/Android.bp
keymaster/4.1/vts/functional/Android.bp
keymaster/aidl/Android.bp
light/2.0/Android.bp
light/2.0/default/Android.bp
light/2.0/vts/functional/Android.bp
light/aidl/Android.bp
light/aidl/default/Android.bp
light/aidl/vts/functional/Android.bp
light/utils/Android.bp
media/1.0/Android.bp
media/1.0/xml/Android.mk
media/Android.bp
media/bufferpool/1.0/Android.bp
media/bufferpool/2.0/Android.bp
media/c2/1.0/Android.bp
media/c2/1.1/Android.bp
media/omx/1.0/Android.bp
media/omx/1.0/vts/functional/audio/Android.bp
media/omx/1.0/vts/functional/common/Android.bp
media/omx/1.0/vts/functional/component/Android.bp
media/omx/1.0/vts/functional/store/Android.bp
media/omx/1.0/vts/functional/video/Android.bp
memtrack/1.0/Android.bp
memtrack/1.0/default/Android.bp
memtrack/1.0/vts/functional/Android.bp
memtrack/aidl/Android.bp
memtrack/aidl/default/Android.bp
memtrack/aidl/vts/Android.bp
neuralnetworks/1.0/Android.bp
neuralnetworks/1.0/utils/Android.bp
neuralnetworks/1.0/vts/functional/Android.bp
neuralnetworks/1.1/Android.bp
neuralnetworks/1.1/utils/Android.bp
neuralnetworks/1.1/vts/functional/Android.bp
neuralnetworks/1.2/Android.bp
neuralnetworks/1.2/utils/Android.bp
neuralnetworks/1.2/vts/functional/Android.bp
neuralnetworks/1.3/Android.bp
neuralnetworks/1.3/utils/Android.bp
neuralnetworks/1.3/vts/functional/Android.bp
neuralnetworks/aidl/Android.bp
neuralnetworks/aidl/utils/Android.bp
neuralnetworks/aidl/vts/functional/Android.bp
neuralnetworks/utils/common/Android.bp
neuralnetworks/utils/service/Android.bp
nfc/1.0/Android.bp
nfc/1.0/default/Android.bp
nfc/1.0/vts/functional/Android.bp
nfc/1.1/Android.bp
nfc/1.1/vts/functional/Android.bp
nfc/1.2/Android.bp
nfc/1.2/vts/functional/Android.bp
oemlock/1.0/Android.bp
oemlock/1.0/vts/functional/Android.bp
oemlock/aidl/Android.bp
oemlock/aidl/default/Android.bp
oemlock/aidl/vts/Android.bp
power/1.0/Android.bp
power/1.0/default/Android.bp
power/1.0/vts/functional/Android.bp
power/1.1/Android.bp
power/1.1/vts/functional/Android.bp
power/1.2/Android.bp
power/1.2/vts/functional/Android.bp
power/1.3/Android.bp
power/1.3/vts/functional/Android.bp
power/aidl/Android.bp
power/aidl/default/Android.bp
power/aidl/vts/Android.bp
power/stats/1.0/Android.bp
power/stats/1.0/default/Android.bp
power/stats/1.0/vts/functional/Android.bp
power/stats/aidl/Android.bp
power/stats/aidl/default/Android.bp
power/stats/aidl/vts/Android.bp
radio/1.0/Android.bp
radio/1.0/vts/functional/Android.bp
radio/1.1/Android.bp
radio/1.1/vts/functional/Android.bp
radio/1.2/Android.bp
radio/1.2/default/Android.bp
radio/1.2/vts/functional/Android.bp
radio/1.3/Android.bp
radio/1.3/vts/functional/Android.bp
radio/1.4/Android.bp
radio/1.4/vts/functional/Android.bp
radio/1.5/Android.bp
radio/1.5/vts/functional/Android.bp
radio/1.6/Android.bp
radio/1.6/vts/functional/Android.bp
radio/config/1.0/Android.bp
radio/config/1.0/default/Android.bp
radio/config/1.0/vts/functional/Android.bp
radio/config/1.1/Android.bp
radio/config/1.1/vts/functional/Android.bp
radio/config/1.2/Android.bp
radio/config/1.2/vts/functional/Android.bp
radio/config/1.3/Android.bp
radio/config/1.3/vts/functional/Android.bp
radio/deprecated/1.0/Android.bp
rebootescrow/aidl/Android.bp
rebootescrow/aidl/default/Android.bp
rebootescrow/aidl/vts/functional/Android.bp
renderscript/1.0/Android.bp
renderscript/1.0/default/Android.bp
renderscript/1.0/vts/functional/Android.bp
secure_element/1.0/Android.bp
secure_element/1.0/vts/functional/Android.bp
secure_element/1.1/Android.bp
secure_element/1.1/vts/functional/Android.bp
secure_element/1.2/Android.bp
secure_element/1.2/vts/functional/Android.bp
security/keymint/aidl/Android.bp
security/keymint/aidl/default/Android.bp
security/keymint/aidl/vts/functional/Android.bp
security/keymint/support/Android.bp
security/secureclock/aidl/Android.bp
security/secureclock/aidl/vts/functional/Android.bp
security/sharedsecret/aidl/Android.bp
security/sharedsecret/aidl/vts/functional/Android.bp
sensors/1.0/Android.bp
sensors/1.0/default/Android.bp
sensors/1.0/vts/functional/Android.bp
sensors/2.0/Android.bp
sensors/2.0/default/Android.bp
sensors/2.0/multihal/Android.bp
sensors/2.0/vts/functional/Android.bp
sensors/2.1/Android.bp
sensors/2.1/default/Android.bp
sensors/2.1/multihal/Android.bp
sensors/2.1/vts/functional/Android.bp
sensors/common/default/2.X/Android.bp
sensors/common/default/2.X/multihal/Android.bp
sensors/common/default/2.X/multihal/tests/Android.bp
sensors/common/utils/Android.bp
sensors/common/vts/2_X/Android.bp
sensors/common/vts/utils/Android.bp
soundtrigger/2.0/Android.bp
soundtrigger/2.0/default/Android.bp
soundtrigger/2.0/default/Android.mk
soundtrigger/2.0/vts/functional/Android.bp
soundtrigger/2.1/Android.bp
soundtrigger/2.1/default/Android.mk
soundtrigger/2.1/vts/functional/Android.bp
soundtrigger/2.2/Android.bp
soundtrigger/2.2/default/Android.bp
soundtrigger/2.2/vts/functional/Android.bp
soundtrigger/2.3/Android.bp
soundtrigger/2.3/default/Android.bp
soundtrigger/2.3/vts/functional/Android.bp
tests/bar/1.0/Android.bp
tests/bar/1.0/default/Android.bp
tests/baz/1.0/Android.bp
tests/baz/1.0/default/Android.bp
tests/expression/1.0/Android.bp
tests/extension/light/2.0/Android.bp
tests/extension/light/2.0/default/Android.bp
tests/extension/vibrator/aidl/Android.bp
tests/extension/vibrator/aidl/client/Android.bp
tests/extension/vibrator/aidl/default/Android.bp
tests/foo/1.0/Android.bp
tests/foo/1.0/default/Android.bp
tests/foo/1.0/default/lib/Android.bp
tests/hash/1.0/Android.bp
tests/hash/1.0/default/Android.bp
tests/inheritance/1.0/Android.bp
tests/inheritance/1.0/default/Android.bp
tests/lazy/1.0/Android.bp
tests/lazy/1.1/Android.bp
tests/libhwbinder/1.0/Android.bp
tests/libhwbinder/1.0/default/Android.bp
tests/libhwbinder/aidl/Android.bp
tests/memory/1.0/Android.bp
tests/memory/1.0/default/Android.bp
tests/memory/2.0/Android.bp
tests/msgq/1.0/Android.bp
tests/msgq/1.0/default/Android.bp
tests/multithread/1.0/Android.bp
tests/multithread/1.0/default/Android.bp
tests/safeunion/1.0/Android.bp
tests/safeunion/1.0/default/Android.bp
tests/safeunion/cpp/1.0/Android.bp
tests/safeunion/cpp/1.0/default/Android.bp
tests/trie/1.0/Android.bp
tests/trie/1.0/default/Android.bp
tetheroffload/config/1.0/Android.bp
tetheroffload/config/1.0/vts/functional/Android.bp
tetheroffload/control/1.0/Android.bp
tetheroffload/control/1.0/vts/functional/Android.bp
tetheroffload/control/1.1/Android.bp
tetheroffload/control/1.1/vts/functional/Android.bp
thermal/1.0/Android.bp
thermal/1.0/default/Android.bp
thermal/1.0/vts/functional/Android.bp
thermal/1.1/Android.bp
thermal/1.1/vts/functional/Android.bp
thermal/2.0/Android.bp
thermal/2.0/default/Android.bp
thermal/2.0/vts/functional/Android.bp
tv/cec/1.0/Android.bp
tv/cec/1.0/default/Android.bp
tv/input/1.0/Android.bp
tv/input/1.0/default/Android.bp
tv/input/1.0/vts/functional/Android.bp
tv/tuner/1.0/Android.bp
tv/tuner/1.0/default/Android.bp
tv/tuner/1.0/vts/functional/Android.bp
usb/1.0/Android.bp
usb/1.0/default/Android.bp
usb/1.0/vts/functional/Android.bp
usb/1.1/Android.bp
usb/1.1/vts/functional/Android.bp
usb/1.2/Android.bp
usb/1.2/vts/functional/Android.bp
usb/gadget/1.0/Android.bp
usb/gadget/1.1/Android.bp
usb/gadget/1.1/default/Android.bp
usb/gadget/1.1/default/lib/Android.bp
vibrator/1.0/Android.bp
vibrator/1.0/default/Android.bp
vibrator/1.0/vts/functional/Android.bp
vibrator/1.1/Android.bp
vibrator/1.1/vts/functional/Android.bp
vibrator/1.2/Android.bp
vibrator/1.2/vts/functional/Android.bp
vibrator/1.3/Android.bp
vibrator/1.3/example/Android.bp
vibrator/1.3/vts/functional/Android.bp
vibrator/aidl/Android.bp
vibrator/aidl/default/Android.bp
vibrator/aidl/vts/Android.bp
vr/1.0/Android.bp
vr/1.0/default/Android.bp
vr/1.0/vts/functional/Android.bp
weaver/1.0/Android.bp
weaver/1.0/vts/functional/Android.bp
weaver/aidl/Android.bp
weaver/aidl/default/Android.bp
weaver/aidl/vts/Android.bp
wifi/1.0/Android.bp
wifi/1.0/vts/functional/Android.bp
wifi/1.1/Android.bp
wifi/1.1/vts/functional/Android.bp
wifi/1.2/Android.bp
wifi/1.2/vts/functional/Android.bp
wifi/1.3/Android.bp
wifi/1.3/vts/functional/Android.bp
wifi/1.4/Android.bp
wifi/1.4/default/Android.mk
wifi/1.4/vts/functional/Android.bp
wifi/hostapd/1.0/Android.bp
wifi/hostapd/1.0/vts/functional/Android.bp
wifi/hostapd/1.1/Android.bp
wifi/hostapd/1.1/vts/functional/Android.bp
wifi/hostapd/1.2/Android.bp
wifi/hostapd/1.2/vts/functional/Android.bp
wifi/offload/1.0/Android.bp
wifi/offload/1.0/vts/functional/Android.bp
wifi/supplicant/1.0/Android.bp
wifi/supplicant/1.0/vts/functional/Android.bp
wifi/supplicant/1.1/Android.bp
wifi/supplicant/1.1/vts/functional/Android.bp
wifi/supplicant/1.2/Android.bp
wifi/supplicant/1.2/vts/functional/Android.bp
wifi/supplicant/1.3/Android.bp
wifi/supplicant/1.3/vts/functional/Android.bp
Added SPDX-license-identifier-Apache-2.0 SPDX-license-identifier-NCSA to:
Android.bp
automotive/can/1.0/Android.bp
automotive/can/1.0/default/Android.bp
Added SPDX-license-identifier-NCSA to:
automotive/can/1.0/default/libc++fs/Android.bp
Bug: 68860345
Bug: 151177513
Bug: 151953481
Test: m all
Exempt-From-Owner-Approval: janitorial work
Change-Id: I602b072f77ff41e9eb8d3c36b6b5315d63664006
Merged-in: I602b072f77ff41e9eb8d3c36b6b5315d63664006
2021-02-21 20:36:55 -08:00
Shawn Willden
e21ce63ba6
Update KM4.1 owners
...
Change-Id: Ib7e0d3aead2a220c8161d7b4af471116f9ffa93f
2021-01-08 15:57:56 +00:00
Treehugger Robot
1aeea8c95b
Merge "Delete keymaster0" am: 02cdce19c1
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1515113
Change-Id: I3ed294c69ce86a036110fb5c5a95fb6f5737ac07
2020-12-07 03:22:47 +00:00
Shawn Willden
7751d10d7f
Delete keymaster0
...
Test: Build
Change-Id: I2ffb10978af9add7792faff0675bd013d96b35b8
2020-12-04 11:53:06 -07:00
Xin Li
c026d3a0b6
Merge rvc-qpr-dev-plus-aosp-without-vendor@6881855
...
Bug: 172690556
Merged-In: If5afd00334e8b09250df1ae97dec9285e39ad930
Change-Id: Ic66bb1389f1bbecfdaa641e1fcdbf79044f55d23
2020-12-02 00:32:27 -08:00
Steven Moreland
28f2549765
HIDL HALs mark sensitive data
...
For extra precautious transaction clearing.
Bug: 171501998
Test: hidl_test + inspecting output
Change-Id: I813dc3dd6c85ad0e86c6b8c116b7a207517dd12e
2020-11-20 21:16:16 +00:00
Treehugger Robot
d47c62b62a
Merge "identity: Fix attestation and documentation problems."
2020-11-19 15:52:21 +00:00
David Zeuthen
34abaaefcb
identity: Fix attestation and documentation problems.
...
- The docs said that IdentityCredential.createEphemeralKey() returned
data encoded PKCS#8 which is wrong. It's supposed to be in DER format
which is also what the VTS tests and credstore expects.
- Clarify that createEphemeralKeyPair(), setReaderEphemeralPublicKey(),
and createAuthChallenge() are all optional.
- Avoid passing an invalid profile ID in the IdentityCredentialTests.
verifyOneProfileAndEntryPass test.
- Update requirements for which tags must be present in the attestation
for CredentialKey as well as the requirements on expiration date and
the issuer name. Update default implementation to satisfy these
requirements. Update VTS tests to carefully verify these requrements
are met.
- Clarify requirements for X.509 cert for AuthenticationKey. Add VTS
test to verify.
- Mandate that TAG_IDENTITY_CREDENTIAL_KEY must not be set for test
credentials. Add VTS test to verify this.
- Make default implementation pretend to be implemented in a trusted
environment and streamline VTS tests to not special-case for the
default implementation.
- Switch to using the attestation extension parser from the KM 4.1
support library instead of the one from system/keymaster. The latter
one did not support the latest attestation extension and thus would
fail for pretty much anything that wasn't the default HAL impl.
- Fix a couple of bugs in keymaster::V4_1::parse_attestation_record():
- Report root_of_trust.security_level
- Add support for Tag::IDENTITY_CREDENTIAL_KEY
- Fix how EMacKey is calculated.
- Add test vectors to verify how EMacKey and DeviceMac is calculated.
Test: atest VtsHalIdentityTargetTest
Test: atest android.security.identity.cts
Bug: 171745570
Change-Id: I2f8bd772de078556733f769cec2021918d1d7de6
2020-11-17 13:44:00 -05:00
Selene Huang
31ab404a5e
Implement keymint V1 aidl interfaces, service module, and vts tests.
...
Bug: b/160968242
Test: atest VtsHalKeyMintV1_0TargetTest
Change-Id: I5f9d642f96e262dd567d88f4d582e621d168dceb
2020-11-17 01:11:42 -08:00
Treehugger Robot
f65abbd1c8
Merge "Allowing GSI patch level to be greater than vbmeta SPL" am: b22330e065
am: c12559f79e
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1256345
Change-Id: If6721904a50f164626d30460a2b13c59ffd2814f
2020-09-02 03:39:52 +00:00
Treehugger Robot
c12559f79e
Merge "Allowing GSI patch level to be greater than vbmeta SPL" am: b22330e065
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1256345
Change-Id: Ic3b7ee64244f03625af7cd2aea055f31febdb19d
2020-09-02 02:27:02 +00:00
TreeHugger Robot
484456242d
Merge "Keymaster: update the verifyAuthorization call time and delta time in VerificationToken VTS" into stage-aosp-rvc-ts-dev am: 9ade092595
am: 872216fd37
...
Original change: https://googleplex-android-review.googlesource.com/c/platform/hardware/interfaces/+/12430970
Change-Id: I065b9d6122747a55eb4decf0b32b7ff20756e26c
2020-08-31 18:34:09 +00:00
Xin Li
36dcf1a404
Merge Android R (rvc-dev-plus-aosp-without-vendor@6692709)
...
Bug: 166295507
Merged-In: I6502829205ede2de914b27e6c2c5c42916af2b39
Change-Id: I7cb06511e43bd1fffd5f80a11dbdf5b1314cfe8e
2020-08-28 13:05:04 -07:00
Bowgo Tsai
63c0129fa6
Allowing GSI patch level to be greater than vbmeta SPL
...
The GSI patch level might be greater than the vbmeta SPL, because
GSI system.img might be updated via the DSU flow, where vbmeta.img won't
be updated in this scenario.
https://developer.android.com/topic/dsu
Allowing GSI patch level to be greater than or equal to the vbmeta SPL,
since Treble allows new system.img works on old vendor images.
Bug: 145377203
Test: atest VtsHalKeymasterV4_0TargetTest
Change-Id: Ib761d80c88695eb2db08b0dc00e30fcdc2788865
2020-08-26 13:16:25 +08:00
Treehugger Robot
1790d8c313
Merge "Disable the test TooManyOperations in keymaster VTS" am: 8a42374ffa
am: bf31c055f5
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1370458
Change-Id: I438ee9a69722fc6e190a0c5440194dbd29c839ea
2020-08-26 00:37:03 +00:00
kh0705
f5b567afab
Keymaster: update the verifyAuthorization call time and delta time in VerificationToken VTS
...
The keymaster function affects the performance of secure os. When considering the swtiching time of the normal world < - > Secure world and the processing delay of the SecureOS by the scheduling policy of the normal world, it is necessary to increase the time.
Even though Secure world is no problem, Sometimes there is a possibility of that the test will fail because it is a limited resource normal world.
On average, it is performed in a very fast time, but sometimes it takes a lot of time. After many tests, the safe time was measured.
Bug: 162115135
Change-Id: I55862204ef71f69bc88c79fe2259f7cb8365699a
Signed-off-by: kh0705 <kh0705.park@samsung.com>
2020-08-24 15:01:16 +08:00
Treehugger Robot
8a42374ffa
Merge "Disable the test TooManyOperations in keymaster VTS"
2020-08-19 19:07:08 +00:00
Eran Messeri
6a1198e166
Merge "Fix Keymaster VTS unique attestation failure" am: 3e4d8d0856
am: b0f932739a
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1372156
Change-Id: I0e2ee2609c8fcf82ad31d9c97423b9006862cb97
(cherry picked from commit 4e3c9a1d65
)
Bug: 160518399
Exempt-From-Owner-Approval: already approved as aosp/1372156.
Change-Id: I0e2ee2609c8fcf82ad31d9c97423b9006862cb97
2020-08-05 14:54:17 +00:00
Dan Shi
e5c9b5e722
Suppress gtest error for tests without any instance am: ba4d532fee
am: 73122cd284
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1374050
Change-Id: Ie5e956d4613f5e947c36ba4f1048f0c3aa8944ba
2020-07-29 05:45:58 +00:00
Dan Shi
ba4d532fee
Suppress gtest error for tests without any instance
...
Bug: 162052785
Test: m -j vts
Change-Id: I8c1a48e6fbd7c8161137902b5332911fa0d7b8b3
2020-07-28 15:12:32 -07:00
Eran Messeri
4e3c9a1d65
Merge "Fix Keymaster VTS unique attestation failure" am: 3e4d8d0856
am: b0f932739a
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1372156
Change-Id: I0e2ee2609c8fcf82ad31d9c97423b9006862cb97
2020-07-24 13:34:02 +00:00
allen.zhang
569a61290e
Fix Keymaster VTS unique attestation failure
...
Adding TAG_DEVICE_UNIQUE_ATTESTATION & CheckedDeleteKey()
in TEST_P(DeviceUniqueAttestationTest, NonStrongBoxOnly)
Test procedure:
1.Build APP "VtsHalKeymasterV4_1TargetTest" in android project,
then replace it to VTS testcase(version in 0610).
2. ./vts-tradefed
3.run vts -m VtsHalKeymasterV4_1TargetTest
Result:all testcase pass
Bug: 158724430
Test: m VtsHalKeymasterV4_1TargetTest && echo run vts -m VtsHalKeymasterV4_1TargetTest | ./vts-tradefed
Change-Id: I693c23596a045bf9af9fe6cc483924fd7cfc6ce6
2020-07-23 12:39:13 +01:00
Gaurav Kashyap
48f67e8438
Disable the test TooManyOperations in keymaster VTS
...
The test fails on devices because an unknown
client starts a keymaster BEGIN operation during
bootup but does not finish it. This affects the
keymaster hardware implementation's capability
to support the maximum possible operations while
running this test.
Bug: 154801042
Change-Id: Ib6adc6c28ebe76ddfdc2c66cd17cf78c04e5b468
2020-07-22 11:14:44 -07:00
Jooyung Han
d610435ac4
update hidl .bp
...
HIDL libs are not necessarily part of VNDK now. Because some are
used by VNDK libs, they are still VNDK. But rest are now just
vendor-available.
.hidl_for_test files are also removed because they are used to exclude
test-purpose hidl libs from VNDK libs.
Instead, .hidl_for_system_ext files are added to tests/lazy to
distinguish them from others which are installed /system.
Bug: 143933769
Test: update-makefiles.sh && m com.android.vndk.current
Merged-In: Ia81312dda340b6b5cbdd7a3c21e1d323bda39a4a
Change-Id: Ia81312dda340b6b5cbdd7a3c21e1d323bda39a4a
(cherry picked from commit b0907a6bb8
)
2020-07-07 16:22:36 +09:00
Joseph Jang
955aa4ecc6
Merge "Keymaster: Fix potential bug in extractUint32()/extractUint64()" am: 991650fd8a
am: e9e59bd5d1
...
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1354466
Change-Id: I1bf12c37f39067857ab27f51ed08bbe1bfd73ef3
2020-07-07 03:01:03 +00:00
josephjang
4feb8cd284
Keymaster: Fix potential bug in extractUint32()/extractUint64()
...
In deserializeVerificationToken(), we use extractUint64() to extract
VerificationToken.challenge. A potential bug was found in
extractUint64() that will cause VerificationToken.challenge()
incorrect.
Bug: 160198696
Merged-In: Ie0d2c0127cc34f1bb90455e4f7869e15e5542173
Change-Id: Ie0d2c0127cc34f1bb90455e4f7869e15e5542173
2020-07-06 07:03:27 +00:00
josephjang
c96b1fab12
Keymaster: Fix potential bug in extractUint32()/extractUint64()
...
In deserializeVerificationToken(), we use extractUint64() to extract
VerificationToken.challenge. A potential bug was found in
extractUint64() that will cause VerificationToken.challenge()
incorrect.
Bug: 160198696
Change-Id: Ie0d2c0127cc34f1bb90455e4f7869e15e5542173
2020-07-06 14:53:55 +08:00
Jooyung Han
d18cba85fe
update hidl .bp
...
HIDL libs are not necessarily part of VNDK now. Because some are
used by VNDK libs, they are still VNDK. But rest are now just
vendor-available.
.hidl_for_test files are also removed because they are used to exclude
test-purpose hidl libs from VNDK libs.
Instead, .hidl_for_system_ext files are added to tests/lazy to
distinguish them from others which are installed /system.
Bug: 143933769
Test: update-makefiles.sh && m com.android.vndk.current
Merged-In: Ia81312dda340b6b5cbdd7a3c21e1d323bda39a4a
Change-Id: Ia81312dda340b6b5cbdd7a3c21e1d323bda39a4a
(cherry picked from commit b0907a6bb8
)
2020-07-02 12:26:37 +09:00
Shawn Willden
a2a6a33ea9
Fix delivery of earlyBootEnded to KM4.1
...
Bug: 152932559
Test: Boot and observe that Strongbox gets the message
Merged-In: I752b44f5cc20d85bf819188ccaaf0813a5607ba5
Change-Id: I752b44f5cc20d85bf819188ccaaf0813a5607ba5
2020-06-01 14:08:39 -06:00
Bowgo Tsai
307d2bba7d
Allow unlocked in VTS
...
VTS was running on a userdebug build GSI before Android 10.
Starting from Android 10, VTS is switched to running on top of a
user build GSI image, plus the device-specific boot-debug.img to
allow adb root.
https://source.android.com/compatibility/vts/vts-on-gsi
So 'ro.build.type' will be 'user' because the value comes from
/system/build.prop. Switching to using 'ro.debuggable' to decide
whether we should check the device is locked or not. Note that
'ro.debuggable' will be '1' for userdebug/eng images or when a
boot-debug.img is used.
Bug: 154449286
Test: atest VtsHalKeymasterV4_0TargetTest
Change-Id: If5a90d62f77489aa58f96e908553a052cf6d1e18
Merged-In: If5a90d62f77489aa58f96e908553a052cf6d1e18
(cherry picked from commit 43dd6e34bd
)
2020-06-01 13:20:52 +08:00
Bowgo Tsai
40eb1a490b
Allow unlocked in VTS am: 43dd6e34bd
am: 767b4b3c2a
...
Change-Id: Ia559b9083b1ac7960b93f710fc5cb2d5390dfac7
2020-06-01 04:25:02 +00:00
Bowgo Tsai
43dd6e34bd
Allow unlocked in VTS
...
VTS was running on a userdebug build GSI before Android 10.
Starting from Android 10, VTS is switched to running on top of a
user build GSI image, plus the device-specific boot-debug.img to
allow adb root.
https://source.android.com/compatibility/vts/vts-on-gsi
So 'ro.build.type' will be 'user' because the value comes from
/system/build.prop. Switching to using 'ro.debuggable' to decide
whether we should check the device is locked or not. Note that
'ro.debuggable' will be '1' for userdebug/eng images or when a
boot-debug.img is used.
Bug: 154449286
Test: atest VtsHalKeymasterV4_0TargetTest
Change-Id: If5a90d62f77489aa58f96e908553a052cf6d1e18
2020-05-29 07:49:11 +00:00
David Zeuthen
b1e8ff545a
Identity Credential: Add method to accept verification token.
...
This is to facilitate HAL implementations using a TA existing in a
different environment than where auth tokens are minted. This method
will be used by credstore in a companion CL.
This modifies version 2 of the Identity Credential API (which was
never been released) to add a new method and creates version 2 of the
Keymaster types-only AIDL API to include the new VerificationToken
parcelable and SecurityLevel enum.
Bug: 156076333
Test: atest VtsHalIdentityTargetTest
Test: atest android.security.identity.cts
Merged-In: I7d05413a9ec70225ce419079f3cc9daf026cf744
Change-Id: Idd7ab041d87617556ed840403033b642f8c2ab86
2020-05-18 15:55:21 -04:00
Steven Moreland
1fd48bb036
Merge "Reminder to freeze keymaster at version "5"" am: a634e859df
am: b9e98012e4
...
Change-Id: I08e4083e092030aaf16eb81c69783d9b1d24dc84
2020-05-11 19:45:36 +00:00
Treehugger Robot
5f2523d609
Merge "Identity Credential: Add method to accept verification token." am: 1ac087e4d6
am: 40577ac4f9
...
Change-Id: I232a8c45dd5d94cf8a2a2215fa99dd54425a9789
2020-05-11 19:45:12 +00:00
Steven Moreland
a634e859df
Merge "Reminder to freeze keymaster at version "5""
2020-05-11 17:46:10 +00:00
Steven Moreland
3c1519c550
Reminder to freeze keymaster at version "5"
...
Fixes: 155808722
Test: freeze-api produces error
Change-Id: I0b6d41a129f1a8cb064c394c73a3a70a6f2abc32
2020-05-08 16:33:55 +00:00
David Zeuthen
a8ed82cbb4
Identity Credential: Add method to accept verification token.
...
This is to facilitate HAL implementations using a TA existing in a
different environment than where auth tokens are minted. This method
will be used by credstore in a companion CL.
This modifies version 2 of the Identity Credential API (which was
never been released) to add a new method and creates version 2 of the
Keymaster types-only AIDL API to include the new VerificationToken
parcelable and SecurityLevel enum.
Bug: 156076333
Test: atest VtsHalIdentityTargetTest
Test: atest android.security.identity.cts
Change-Id: I7d05413a9ec70225ce419079f3cc9daf026cf744
2020-05-08 11:33:23 -04:00
TreeHugger Robot
830c4875ad
Merge "Round off attestation tests." into rvc-dev am: 2023afbe66
...
Change-Id: I1c83c78bd3ac674a5f4aeb2356d4e127ef2d617c
2020-05-07 16:28:58 +00:00
TreeHugger Robot
d35a504e05
Merge "Fix StrongBoxOnly test" into rvc-dev am: ba1a4c7f6d
...
Change-Id: Ie7ecb3d434786f3cf4bdb472cfe0c7cbfe673e4d
2020-05-07 16:28:44 +00:00
Treehugger Robot
349af3e40c
Merge "Allow device properties tags for attestation" am: 9a2f497439
am: 3fd8b10984
...
Change-Id: I3b8e79ebf16b60d9236f1ba207255950ade3c701
2020-04-24 08:30:54 +00:00