No description
fea9aa6eb8
For wrapping the disk encryption secret, we add a flag that indicates it
can be done without having to start some storage daemon which the
trusted OS will query to get data needed to load up the keys. This
usually means that the "key blob" we store is actually just the RSA key
encrypted with the device's KEK and not a reference to an encrypted
filesystem stored on /data
Also to allow other providers to upgrade to V3 of the header, we add
flags to show whether the keymaster supports different key types. This
allows keymaster HALs to support the whole device encryption secret
wrapping without needing to implement DSA and EC key handling. The V2
header made support implicit.
(cherry picked from commit
|
||
---|---|---|
include/hardware | ||
modules | ||
tests | ||
Android.mk | ||
CleanSpec.mk | ||
hardware.c | ||
MODULE_LICENSE_APACHE2 | ||
NOTICE |