Skip to content
Snippets Groups Projects
  • Alex Klyubin's avatar
    f7543d27
    Switch Keymaster HAL policy to _client/_server · f7543d27
    Alex Klyubin authored
    This switches Keymaster HAL policy to the design which enables us to
    conditionally remove unnecessary rules from domains which are clients
    of Keymaster HAL.
    
    Domains which are clients of Keymaster HAL, such as keystore and vold
    domains, are granted rules targeting hal_keymaster only when the
    Keymaster HAL runs in passthrough mode (i.e., inside the client's
    process). When the HAL runs in binderized mode (i.e., in another
    process/domain, with clients talking to the HAL over HwBinder IPC),
    rules targeting hal_keymaster are not granted to client domains.
    
    Domains which offer a binderized implementation of Keymaster HAL, such
    as hal_keymaster_default domain, are always granted rules targeting
    hal_keymaster.
    
    Test: Password-protected sailfish boots up and lock screen unlocks --
          this exercises vold -> Keymaster HAL interaction
    Test: All Android Keystore CTS tests pass -- this exercises keystore ->
          Keymaster HAL interaction:
          make cts cts-tradefed
          cts-tradefed run singleCommand cts --skip-device-info \
          --skip-preconditions --skip-connectivity-check --abi arm64-v8a \
          --module CtsKeystoreTestCases
    Bug: 34170079
    
    Change-Id: I2254d0fdee72145721654d6c9e6e8d3331920ec7
    f7543d27
    History
    Switch Keymaster HAL policy to _client/_server
    Alex Klyubin authored
    This switches Keymaster HAL policy to the design which enables us to
    conditionally remove unnecessary rules from domains which are clients
    of Keymaster HAL.
    
    Domains which are clients of Keymaster HAL, such as keystore and vold
    domains, are granted rules targeting hal_keymaster only when the
    Keymaster HAL runs in passthrough mode (i.e., inside the client's
    process). When the HAL runs in binderized mode (i.e., in another
    process/domain, with clients talking to the HAL over HwBinder IPC),
    rules targeting hal_keymaster are not granted to client domains.
    
    Domains which offer a binderized implementation of Keymaster HAL, such
    as hal_keymaster_default domain, are always granted rules targeting
    hal_keymaster.
    
    Test: Password-protected sailfish boots up and lock screen unlocks --
          this exercises vold -> Keymaster HAL interaction
    Test: All Android Keystore CTS tests pass -- this exercises keystore ->
          Keymaster HAL interaction:
          make cts cts-tradefed
          cts-tradefed run singleCommand cts --skip-device-info \
          --skip-preconditions --skip-connectivity-check --abi arm64-v8a \
          --module CtsKeystoreTestCases
    Bug: 34170079
    
    Change-Id: I2254d0fdee72145721654d6c9e6e8d3331920ec7