History log of /external/sepolicy/tools/insertkeys.py
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
14138335bd3c7204d5bff4690ffa2314dd4a0a9e 15-Oct-2013 William Roberts <wroberts@tresys.com> tools: Strengthen BEGIN/END CERTIFICATE checks

insertkeys.py used beginswith() when checking that the BEGIN
and END CERTIFICATE clauses in PEM files were correct. It should
have done an explicit check on equality.

Change-Id: I5efb48d180bc674e6281a26a955acd248588b8bd
/external/sepolicy/tools/insertkeys.py
070c01f8f133dfc0da82beca6f747b679d27f904 10-Oct-2013 Mike Palmiotto <mpalmiotto@tresys.com> tools: Don't error out of insertkeys script on whitespace

Many keys end with whitespace or otherwise have whitespace separating the
certificates. If insertkeys is intended to support multiple certificates, we
should also support blank line separators.

Change-Id: I5fd17be5785ad1b89a6191e9ba33bbc7c5a4e8e9
/external/sepolicy/tools/insertkeys.py
1ecb4e8ad15a44347e0a2460c204d819e4ebd269 07-Oct-2013 William Roberts <wroberts@tresys.com> tools: Correct insert keys behavior on pem files

Insert keys would erroneously process pem files
with openssl headers in them. Also, the tool would
be fooled into attempting to use pem files that
had private keys and other things in the format.
This patch strengthens the formatting requirements
and increases the verboseness of error messages
when processing pem files.

Change-Id: I03353faaa641233a000d1a18943024ae47c63e0f
/external/sepolicy/tools/insertkeys.py
1b46b2fe4723b0dda74c2f66a09df8259508fd4b 08-Aug-2013 Richard Haines <richard_c_haines@btinternet.com> Fix insertkeys.py to resolve keys.conf path entries in a portable way

Currently a path to a key in keys.conf must be fully qualified or have
the -d option appended. This fix will allow paths to have environment
variables that will be expanded. This will give portability to the
entries. For example the following entry will now be resolved correctly:
[@NET_APPS]
ALL : $ANDROID_BUILD_TOP/device/demo_vendor/demo_dev/security/net_apps.x509.pem

Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead
Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/external/sepolicy/tools/insertkeys.py
020b5ff6311044ef7a2200dd4db69f5cccf46213 28-Mar-2013 Geremy Condra <gcondra@google.com> Add a key directory argument to insertkeys.py

This allows us to better integrate key selection with our existing
build process.

Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
/external/sepolicy/tools/insertkeys.py
7f2392eeb03eeb88f2699061f4adaeb1fcbd1de2 27-Mar-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Expand insertkeys.py script to allow union of files.

Allow script to union mac_permissions.xml files
specified using the BOARD_SEPOLICY_DIRS and
BOARD_SEPOLICY_UNION constructs.

Change-Id: I4fc65fd1ab4c612f25e966f030247e54a270b614
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/external/sepolicy/tools/insertkeys.py
edf7b4c861144764d0bc17436064d52e7147f916 26-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Revert "Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml""""

This reverts commit 60d4d71ead9e9ac96e9cb81380c254bac3a9df4f

This should (finally) be fixed in https://android-review.googlesource.com/#/c/54730/

Change-Id: I3dd358560f7236f28387ffbe247fc2b004e303ea
/external/sepolicy/tools/insertkeys.py
60d4d71ead9e9ac96e9cb81380c254bac3a9df4f 26-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml"""

This reverts commit cd4104e84b438827fddd6a7fe6cb86e91392152d

This builds clean locally, but seems to explode on the build servers. Reverting until there's a solution.

Change-Id: I09200db37c193f39c77486d5957a8f5916e38aa0
/external/sepolicy/tools/insertkeys.py
cd4104e84b438827fddd6a7fe6cb86e91392152d 26-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml""

This reverts commit 1446e714af0b0c358b5ecf37c5d704c96c72cf7c

Hidden dependency has been resolved.

Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
/external/sepolicy/tools/insertkeys.py
1446e714af0b0c358b5ecf37c5d704c96c72cf7c 19-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Dynamic insertion of pubkey to mac_permissions.xml"

This reverts commit 22fc04103b70dd5a1cb1b5a8309ef20461e06289

Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
/external/sepolicy/tools/insertkeys.py
22fc04103b70dd5a1cb1b5a8309ef20461e06289 05-Dec-2012 William Roberts <w.roberts@sta.samsung.com> Dynamic insertion of pubkey to mac_permissions.xml

Support the inseretion of the public key from pem
files into the mac_permissions.xml file at build
time.

Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
/external/sepolicy/tools/insertkeys.py