14138335bd3c7204d5bff4690ffa2314dd4a0a9e |
|
15-Oct-2013 |
William Roberts <wroberts@tresys.com> |
tools: Strengthen BEGIN/END CERTIFICATE checks insertkeys.py used beginswith() when checking that the BEGIN and END CERTIFICATE clauses in PEM files were correct. It should have done an explicit check on equality. Change-Id: I5efb48d180bc674e6281a26a955acd248588b8bd
/system/sepolicy/tools/insertkeys.py
|
070c01f8f133dfc0da82beca6f747b679d27f904 |
|
10-Oct-2013 |
Mike Palmiotto <mpalmiotto@tresys.com> |
tools: Don't error out of insertkeys script on whitespace Many keys end with whitespace or otherwise have whitespace separating the certificates. If insertkeys is intended to support multiple certificates, we should also support blank line separators. Change-Id: I5fd17be5785ad1b89a6191e9ba33bbc7c5a4e8e9
/system/sepolicy/tools/insertkeys.py
|
1ecb4e8ad15a44347e0a2460c204d819e4ebd269 |
|
07-Oct-2013 |
William Roberts <wroberts@tresys.com> |
tools: Correct insert keys behavior on pem files Insert keys would erroneously process pem files with openssl headers in them. Also, the tool would be fooled into attempting to use pem files that had private keys and other things in the format. This patch strengthens the formatting requirements and increases the verboseness of error messages when processing pem files. Change-Id: I03353faaa641233a000d1a18943024ae47c63e0f
/system/sepolicy/tools/insertkeys.py
|
1b46b2fe4723b0dda74c2f66a09df8259508fd4b |
|
08-Aug-2013 |
Richard Haines <richard_c_haines@btinternet.com> |
Fix insertkeys.py to resolve keys.conf path entries in a portable way Currently a path to a key in keys.conf must be fully qualified or have the -d option appended. This fix will allow paths to have environment variables that will be expanded. This will give portability to the entries. For example the following entry will now be resolved correctly: [@NET_APPS] ALL : $ANDROID_BUILD_TOP/device/demo_vendor/demo_dev/security/net_apps.x509.pem Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/system/sepolicy/tools/insertkeys.py
|
020b5ff6311044ef7a2200dd4db69f5cccf46213 |
|
28-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add a key directory argument to insertkeys.py This allows us to better integrate key selection with our existing build process. Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
/system/sepolicy/tools/insertkeys.py
|
7f2392eeb03eeb88f2699061f4adaeb1fcbd1de2 |
|
27-Mar-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Expand insertkeys.py script to allow union of files. Allow script to union mac_permissions.xml files specified using the BOARD_SEPOLICY_DIRS and BOARD_SEPOLICY_UNION constructs. Change-Id: I4fc65fd1ab4c612f25e966f030247e54a270b614 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/tools/insertkeys.py
|
edf7b4c861144764d0bc17436064d52e7147f916 |
|
26-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Revert "Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml"""" This reverts commit 60d4d71ead9e9ac96e9cb81380c254bac3a9df4f This should (finally) be fixed in https://android-review.googlesource.com/#/c/54730/ Change-Id: I3dd358560f7236f28387ffbe247fc2b004e303ea
/system/sepolicy/tools/insertkeys.py
|
60d4d71ead9e9ac96e9cb81380c254bac3a9df4f |
|
26-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml""" This reverts commit cd4104e84b438827fddd6a7fe6cb86e91392152d This builds clean locally, but seems to explode on the build servers. Reverting until there's a solution. Change-Id: I09200db37c193f39c77486d5957a8f5916e38aa0
/system/sepolicy/tools/insertkeys.py
|
cd4104e84b438827fddd6a7fe6cb86e91392152d |
|
26-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml"" This reverts commit 1446e714af0b0c358b5ecf37c5d704c96c72cf7c Hidden dependency has been resolved. Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
/system/sepolicy/tools/insertkeys.py
|
1446e714af0b0c358b5ecf37c5d704c96c72cf7c |
|
19-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Dynamic insertion of pubkey to mac_permissions.xml" This reverts commit 22fc04103b70dd5a1cb1b5a8309ef20461e06289 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
/system/sepolicy/tools/insertkeys.py
|
22fc04103b70dd5a1cb1b5a8309ef20461e06289 |
|
05-Dec-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Dynamic insertion of pubkey to mac_permissions.xml Support the inseretion of the public key from pem files into the mac_permissions.xml file at build time. Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
/system/sepolicy/tools/insertkeys.py
|