summaryrefslogtreecommitdiff
path: root/identity/java
AgeCommit message (Collapse)Author
2021-01-21Identity Credential: API changes for Android 12David Zeuthen
- Add PackageManager system features (with versions) for the normal and direct access store - Deprecate IdentityCredentialStore.deleteCredentialByName() and add IdentityCredential.delete() as a replacement. - Add IdentityCredential.proveOwnership() - Add IdentityCredential.update() - Add docs for ProofOfBinding CBOR in X.509 extension of certificate for AuthenticationKey - Add IdentityCredential.setAllowUsingExpiredKeys() - Add version of IdentityCredential.storeStaticAuthenticationData() which takes a an expiration date. Deprecate the old variant of this method. Bug: 170146643 Test: atest android.security.identity.cts Change-Id: I39a0ed65ed6efaa424ada7a9495e3b1da67cf452
2020-06-24Identity: Update for changes to ISO 18013-5.David Zeuthen
Key derivation for session encryption and MACing now involves mixing in SessionTranscriptBytes. Update docs to reflect this. Also, the standard changed such that instead of DeviceAuthentication being MACed or signed, it's instead DeviceAuthenticationBytes which is defined as #6.24(bstr .cbor DeviceAuthentication). The same also for ReaderAuthentication, now ReaderAuthenticationBytes is the CBOR which is signed by the reader. Also make a note that the encryptMessageToReader() and decryptMessageFromReader() should NOT be used and applications should instead implement these themselves. This is because we don't have the SessionTranscript available and it's way too late to start adding public API now. For the next Android version these methods will be deprecated. Realistically this shouldn't be a problem because applications are expected to use the Jetpack anyway. Bug: 159482543 Test: atest android.security.identity.cts Change-Id: I380a973a0cc78f1206fd7a33d0bd4896a0b16c6d
2020-06-04Identity: Update requirements about SessionTranscript CBOR and provisioning ↵David Zeuthen
challenge. Bug: 156911917 Bug: 158107945 Test: atest VtsHalIdentityTargetTest Test: atest android.security.identity.cts Change-Id: Iacdf89744bbd30c5a10d6cba873147e424ddb01b
2020-04-27Identity Credential: Update docs to mention valid range for ACP identifiers.David Zeuthen
Bug: 155100967 Test: atest android.security.identity.cts Change-Id: I850e667676d3488be786447ed3ad33c80444f5e2
2020-04-14Update Identity Credential API docs.David Zeuthen
This change contains no actual syntactical or semantic changes, just clarifications on the inputs and outputs. Test: N/A Bug: 151082886 Change-Id: Ic7797aa53d292abdeb779cb55b404f8a433bce79
2020-03-06Identity Credential: Apply changes identified in API review.David Zeuthen
Bug: 150817385 Test: atest android.security.identity.cts Change-Id: I4e005fa7a81ef363a80278224bb706441dad2241
2020-02-13Update counters for session encryption to start at 1.David Zeuthen
The DIS version of 18013-5 now specifically says The first encryption with a key shall use a counter value of 1. For each following encryption the counter value shall be increased by 1. in section '9.2.1.4 Mechanism". The previous version said The counter value is an unsigned integer, which starts at 0 for both the mDL and the mDL Reader. For each encryption the counter value shall be increased by 1. which for some strange reason was interpreted by someone to mean that counters should start at 1. Update our implementation to use 1 as now called for by the standard. Bug: 111446262 Test: atest android.security.identity.cts Change-Id: I09d1216713d57b54036e4f9aa6677dfa5713133c
2020-01-31Make IdentityCredentialStore.getInstance() return null if credstore is not ↵David Zeuthen
installed. Having this method return null is the expected and documented behavior when either the IC HAL or credstore isn't available. Test: atest android.security.identity.cts (with credstore not running) Bug: 148495024 Change-Id: Ifa17c58a84057499b1aeb8404959d5c0badfe52a
2020-01-21Hide WriteableIdentityCredential constructor from public APIDavid Zeuthen
Bug: 111446262 Test: CtsIdentityTestCases Change-Id: Iafe8e76e6491ff92ee751702b8fb44aeda7355a8
2020-01-20Add Framework APIs for Identity Credential.David Zeuthen
The Identity Credential APIs provides an interface to a secure store for user identity documents. These APIs are deliberately fairly general and abstract. To the extent possible, specification of the message formats and semantics of communication with credential verification devices and Issuing Authorities (IAs) is out of scope for these APIs. The Identity Credential APIs rely on user authentication to protect data elements in credentials which is implemented through auth-tokens. This CL contains changes to CryptoObject to allow this. Bug: 111446262 Test: CtsIdentityTestCases Change-Id: I48f21a561b762d86c9ca8d229962782572412f47