summaryrefslogtreecommitdiffstats
path: root/keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java
diff options
context:
space:
mode:
authorAlex Klyubin <klyubin@google.com>2015-07-22 15:24:27 +0000
committerAndroid (Google) Code Review <android-gerrit@google.com>2015-07-22 15:24:27 +0000
commitada70be897fb7541129f1ab1f6faa94a80fca986 (patch)
tree4686db46b90b94925b7d73643a0616b0bba5354f /keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java
parentff21279e2cbe0bdd9c41350b7a204cabf9370377 (diff)
parenta95550f8016bbb0dba086dbd73eec63e6cdbbe98 (diff)
downloadframeworks_base-ada70be897fb7541129f1ab1f6faa94a80fca986.zip
frameworks_base-ada70be897fb7541129f1ab1f6faa94a80fca986.tar.gz
frameworks_base-ada70be897fb7541129f1ab1f6faa94a80fca986.tar.bz2
Merge "Add KM_MIN_MAC_LENGTH tag to HMAC and AES-GCM keys." into mnc-dev
Diffstat (limited to 'keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java')
-rw-r--r--keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java7
1 files changed, 6 insertions, 1 deletions
diff --git a/keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java b/keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java
index fd014eb..4c174f1 100644
--- a/keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java
+++ b/keystore/java/android/security/keystore/AndroidKeyStoreKeyGeneratorSpi.java
@@ -171,7 +171,7 @@ public abstract class AndroidKeyStoreKeyGeneratorSpi extends KeyGeneratorSpi {
"Key size must be positive: " + mKeySizeBits);
} else if ((mKeySizeBits % 8) != 0) {
throw new InvalidAlgorithmParameterException(
- "Key size in must be a multiple of 8: " + mKeySizeBits);
+ "Key size must be a multiple of 8: " + mKeySizeBits);
}
try {
@@ -272,6 +272,11 @@ public abstract class AndroidKeyStoreKeyGeneratorSpi extends KeyGeneratorSpi {
KeymasterUtils.addUserAuthArgs(args,
spec.isUserAuthenticationRequired(),
spec.getUserAuthenticationValidityDurationSeconds());
+ KeymasterUtils.addMinMacLengthAuthorizationIfNecessary(
+ args,
+ mKeymasterAlgorithm,
+ mKeymasterBlockModes,
+ mKeymasterDigests);
args.addDateIfNotNull(KeymasterDefs.KM_TAG_ACTIVE_DATETIME, spec.getKeyValidityStart());
args.addDateIfNotNull(KeymasterDefs.KM_TAG_ORIGINATION_EXPIRE_DATETIME,
spec.getKeyValidityForOriginationEnd());