summaryrefslogtreecommitdiffstats
path: root/telephony/java
diff options
context:
space:
mode:
authorVinit Deshapnde <vinitd@google.com>2013-10-02 17:26:05 -0700
committerVinit Deshapnde <vinitd@google.com>2013-10-02 17:26:05 -0700
commita3038b2b311cd07d851c404ccc5df2f4e07bcfd8 (patch)
tree6099aefba7430212240b6aeb356bee9b7feb6211 /telephony/java
parentd6957d5f8ddf3b542996955bf2d6efe0e9804ef4 (diff)
downloadframeworks_base-a3038b2b311cd07d851c404ccc5df2f4e07bcfd8.zip
frameworks_base-a3038b2b311cd07d851c404ccc5df2f4e07bcfd8.tar.gz
frameworks_base-a3038b2b311cd07d851c404ccc5df2f4e07bcfd8.tar.bz2
Fix EAP-TLS reconnect after reboot issue
After a reboot, KeyStore is locked, and certificates encrypted with user PIN are not accessible. So statemachines are not able to connect to EAP-TLS networks. This change makes the problem less severe by 1. Not signing certificates with user PIN on devices with hardware backed KeyStore. 2. Issuing a reconnect upon first USER_PRESENT event. This means HH (which has a hardware backed keystore) can connect to EAP-TLS networks without requiring user intervention and other devices will automatically connect to those networks after user punches PIN. Bug: 10325089 Change-Id: I023d60e58d8214152f051bd9ec84b85b702d829a
Diffstat (limited to 'telephony/java')
0 files changed, 0 insertions, 0 deletions