diff options
| author | 2018-03-22 17:32:10 +0000 | |
|---|---|---|
| committer | 2018-03-22 17:32:10 +0000 | |
| commit | 88956ce326dc52ac4011502c2deb983e166f7593 (patch) | |
| tree | 1285113eff2c9be03bf6ac87aee836925006713d | |
| parent | c6bd1855656168119ab4ac62cbf0e7930551e846 (diff) | |
| parent | f23c203ed5dc98a701ab7b425d4773aa27a761d9 (diff) | |
Merge "Remove the hard-coded counterId in VaultParams" into pi-dev
3 files changed, 3 insertions, 6 deletions
diff --git a/services/core/java/com/android/server/locksettings/recoverablekeystore/KeySyncTask.java b/services/core/java/com/android/server/locksettings/recoverablekeystore/KeySyncTask.java index f46657c15b5a..a87adbde31e6 100644 --- a/services/core/java/com/android/server/locksettings/recoverablekeystore/KeySyncTask.java +++ b/services/core/java/com/android/server/locksettings/recoverablekeystore/KeySyncTask.java @@ -255,9 +255,6 @@ public class KeySyncTask implements Runnable { } } - // TODO: make sure the same counter id is used during recovery and remove temporary fix. - counterId = 1L; - byte[] vaultParams = KeySyncUtils.packVaultParams( publicKey, counterId, diff --git a/services/core/java/com/android/server/locksettings/recoverablekeystore/RecoverableKeyStoreManager.java b/services/core/java/com/android/server/locksettings/recoverablekeystore/RecoverableKeyStoreManager.java index 5b10add4ecfa..e03e86f1d455 100644 --- a/services/core/java/com/android/server/locksettings/recoverablekeystore/RecoverableKeyStoreManager.java +++ b/services/core/java/com/android/server/locksettings/recoverablekeystore/RecoverableKeyStoreManager.java @@ -416,8 +416,8 @@ public class RecoverableKeyStoreManager { * @param vaultChallenge Challenge issued by vault service. * @param secrets Lock-screen hashes. For now only a single secret is supported. * @return Encrypted bytes of recovery claim. This can then be issued to the vault service. - * @deprecated Use {@link #startRecoverySessionWithCertPath(String, RecoveryCertPath, byte[], - * byte[], List)} instead. + * @deprecated Use {@link #startRecoverySessionWithCertPath(String, String, RecoveryCertPath, + * byte[], byte[], List)} instead. * * @hide */ @@ -457,6 +457,7 @@ public class RecoverableKeyStoreManager { uid, new RecoverySessionStorage.Entry(sessionId, kfHash, keyClaimant, vaultParams)); + Log.i(TAG, "Received VaultParams for recovery: " + HexDump.toHexString(vaultParams)); try { byte[] thmKfHash = KeySyncUtils.calculateThmKfHash(kfHash); return KeySyncUtils.encryptRecoveryClaim( diff --git a/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/KeySyncTaskTest.java b/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/KeySyncTaskTest.java index 69796b33c2eb..25747b801b80 100644 --- a/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/KeySyncTaskTest.java +++ b/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/KeySyncTaskTest.java @@ -296,7 +296,6 @@ public class KeySyncTaskTest { keyDerivationParams.getSalt(), TEST_CREDENTIAL); Long counterId = mRecoverableKeyStoreDb.getCounterId(TEST_USER_ID, TEST_RECOVERY_AGENT_UID); - counterId = 1L; // TODO: use value from the database. assertThat(counterId).isNotNull(); byte[] recoveryKey = decryptThmEncryptedKey( lockScreenHash, |