diff options
| author | Martijn Coenen <maco@google.com> | 2020-11-30 10:05:40 +0100 |
|---|---|---|
| committer | Martijn Coenen <maco@google.com> | 2020-12-01 14:39:22 +0000 |
| commit | 653da701f1354dbbf948129a780f0e2addf42270 (patch) | |
| tree | 5827dfe74dfd04d7af9e308c13ae1d1f885ade12 /trusty/coverage/coverage_test.cpp | |
| parent | c003ebc4152d4a1fcb10d6d93a6956b23bc52711 (diff) | |
Split fsverity_init in two phases.
First load the verified keys, and then only lock the keyring after apexd
has run. This is in preperation for on-device signing, which will need
to add another key to the fs-verity keyring before it's locked.
Note that I've moved loading of the verified keys up a bit; fsverity_init
used to load keys from Keymaster, but it currently doesn't, so there's
no need to wait for it.
Bug: 165630556
Test: boot, cat /proc/keys
Change-Id: I077673575ae3dafcf3126d8c544fe7f8d34c0225
Diffstat (limited to 'trusty/coverage/coverage_test.cpp')
0 files changed, 0 insertions, 0 deletions
