Skip to content
This repository was archived by the owner on Nov 8, 2023. It is now read-only.

Commit dba029f

Browse files
committed
Delete unused method.
Removing a method that had no references to it anywhere else. Test: builds Change-Id: I654fbafa63f0863d38827148917fcc4d48e8177a
1 parent 3543435 commit dba029f

File tree

1 file changed

+0
-44
lines changed

1 file changed

+0
-44
lines changed

keystore/java/android/security/keystore2/KeymasterUtils.java

-44
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,10 @@
1616

1717
package android.security.keystore2;
1818

19-
import android.security.keymaster.KeymasterArguments;
2019
import android.security.keymaster.KeymasterDefs;
21-
import android.security.keystore.KeyProperties;
2220

2321
import java.security.AlgorithmParameters;
2422
import java.security.NoSuchAlgorithmException;
25-
import java.security.ProviderException;
2623
import java.security.spec.ECGenParameterSpec;
2724
import java.security.spec.ECParameterSpec;
2825
import java.security.spec.InvalidParameterSpecException;
@@ -86,47 +83,6 @@ static boolean isKeymasterPaddingSchemeIndCpaCompatibleWithAsymmetricCrypto(
8683
}
8784
}
8885

89-
/**
90-
* Adds {@code KM_TAG_MIN_MAC_LENGTH} tag, if necessary, to the keymaster arguments for
91-
* generating or importing a key. This tag may only be needed for symmetric keys (e.g., HMAC,
92-
* AES-GCM).
93-
*/
94-
public static void addMinMacLengthAuthorizationIfNecessary(KeymasterArguments args,
95-
int keymasterAlgorithm,
96-
int[] keymasterBlockModes,
97-
int[] keymasterDigests) {
98-
switch (keymasterAlgorithm) {
99-
case KeymasterDefs.KM_ALGORITHM_AES:
100-
if (com.android.internal.util.ArrayUtils.contains(
101-
keymasterBlockModes, KeymasterDefs.KM_MODE_GCM)) {
102-
// AES GCM key needs the minimum length of AEAD tag specified.
103-
args.addUnsignedInt(KeymasterDefs.KM_TAG_MIN_MAC_LENGTH,
104-
AndroidKeyStoreAuthenticatedAESCipherSpi.GCM
105-
.MIN_SUPPORTED_TAG_LENGTH_BITS);
106-
}
107-
break;
108-
case KeymasterDefs.KM_ALGORITHM_HMAC:
109-
// HMAC key needs the minimum length of MAC set to the output size of the associated
110-
// digest. This is because we do not offer a way to generate shorter MACs and
111-
// don't offer a way to verify MACs (other than by generating them).
112-
if (keymasterDigests.length != 1) {
113-
throw new ProviderException(
114-
"Unsupported number of authorized digests for HMAC key: "
115-
+ keymasterDigests.length
116-
+ ". Exactly one digest must be authorized");
117-
}
118-
int keymasterDigest = keymasterDigests[0];
119-
int digestOutputSizeBits = getDigestOutputSizeBits(keymasterDigest);
120-
if (digestOutputSizeBits == -1) {
121-
throw new ProviderException(
122-
"HMAC key authorized for unsupported digest: "
123-
+ KeyProperties.Digest.fromKeymaster(keymasterDigest));
124-
}
125-
args.addUnsignedInt(KeymasterDefs.KM_TAG_MIN_MAC_LENGTH, digestOutputSizeBits);
126-
break;
127-
}
128-
}
129-
13086
static String getEcCurveFromKeymaster(int ecCurve) {
13187
switch (ecCurve) {
13288
case android.hardware.security.keymint.EcCurve.P_224:

0 commit comments

Comments
 (0)