Init e3q vendor blobs
This commit is contained in:
33
proprietary/vendor/etc/ssg/ta_config.json
vendored
Normal file
33
proprietary/vendor/etc/ssg/ta_config.json
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
/********************************************************************
|
||||
Copyright (c) 2018-2019,2022 Qualcomm Technologies, Inc.
|
||||
All Rights Reserved.
|
||||
Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
*********************************************************************/
|
||||
{
|
||||
// Configuration for System Clients maintained by ssgtzd
|
||||
// MaxSystemClients: Number of Clients Allowed in System Domain (Apk)
|
||||
// ObjectsPerClient: Number of Objects that can be requested by each apk
|
||||
// MaxObjectCap: Max Cap on the Objects that can be used by System Clients.
|
||||
"tz_configuration":[
|
||||
{ "MaxSystemClients" : 12},
|
||||
{ "MaxObjectsPerClient" : 15},
|
||||
{ "MaxObjectCap" : 100}
|
||||
],
|
||||
"embedded_ta_images": [
|
||||
{ "name":"rtice"},
|
||||
{ "name":"qwes"},
|
||||
{ "name":"tzsc"},
|
||||
{ "name":"ConnectionSecurity"}
|
||||
],
|
||||
"ta_images": [
|
||||
{ "path":"/vendor/firmware_mnt/image/qwes.mbn"},
|
||||
{ "path":"/vendor/firmware/image/qwes.mbn"},
|
||||
{ "path":"/vendor/firmware_mnt/image/haventkn.mbn"},
|
||||
{ "path":"/vendor/firmware/image/haventkn.mbn"},
|
||||
{ "path":"/vendor/firmware_mnt/image/tzsc.mbn"}
|
||||
],
|
||||
"ta_paths": [
|
||||
{ "path": "/vendor/firmware_mnt/image"},
|
||||
{ "path": "/vendor/firmware/image/"},
|
||||
]
|
||||
}
|
||||
37
proprietary/vendor/etc/ssg/tz_whitelist.json
vendored
Normal file
37
proprietary/vendor/etc/ssg/tz_whitelist.json
vendored
Normal file
@@ -0,0 +1,37 @@
|
||||
/********************************************************************
|
||||
Copyright (c) 2018-22 Qualcomm Technologies, Inc.
|
||||
All Rights Reserved.
|
||||
Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
*********************************************************************/
|
||||
|
||||
/*
|
||||
* Configure class Ids available to third-party apps that try to
|
||||
* communicate with TZ. The rules defined here are used by
|
||||
* com.qualcomm.qti.qms.service.TrustZoneAccess to determine
|
||||
* what classes are available to clients.
|
||||
*
|
||||
* For Example -
|
||||
* { "classId": "Decimal UID", "name": "Local Name", "permissions" : [json set of permission]}
|
||||
* { "classId":"80", "name":"I Need Location TA", "permissions":[ "android.permission.ACCESS_FINE_LOCATION" ] },
|
||||
* classId: The class ID that a TA is assigned.
|
||||
* name: The name of that TA. This is only a placeholder for now.
|
||||
* permissions: A list of Android permissions that a client must have to use this TA.
|
||||
*/
|
||||
|
||||
|
||||
{
|
||||
"whitelist": [
|
||||
{ "classId":"3", "name":"App Loader", "permissions":[] },
|
||||
{ "classId":"62", "name":"Device Attestation", "permissions":[] },
|
||||
{ "classId":"78", "name":"Haven Token", "permissions":[] },
|
||||
{ "classId":"70", "name":"RTIC App", "permissions":[] },
|
||||
{ "classId":"71", "name":"RTICe App", "permissions":[] },
|
||||
{ "classId":"101", "name":"Celluar Security Measures", "permissions":[] },
|
||||
{ "classId":"102", "name":"SCPassThrough", "permissions":[] },
|
||||
{ "classId":"119", "name":"Platform Feature Management", "permissions":[] },
|
||||
{ "classId":"120", "name":"QWESTA Services", "permissions":[] },
|
||||
{ "classId":"146", "name":"TLOC Service", "permissions":[] },
|
||||
{ "classId":"275", "name":"connectionsecurity service", "permissions":[] },
|
||||
{ "classId":"409", "name":"GP API", "permissions":[] }
|
||||
]
|
||||
}
|
||||
Reference in New Issue
Block a user