OpenEUICC/app-common
Peter Cai c033ef5ba9 refactor: Trust SM-DP+ TLS certs based on euiccCiPKIdListForVerification
Unfortunately, because there is no way to access the certificate itself
from the eUICC, we have to hard-code known & supported certificates
still.

However, this approach makes sure that only those certificates listed by
the eUICC are trusted during their SM-DP+ sessions. Were these added
directly as part of the Android security config, then all certificates
would be blindly trusted for all SM-DP+ sessions (and even normal TLS
connections if the app were to make them).

As a result we can now trust more known certificates, including GSMA
Test CIs. These are hard-coded as a hash map.
2024-02-21 21:09:20 -05:00
..
src refactor: Trust SM-DP+ TLS certs based on euiccCiPKIdListForVerification 2024-02-21 21:09:20 -05:00
.gitignore refactor: [1/n] Separate app into app and app-common 2023-11-28 18:26:24 -05:00
build.gradle.kts Generate Android.bp and dependencies with LineageOS's GenerateBp plugin 2024-01-20 16:36:23 -05:00
consumer-rules.pro refactor: [1/n] Separate app into app and app-common 2023-11-28 18:26:24 -05:00
proguard-rules.pro refactor: [1/n] Separate app into app and app-common 2023-11-28 18:26:24 -05:00