HomeSort by relevance Sort by last modified time
    Searched defs:recovery (Results 1 - 25 of 39) sorted by null

1 2

  /frameworks/base/core/java/android/security/keystore/recovery/
DecryptionFailedException.java 17 package android.security.keystore.recovery;
LockScreenRequiredException.java 17 package android.security.keystore.recovery;
SessionExpiredException.java 17 package android.security.keystore.recovery;
InternalRecoveryServiceException.java 17 package android.security.keystore.recovery;
24 * An error thrown when something went wrong internally in the recovery service.
RecoveryCertPath.java 17 package android.security.keystore.recovery;
32 * The certificate path of the recovery service.
X509CertificateParsingUtils.java 17 package android.security.keystore.recovery;
KeyDerivationParams.java 17 package android.security.keystore.recovery;
44 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody
WrappedApplicationKey.java 17 package android.security.keystore.recovery;
27 * Helper class with data necessary recover a single application key, given a recovery key.
34 * Note that Application info is not included. Recovery Agent can only make its own keys
50 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody
87 * Sets key material encrypted by recovery key.
131 /** Key material encrypted by recovery key. */
TrustedRootCertificates.java 17 package android.security.keystore.recovery;
19 import static android.security.keystore.recovery.X509CertificateParsingUtils.decodeBase64Cert;
30 * {@link android.security.keystore.recovery.RecoveryController}. These certificates are used to
42 * When recovery controller is initialized with the certificate, recovery snapshots will only
44 * Recovery snapshot will only be created if device is unlocked with password started with
61 * recovery agent uses {@link #TEST_ONLY_INSECURE_CERTIFICATE_ALIAS} root certificate.
68 * Passwords started with the prefix are not protected if recovery agent uses
KeyChainProtectionParams.java 17 package android.security.keystore.recovery;
59 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody
125 * Specifies UX shown to user during recovery.
RecoverySession.java 17 package android.security.keystore.recovery;
39 * recovery agent.
111 * Starts a recovery session and returns a blob with proof of recovery secret possession.
113 * return recovery key.
117 * @param verifierCertPath The certificate path used to create the recovery blob on the source
119 * @param vaultParams Must match the parameters in the corresponding field in the recovery blob.
121 * @param vaultChallenge Data passed from server for this recovery session and used to prevent
124 * @return The binary blob with recovery claim. It is encrypted with verifierPublicKey
126 * key and parameters necessary to identify the counter with the number of failed recovery
    [all...]
KeyChainSnapshot.java 17 package android.security.keystore.recovery;
41 * the recovery agent itself should not be able to decipher the data. The recovery agent sends an
43 * recovery flow, the recovery agent retrieves a snapshot from the remote trusted hardware. It then
57 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody
87 * Snapshot version for given recovery agent. It is incremented when user secret or list of
95 * Number of user secret guesses allowed during KeyChain recovery.
150 * the recovery key ({@link #getEncryptedRecoveryKeyBlob}).
157 * Recovery key blob, encrypted by user secret and recovery service public key
    [all...]
RecoveryController.java 17 package android.security.keystore.recovery;
57 * <p>The same system app must also register a Recovery Agent to manage syncing recoverable keys to
58 * remote secure hardware. The Recovery Agent is a service that registers itself with the controller
80 * is up to the Recovery Agent to decide how best to identify devices, but this could be, e.g.,
88 * controller can create snapshots without the Recovery Agent registering this intent, it is a
89 * good idea to register the intent so that the Recovery Agent is able to sync this snapshot to
109 * <p>Whenever the user unlocks their device, if a snapshot is pending, the Recovery Controller
114 * Recovery Key.
115 * <li>Wraps the key material of all keys in the recoverable key chain with the Recovery Key.
116 * <li>Encrypts the Recovery Key with both the public key of the trusted hardware module and
    [all...]
  /frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/
TrustedRootCertificatesTest.java 17 package android.security.keystore.recovery;
19 import static android.security.keystore.recovery.TrustedRootCertificates.getRootCertificates;
X509CertificateParsingUtilsTest.java 17 package android.security.keystore.recovery;
19 import static android.security.keystore.recovery.X509CertificateParsingUtils.decodeBase64Cert;
KeyDerivationParamsTest.java 17 package android.security.keystore.recovery;
WrappedApplicationKeyTest.java 17 package android.security.keystore.recovery;
KeyChainProtectionParamsTest.java 17 package android.security.keystore.recovery;
KeyChainSnapshotTest.java 17 package android.security.keystore.recovery;
  /external/vboot_reference/firmware/lib/
vboot_api_init.c 27 uint32_t recovery = VBNV_RECOVERY_NOT_REQUESTED; local
110 * If this isn't a S3 resume, read the current recovery request, then
111 * clear it so we don't get stuck in recovery mode.
114 VbNvGet(&vnc, VBNV_RECOVERY_REQUEST, &recovery);
115 VBDEBUG(("VbInit sees recovery request = %d\n", recovery));
116 if (VBNV_RECOVERY_NOT_REQUESTED != recovery)
123 * verified boot, and recovery is not requested for our own reasons,
124 * request recovery mode. This gives the calling firmware a way to
125 * request recovery if it finds something terribly wrong
    [all...]
vboot_firmware.c 58 int recovery = VBNV_RECOVERY_RO_UNSPECIFIED; local
128 /* RW firmware never runs in recovery mode. */
130 VBDEBUG(("Recovery flag mismatch.\n"));
331 /* No good firmware, so go to recovery mode. */
333 recovery = VBNV_RECOVERY_RO_INVALID_RW;
337 * If the best check result fits in the range of recovery
345 recovery = best_check;
351 /* Store recovery request, if any */
353 recovery : VBNV_RECOVERY_NOT_REQUESTED);
355 * encountered an error, update the shared recovery reason i
    [all...]
vboot_kernel.c 27 kBootRecovery = 0, /* Recovery firmware, any dev switch position */
56 int recovery = VBNV_RECOVERY_LK_UNSPECIFIED; local
107 /* Use the recovery key to verify the kernel */
238 VBDEBUG(("Key block recovery flag mismatch.\n"));
243 /* Check for rollback of key version except in recovery mode. */
292 * If the key block is valid and we're not in recovery mode,
448 * If we're in recovery mode or we're about to boot a
453 VBDEBUG(("In recovery mode or dev-signed kernel\n"));
513 recovery = VBNV_RECOVERY_RW_INVALID_OS;
517 recovery = VBNV_RECOVERY_RW_NO_OS
    [all...]
  /bootable/recovery/bootloader_message/include/bootloader_message/
bootloader_message.h 28 // 16K - 64K Used by uncrypt and recovery to store wipe_package for A/B devices
29 // Note that these offsets are admitted by bootloader,recovery and uncrypt, so they
37 * that is used for recovery and the bootloader to talk to
41 * reboot into recovery or to update radio or bootloader firmware.
43 * is complete (to boot into recovery for any final cleanup)
49 * The recovery field is only written by linux and used
50 * for the system to send a message to recovery or the
59 * this struct, which gets unintentionally cleared by recovery or
66 char recovery[768]; member in struct:bootloader_message
68 // The 'recovery' field used to be 1024 bytes. It has only eve
    [all...]
  /external/deqp/android/cts/runner/tests/src/com/drawelements/deqp/runner/
DeqpTestRunnerTest.java 1501 DeqpTestRunner.Recovery recovery = new DeqpTestRunner.Recovery(); local
1641 DeqpTestRunner.Recovery recovery = new DeqpTestRunner.Recovery(); local
    [all...]
  /external/webrtc/webrtc/modules/rtp_rtcp/source/
rtp_fec_unittest.cc 84 // Check for complete recovery after FEC decoding.
117 // No packets lost, expect complete recovery.
145 // One packet lost, one FEC packet, expect complete recovery.
159 // 2 packets lost, one FEC packet, cannot get complete recovery.
213 // Verify we can still recovery frame if sequence number wrap occurs within
243 // Expect 3 media packets in recovered list, and complete recovery.
251 // In this case we will discard FEC packet and full recovery is not expected.
285 // The two FEC packets are received and should allow for complete recovery,
288 // list and no complete recovery.
295 // Verify we can still recovery frame if FEC is received before media packets
822 bool recovery = true; local
    [all...]

Completed in 300 milliseconds

1 2