/frameworks/base/core/java/android/security/keystore/recovery/ |
DecryptionFailedException.java | 17 package android.security.keystore.recovery;
|
LockScreenRequiredException.java | 17 package android.security.keystore.recovery;
|
SessionExpiredException.java | 17 package android.security.keystore.recovery;
|
InternalRecoveryServiceException.java | 17 package android.security.keystore.recovery; 24 * An error thrown when something went wrong internally in the recovery service.
|
RecoveryCertPath.java | 17 package android.security.keystore.recovery; 32 * The certificate path of the recovery service.
|
X509CertificateParsingUtils.java | 17 package android.security.keystore.recovery;
|
KeyDerivationParams.java | 17 package android.security.keystore.recovery; 44 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody
|
WrappedApplicationKey.java | 17 package android.security.keystore.recovery; 27 * Helper class with data necessary recover a single application key, given a recovery key. 34 * Note that Application info is not included. Recovery Agent can only make its own keys 50 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody 87 * Sets key material encrypted by recovery key. 131 /** Key material encrypted by recovery key. */
|
TrustedRootCertificates.java | 17 package android.security.keystore.recovery; 19 import static android.security.keystore.recovery.X509CertificateParsingUtils.decodeBase64Cert; 30 * {@link android.security.keystore.recovery.RecoveryController}. These certificates are used to 42 * When recovery controller is initialized with the certificate, recovery snapshots will only 44 * Recovery snapshot will only be created if device is unlocked with password started with 61 * recovery agent uses {@link #TEST_ONLY_INSECURE_CERTIFICATE_ALIAS} root certificate. 68 * Passwords started with the prefix are not protected if recovery agent uses
|
KeyChainProtectionParams.java | 17 package android.security.keystore.recovery; 59 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody 125 * Specifies UX shown to user during recovery.
|
RecoverySession.java | 17 package android.security.keystore.recovery; 39 * recovery agent. 111 * Starts a recovery session and returns a blob with proof of recovery secret possession. 113 * return recovery key. 117 * @param verifierCertPath The certificate path used to create the recovery blob on the source 119 * @param vaultParams Must match the parameters in the corresponding field in the recovery blob. 121 * @param vaultChallenge Data passed from server for this recovery session and used to prevent 124 * @return The binary blob with recovery claim. It is encrypted with verifierPublicKey 126 * key and parameters necessary to identify the counter with the number of failed recovery [all...] |
KeyChainSnapshot.java | 17 package android.security.keystore.recovery; 41 * the recovery agent itself should not be able to decipher the data. The recovery agent sends an 43 * recovery flow, the recovery agent retrieves a snapshot from the remote trusted hardware. It then 57 // - Update android.security.keystore.recovery.KeyChainSnapshotTest to make sure nobody 87 * Snapshot version for given recovery agent. It is incremented when user secret or list of 95 * Number of user secret guesses allowed during KeyChain recovery. 150 * the recovery key ({@link #getEncryptedRecoveryKeyBlob}). 157 * Recovery key blob, encrypted by user secret and recovery service public key [all...] |
RecoveryController.java | 17 package android.security.keystore.recovery; 57 * <p>The same system app must also register a Recovery Agent to manage syncing recoverable keys to 58 * remote secure hardware. The Recovery Agent is a service that registers itself with the controller 80 * is up to the Recovery Agent to decide how best to identify devices, but this could be, e.g., 88 * controller can create snapshots without the Recovery Agent registering this intent, it is a 89 * good idea to register the intent so that the Recovery Agent is able to sync this snapshot to 109 * <p>Whenever the user unlocks their device, if a snapshot is pending, the Recovery Controller 114 * Recovery Key. 115 * <li>Wraps the key material of all keys in the recoverable key chain with the Recovery Key. 116 * <li>Encrypts the Recovery Key with both the public key of the trusted hardware module and [all...] |
/frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/ |
TrustedRootCertificatesTest.java | 17 package android.security.keystore.recovery; 19 import static android.security.keystore.recovery.TrustedRootCertificates.getRootCertificates;
|
X509CertificateParsingUtilsTest.java | 17 package android.security.keystore.recovery; 19 import static android.security.keystore.recovery.X509CertificateParsingUtils.decodeBase64Cert;
|
KeyDerivationParamsTest.java | 17 package android.security.keystore.recovery;
|
WrappedApplicationKeyTest.java | 17 package android.security.keystore.recovery;
|
KeyChainProtectionParamsTest.java | 17 package android.security.keystore.recovery;
|
KeyChainSnapshotTest.java | 17 package android.security.keystore.recovery;
|
/external/vboot_reference/firmware/lib/ |
vboot_api_init.c | 27 uint32_t recovery = VBNV_RECOVERY_NOT_REQUESTED; local 110 * If this isn't a S3 resume, read the current recovery request, then 111 * clear it so we don't get stuck in recovery mode. 114 VbNvGet(&vnc, VBNV_RECOVERY_REQUEST, &recovery); 115 VBDEBUG(("VbInit sees recovery request = %d\n", recovery)); 116 if (VBNV_RECOVERY_NOT_REQUESTED != recovery) 123 * verified boot, and recovery is not requested for our own reasons, 124 * request recovery mode. This gives the calling firmware a way to 125 * request recovery if it finds something terribly wrong [all...] |
vboot_firmware.c | 58 int recovery = VBNV_RECOVERY_RO_UNSPECIFIED; local 128 /* RW firmware never runs in recovery mode. */ 130 VBDEBUG(("Recovery flag mismatch.\n")); 331 /* No good firmware, so go to recovery mode. */ 333 recovery = VBNV_RECOVERY_RO_INVALID_RW; 337 * If the best check result fits in the range of recovery 345 recovery = best_check; 351 /* Store recovery request, if any */ 353 recovery : VBNV_RECOVERY_NOT_REQUESTED); 355 * encountered an error, update the shared recovery reason i [all...] |
vboot_kernel.c | 27 kBootRecovery = 0, /* Recovery firmware, any dev switch position */ 56 int recovery = VBNV_RECOVERY_LK_UNSPECIFIED; local 107 /* Use the recovery key to verify the kernel */ 238 VBDEBUG(("Key block recovery flag mismatch.\n")); 243 /* Check for rollback of key version except in recovery mode. */ 292 * If the key block is valid and we're not in recovery mode, 448 * If we're in recovery mode or we're about to boot a 453 VBDEBUG(("In recovery mode or dev-signed kernel\n")); 513 recovery = VBNV_RECOVERY_RW_INVALID_OS; 517 recovery = VBNV_RECOVERY_RW_NO_OS [all...] |
/bootable/recovery/bootloader_message/include/bootloader_message/ |
bootloader_message.h | 28 // 16K - 64K Used by uncrypt and recovery to store wipe_package for A/B devices 29 // Note that these offsets are admitted by bootloader,recovery and uncrypt, so they 37 * that is used for recovery and the bootloader to talk to 41 * reboot into recovery or to update radio or bootloader firmware. 43 * is complete (to boot into recovery for any final cleanup) 49 * The recovery field is only written by linux and used 50 * for the system to send a message to recovery or the 59 * this struct, which gets unintentionally cleared by recovery or 66 char recovery[768]; member in struct:bootloader_message 68 // The 'recovery' field used to be 1024 bytes. It has only eve [all...] |
/external/deqp/android/cts/runner/tests/src/com/drawelements/deqp/runner/ |
DeqpTestRunnerTest.java | 1501 DeqpTestRunner.Recovery recovery = new DeqpTestRunner.Recovery(); local 1641 DeqpTestRunner.Recovery recovery = new DeqpTestRunner.Recovery(); local [all...] |
/external/webrtc/webrtc/modules/rtp_rtcp/source/ |
rtp_fec_unittest.cc | 84 // Check for complete recovery after FEC decoding. 117 // No packets lost, expect complete recovery. 145 // One packet lost, one FEC packet, expect complete recovery. 159 // 2 packets lost, one FEC packet, cannot get complete recovery. 213 // Verify we can still recovery frame if sequence number wrap occurs within 243 // Expect 3 media packets in recovered list, and complete recovery. 251 // In this case we will discard FEC packet and full recovery is not expected. 285 // The two FEC packets are received and should allow for complete recovery, 288 // list and no complete recovery. 295 // Verify we can still recovery frame if FEC is received before media packets 822 bool recovery = true; local [all...] |