commit | 3a78defa0b1479f6d200fec2d8c1baf4be0b4ce2 | [log] [tgz] |
---|---|---|
author | Kenny Root <kroot@google.com> | Tue Dec 03 15:31:05 2019 -0800 |
committer | Kenny Root <kroot@google.com> | Thu Dec 19 05:53:21 2019 +0000 |
tree | bd90aeecc7fed6f264cffc5dc07bb73d72378208 | |
parent | ffa4ed7fc70281efe96ed7da48482cef67507291 [diff] |
Support Resume on Reboot When an OTA is downloaded, the RecoverySystem can be triggered to store the user's lock screen knowledge factor in a secure way using the IRebootEscrow HAL. This will allow the credential encrypted (CE) storage, keymaster credentials, and possibly others to be unlocked when the device reboots after an OTA. Bug: 63928581 Test: make Test: boot with emulator Test: atest VtsHalRebootEscrowTargetTest Change-Id: If2a034627a13e11d74d4f713604c5c9c1290ee1a
git clone https://github.com/google/android-cuttlefish cd android-cuttlefish debuild -i -us -uc -b sudo dpkg -i ../cuttlefish-common_*_amd64.deb sudo apt-get install -f
aosp-master
if you don't know what you're looking foraosp_cf_x86_phone
and click on userdebug
for the latest buildArtifacts
aosp_cf_x86_phone-img-xxxxxx.zip
-- it will always have img
in the name. Download this filecvd-host_package.tar.gz
. You should always download a host package from the same build as your images.mkdir cf cd cf tar xvf /path/to/cvd-host_package.tar.gz unzip /path/to/aosp_cf_x86_phone-img-xxxxxx.zip
Launch cuttlefish with:
$ HOME=$PWD ./bin/launch_cvd
Stop cuttlefish with:
$ HOME=$PWD ./bin/stop_cvd
You can use adb
to debug it, just like a physical device:
$ ./bin/adb -e shell
You can use the TightVNC JViewer. Once you have downloaded the TightVNC Java Viewer JAR in a ZIP archive, run it with
$ java -jar tightvnc-jviewer.jar -ScalingFactor=50 -Tunneling=no -host=localhost -port=6444
Click "Connect" and you should see a lock screen!