Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 33) sorted by relevance

12

/system/vold/
Dvdc.rc1 # One shot invocation to deal with encrypted volume.
Dcryptfs.cpp2537 static unsigned int persist_get_max_entries(int encrypted) { in persist_get_max_entries() argument
2544 if (encrypted) { in persist_get_max_entries()
2578 static int persist_set_key(const char* fieldname, const char* value, int encrypted) { in persist_set_key() argument
2587 max_persistent_entries = persist_get_max_entries(encrypted); in persist_set_key()
2767 int encrypted = 0; in cryptfs_setfield() local
2783 encrypted = 1; in cryptfs_setfield()
2807 persist_get_max_entries(encrypted)) { in cryptfs_setfield()
2816 if (persist_set_key(fieldname, value, encrypted)) { in cryptfs_setfield()
2825 if (persist_set_key(temp_field, value + field_id * (PROPERTY_VALUE_MAX - 1), encrypted)) { in cryptfs_setfield()
2833 if (encrypted) { in cryptfs_setfield()
/system/security/keystore/
Dblob.h67 uint8_t encrypted[0]; // Marks offset to encrypted data. member
77 offsetof(blobv3, aead_tag) == offsetof(blobv2, encrypted) &&
132 void setEncrypted(bool encrypted);
Dkeystore_client.proto21 // Holds encrypted, authenticated data.
Dblob.cpp298 void Blob::setEncrypted(bool encrypted) { in setEncrypted() argument
299 mBlob->flags = setFlag(mBlob->flags, encrypted, KEYSTORE_FLAG_ENCRYPTED); in setEncrypted()
436 const size_t headerLength = offsetof(blobv2, encrypted); in readBlob()
447 AES_cbc_encrypt(v2blob.encrypted, v2blob.encrypted, encryptedLength, &key, in readBlob()
/system/sepolicy/prebuilts/api/28.0/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
/system/sepolicy/prebuilts/api/26.0/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
/system/sepolicy/prebuilts/api/27.0/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
/system/sepolicy/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
Dgsid.te62 # underlying blocks would be encrypted, and we couldn't mount the GSI image in
Duntrusted_app_all.te177 # that apps are attempting to access encrypted storage before
/system/sepolicy/prebuilts/api/29.0/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
Dgsid.te62 # underlying blocks would be encrypted, and we couldn't mount the GSI image in
Duntrusted_app_all.te177 # that apps are attempting to access encrypted storage before
/system/libsysprop/srcs/android/sysprop/
DCryptoProperties.sysprop34 enum_values: "encrypted|unencrypted|unsupported"
/system/sepolicy/prebuilts/api/29.0/public/
Drecovery.te153 # In particular, if /data is encrypted, it is not accessible
Dvold.te127 # Rules to support encrypted fs support.
/system/sepolicy/public/
Drecovery.te153 # In particular, if /data is encrypted, it is not accessible
Dvold.te127 # Rules to support encrypted fs support.
/system/sepolicy/prebuilts/api/26.0/public/
Drecovery.te134 # In particular, if /data is encrypted, it is not accessible
Dvold.te95 # Rules to support encrypted fs support.
/system/sepolicy/prebuilts/api/28.0/public/
Drecovery.te144 # In particular, if /data is encrypted, it is not accessible
Dvold.te103 # Rules to support encrypted fs support.
/system/sepolicy/prebuilts/api/27.0/public/
Drecovery.te142 # In particular, if /data is encrypted, it is not accessible
Dvold.te98 # Rules to support encrypted fs support.

12