/system/vold/ |
D | vdc.rc | 1 # One shot invocation to deal with encrypted volume.
|
D | cryptfs.cpp | 2537 static unsigned int persist_get_max_entries(int encrypted) { in persist_get_max_entries() argument 2544 if (encrypted) { in persist_get_max_entries() 2578 static int persist_set_key(const char* fieldname, const char* value, int encrypted) { in persist_set_key() argument 2587 max_persistent_entries = persist_get_max_entries(encrypted); in persist_set_key() 2767 int encrypted = 0; in cryptfs_setfield() local 2783 encrypted = 1; in cryptfs_setfield() 2807 persist_get_max_entries(encrypted)) { in cryptfs_setfield() 2816 if (persist_set_key(fieldname, value, encrypted)) { in cryptfs_setfield() 2825 if (persist_set_key(temp_field, value + field_id * (PROPERTY_VALUE_MAX - 1), encrypted)) { in cryptfs_setfield() 2833 if (encrypted) { in cryptfs_setfield()
|
/system/security/keystore/ |
D | blob.h | 67 uint8_t encrypted[0]; // Marks offset to encrypted data. member 77 offsetof(blobv3, aead_tag) == offsetof(blobv2, encrypted) && 132 void setEncrypted(bool encrypted);
|
D | keystore_client.proto | 21 // Holds encrypted, authenticated data.
|
D | blob.cpp | 298 void Blob::setEncrypted(bool encrypted) { in setEncrypted() argument 299 mBlob->flags = setFlag(mBlob->flags, encrypted, KEYSTORE_FLAG_ENCRYPTED); in setEncrypted() 436 const size_t headerLength = offsetof(blobv2, encrypted); in readBlob() 447 AES_cbc_encrypt(v2blob.encrypted, v2blob.encrypted, encryptedLength, &key, in readBlob()
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
/system/sepolicy/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
D | gsid.te | 62 # underlying blocks would be encrypted, and we couldn't mount the GSI image in
|
D | untrusted_app_all.te | 177 # that apps are attempting to access encrypted storage before
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
D | gsid.te | 62 # underlying blocks would be encrypted, and we couldn't mount the GSI image in
|
D | untrusted_app_all.te | 177 # that apps are attempting to access encrypted storage before
|
/system/libsysprop/srcs/android/sysprop/ |
D | CryptoProperties.sysprop | 34 enum_values: "encrypted|unencrypted|unsupported"
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | recovery.te | 153 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 127 # Rules to support encrypted fs support.
|
/system/sepolicy/public/ |
D | recovery.te | 153 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 127 # Rules to support encrypted fs support.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | recovery.te | 134 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 95 # Rules to support encrypted fs support.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | recovery.te | 144 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 103 # Rules to support encrypted fs support.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | recovery.te | 142 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 98 # Rules to support encrypted fs support.
|