Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 17 of 17) sorted by relevance

/device/google/cuttlefish/host/commands/secure_env/
Djson_serializable.cpp91 EncryptedSerializable encryption( in WriteProtectedJsonToFile() local
95 TPM2_SHA256_DIGEST_SIZE, &encryption, in WriteProtectedJsonToFile()
142 EncryptedSerializable encryption( in ReadProtectedJsonFromFile() local
146 TPM2_SHA256_DIGEST_SIZE, &encryption, in ReadProtectedJsonFromFile()
Dtpm_key_blob_maker.cpp225 EncryptedSerializable encryption( in UnvalidatedCreateKeyBlob() local
233 TPM2_SHA256_DIGEST_SIZE, &encryption, &hidden); in UnvalidatedCreateKeyBlob()
252 EncryptedSerializable encryption( in UnwrapKeyBlob() local
256 TPM2_SHA256_DIGEST_SIZE, &encryption, &hidden); in UnwrapKeyBlob()
/device/google/gs201/conf/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/google/gs101/conf/nomodem/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/google/gs101/conf/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/google/zuma/conf/ext4/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/google/zuma/conf/f2fs/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/google/cuttlefish/host/commands/cvd_update_security_algorithm/
Dupdate_security_algorithm_command_builder.cc25 std::string GetATCommand(int32_t connection_event, int32_t encryption, in GetATCommand() argument
28 connection_event, encryption, integrity, in GetATCommand()
Dupdate_security_algorithm_command_builder.h29 std::string GetATCommand(int32_t connection_event, int32_t encryption,
Dmain.cc33 DEFINE_int32(encryption, 0,
/device/google/zumapro/conf/
DAndroid.bp17 // By default this device uses hardware-wrapped keys for storage encryption,
20 // FIPS-140 certification of the encryption hardware, and hence we have to
24 // identical with the exception of the encryption settings, so to keep them in
/device/linaro/hikey/hikey960/
Dfstab.hikey96010 # Use the old cache partition for /metadata in order to support metadata encryption
/device/linaro/hikey/sepolicy/
Dfile_contexts39 # temporary workaround for metadata encryption support
/device/google/cuttlefish/host/commands/assemble_cvd/doc/
Ddisk.dot22 metadata [URL = "https://source.android.com/docs/security/features/encryption/metadata"]
/device/google/cuttlefish/guest/hals/ril/reference-libril/
Dril.h8570 int32_t encryption; member
Dril_service.cpp10713 update.encryption = static_cast<aidl_radio::network::SecurityAlgorithm>(rawUpdate->encryption); in securityAlgorithmUpdatedInd()
/device/google/cuttlefish/guest/hals/ril/reference-ril/
Dreference-ril.c6282 if (at_tok_nextint(&p, &update.encryption) < 0) {