/device/google/cuttlefish/host/commands/secure_env/ |
D | json_serializable.cpp | 91 EncryptedSerializable encryption( in WriteProtectedJsonToFile() local 95 TPM2_SHA256_DIGEST_SIZE, &encryption, in WriteProtectedJsonToFile() 142 EncryptedSerializable encryption( in ReadProtectedJsonFromFile() local 146 TPM2_SHA256_DIGEST_SIZE, &encryption, in ReadProtectedJsonFromFile()
|
D | tpm_key_blob_maker.cpp | 225 EncryptedSerializable encryption( in UnvalidatedCreateKeyBlob() local 233 TPM2_SHA256_DIGEST_SIZE, &encryption, &hidden); in UnvalidatedCreateKeyBlob() 252 EncryptedSerializable encryption( in UnwrapKeyBlob() local 256 TPM2_SHA256_DIGEST_SIZE, &encryption, &hidden); in UnwrapKeyBlob()
|
/device/google/gs201/conf/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/google/gs101/conf/nomodem/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/google/gs101/conf/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/google/zuma/conf/ext4/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/google/zuma/conf/f2fs/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/google/cuttlefish/host/commands/cvd_update_security_algorithm/ |
D | update_security_algorithm_command_builder.cc | 25 std::string GetATCommand(int32_t connection_event, int32_t encryption, in GetATCommand() argument 28 connection_event, encryption, integrity, in GetATCommand()
|
D | update_security_algorithm_command_builder.h | 29 std::string GetATCommand(int32_t connection_event, int32_t encryption,
|
D | main.cc | 33 DEFINE_int32(encryption, 0,
|
/device/google/zumapro/conf/ |
D | Android.bp | 17 // By default this device uses hardware-wrapped keys for storage encryption, 20 // FIPS-140 certification of the encryption hardware, and hence we have to 24 // identical with the exception of the encryption settings, so to keep them in
|
/device/linaro/hikey/hikey960/ |
D | fstab.hikey960 | 10 # Use the old cache partition for /metadata in order to support metadata encryption
|
/device/linaro/hikey/sepolicy/ |
D | file_contexts | 39 # temporary workaround for metadata encryption support
|
/device/google/cuttlefish/host/commands/assemble_cvd/doc/ |
D | disk.dot | 22 metadata [URL = "https://source.android.com/docs/security/features/encryption/metadata"]
|
/device/google/cuttlefish/guest/hals/ril/reference-libril/ |
D | ril.h | 8570 int32_t encryption; member
|
D | ril_service.cpp | 10713 update.encryption = static_cast<aidl_radio::network::SecurityAlgorithm>(rawUpdate->encryption); in securityAlgorithmUpdatedInd()
|
/device/google/cuttlefish/guest/hals/ril/reference-ril/ |
D | reference-ril.c | 6282 if (at_tok_nextint(&p, &update.encryption) < 0) {
|