/system/security/keystore/ |
D | blob.cpp | 74 void Blob::setEncrypted(bool encrypted) { in setEncrypted() argument 75 if (encrypted) { in setEncrypted() 112 memmove(&mBlob.encrypted[encryptedLength], &mBlob.value[mBlob.length], mBlob.info); in writeBlob() 123 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength, aes_key, vector, in writeBlob() 127 size_t headerLength = (mBlob.encrypted - (uint8_t*)&mBlob); in writeBlob() 175 size_t headerLength = (mBlob.encrypted - (uint8_t*)&mBlob); in readBlob() 191 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength, aes_key, mBlob.vector, in readBlob()
|
D | blob.h | 58 uint8_t encrypted[0]; // Marks offset to encrypted data. member 95 void setEncrypted(bool encrypted);
|
D | keystore_client.proto | 19 // Holds encrypted, authenticated data.
|
/system/connectivity/shill/shims/protos/ |
D | crypto_util.proto | 38 // Data to be encrypted under the public key. 47 // Data after being encrypted under the public_key, or an empty string. 57 // Data string hashed with SHA-1 before being encrypted with the private key
|
/system/tpm/attestation/common/ |
D | common.proto | 67 // Holds encrypted data and information required to decrypt it. 91 // TPM_ASYM_CA_CONTENTS, encrypted with EK public key. 93 // TPM_SYM_CA_ATTESTATION, encrypted with the key in aysm_ca_contents.
|
D | crypto_utility_impl.cc | 215 EncryptedIdentityCredential* encrypted) { in EncryptIdentityCredential() argument 265 encrypted->set_asym_ca_contents(encrypted_asym_content); in EncryptIdentityCredential() 266 encrypted->set_sym_ca_attestation(sym_content); in EncryptIdentityCredential() 431 std::string encrypted; in TssCompatibleEncrypt() local 432 if (!AesEncrypt(input, key, iv, &encrypted)) { in TssCompatibleEncrypt() 436 *output = iv + encrypted; in TssCompatibleEncrypt()
|
D | crypto_utility.h | 81 EncryptedIdentityCredential* encrypted) = 0;
|
D | attestation_ca.proto | 26 // The EK cert, in X.509 form, encrypted using the server's public key with 106 // The AIK cert, in X.509 form, encrypted using the server's public key with 116 // The EK cert, in X.509 form, encrypted using the server's public key with 160 // The KeyInfo message encrypted using a public encryption key, pushed via
|
D | crypto_utility_impl.h | 58 EncryptedIdentityCredential* encrypted) override;
|
D | database.proto | 19 // The |endorsement_credential| encrypted with a public key associated with
|
/system/vold/ |
D | vdc.rc | 1 # One shot invocation to deal with encrypted volume.
|
D | cryptfs.c | 3380 static unsigned int persist_get_max_entries(int encrypted) { argument 3388 if (encrypted) { 3421 static int persist_set_key(const char *fieldname, const char *value, int encrypted) argument 3431 max_persistent_entries = persist_get_max_entries(encrypted); 3622 int encrypted = 0; local 3638 encrypted = 1; 3662 persist_get_max_entries(encrypted)) { 3671 if (persist_set_key(fieldname, value, encrypted)) { 3680 if (persist_set_key(temp_field, value + field_id * (PROPERTY_VALUE_MAX - 1), encrypted)) { 3688 if (encrypted) {
|
/system/sepolicy/ |
D | blkid.te | 5 # Allowed read-only access to encrypted devices to extract UUID/label
|
D | recovery.te | 112 # In particular, if /data is encrypted, it is not accessible
|
D | vold.te | 106 # Rules to support encrypted fs support.
|
D | init.te | 68 # Use tmpfs as /data, used for booting when /data is encrypted
|
/system/core/bootstat/ |
D | bootstat.rc | 18 # The second marker ensures an encrypted device is decrypted before logging
|
/system/tpm/attestation/client/ |
D | main.cc | 373 EncryptedIdentityCredential encrypted; in EncryptForActivate3() local 378 &encrypted)) { in EncryptForActivate3() 382 encrypted.SerializeToString(&output); in EncryptForActivate3()
|
/system/bt/stack/smp/ |
D | smp_keys.c | 943 BOOLEAN encrypted; in smp_calculate_legacy_short_term_key() local 945 encrypted = SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, output); in smp_calculate_legacy_short_term_key() 946 if (!encrypted) in smp_calculate_legacy_short_term_key() 950 return encrypted; in smp_calculate_legacy_short_term_key()
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 1544 allow a command parameter to be encrypted, then the TPM will return TPM_RC_ATTRIBUTES. 2010 If a command parameter was encrypted using parameter encryption, it was decrypted before being 2037 response parameters that require parameter encryption will be encrypted after the command actions 3498 The type of tpmKey determines how the value in encryptedSalt is encrypted. The decrypted secret val… 3695 value encrypted according to the type of tpmKey 4184 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr… 4196 The sensitive parameter may be encrypted using parameter encryption. 5719 The key associated with keyHandle is used to recover a seed from secret, which is the encrypted see… 5791 keyHandle algorithm-dependent encrypted seed that 6282 The returned value may be encrypted using authorization session encryption. [all …]
|
D | raw_commands_fixed.txt | 1544 allow a command parameter to be encrypted, then the TPM will return TPM_RC_ATTRIBUTES. 2010 If a command parameter was encrypted using parameter encryption, it was decrypted before being 2037 response parameters that require parameter encryption will be encrypted after the command actions 3498 The type of tpmKey determines how the value in encryptedSalt is encrypted. The decrypted secret val… 3697 value encrypted according to the type of tpmKey 4186 data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate). Pr… 4198 The sensitive parameter may be encrypted using parameter encryption. 5721 The key associated with keyHandle is used to recover a seed from secret, which is the encrypted see… 5793 keyHandle algorithm-dependent encrypted seed that 6286 The returned value may be encrypted using authorization session encryption. [all …]
|
D | raw_structures.txt | 8447 …then when the object is duplicated, the sensitive portion of the object is required to be encrypted 8579 decryption and the key may be used to decrypt and return any structure encrypted by the public port… 8728 is symmetrically encrypted using the parameter encryption scheme described in Part 8788 used for authorization, encryption, or decryption. The encrypted and encrypt fields 10349 If a TPM2B_ is encrypted, the TPM will encrypt/decrypt the data field of the TPM2B_ but not the size 12806 When sent to the TPM or unsealed, data is usually encrypted using parameter encryption. 13831 …s structure is defined to allow a point to be a single sized parameter so that it may be encrypted. 14271 This structure is used to hold either an ephemeral public point for ECDH, an OAEP-encrypted block f… 14272 RSA, or a symmetrically encrypted value. This structure is defined for the limited purpose of deter… 14274 The symmetrically encrypted value may use either CFB or XOR encryption. [all …]
|
D | raw_structures_fixed.txt | 8475 …then when the object is duplicated, the sensitive portion of the object is required to be encrypted 8607 decryption and the key may be used to decrypt and return any structure encrypted by the public port… 8756 is symmetrically encrypted using the parameter encryption scheme described in Part 8816 used for authorization, encryption, or decryption. The encrypted and encrypt fields 10377 If a TPM2B_ is encrypted, the TPM will encrypt/decrypt the data field of the TPM2B_ but not the size 12818 When sent to the TPM or unsealed, data is usually encrypted using parameter encryption. 13846 …s structure is defined to allow a point to be a single sized parameter so that it may be encrypted. 14283 This structure is used to hold either an ephemeral public point for ECDH, an OAEP-encrypted block f… 14284 RSA, or a symmetrically encrypted value. This structure is defined for the limited purpose of deter… 14286 The symmetrically encrypted value may use either CFB or XOR encryption. [all …]
|
/system/connectivity/shill/doc/ |
D | manager-api.txt | 434 encrypted psk, or an empty string on error. 449 encrypted data, or an empty string on error.
|
/system/core/rootdir/ |
D | init.rc | 458 # must uncomment this line, otherwise encrypted filesystems
|