Searched defs:encrypted (Results 1 - 8 of 8) sorted by relevance
/system/security/keystore/ |
H A D | blob.h | 59 uint8_t encrypted[0]; // Marks offset to encrypted data. member in struct:blobv2 69 offsetof(blobv3, aead_tag) == offsetof(blobv2, encrypted) && 106 void setEncrypted(bool encrypted);
|
H A D | blob.cpp | 188 void Blob::setEncrypted(bool encrypted) { argument 189 mBlob.flags = setFlag(mBlob.flags, encrypted, KEYSTORE_FLAG_ENCRYPTED); 217 ALOGD("couldn't insert encrypted blob while not unlocked"); 292 const size_t headerLength = offsetof(blobv2, encrypted); 303 AES_cbc_encrypt(blob.encrypted, blob.encrypted, encryptedLength, &key, blob.vector,
|
/system/tpm/attestation/client/ |
H A D | main.cc | 67 Activates an attestation key using the encrypted credential in 355 EncryptedIdentityCredential encrypted; local 358 attestation_key_info.public_key_tpm_format(), &encrypted)) { 362 encrypted.SerializeToString(&output);
|
/system/iot/attestation/atap/libatap/ |
H A D | atap_types.h | 134 AtapBlob encrypted; member in struct:__anon1932
|
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl.cc | 148 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 153 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 214 EncryptedIdentityCredential* encrypted) { 264 encrypted->set_asym_ca_contents(encrypted_asym_content); 265 encrypted->set_sym_ca_attestation(sym_content); 430 std::string encrypted; local 431 if (!AesEncrypt(input, key, iv, &encrypted)) { 435 *output = iv + encrypted; 210 EncryptIdentityCredential( const std::string& credential, const std::string& ek_public_key_info, const std::string& aik_public_key, EncryptedIdentityCredential* encrypted) argument
|
/system/bt/stack/smp/ |
H A D | smp_keys.cc | 107 * Plain_text is encrypted using key, the result is at p_out. 119 uint8_t* p_rev_output = NULL; /* encrypted output in big endilan format */ 737 bool encrypted = local 739 if (!encrypted) { 742 return encrypted;
|
/system/vold/ |
H A D | cryptfs.cpp | 18 * 1. Perhaps keep several copies of the encrypted key, in case something 465 /* If it's an encrypted Android partition, the last 16 Kbytes contain the 782 /* If not encrypted, just allocate an empty table and initialize it */ 784 if (strcmp(encrypted_state, "encrypted") ) { 1553 SLOGE("System already restarted with encrypted disk, aborting"); 1563 * to umount the tmpfs /data, then mount the encrypted /data. 1690 if (strcmp(encrypted_state, "encrypted") ) { 1695 // crypto_complete is full disk encrypted status 1705 * If the device was never encrypted, and /data is not mountable for 1873 * Called by vold when it's asked to mount an encrypted externa 2548 persist_get_max_entries(int encrypted) argument 2589 persist_set_key(const char *fieldname, const char *value, int encrypted) argument 2783 int encrypted = 0; local [all...] |
/system/tpm/trunks/ |
H A D | tpm_generated.h | 1625 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:trunks::TPMS_CONTEXT_DATA
|
Completed in 3618 milliseconds