Lines Matching full:encryption
427 * Since the entire framework is torn down and rebuilt after encryption,
556 * encryption info footer and key, and plenty of bytes to spare for future
1761 SLOGE("cryptfs_restart not valid for file encryption:");
1777 SLOGE("not running with encryption, aborting");
1807 SLOGE("Encryption process is partway completed\n");
1812 SLOGE("Encryption process was interrupted but cannot continue\n");
1817 SLOGE("Encryption is successful but data is corrupt\n");
1857 SLOGE("Hardware encryption key does not match");
2019 SLOGE("encrypted fs already validated or not running with encryption,"
2036 SLOGE("cryptfs_check_passwd not valid for file encryption");
2065 SLOGE("Default password did not match on reboot encryption");
2073 SLOGE("Could not change password on reboot encryption");
2434 SLOGE("Stopping encryption due to low battery");
2763 SLOGE("Stopping encryption due to low battery");
2802 SLOGD("Continuing encryption from %" PRId64, previously_encrypted_upto);
2892 SLOGW("Not starting encryption due to low battery");
2965 /* An encryption was underway and was interrupted */
2971 complete encryption, a reboot will leave us broken. So mark the
2972 encryption failed in case that happens.
2973 On successfully completing encryption, remove this flag */
2984 /* Doing a reboot-encryption*/
3015 /* If doing inplace encryption, make sure the orig fs doesn't include the crypto footer */
3063 /* Do extra work for a better UX when doing the long inplace encryption */
3066 * /data, set a property saying we're doing inplace encryption,
3072 encryption is starting */
3103 complete encryption, a reboot will leave us broken. So mark the
3104 encryption failed in case that happens.
3105 On successfully completing encryption, remove this flag */
3119 SLOGE("Error clearing device encryption hardware key. rc = %d", rc);
3125 SLOGE("Error initializing device encryption hardware key. rc = %d", rc);
3210 SLOGE("Error calculating checksum for continuing encryption");
3236 /* default encryption - continue first boot sequence */
3264 /* wipe data if encryption failed */
3265 SLOGE("encryption failed - rebooting into recovery to wipe data\n");
3298 SLOGE("Error enabling encryption after framework is shutdown, no data changed, restarting system");
3323 SLOGE("cryptfs_changepw not valid for file encryption");
3366 SLOGD("Update hardware encryption key to default for crypt_type: %d. rc = %d", crypt_type, rc);
3371 SLOGD("Update hardware encryption key for crypt_type: %d. rc = %d", crypt_type, rc);
3736 SLOGE("cryptfs_get_password_type not valid for file encryption");
3757 SLOGE("cryptfs_get_password not valid for file encryption");