/bootable/recovery/ |
roots.cpp | 133 bool crypt_footer = fs_mgr_is_encryptable(v) && !strcmp(v->key_loc, "footer"); 251 // If there's a key_loc that looks like a path, it should be a block device for storing encryption 253 if (v->key_loc != nullptr && v->key_loc[0] == '/') { 254 LOG(INFO) << "Wiping " << v->key_loc; 255 int fd = open(v->key_loc, O_WRONLY | O_CREAT, 0644); 257 PLOG(ERROR) << "format_volume: Failed to open " << v->key_loc; 268 (v->key_loc != nullptr && strcmp(v->key_loc, "footer") == 0)) {
|
/system/core/fs_mgr/include/ |
fs_mgr.h | 75 void fs_mgr_get_crypt_info(struct fstab* fstab, char* key_loc, char* real_blk_device, size_t size);
|
/system/core/fs_mgr/include_fstab/fstab/ |
fstab.h | 46 char* key_loc; member in struct:fstab_rec
|
/system/vold/ |
cryptfs.cpp | 449 char key_loc[PROPERTY_VALUE_MAX]; local 454 fs_mgr_get_crypt_info(fstab_default, key_loc, real_blkdev, sizeof(key_loc)); 456 if (!strcmp(key_loc, KEY_IN_FOOTER)) { 477 strlcpy(cached_metadata_fname, key_loc, sizeof(cached_metadata_fname)); 1687 char key_loc[PROPERTY_VALUE_MAX]; local 2158 char key_loc[PROPERTY_VALUE_MAX]; local [all...] |
/system/core/fs_mgr/ |
fs_mgr.cpp | [all...] |
fs_mgr_fstab.cpp | 39 char *key_loc; member in struct:fs_mgr_flag_values 241 flag_vals->key_loc = strdup(strchr(p, '=') + 1); 254 flag_vals->key_loc = strdup(strchr(p, '=') + 1); 259 flag_vals->key_loc = strdup(strchr(p, '=') + 1); 613 fstab->recs[cnt].key_loc = flag_vals.key_loc; 840 free(fstab->recs[i].key_loc); [all...] |