Home
last modified time | relevance | path

Searched refs:DB (Results 1 – 25 of 36) sorted by relevance

12

/system/security/keystore2/src/
Dmaintenance.rs22 use crate::globals::{DB, LEGACY_MIGRATOR, SUPER_KEY};
75 DB.with(|db| { in on_user_password_changed()
81 match DB in on_user_password_changed()
109 DB.with(|db| { in add_or_remove_user()
131 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace()
142 let state = DB in get_state()
204 if let Err(e) = DB.with(|db| SUPER_KEY.set_up_boot_level_cache(&mut db.borrow_mut())) { in early_boot_ended()
215 DB.with(|db| db.borrow_mut().update_last_off_body(MonotonicRawTime::now())); in on_device_off_body()
222 DB.with(|db| { in migrate_key_namespace()
Dauthorization.rs18 use crate::globals::{ENFORCEMENTS, SUPER_KEY, DB, LEGACY_MIGRATOR};
150 DB.with(|db| { in on_lock_screen_event()
160 if let UserState::Uninitialized = DB in on_lock_screen_event()
183 DB.with(|db| { in on_lock_screen_event()
193 DB.with(|db| { in on_lock_screen_event()
Dservice.rs29 globals::{create_thread_local_db, DB, LEGACY_BLOB_LOADER, LEGACY_MIGRATOR},
135 let (key_id_guard, mut key_entry) = DB in get_key_entry()
187 DB.with::<_, Result<()>>(|db| { in update_subcomponent()
296 &mut DB in list_entries()
311 DB.with(|db| { in delete_key()
329 DB.with(|db| { in grant()
344 DB.with(|db| { in ungrant()
Dremote_provisioning.rs45 use crate::globals::{get_keymint_device, get_remotely_provisioned_component, DB};
289 let keys_to_sign = DB.with::<_, Result<Vec<MacedPublicKey>>>(|db| { in generate_csr()
345 DB.with::<_, Result<()>>(|db| { in provision_cert_chain()
381 DB.with::<_, Result<()>>(|db| { in generate_key_pair()
400 DB.with::<_, Result<i64>>(|db| { in delete_all_keys()
412 DB.with::<_, Result<AttestationPoolStatus>>(|db| { in get_pool_status()
Dsecurity_level.rs23 use crate::globals::{DB, ENFORCEMENTS, LEGACY_MIGRATOR, SUPER_KEY};
156 _ => DB in store_new_key()
242 let (key_id_guard, mut key_entry) = DB in create_operation()
334 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation()
494 _ => DB in generate_key()
693 let (wrapping_key_id_guard, mut wrapping_key_entry) = DB in import_wrapped_key()
784 DB.with(|db| { in store_upgraded_keyblob()
Denforcements.rs18 use crate::globals::{get_timestamp_service, ASYNC_TASK, DB, ENFORCEMENTS};
324 DB.with(|db| { in after_finish()
706 DB.with(|db| db.borrow().find_auth_token_entry(p)) in find_auth_token()
751 DB.with(|db| db.borrow_mut().insert_auth_token(&hat)); in add_auth_token()
Dmetrics_store.rs21 use crate::globals::DB;
540 DB.with(|db| { in pull_storage_stats()
/system/security/keystore2/legacykeystore/
Dlib.rs40 struct DB { struct
44 impl DB { implementation
284 fn open_db(&self) -> Result<DB> { in open_db() argument
285 DB::new(&self.db_path).context("In open_db: Failed to open db.") in open_db()
429 let mut db = DB::new(&state.db_path).context("In open_db: Failed to open db.")?; in get_legacy()
477 db: &mut DB, in migrate_one_legacy_entry() argument
538 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_entry_db()
581 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_uid()
599 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_user()
635 let mut db = DB::new(&db_path).expect("Failed to open database."); in concurrent_legacy_keystore_entry_test()
[all …]
/system/ca-certificates/google/files/
Da7d2cf64.054 SHA1 Fingerprint=AA:DB:BC:22:23:8F:C4:01:A1:27:BB:38:DD:F4:1D:DB:08:9E:F0:12
Ded39abd0.045 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
Dc7e2a638.065 C4:79:CA:8E:A1:4E:03:1D:1C:DC:6B:DB:31:5B:94:3E:3F:30:7F:2D
D3ad48a91.078 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
D8d6437c3.063 CE:C3:4A:B9:99:55:F2:B8:DB:60:BF:A9:7E:BD:56:B5:97:36:A7:D6
/system/ca-certificates/files/
Db872f2b4.057 A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
D7a7c655d.041 AB:B6:DB:D7:06:9E:37:AC:30:86:07:91:70:C7:9C:C4:19:B1:78:C0
D6b03dec0.052 SHA1 Fingerprint=30:D4:24:6F:07:FF:DB:91:89:8A:0B:E9:49:66:11:EB:8C:5E:46:E5
Ded39abd0.046 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
D583d0756.089 keyid:F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
92 F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
D3c6676aa.0120 SHA1 Fingerprint=76:E2:7E:C1:4F:DB:82:C1:C0:A6:75:B5:05:BE:3D:29:B4:ED:DB:BB
D9339512a.0101 F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
103 keyid:F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
Dcb156124.089 2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54
93 keyid:2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54
D9f533518.097 B9:09:CA:9C:1E:DB:D3:6C:3A:6B:AE:ED:54:F1:5B:93:06:35:2E:5E
99 keyid:B9:09:CA:9C:1E:DB:D3:6C:3A:6B:AE:ED:54:F1:5B:93:06:35:2E:5E
Dbdacca6f.065 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4
D882de061.060 E0:8C:9B:DB:25:49:B3:F1:7C:86:D6:B2:42:87:0B:D0:6B:A0:D9:E4
D3ad48a91.078 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74

12