/system/security/keystore2/src/ |
D | maintenance.rs | 22 use crate::globals::{DB, LEGACY_MIGRATOR, SUPER_KEY}; 75 DB.with(|db| { in on_user_password_changed() 81 match DB in on_user_password_changed() 109 DB.with(|db| { in add_or_remove_user() 131 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace() 142 let state = DB in get_state() 204 if let Err(e) = DB.with(|db| SUPER_KEY.set_up_boot_level_cache(&mut db.borrow_mut())) { in early_boot_ended() 215 DB.with(|db| db.borrow_mut().update_last_off_body(MonotonicRawTime::now())); in on_device_off_body() 222 DB.with(|db| { in migrate_key_namespace()
|
D | authorization.rs | 18 use crate::globals::{ENFORCEMENTS, SUPER_KEY, DB, LEGACY_MIGRATOR}; 150 DB.with(|db| { in on_lock_screen_event() 160 if let UserState::Uninitialized = DB in on_lock_screen_event() 183 DB.with(|db| { in on_lock_screen_event() 193 DB.with(|db| { in on_lock_screen_event()
|
D | service.rs | 29 globals::{create_thread_local_db, DB, LEGACY_BLOB_LOADER, LEGACY_MIGRATOR}, 135 let (key_id_guard, mut key_entry) = DB in get_key_entry() 187 DB.with::<_, Result<()>>(|db| { in update_subcomponent() 296 &mut DB in list_entries() 311 DB.with(|db| { in delete_key() 329 DB.with(|db| { in grant() 344 DB.with(|db| { in ungrant()
|
D | remote_provisioning.rs | 45 use crate::globals::{get_keymint_device, get_remotely_provisioned_component, DB}; 289 let keys_to_sign = DB.with::<_, Result<Vec<MacedPublicKey>>>(|db| { in generate_csr() 345 DB.with::<_, Result<()>>(|db| { in provision_cert_chain() 381 DB.with::<_, Result<()>>(|db| { in generate_key_pair() 400 DB.with::<_, Result<i64>>(|db| { in delete_all_keys() 412 DB.with::<_, Result<AttestationPoolStatus>>(|db| { in get_pool_status()
|
D | security_level.rs | 23 use crate::globals::{DB, ENFORCEMENTS, LEGACY_MIGRATOR, SUPER_KEY}; 156 _ => DB in store_new_key() 242 let (key_id_guard, mut key_entry) = DB in create_operation() 334 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation() 494 _ => DB in generate_key() 693 let (wrapping_key_id_guard, mut wrapping_key_entry) = DB in import_wrapped_key() 784 DB.with(|db| { in store_upgraded_keyblob()
|
D | enforcements.rs | 18 use crate::globals::{get_timestamp_service, ASYNC_TASK, DB, ENFORCEMENTS}; 324 DB.with(|db| { in after_finish() 706 DB.with(|db| db.borrow().find_auth_token_entry(p)) in find_auth_token() 751 DB.with(|db| db.borrow_mut().insert_auth_token(&hat)); in add_auth_token()
|
D | metrics_store.rs | 21 use crate::globals::DB; 540 DB.with(|db| { in pull_storage_stats()
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 40 struct DB { struct 44 impl DB { implementation 284 fn open_db(&self) -> Result<DB> { in open_db() argument 285 DB::new(&self.db_path).context("In open_db: Failed to open db.") in open_db() 429 let mut db = DB::new(&state.db_path).context("In open_db: Failed to open db.")?; in get_legacy() 477 db: &mut DB, in migrate_one_legacy_entry() argument 538 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_entry_db() 581 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_uid() 599 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_user() 635 let mut db = DB::new(&db_path).expect("Failed to open database."); in concurrent_legacy_keystore_entry_test() [all …]
|
/system/ca-certificates/google/files/ |
D | a7d2cf64.0 | 54 SHA1 Fingerprint=AA:DB:BC:22:23:8F:C4:01:A1:27:BB:38:DD:F4:1D:DB:08:9E:F0:12
|
D | ed39abd0.0 | 45 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
|
D | c7e2a638.0 | 65 C4:79:CA:8E:A1:4E:03:1D:1C:DC:6B:DB:31:5B:94:3E:3F:30:7F:2D
|
D | 3ad48a91.0 | 78 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
|
D | 8d6437c3.0 | 63 CE:C3:4A:B9:99:55:F2:B8:DB:60:BF:A9:7E:BD:56:B5:97:36:A7:D6
|
/system/ca-certificates/files/ |
D | b872f2b4.0 | 57 A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21 61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
D | 7a7c655d.0 | 41 AB:B6:DB:D7:06:9E:37:AC:30:86:07:91:70:C7:9C:C4:19:B1:78:C0
|
D | 6b03dec0.0 | 52 SHA1 Fingerprint=30:D4:24:6F:07:FF:DB:91:89:8A:0B:E9:49:66:11:EB:8C:5E:46:E5
|
D | ed39abd0.0 | 46 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
|
D | 583d0756.0 | 89 keyid:F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E 92 F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
|
D | 3c6676aa.0 | 120 SHA1 Fingerprint=76:E2:7E:C1:4F:DB:82:C1:C0:A6:75:B5:05:BE:3D:29:B4:ED:DB:BB
|
D | 9339512a.0 | 101 F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0 103 keyid:F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
|
D | cb156124.0 | 89 2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54 93 keyid:2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54
|
D | 9f533518.0 | 97 B9:09:CA:9C:1E:DB:D3:6C:3A:6B:AE:ED:54:F1:5B:93:06:35:2E:5E 99 keyid:B9:09:CA:9C:1E:DB:D3:6C:3A:6B:AE:ED:54:F1:5B:93:06:35:2E:5E
|
D | bdacca6f.0 | 65 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4
|
D | 882de061.0 | 60 E0:8C:9B:DB:25:49:B3:F1:7C:86:D6:B2:42:87:0B:D0:6B:A0:D9:E4
|
D | 3ad48a91.0 | 78 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
|