Lines Matching refs:nspace

1291         nspace: i64,  in key_exists()
1299 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists()
1372 nspace: user_id as i64, in load_super_key()
1683 Domain::APP => KeyDescriptor { nspace: caller_uid as i64, ..(*destination).clone() }, in migrate_key_namespace()
1706 params![alias, destination.domain.0, destination.nspace], in migrate_key_namespace()
1722 params![alias, destination.domain.0, destination.nspace, key_id_guard.id()], in migrate_key_namespace()
1754 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_key()
1755 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_key()
1756 (alias, key.domain, nspace) in store_new_key()
1833 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_certificate()
1834 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_certificate()
1835 (alias, key.domain, nspace) in store_new_certificate()
1890 .query(params![key_type, key.domain.0 as u32, key.nspace, alias, KeyLifeCycle::Live]) in load_key_entry_id()
1929 access_key.nspace = caller_uid as i64; in load_access_tuple()
1948 .query(params![caller_uid as i64, key.nspace, KeyLifeCycle::Live]) in load_access_tuple()
1976 .query(params![key.nspace, KeyLifeCycle::Live]) in load_access_tuple()
2001 params![caller_uid as i64, key.nspace], in load_access_tuple()
2011 let key_id = key.nspace; in load_access_tuple()
2014 access_key.nspace = namespace; in load_access_tuple()
2195 Domain::KEY_ID => Some(KEY_ID_LOCK.get(key.nspace)), in load_key_entry_internal()
2244 nspace: key_id, in load_key_entry_internal()
2621 nspace: namespace, in list_past_alias()
2725 Ok(KeyDescriptor { domain: Domain::GRANT, nspace: grant_id, alias: None, blob: None }) in grant()
2814 nspace: row.get(1)?, in load_key_descriptor()
3215 nspace: 0, in test_grant_ungrant()
3235 nspace: CALLER_UID as i64, in test_grant_ungrant()
3249 nspace: next_random, in test_grant_ungrant()
3257 nspace: SELINUX_NAMESPACE, in test_grant_ungrant()
3271 nspace: SELINUX_NAMESPACE, in test_grant_ungrant()
3285 nspace: next_random + 1, in test_grant_ungrant()
3301 nspace: SELINUX_NAMESPACE, in test_grant_ungrant()
3315 nspace: next_random + 1, in test_grant_ungrant()
3407 nspace: 0, in test_insert_and_load_full_keyentry_domain_app()
3422 nspace: 0, in test_insert_and_load_full_keyentry_domain_app()
3437 nspace: 0, in test_insert_and_load_full_keyentry_domain_app()
3461 nspace: 1, in test_insert_and_load_certificate_entry_domain_app()
3475 nspace: 1, in test_insert_and_load_certificate_entry_domain_app()
3493 nspace: 1, in test_insert_and_load_certificate_entry_domain_app()
3508 nspace: 1, in test_insert_and_load_certificate_entry_domain_app()
3535 nspace: 1, in test_insert_and_load_full_keyentry_domain_selinux()
3550 nspace: 1, in test_insert_and_load_full_keyentry_domain_selinux()
3565 nspace: 1, in test_insert_and_load_full_keyentry_domain_selinux()
3590 &KeyDescriptor { domain: Domain::KEY_ID, nspace: key_id, alias: None, blob: None }, in test_insert_and_load_full_keyentry_domain_key_id()
3601 &KeyDescriptor { domain: Domain::KEY_ID, nspace: key_id, alias: None, blob: None }, in test_insert_and_load_full_keyentry_domain_key_id()
3611 &KeyDescriptor { domain: Domain::KEY_ID, nspace: key_id, alias: None, blob: None }, in test_insert_and_load_full_keyentry_domain_key_id()
3635 &KeyDescriptor { domain: Domain::KEY_ID, nspace: key_id, alias: None, blob: None }, in test_check_and_update_key_usage_count_with_limited_use_key()
3684 nspace: 0, in test_insert_and_load_full_keyentry_from_grant()
3741 nspace: 0, in test_insert_and_load_full_keyentry_from_grant_by_key_id()
3755 KeyDescriptor { domain: Domain::KEY_ID, nspace: key_id, ..Default::default() }; in test_insert_and_load_full_keyentry_from_grant_by_key_id()
3765 assert_eq!(OWNER_UID as i64, k.nspace); in test_insert_and_load_full_keyentry_from_grant_by_key_id()
3782 assert_eq!(OWNER_UID as i64, k.nspace); in test_insert_and_load_full_keyentry_from_grant_by_key_id()
3825 nspace: -1, in test_migrate_key_app_to_app()
3832 nspace: -1, in test_migrate_key_app_to_app()
3852 assert_eq!(DESTINATION_UID as i64, k.nspace); in test_migrate_key_app_to_app()
3894 nspace: -1, in test_migrate_key_app_to_selinux()
3901 nspace: DESTINATION_NAMESPACE, in test_migrate_key_app_to_selinux()
3921 assert_eq!(DESTINATION_NAMESPACE, k.nspace); in test_migrate_key_app_to_selinux()
3964 nspace: -1, in test_migrate_key_destination_occupied()
4004 nspace: -1, in test_upgrade_0_to_1()
4013 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4024 nspace: -1, in test_upgrade_0_to_1()
4033 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4044 nspace: -1, in test_upgrade_0_to_1()
4053 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4068 nspace: -1, in test_upgrade_0_to_1()
4077 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4088 nspace: -1, in test_upgrade_0_to_1()
4097 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4109 nspace: -1, in test_upgrade_0_to_1()
4118 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1()
4144 nspace: 0, in test_insert_and_load_full_keyentry_domain_app_concurrently()
4172 nspace: 0, in test_insert_and_load_full_keyentry_domain_app_concurrently()
4286 nspace: -1, in test_large_number_of_concurrent_db_manipulations()
4306 nspace: -1, in test_large_number_of_concurrent_db_manipulations()
4333 nspace: -1, in test_large_number_of_concurrent_db_manipulations()
4395 nspace: *ns, in list()
5070 fn app_key_exists(db: &mut KeystoreDB, nspace: i64, alias: &str) -> Result<bool> { in app_key_exists()
5071 db.key_exists(Domain::APP, nspace, alias, KeyType::Client) in app_key_exists()
5079 let nspace: i64 = (user_id * AID_USER_OFFSET).into(); in test_unbind_auth_bound_keys_for_user() localVariable
5100 make_superencrypted_key_entry(&mut db, nspace, "noauth_noud", false, false, super_key_id)?; in test_unbind_auth_bound_keys_for_user()
5101 make_superencrypted_key_entry(&mut db, nspace, "noauth_ud", false, true, super_key_id)?; in test_unbind_auth_bound_keys_for_user()
5102 make_superencrypted_key_entry(&mut db, nspace, "auth_noud", true, false, super_key_id)?; in test_unbind_auth_bound_keys_for_user()
5103 make_superencrypted_key_entry(&mut db, nspace, "auth_ud", true, true, super_key_id)?; in test_unbind_auth_bound_keys_for_user()
5104 assert!(app_key_exists(&mut db, nspace, "noauth_noud")?); in test_unbind_auth_bound_keys_for_user()
5105 assert!(app_key_exists(&mut db, nspace, "noauth_ud")?); in test_unbind_auth_bound_keys_for_user()
5106 assert!(app_key_exists(&mut db, nspace, "auth_noud")?); in test_unbind_auth_bound_keys_for_user()
5107 assert!(app_key_exists(&mut db, nspace, "auth_ud")?); in test_unbind_auth_bound_keys_for_user()
5126 assert!(app_key_exists(&mut db, nspace, "noauth_noud")?); in test_unbind_auth_bound_keys_for_user()
5127 assert!(app_key_exists(&mut db, nspace, "noauth_ud")?); in test_unbind_auth_bound_keys_for_user()
5128 assert!(!app_key_exists(&mut db, nspace, "auth_noud")?); in test_unbind_auth_bound_keys_for_user()
5129 assert!(!app_key_exists(&mut db, nspace, "auth_ud")?); in test_unbind_auth_bound_keys_for_user()
5353 nspace: 0, in test_verify_grant_table_size_reporting()
5412 assert_eq!(key.nspace, 1); in test_load_key_descriptor()