Home
last modified time | relevance | path

Searched refs:DB (Results 1 – 25 of 29) sorted by relevance

12

/system/security/keystore2/src/
Dmaintenance.rs22 use crate::globals::{DB, LEGACY_IMPORTER, SUPER_KEY};
80 DB.with(|db| { in on_user_password_changed()
86 if let UserState::BeforeFirstUnlock = DB in on_user_password_changed()
94 DB.with(|db| match password { in on_user_password_changed()
111 DB.with(|db| { in add_or_remove_user()
134 DB.with(|db| { in init_user_super_keys()
155 DB.with(|db| db.borrow_mut().unbind_auth_bound_keys_for_user(user_id as u32)) in on_user_lskf_removed()
166 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace()
220 DB.with(|db| SuperKeyManager::set_up_boot_level_cache(&SUPER_KEY, &mut db.borrow_mut())) in early_boot_ended()
250 DB.with(|db| { in migrate_key_namespace()
[all …]
Dservice.rs30 globals::{create_thread_local_db, DB, LEGACY_BLOB_LOADER, LEGACY_IMPORTER, SUPER_KEY},
134 let (key_id_guard, mut key_entry) = DB in get_key_entry()
191 DB.with::<_, Result<()>>(|db| { in update_subcomponent()
301 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, None)) in list_entries()
307 DB.with(|db| count_key_entries(&mut db.borrow_mut(), k.domain, k.nspace)) in count_num_entries()
317 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, start_past_alias)) in list_entries_batched()
327 DB.with(|db| { in delete_key()
351 DB.with(|db| { in grant()
366 DB.with(|db| { in ungrant()
Dauthorization.rs19 use crate::globals::{DB, ENFORCEMENTS, LEGACY_IMPORTER, SUPER_KEY};
139 DB.with(|db| { in on_device_unlocked()
144 DB.with(|db| skm.try_unlock_user_with_biometric(&mut db.borrow_mut(), user_id as u32)) in on_device_unlocked()
168 DB.with(|db| { in on_device_locked()
Dsecurity_level.rs26 get_remotely_provisioned_component_name, DB, ENFORCEMENTS, LEGACY_IMPORTER, SUPER_KEY,
167 _ => DB in store_new_key()
258 let (key_id_guard, mut key_entry) = DB in create_operation()
349 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation()
541 _ => DB in generate_key()
740 let (wrapping_key_id_guard, mut wrapping_key_entry) = DB in import_wrapped_key()
829 DB.with(|db| { in store_upgraded_keyblob()
Denforcements.rs19 use crate::globals::{get_timestamp_service, ASYNC_TASK, DB, ENFORCEMENTS};
323 DB.with(|db| { in after_finish()
725 DB.with(|db| db.borrow().find_auth_token_entry(p)) in find_auth_token()
770 DB.with(|db| db.borrow_mut().insert_auth_token(&hat)); in add_auth_token()
Dmetrics_store.rs21 use crate::globals::DB;
535 DB.with(|db| { in pull_storage_stats()
/system/security/keystore2/legacykeystore/
Dlib.rs39 struct DB { struct
43 impl DB { impl
291 fn open_db(&self) -> Result<DB> { in open_db() argument
292 DB::new(&self.db_path).context("In open_db: Failed to open db.") in open_db()
438 let mut db = DB::new(&state.db_path).context("In open_db: Failed to open db.")?; in get_legacy()
499 db: &mut DB, in import_one_legacy_entry() argument
570 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_entry_db()
613 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_uid()
631 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_user()
667 let mut db = DB::new(&db_path).expect("Failed to open database."); in concurrent_legacy_keystore_entry_test()
[all …]
/system/ca-certificates/files/
Dee532fd5.039 98:39:CD:BE:D8:B2:8C:F7:B2:AB:E1:AD:24:AF:7B:7C:A1:DB:1F:CF
51 SHA1 Fingerprint=F6:9C:DB:B0:FC:F6:02:13:B6:52:32:A6:A3:91:3F:16:70:DA:C3:E1
Db872f2b4.057 A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
D7a7c655d.039 AB:B6:DB:D7:06:9E:37:AC:30:86:07:91:70:C7:9C:C4:19:B1:78:C0
D8794b4e3.051 SHA1 Fingerprint=BD:B1:B9:3C:D5:97:8D:45:C6:26:14:55:F8:DB:95:C7:5A:D1:53:AF
De7c037b4.050 SHA1 Fingerprint=39:B4:6C:D5:FE:80:06:EB:E2:2F:4A:BB:08:33:A0:AF:DB:B9:DD:84
Ded39abd0.044 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
Da716d4ed.063 SHA1 Fingerprint=61:DB:8C:21:59:69:03:90:D8:7C:9C:12:86:54:CF:9D:3D:F4:DD:07
D583d0756.089 keyid:F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
92 F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
D98aaf404.089 keyid:40:E4:E4:F2:23:EF:38:CA:B0:AE:57:7F:F2:21:30:16:34:DB:BC:92
92 40:E4:E4:F2:23:EF:38:CA:B0:AE:57:7F:F2:21:30:16:34:DB:BC:92
Dc559d742.089 BB:FF:CA:8E:23:9F:4F:99:CA:DB:E2:68:A6:A5:15:27:17:1E:D9:0E
120 SHA1 Fingerprint=9A:44:49:76:32:DB:DE:FA:D0:BC:FB:5A:7B:17:BD:9E:56:09:24:94
D9339512a.0101 F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
103 keyid:F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
Dbdacca6f.065 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4
D3ad48a91.078 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
D882de061.060 E0:8C:9B:DB:25:49:B3:F1:7C:86:D6:B2:42:87:0B:D0:6B:A0:D9:E4
D81b9768f.084 SHA1 Fingerprint=5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25
D8d6437c3.063 CE:C3:4A:B9:99:55:F2:B8:DB:60:BF:A9:7E:BD:56:B5:97:36:A7:D6
Da81e292b.079 SHA1 Fingerprint=E2:52:FA:95:3F:ED:DB:24:60:BD:6E:28:F3:9C:CC:CF:5E:B3:3F:DE
D4be590e0.089 E3:71:E0:9E:D8:A7:42:D9:DB:71:91:6B:94:93:EB:C3:A3:D1:14:A3

12