/system/security/keystore2/src/ |
D | maintenance.rs | 22 use crate::globals::{DB, LEGACY_IMPORTER, SUPER_KEY}; 80 DB.with(|db| { in on_user_password_changed() 86 if let UserState::BeforeFirstUnlock = DB in on_user_password_changed() 94 DB.with(|db| match password { in on_user_password_changed() 111 DB.with(|db| { in add_or_remove_user() 134 DB.with(|db| { in init_user_super_keys() 155 DB.with(|db| db.borrow_mut().unbind_auth_bound_keys_for_user(user_id as u32)) in on_user_lskf_removed() 166 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace() 220 DB.with(|db| SuperKeyManager::set_up_boot_level_cache(&SUPER_KEY, &mut db.borrow_mut())) in early_boot_ended() 250 DB.with(|db| { in migrate_key_namespace() [all …]
|
D | service.rs | 30 globals::{create_thread_local_db, DB, LEGACY_BLOB_LOADER, LEGACY_IMPORTER, SUPER_KEY}, 134 let (key_id_guard, mut key_entry) = DB in get_key_entry() 191 DB.with::<_, Result<()>>(|db| { in update_subcomponent() 301 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, None)) in list_entries() 307 DB.with(|db| count_key_entries(&mut db.borrow_mut(), k.domain, k.nspace)) in count_num_entries() 317 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, start_past_alias)) in list_entries_batched() 327 DB.with(|db| { in delete_key() 351 DB.with(|db| { in grant() 366 DB.with(|db| { in ungrant()
|
D | authorization.rs | 19 use crate::globals::{DB, ENFORCEMENTS, LEGACY_IMPORTER, SUPER_KEY}; 139 DB.with(|db| { in on_device_unlocked() 144 DB.with(|db| skm.try_unlock_user_with_biometric(&mut db.borrow_mut(), user_id as u32)) in on_device_unlocked() 168 DB.with(|db| { in on_device_locked()
|
D | security_level.rs | 26 get_remotely_provisioned_component_name, DB, ENFORCEMENTS, LEGACY_IMPORTER, SUPER_KEY, 167 _ => DB in store_new_key() 258 let (key_id_guard, mut key_entry) = DB in create_operation() 349 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation() 541 _ => DB in generate_key() 740 let (wrapping_key_id_guard, mut wrapping_key_entry) = DB in import_wrapped_key() 829 DB.with(|db| { in store_upgraded_keyblob()
|
D | enforcements.rs | 19 use crate::globals::{get_timestamp_service, ASYNC_TASK, DB, ENFORCEMENTS}; 323 DB.with(|db| { in after_finish() 725 DB.with(|db| db.borrow().find_auth_token_entry(p)) in find_auth_token() 770 DB.with(|db| db.borrow_mut().insert_auth_token(&hat)); in add_auth_token()
|
D | metrics_store.rs | 21 use crate::globals::DB; 535 DB.with(|db| { in pull_storage_stats()
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 39 struct DB { struct 43 impl DB { impl 291 fn open_db(&self) -> Result<DB> { in open_db() argument 292 DB::new(&self.db_path).context("In open_db: Failed to open db.") in open_db() 438 let mut db = DB::new(&state.db_path).context("In open_db: Failed to open db.")?; in get_legacy() 499 db: &mut DB, in import_one_legacy_entry() argument 570 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_entry_db() 613 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_uid() 631 let mut db = DB::new(&test_dir.build().push(LegacyKeystore::LEGACY_KEYSTORE_FILE_NAME)) in test_delete_user() 667 let mut db = DB::new(&db_path).expect("Failed to open database."); in concurrent_legacy_keystore_entry_test() [all …]
|
/system/ca-certificates/files/ |
D | ee532fd5.0 | 39 98:39:CD:BE:D8:B2:8C:F7:B2:AB:E1:AD:24:AF:7B:7C:A1:DB:1F:CF 51 SHA1 Fingerprint=F6:9C:DB:B0:FC:F6:02:13:B6:52:32:A6:A3:91:3F:16:70:DA:C3:E1
|
D | b872f2b4.0 | 57 A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21 61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
D | 7a7c655d.0 | 39 AB:B6:DB:D7:06:9E:37:AC:30:86:07:91:70:C7:9C:C4:19:B1:78:C0
|
D | 8794b4e3.0 | 51 SHA1 Fingerprint=BD:B1:B9:3C:D5:97:8D:45:C6:26:14:55:F8:DB:95:C7:5A:D1:53:AF
|
D | e7c037b4.0 | 50 SHA1 Fingerprint=39:B4:6C:D5:FE:80:06:EB:E2:2F:4A:BB:08:33:A0:AF:DB:B9:DD:84
|
D | ed39abd0.0 | 44 B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
|
D | a716d4ed.0 | 63 SHA1 Fingerprint=61:DB:8C:21:59:69:03:90:D8:7C:9C:12:86:54:CF:9D:3D:F4:DD:07
|
D | 583d0756.0 | 89 keyid:F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E 92 F9:60:BB:D4:E3:D5:34:F6:B8:F5:06:80:25:A7:73:DB:46:69:A8:9E
|
D | 98aaf404.0 | 89 keyid:40:E4:E4:F2:23:EF:38:CA:B0:AE:57:7F:F2:21:30:16:34:DB:BC:92 92 40:E4:E4:F2:23:EF:38:CA:B0:AE:57:7F:F2:21:30:16:34:DB:BC:92
|
D | c559d742.0 | 89 BB:FF:CA:8E:23:9F:4F:99:CA:DB:E2:68:A6:A5:15:27:17:1E:D9:0E 120 SHA1 Fingerprint=9A:44:49:76:32:DB:DE:FA:D0:BC:FB:5A:7B:17:BD:9E:56:09:24:94
|
D | 9339512a.0 | 101 F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0 103 keyid:F2:C0:13:E0:82:43:3E:FB:EE:2F:67:32:96:35:5C:DB:B8:CB:02:D0
|
D | bdacca6f.0 | 65 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4
|
D | 3ad48a91.0 | 78 SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
|
D | 882de061.0 | 60 E0:8C:9B:DB:25:49:B3:F1:7C:86:D6:B2:42:87:0B:D0:6B:A0:D9:E4
|
D | 81b9768f.0 | 84 SHA1 Fingerprint=5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25
|
D | 8d6437c3.0 | 63 CE:C3:4A:B9:99:55:F2:B8:DB:60:BF:A9:7E:BD:56:B5:97:36:A7:D6
|
D | a81e292b.0 | 79 SHA1 Fingerprint=E2:52:FA:95:3F:ED:DB:24:60:BD:6E:28:F3:9C:CC:CF:5E:B3:3F:DE
|
D | 4be590e0.0 | 89 E3:71:E0:9E:D8:A7:42:D9:DB:71:91:6B:94:93:EB:C3:A3:D1:14:A3
|