/system/security/keystore2/src/ |
D | attestation_key_utils.rs | 18 use crate::database::{BlobMetaData, KeyEntryLoadBits, KeyType}; 44 blob_metadata: BlobMetaData, 100 ) -> Result<(KeyIdGuard, Vec<u8>, Vec<u8>, BlobMetaData)> { in load_attest_key_blob_and_cert() argument
|
D | super_key.rs | 17 database::BlobMetaData, 126 fn from_metadata(metadata: &BlobMetaData) -> Option<Self> { in from_metadata() 136 fn add_to_metadata(&self, metadata: &mut BlobMetaData) { in add_to_metadata() argument 435 metadata: &BlobMetaData, in unwrap_key_if_required() argument 456 fn unwrap_key_with_key(blob: &[u8], metadata: &BlobMetaData, key: &SuperKey) -> Result<ZVec> { in unwrap_key_with_key() argument 663 ) -> Result<(Vec<u8>, BlobMetaData)> { in encrypt_with_password() argument 668 let mut metadata = BlobMetaData::new(); in encrypt_with_password() 688 ) -> Result<(Vec<u8>, BlobMetaData)> { in super_encrypt_on_key_init() argument 710 ) -> Result<(Vec<u8>, BlobMetaData)> { in encrypt_with_aes_super_key() argument 715 let mut metadata = BlobMetaData::new(); in encrypt_with_aes_super_key() [all …]
|
D | gc.rs | 23 database::{BlobMetaData, KeystoreDB, Uuid}, 86 superseded_blobs: Vec<(i64, Vec<u8>, BlobMetaData)>,
|
D | raw_device.rs | 19 BlobMetaData, BlobMetaEntry, CertificateInfo, DateTime, KeyEntry, KeyEntryLoadBits, 119 let mut blob_metadata = BlobMetaData::new(); in create_and_store_key() 272 let mut new_blob_metadata = BlobMetaData::new(); in upgrade_keyblob_if_required_with()
|
D | legacy_migrator.rs | 24 BlobMetaData, BlobMetaEntry, CertificateInfo, DateTime, EncryptedBy, KeyMetaData, 498 let mut blob_metadata = BlobMetaData::new(); in check_and_migrate() 505 BlobValue::Decrypted(data) => (LegacyBlob::ZVec(data), BlobMetaData::new()), in check_and_migrate() 663 let mut blob_metadata = BlobMetaData::new(); in bulk_delete() 683 Some((LegacyBlob::ZVec(data), BlobMetaData::new())) in bulk_delete()
|
D | database.rs | 176 pub struct BlobMetaData; 203 impl BlobMetaData { impl 617 key_blob_info: Option<(Vec<u8>, BlobMetaData)>, 632 pub fn key_blob_info(&self) -> &Option<(Vec<u8>, BlobMetaData)> { in key_blob_info() argument 636 pub fn take_key_blob_info(&mut self) -> Option<(Vec<u8>, BlobMetaData)> { in take_key_blob_info() argument 871 params![KeyLifeCycle::Unreferenced, Tag::MAX_BOOT_LEVEL.0, BlobMetaData::MaxBootLevel], in from_0_to_1() 1132 ) -> Result<Vec<(i64, Vec<u8>, BlobMetaData)>> { in handle_next_superseded_blobs() argument 1183 Ok((blob_id, blob, BlobMetaData::load_from_db(blob_id, tx)?)) in handle_next_superseded_blobs() 1185 .collect::<Result<Vec<(i64, Vec<u8>, BlobMetaData)>>>() in handle_next_superseded_blobs() 1266 blob_metadata: &BlobMetaData, in store_super_key() argument [all …]
|
D | security_level.rs | 35 BlobMetaData, BlobMetaEntry, DateTime, KeyEntry, KeyEntryLoadBits, KeyMetaData, 238 BlobMetaData::new(), in create_operation() 801 blob_metadata: &BlobMetaData, in upgrade_keyblob_if_required_with() argument
|