/system/security/keystore2/src/ |
D | attestation_key_utils.rs | 19 use crate::database::{KeyIdGuard, KeystoreDB}; 58 db: &mut KeystoreDB, in get_attest_key_info() argument 83 db: &mut KeystoreDB, in get_user_generated_attestation_key() argument 99 db: &mut KeystoreDB, in load_attest_key_blob_and_cert() argument
|
D | gc.rs | 23 database::{BlobMetaData, KeystoreDB, Uuid}, 49 KeystoreDB, in new_init_with() argument 88 db: KeystoreDB,
|
D | raw_device.rs | 20 KeyIdGuard, KeyMetaData, KeyMetaEntry, KeyType, KeystoreDB, SubComponentType, Uuid, 102 db: &mut KeystoreDB, in create_and_store_key() argument 147 db: &mut KeystoreDB, in lookup_from_desc() argument 172 db: &mut KeystoreDB, in lookup_or_generate_key() argument 253 db: &mut KeystoreDB, in upgrade_keyblob_if_required_with() argument 305 db: &mut KeystoreDB, in use_key_in_one_step() argument
|
D | super_key.rs | 22 database::{KeyEntryLoadBits, KeyIdGuard, KeyMetaData, KeyMetaEntry, KeystoreDB}, 191 db: &mut KeystoreDB, in decrypt() argument 284 pub fn set_up_boot_level_cache(self: &Arc<Self>, db: &mut KeystoreDB) -> Result<()> { in set_up_boot_level_cache() 392 db: &mut KeystoreDB, in unlock_user_key() argument 499 db: &mut KeystoreDB, in super_key_exists_in_db_for_user() argument 521 db: &mut KeystoreDB, in check_and_unlock_super_key() argument 550 db: &mut KeystoreDB, in check_and_initialize_super_key() argument 684 db: &mut KeystoreDB, in super_encrypt_on_key_init() argument 729 db: &mut KeystoreDB, in handle_super_encryption_on_key_init() argument 818 db: &mut KeystoreDB, in get_or_create_super_key() argument [all …]
|
D | globals.rs | 27 database::KeystoreDB, 56 pub fn create_thread_local_db() -> KeystoreDB { in create_thread_local_db() 59 let mut db = KeystoreDB::new(&db_path, Some(GC.clone())).expect("Failed to open database."); in create_thread_local_db() 84 pub static DB: RefCell<KeystoreDB> = 175 KeystoreDB::new(&DB_PATH.read().expect("Could not get the database directory."), None)
|
D | remote_provisioning.rs | 43 use crate::database::{CertificateChain, KeystoreDB, Uuid}; 69 fn check_rem_prov_enabled(&self, db: &mut KeystoreDB) -> Result<bool> { in check_rem_prov_enabled() 94 db: &mut KeystoreDB, in get_rem_prov_attest_key() argument 132 db: &mut KeystoreDB, in get_rem_prov_attest_key_helper() argument 176 db: &mut KeystoreDB, in get_remotely_provisioned_attestation_key_and_certs() argument
|
D | boot_level_keys.rs | 18 database::{KeyType, KeystoreDB}, 51 pub fn get_level_zero_key(db: &mut KeystoreDB) -> Result<ZVec> { in get_level_zero_key()
|
D | legacy_migrator.rs | 25 KeyMetaEntry, KeystoreDB, Uuid, KEYSTORE_UUID, 47 dyn FnOnce() -> (KeystoreDB, HashMap<SecurityLevel, Uuid>, Arc<LegacyBlobLoader>) 82 db: KeystoreDB, 109 F: FnOnce() -> (KeystoreDB, HashMap<SecurityLevel, Uuid>, Arc<LegacyBlobLoader>) in set_init() argument
|
D | database.rs | 736 pub struct KeystoreDB { struct 829 impl KeystoreDB { impl 3243 fn new_test_db() -> Result<KeystoreDB> { in new_test_db() 3244 let conn = KeystoreDB::make_connection("file::memory:")?; in new_test_db() 3246 let mut db = KeystoreDB { conn, gc: None, perboot: Arc::new(perboot::PerbootDB::new()) }; in new_test_db() 3248 KeystoreDB::init_tables(tx).context("Failed to initialize tables.").no_gc() in new_test_db() 3253 fn new_test_db_with_gc<F>(path: &Path, cb: F) -> Result<KeystoreDB> in new_test_db_with_gc() 3259 let gc_db = KeystoreDB::new(path, None).expect("Failed to open test gc db_connection."); in new_test_db_with_gc() 3262 KeystoreDB::new(path, Some(Arc::new(gc))) in new_test_db_with_gc() 3266 db: &mut KeystoreDB, in rebind_alias() argument [all …]
|
D | legacy_blob.rs | 1278 let _db = crate::database::KeystoreDB::new(temp_dir.path(), None) in test_is_empty() 1344 let mut db = crate::database::KeystoreDB::new(temp_dir.path(), None)?; in test_legacy_blobs()
|