/system/apex/apexd/ |
D | apex_database_test.cpp | 96 size_t CountPackages(const MountedApexDatabase& db) { in CountPackages() argument 98 db.ForallMountedApexes([&ret](const std::string& a ATTRIBUTE_UNUSED, in CountPackages() 104 bool Contains(const MountedApexDatabase& db, const std::string& package, in Contains() argument 109 db.ForallMountedApexes([&](const std::string& p, const MountedApexData& d, in Contains() 120 bool ContainsPackage(const MountedApexDatabase& db, const std::string& package, in ContainsPackage() argument 125 db.ForallMountedApexes( in ContainsPackage() 143 MountedApexDatabase db; in TEST() local 144 ASSERT_EQ(CountPackages(db), 0u); in TEST() 146 db.AddMountedApex(kPackage, false, kLoopName, kPath, kMountPoint, kDeviceName, in TEST() 148 ASSERT_TRUE(Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName, in TEST() [all …]
|
D | apexd_test.cpp | 1137 auto& db = GetApexDatabaseForTesting(); in TEST_F() local 1139 db.ForallMountedApexes( in TEST_F() 1178 auto& db = GetApexDatabaseForTesting(); in TEST_F() local 1180 db.ForallMountedApexes( in TEST_F() 1265 auto& db = GetApexDatabaseForTesting(); in TEST_F() local 1267 db.ForallMountedApexes( in TEST_F() 1318 auto& db = GetApexDatabaseForTesting(); in TEST_F() local 1320 db.ForallMountedApexes( in TEST_F() 1366 auto& db = GetApexDatabaseForTesting(); in TEST_F() local 1368 db.ForallMountedApexes( in TEST_F() [all …]
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 47 let mut db = Self { in new() localVariable 51 db.init_tables().context("Trying to initialize legacy keystore db.")?; in new() 52 Ok(db) in new() 319 let mut db = self.open_db().context("In get.")?; in get() localVariable 322 if let Some(entry) = db.get(uid, alias).context("In get: Trying to load entry from DB.")? { in get() 328 db.get(uid, alias).context("In get: Trying to load entry from DB.")? in get() 338 let mut db = self.open_db().context("In put.")?; in put() localVariable 339 db.put(uid, alias, entry).context("In put: Trying to insert entry into DB.")?; in put() 347 let mut db = self.open_db().context("In remove.")?; in remove() localVariable 353 db.remove(uid, alias).context("In remove: Trying to remove entry from DB.")?; in remove() [all …]
|
/system/sepolicy/tests/ |
D | sepol_wrap.cpp | 35 policydb_t *db = static_cast<policydb_t *>(policydbp); in init_genfs_iter() local 37 out->genfs = db->genfs; in init_genfs_iter() 38 out->ocon = db->genfs->head; in init_genfs_iter() 54 policydb_t *db = static_cast<policydb_t *>(policydbp); in get_genfs() local 59 db->p_user_val_to_name[i->ocon->context->user-1], in get_genfs() 60 db->p_role_val_to_name[i->ocon->context->role-1], in get_genfs() 61 db->p_type_val_to_name[i->ocon->context->type-1]); in get_genfs() 100 policydb_t *db = static_cast<policydb_t *>(policydbp); in init_type_iter() local 110 out->length = db->p_types.nprim; in init_type_iter() 118 out->d = static_cast<type_datum *>(hashtab_search(db->p_types.table, type)); in init_type_iter() [all …]
|
/system/security/keystore2/src/ |
D | database.rs | 878 let mut db = Self { conn, gc, perboot: perboot::PERBOOT_DB.clone() }; in new() localVariable 879 db.with_transaction(TransactionBehavior::Immediate, |tx| { in new() 884 Ok(db) in new() 3298 let mut db = KeystoreDB { conn, gc: None, perboot: Arc::new(perboot::PerbootDB::new()) }; in new_test_db() localVariable 3299 db.with_transaction(TransactionBehavior::Immediate, |tx| { in new_test_db() 3302 Ok(db) in new_test_db() 3318 db: &mut KeystoreDB, in rebind_alias() 3324 db.with_transaction(TransactionBehavior::Immediate, |tx| { in rebind_alias() 3371 let db = new_test_db()?; in test_tables() localVariable 3372 let tables = db in test_tables() [all …]
|
D | maintenance.rs | 80 DB.with(|db| { in on_user_password_changed() 81 skm.unlock_screen_lock_bound_key(&mut db.borrow_mut(), user_id as u32, pw) in on_user_password_changed() 87 .with(|db| { in on_user_password_changed() 89 &mut db.borrow_mut(), in on_user_password_changed() 113 DB.with(|db| { in add_or_remove_user() 115 &mut db.borrow_mut(), in add_or_remove_user() 134 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace() 146 .with(|db| { in get_state() 148 &mut db.borrow_mut(), in get_state() 209 DB.with(|db| SuperKeyManager::set_up_boot_level_cache(&SUPER_KEY, &mut db.borrow_mut())) in early_boot_ended() [all …]
|
D | service.rs | 133 .with(|db| { in get_key_entry() 135 db.borrow_mut().load_key_entry( in get_key_entry() 187 DB.with::<_, Result<()>>(|db| { in update_subcomponent() 189 db.borrow_mut().load_key_entry( in update_subcomponent() 205 let mut db = db.borrow_mut(); in update_subcomponent() localVariable 207 db.set_blob(&key_id_guard, SubComponentType::CERT, public_cert, None) in update_subcomponent() 210 db.set_blob(&key_id_guard, SubComponentType::CERT_CHAIN, certificate_chain, None) in update_subcomponent() 242 db.store_new_certificate( in update_subcomponent() 297 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, None)) in list_entries() 303 DB.with(|db| count_key_entries(&mut db.borrow_mut(), k.domain, k.nspace)) in count_num_entries() [all …]
|
D | raw_device.rs | 108 db: &mut KeystoreDB, in create_and_store_key() 127 db.store_new_key( in create_and_store_key() 152 db: &mut KeystoreDB, in lookup_from_desc() 156 db.load_key_entry(key_desc, key_type, KeyEntryLoadBits::KM, AID_KEYSTORE, |_, _| Ok(())) in lookup_from_desc() 177 db: &mut KeystoreDB, in lookup_or_generate_key() 191 let lookup = Self::not_found_is_none(Self::lookup_from_desc(db, key_desc, key_type)) in lookup_or_generate_key() 209 db, in lookup_or_generate_key() 236 self.create_and_store_key(db, key_desc, key_type, |km_dev| { in lookup_or_generate_key() 240 Self::lookup_from_desc(db, key_desc, key_type) in lookup_or_generate_key() 258 db: &mut KeystoreDB, in upgrade_keyblob_if_required_with() [all …]
|
D | key_parameter.rs | 1225 let db = init_db()?; in test_new_from_sql_enum_i32() localVariable 1227 &db, in test_new_from_sql_enum_i32() 1233 let key_param = query_from_keyparameter(&db)?; in test_new_from_sql_enum_i32() 1244 let db = init_db()?; in test_new_from_sql_i32() localVariable 1245 insert_into_keyparameter(&db, 1, Tag::KEY_SIZE.0, &1024, SecurityLevel::STRONGBOX.0)?; in test_new_from_sql_i32() 1246 let key_param = query_from_keyparameter(&db)?; in test_new_from_sql_i32() 1256 let db = init_db()?; in test_new_from_sql_i64() localVariable 1259 &db, in test_new_from_sql_i64() 1265 let key_param = query_from_keyparameter(&db)?; in test_new_from_sql_i64() 1278 let db = init_db()?; in test_new_from_sql_bool() localVariable [all …]
|
D | super_key.rs | 193 db: &mut KeystoreDB, in decrypt() 216 db, in decrypt() 283 pub fn set_up_boot_level_cache(skm: &Arc<RwLock<Self>>, db: &mut KeystoreDB) -> Result<()> { in set_up_boot_level_cache() 290 get_level_zero_key(db).context(ks_err!("get_level_zero_key failed"))?; in set_up_boot_level_cache() 409 db: &mut KeystoreDB, in unlock_user_key() 414 let (_, entry) = db in unlock_user_key() 514 db: &mut KeystoreDB, in super_key_exists_in_db_for_user() 518 let key_in_db = db in super_key_exists_in_db_for_user() 534 db: &mut KeystoreDB, in check_and_unlock_super_key() 541 .with_try_import_super_key(user_id, pw, || db.load_super_key(alias, user_id)) in check_and_unlock_super_key() [all …]
|
D | attestation_key_utils.rs | 59 db: &mut KeystoreDB, in get_attest_key_info() 75 Some(attest_key) => get_user_generated_attestation_key(attest_key, caller_uid, db) in get_attest_key_info() 84 db: &mut KeystoreDB, in get_user_generated_attestation_key() 87 load_attest_key_blob_and_cert(key, caller_uid, db) in get_user_generated_attestation_key() 99 db: &mut KeystoreDB, in load_attest_key_blob_and_cert() 105 let (key_id_guard, mut key_entry) = db in load_attest_key_blob_and_cert()
|
D | authorization.rs | 160 DB.with(|db| { in on_lock_screen_event() 162 &mut db.borrow_mut(), in on_lock_screen_event() 171 .with(|db| { in on_lock_screen_event() 173 &mut db.borrow_mut(), in on_lock_screen_event() 192 DB.with(|db| { in on_lock_screen_event() 193 skm.try_unlock_user_with_biometric(&mut db.borrow_mut(), user_id as u32) in on_lock_screen_event() 202 DB.with(|db| { in on_lock_screen_event() 204 &mut db.borrow_mut(), in on_lock_screen_event()
|
D | metrics_store.rs | 534 DB.with(|db| { in pull_storage_stats() 535 let mut db = db.borrow_mut(); in pull_storage_stats() localVariable 536 append(db.get_storage_stat(MetricsStorage::DATABASE)); in pull_storage_stats() 537 append(db.get_storage_stat(MetricsStorage::KEY_ENTRY)); in pull_storage_stats() 538 append(db.get_storage_stat(MetricsStorage::KEY_ENTRY_ID_INDEX)); in pull_storage_stats() 539 append(db.get_storage_stat(MetricsStorage::KEY_ENTRY_DOMAIN_NAMESPACE_INDEX)); in pull_storage_stats() 540 append(db.get_storage_stat(MetricsStorage::BLOB_ENTRY)); in pull_storage_stats() 541 append(db.get_storage_stat(MetricsStorage::BLOB_ENTRY_KEY_ENTRY_ID_INDEX)); in pull_storage_stats() 542 append(db.get_storage_stat(MetricsStorage::KEY_PARAMETER)); in pull_storage_stats() 543 append(db.get_storage_stat(MetricsStorage::KEY_PARAMETER_KEY_ENTRY_ID_INDEX)); in pull_storage_stats() [all …]
|
D | gc.rs | 60 let (invalidate_key, db, super_key) = init(); in new_init_with() 66 db, in new_init_with() 89 db: KeystoreDB, field 105 .db in process_one_key()
|
/system/ca-certificates/files/ |
D | f013ecaf.0 | 49 f6:8c:7f:fb:e8:db:bc:6a:2e:97:97:a3:8c:4b:f9: 52 b1:9c:63:db:d7:99:7e:f0:0a:5e:eb:68:a6:f4:c6: 92 9f:aa:42:26:db:0b:9b:be:ff:1e:96:92:2e:3e:a2:65:4a:6a: 97 35:24:ce:9b:3e:1a:54:1e:6e:db:b2:87:a7:fc:f3:fa:81:55: 98 14:62:0a:59:a9:22:05:31:3e:82:d6:ee:db:57:34:bc:33:95: 103 07:c8:3f:1c:fc:f0:db:45:30:df:62:88:c1:b5:0f:9d:c3:9f: 107 4c:f4:b6:ff:db:6a:5f:31:6b:99:9e:2c:c1:6b:50:a4:d7:e6: 116 fd:31:c8:16:66:da:d2:0c:3c:db:b3:8e:c9:a1:0d:80:0f:7b: 117 16:77:14:bf:ff:db:09:94:b2:93:bc:20:58:15:e9:db:71:43: 118 f3:de:10:c3:00:dc:a8:2a:95:b6:c2:d6:3f:90:6b:76:db:6c:
|
D | d41b5e2a.0 | 30 7b:46:4b:63:b0:62:f6:2d:1b:db:08:71:21:d2:00: 32 aa:a3:5b:20:98:45:5d:16:db:fd:e8:10:6d:e3:9c: 34 ba:88:a1:2a:a0:75:f8:81:ae:62:06:c4:81:db:39: 51 a7:88:9c:8a:e4:4c:4a:db:96:d4:ac:8b:6b:6b:49:12:53:33:
|
D | 81b9768f.0 | 42 a4:a9:41:59:3a:d3:dc:94:d6:3c:db:74:38:a4:4a: 45 f8:c5:ec:db:38:92:e3:06:e5:08:91:0c:c4:28:41: 51 68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55:db:5e: 69 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db:21:47: 72 b3:78:ce:db:e3:53:79:71:d6:e5:21:94:01:da:55:87:9a:24: 79 d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4:ba:70:26:5d:90:60:
|
D | 3c860d51.0 | 56 84:db:52:2c:f3:0e:27:77:0b:6b:bf:11:2f:72:78: 61 33:51:de:be:8d:ba:84:7a:60:3c:6a:db:9f:2b:ec: 65 13:db:c9:db:79:36:7b:85:3a:4a:c5:52:89:f9:24: 69 89:92:f1:9d:26:8f:a1:07:d4:c6:b2:78:50:db:0c: 108 db:5f:26:6b:52:d9:2e:8a:f1:14:c6:44:8d:15:a9:b7:bf:bd: 117 cb:ce:9a:db:6a:b4:a6:b2:db:41:08:86:27:77:f7:6a:a0:42: 126 e9:b8:c9:66:f4:db:26:f3:3a:a4:74:f2:49:24:5b:c9:b0:d0:
|
D | bf64f35b.0 | 45 4e:c6:d1:c0:95:88:b0:c9:ff:31:8b:33:03:db:b7: 47 71:37:c5:cb:47:0e:97:2a:68:c0:22:95:62:15:db: 48 47:d9:f5:d0:2b:ff:82:4b:c9:ad:3e:de:4c:db:90: 54 13:31:19:e8:4e:4d:9f:db:ac:b3:6a:d5:bc:39:54: 77 19:ca:7b:72:4e:d4:b1:db:d0:96:fb:54:5a:19:2c:0c:08:f7: 78 b2:bc:85:a8:9d:7f:6d:3b:52:b3:2a:db:e7:d4:84:8c:63:f6:
|
/system/ca-certificates/google/files/ |
D | facacbc6.0 | 48 8f:7e:07:57:ec:ef:43:db:66:62:15:61:cf:60:0d: 52 7b:c7:70:f6:b3:dc:12:74:db:7b:5d:4b:56:d3:96: 77 d8:e6:06:91:40:18:b9:f8:c1:ed:df:db:41:aa:e0:96:20:c9: 78 cd:64:15:38:81:c9:94:ee:a2:84:29:0b:13:6f:8e:db:0c:dd: 79 25:02:db:a4:8b:19:44:d2:41:7a:05:69:4a:58:4f:60:ca:7e: 80 82:6a:0b:02:aa:25:17:39:b5:db:7f:e7:84:65:2a:95:8a:bd: 83 32:db:ce:9d:51:5e:28:b6:9e:85:d3:5b:ef:a5:7d:45:40:72:
|
D | 81b9768f.0 | 42 a4:a9:41:59:3a:d3:dc:94:d6:3c:db:74:38:a4:4a: 45 f8:c5:ec:db:38:92:e3:06:e5:08:91:0c:c4:28:41: 51 68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55:db:5e: 69 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db:21:47: 72 b3:78:ce:db:e3:53:79:71:d6:e5:21:94:01:da:55:87:9a:24: 79 d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4:ba:70:26:5d:90:60:
|
D | 3e7271e8.0 | 43 78:40:c0:73:42:c8:68:c0:db:53:2b:dd:5e:b8:76: 53 fd:b2:64:4c:0e:e4:98:07:75:db:7f:df:b9:08:55: 74 ed:6d:e5:2a:db:ed:14:a9:2b:c6:36:11:d0:2b:eb:07:8b:a5: 79 7f:7b:ff:af:1c:cf:e6:db:07:ad:5e:db:85:9d:d0:2b:0d:33: 80 db:04:d1:e6:49:40:13:2b:76:fb:3e:e9:9c:89:0f:15:ce:18:
|
D | bf64f35b.0 | 45 4e:c6:d1:c0:95:88:b0:c9:ff:31:8b:33:03:db:b7: 47 71:37:c5:cb:47:0e:97:2a:68:c0:22:95:62:15:db: 48 47:d9:f5:d0:2b:ff:82:4b:c9:ad:3e:de:4c:db:90: 54 13:31:19:e8:4e:4d:9f:db:ac:b3:6a:d5:bc:39:54: 77 19:ca:7b:72:4e:d4:b1:db:d0:96:fb:54:5a:19:2c:0c:08:f7: 78 b2:bc:85:a8:9d:7f:6d:3b:52:b3:2a:db:e7:d4:84:8c:63:f6:
|
D | 86212b19.0 | 51 f6:f4:92:81:36:fd:db:34:f1:72:7e:f3:0c:16:bd: 63 4d:a7:a4:df:ec:be:a7:be:f8:43:db:91:37:ce:b4:32:2e:50: 66 1b:05:65:5a:62:92:9c:ee:41:8d:31:db:e7:34:ea:59:21:d5: 73 2c:5d:6c:19:3a:66:b5:7d:fd:91:6f:82:b1:be:08:93:db:14: 76 a6:ad:bf:db
|
/system/sepolicy/tools/ |
D | version_policy.c | 29 static int read_cil_file(struct cil_db **db, char *path) { in read_cil_file() argument 36 cil_db_init(db); in read_cil_file() 64 rc = cil_add_file(*db, path, buff, file_size); in read_cil_file() 77 cil_db_destroy(db); in read_cil_file()
|