/aosp12/system/security/keystore2/src/ |
H A D | attestation_key_utils.rs | 19 use crate::database::{KeyIdGuard, KeystoreDB}; 58 db: &mut KeystoreDB, in get_attest_key_info() argument 83 db: &mut KeystoreDB, in get_user_generated_attestation_key() argument 99 db: &mut KeystoreDB, in load_attest_key_blob_and_cert() argument
|
H A D | raw_device.rs | 20 KeyIdGuard, KeyMetaData, KeyMetaEntry, KeyType, KeystoreDB, SubComponentType, Uuid, 102 db: &mut KeystoreDB, in create_and_store_key() argument 147 db: &mut KeystoreDB, in lookup_from_desc() argument 172 db: &mut KeystoreDB, in lookup_or_generate_key() argument 253 db: &mut KeystoreDB, in upgrade_keyblob_if_required_with() argument 305 db: &mut KeystoreDB, in use_key_in_one_step() argument
|
H A D | super_key.rs | 191 db: &mut KeystoreDB, in decrypt() argument 392 db: &mut KeystoreDB, in unlock_user_key() argument 499 db: &mut KeystoreDB, in super_key_exists_in_db_for_user() argument 521 db: &mut KeystoreDB, in check_and_unlock_super_key() argument 550 db: &mut KeystoreDB, in check_and_initialize_super_key() argument 684 db: &mut KeystoreDB, in super_encrypt_on_key_init() argument 729 db: &mut KeystoreDB, in handle_super_encryption_on_key_init() argument 818 db: &mut KeystoreDB, in get_or_create_super_key() argument 882 db: &mut KeystoreDB, in unlock_screen_lock_bound_key() argument 920 db: &mut KeystoreDB, in lock_screen_lock_bound_key() argument [all …]
|
H A D | gc.rs | 23 database::{BlobMetaData, KeystoreDB, Uuid}, 49 KeystoreDB, in new_init_with() argument 88 db: KeystoreDB,
|
H A D | globals.rs | 27 database::KeystoreDB, 56 pub fn create_thread_local_db() -> KeystoreDB { in create_thread_local_db() 59 let mut db = KeystoreDB::new(&db_path, Some(GC.clone())).expect("Failed to open database."); in create_thread_local_db() 84 pub static DB: RefCell<KeystoreDB> = 175 KeystoreDB::new(&DB_PATH.read().expect("Could not get the database directory."), None)
|
H A D | remote_provisioning.rs | 43 use crate::database::{CertificateChain, KeystoreDB, Uuid}; 69 fn check_rem_prov_enabled(&self, db: &mut KeystoreDB) -> Result<bool> { in check_rem_prov_enabled() 94 db: &mut KeystoreDB, in get_rem_prov_attest_key() argument 132 db: &mut KeystoreDB, in get_rem_prov_attest_key_helper() argument 176 db: &mut KeystoreDB, in get_remotely_provisioned_attestation_key_and_certs() argument
|
H A D | database.rs | 736 pub struct KeystoreDB { struct 829 impl KeystoreDB { implementation 3241 fn new_test_db() -> Result<KeystoreDB> { in new_test_db() 3260 KeystoreDB::new(path, Some(Arc::new(gc))) in new_test_db_with_gc() 3264 db: &mut KeystoreDB, in rebind_alias() argument 3399 let db = KeystoreDB::new(temp_dir.path(), None)?; in test_persistence_for_files() 4555 KeystoreDB::from_0_to_1(tx).no_gc() in test_upgrade_0_to_1() 4988 db: &mut KeystoreDB, in load_attestation_key_pool() argument 5240 db: &mut KeystoreDB, in make_test_key_entry() argument 5299 db: &mut KeystoreDB, in make_bootlevel_key_entry() argument [all …]
|
H A D | legacy_migrator.rs | 25 KeyMetaEntry, KeystoreDB, Uuid, KEYSTORE_UUID, 47 dyn FnOnce() -> (KeystoreDB, HashMap<SecurityLevel, Uuid>, Arc<LegacyBlobLoader>) 82 db: KeystoreDB, 109 F: FnOnce() -> (KeystoreDB, HashMap<SecurityLevel, Uuid>, Arc<LegacyBlobLoader>) in set_init() argument
|
H A D | boot_level_keys.rs | 18 database::{KeyType, KeystoreDB}, 51 pub fn get_level_zero_key(db: &mut KeystoreDB) -> Result<ZVec> { in get_level_zero_key()
|
H A D | legacy_blob.rs | 1278 let _db = crate::database::KeystoreDB::new(temp_dir.path(), None) in test_is_empty() 1344 let mut db = crate::database::KeystoreDB::new(temp_dir.path(), None)?; in test_legacy_blobs()
|