Home
last modified time | relevance | path

Searched refs:unique_id (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp122 keymaster_blob_t unique_id = {}; in TEST() local
127 &parsed_sw_set, &parsed_hw_set, &unique_id)); in TEST()
135 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST()
136 delete[] unique_id.data; in TEST()
202 keymaster_blob_t unique_id = {}; in TEST() local
211 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST()
223 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST()
224 delete[] unique_id.data; in TEST()
298 keymaster_blob_t unique_id = {}; in TEST() local
308 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST()
/system/bt/gd/security/cert/
Dle_security_test.py169 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
216 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
251 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
288 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
325 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
362 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
398 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
436 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
474 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
510 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
[all …]
/system/keymaster/km_openssl/
Dattestation_record.cpp949 Buffer unique_id = context.GenerateUniqueId( in build_eat_record() local
955 cppbor::Bstr(std::pair(unique_id.begin(), unique_id.available_read()))); in build_eat_record()
1074 Buffer unique_id = context.GenerateUniqueId( in build_attestation_record() local
1079 key_desc->unique_id = ASN1_OCTET_STRING_new(); in build_attestation_record()
1080 if (!key_desc->unique_id || in build_attestation_record()
1081 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(), in build_attestation_record()
1082 unique_id.available_read())) in build_attestation_record()
1406 keymaster_blob_t* unique_id) { in parse_attestation_record() argument
1423 unique_id->data = dup_buffer(record->unique_id->data, record->unique_id->length); in parse_attestation_record()
1424 unique_id->data_length = record->unique_id->length; in parse_attestation_record()
[all …]
/system/bt/gd/security/
Dfacade.cc420 display_yes_no.set_unique_id(unique_id++); in DisplayPairingPrompt()
433 display_with_value.set_unique_id(unique_id++); in DisplayConfirmValue()
444 display_yes_no.set_unique_id(unique_id++); in DisplayYesNoDialog()
457 display_passkey.set_unique_id(unique_id++); in DisplayPasskey()
468 display_passkey_input.set_unique_id(unique_id++); in DisplayEnterPasskeyDialog()
479 display_pin_input.set_unique_id(unique_id++); in DisplayEnterPinDialog()
488 display_cancel.set_unique_id(unique_id++); in Cancel()
536 uint32_t unique_id{1}; member in bluetooth::security::SecurityModuleFacadeService
Dfacade.proto62 uint32 unique_id = 4; field
77 uint32 unique_id = 5; field
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h202 ASN1_INTEGER* unique_id; member
211 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING),
358 keymaster_blob_t* unique_id);
378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
/system/bt/gd/cert/
Dpy_security.py139 unique_id=uid,
209 ui_id = event.unique_id