/system/keymaster/tests/ |
D | attestation_record_test.cpp | 122 keymaster_blob_t unique_id = {}; in TEST() local 127 &parsed_sw_set, &parsed_hw_set, &unique_id)); in TEST() 135 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST() 136 delete[] unique_id.data; in TEST() 202 keymaster_blob_t unique_id = {}; in TEST() local 211 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST() 223 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST() 224 delete[] unique_id.data; in TEST() 298 keymaster_blob_t unique_id = {}; in TEST() local 308 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST()
|
/system/bt/gd/security/cert/ |
D | le_security_test.py | 169 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 216 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 251 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 288 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 325 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 362 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 398 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 436 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 474 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 510 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) [all …]
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 949 Buffer unique_id = context.GenerateUniqueId( in build_eat_record() local 955 cppbor::Bstr(std::pair(unique_id.begin(), unique_id.available_read()))); in build_eat_record() 1074 Buffer unique_id = context.GenerateUniqueId( in build_attestation_record() local 1079 key_desc->unique_id = ASN1_OCTET_STRING_new(); in build_attestation_record() 1080 if (!key_desc->unique_id || in build_attestation_record() 1081 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(), in build_attestation_record() 1082 unique_id.available_read())) in build_attestation_record() 1406 keymaster_blob_t* unique_id) { in parse_attestation_record() argument 1423 unique_id->data = dup_buffer(record->unique_id->data, record->unique_id->length); in parse_attestation_record() 1424 unique_id->data_length = record->unique_id->length; in parse_attestation_record() [all …]
|
/system/bt/gd/security/ |
D | facade.cc | 420 display_yes_no.set_unique_id(unique_id++); in DisplayPairingPrompt() 433 display_with_value.set_unique_id(unique_id++); in DisplayConfirmValue() 444 display_yes_no.set_unique_id(unique_id++); in DisplayYesNoDialog() 457 display_passkey.set_unique_id(unique_id++); in DisplayPasskey() 468 display_passkey_input.set_unique_id(unique_id++); in DisplayEnterPasskeyDialog() 479 display_pin_input.set_unique_id(unique_id++); in DisplayEnterPinDialog() 488 display_cancel.set_unique_id(unique_id++); in Cancel() 536 uint32_t unique_id{1}; member in bluetooth::security::SecurityModuleFacadeService
|
D | facade.proto | 62 uint32 unique_id = 4; field 77 uint32 unique_id = 5; field
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 202 ASN1_INTEGER* unique_id; member 211 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 358 keymaster_blob_t* unique_id); 378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|
/system/bt/gd/cert/ |
D | py_security.py | 139 unique_id=uid, 209 ui_id = event.unique_id
|