Home
last modified time | relevance | path

Searched refs:USER_ID (Results 1 – 13 of 13) sorted by relevance

/system/security/keystore2/src/
Dsuper_key.rs1334 const USER_ID: u32 = 0; constant
1357 .init_user(&mut keystore_db, &legacy_importer, USER_ID, pw) in setup_test()
1415 USER_ID, in test_init_user()
1428 USER_ID, in test_unlock_user()
1437 USER_ID, in test_unlock_user()
1444 .unlock_user(&mut keystore_db, &legacy_importer, USER_ID, &pw) in test_unlock_user()
1450 USER_ID, in test_unlock_user()
1464 USER_ID, in test_unlock_wrong_password()
1473 USER_ID, in test_unlock_wrong_password()
1480 .unlock_user(&mut keystore_db, &legacy_importer, USER_ID, &wrong_pw) in test_unlock_wrong_password()
[all …]
Dkey_parameter.rs899 #[key_param(tag = USER_ID, field = Integer)]
/system/gatekeeper/tests/
Dgatekeeper_messages_test.cpp35 static const uint32_t USER_ID = 3857; variable
52 EnrollRequest msg(USER_ID, {}, make_buffer(password_size), {}); in TEST()
65 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST()
76 EnrollRequest msg(USER_ID, {}, make_buffer(password_size), {}); in TEST()
88 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST()
104 …EnrollRequest msg(USER_ID, move(password_handle), move(provided_password), move(enrolled_password)… in TEST()
118 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST()
132 EnrollResponse msg(USER_ID, make_buffer(password_size)); in TEST()
144 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST()
154 VerifyRequest msg(USER_ID, 1, make_buffer(password_size), make_buffer(password_size)); in TEST()
[all …]
/system/security/keystore2/tests/
Dkeystore2_client_operation_tests.rs288 const USER_ID: u32 = 99; in keystore2_ops_prune_test() constant
291 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_ops_prune_test()
292 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_ops_prune_test()
388 const USER_ID: u32 = 99; in keystore2_forced_op_perm_denied_test() constant
391 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_perm_denied_test()
392 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_perm_denied_test()
419 const USER_ID: u32 = 99; in keystore2_forced_op_success_test() constant
422 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_success_test()
423 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_success_test()
Dkeystore2_client_grant_key_tests.rs91 const USER_ID: u32 = 99; in keystore2_grant_key_with_invalid_perm_expecting_syserror() constant
93 let grantee_uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_with_invalid_perm_expecting_syserror()
112 const USER_ID: u32 = 99; in keystore2_grant_key_with_perm_none() constant
114 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_with_perm_none()
168 const USER_ID: u32 = 99; in keystore2_grant_get_info_use_key_perm() constant
170 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_get_info_use_key_perm()
251 const USER_ID: u32 = 99; in keystore2_grant_delete_key_success() constant
253 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_delete_key_success()
324 const USER_ID: u32 = 99; in keystore2_grant_key_fails_with_permission_denied() constant
326 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_fails_with_permission_denied()
[all …]
Dkeystore2_client_list_entries_tests.rs58 const USER_ID: u32 = 91; in keystore2_list_entries_success() constant
60 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_success()
199 const USER_ID: u32 = 92; in keystore2_list_entries_with_long_aliases_success() constant
201 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_with_long_aliases_success()
266 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_long_aliases_success() constant
268 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_long_aliases_success()
333 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_multi_procs_success() constant
335 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_multi_procs_success()
433 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_empty_keystore_success() constant
435 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_empty_keystore_success()
[all …]
Dkeystore2_client_keystore_engine_tests.rs164 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() constant
166 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success()
207 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success() constant
209 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success()
250 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_pem_pub_key_success() constant
252 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_pem_pub_key_success()
Dkeystore2_client_ec_key_tests.rs430 const USER_ID: u32 = 99; in keystore2_key_owner_validation() constant
433 let uid1 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_1; in keystore2_key_owner_validation()
434 let gid1 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_1; in keystore2_key_owner_validation()
459 let uid2 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_2; in keystore2_key_owner_validation()
460 let gid2 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_2; in keystore2_key_owner_validation()
/system/keymaster/ng/include/
Dkeymaster_tags.h144 DECLARE_TYPED_TAG(USER_ID);
/system/keymint/hal/src/
Dhal.rs276 KeyParam::UserId(v) => (Tag::USER_ID, KeyParameterValue::Integer(v as i32)), in fromm()
556 keymint::Tag::Tag::USER_ID => Some(KeyParam::UserId(value_of!(val, Integer)? as u32)), in try_fromm()
/system/security/keystore2/test_utils/
Dkey_generations.rs98 Tag::USER_ID,
499 tag: Tag::USER_ID, in check_common_auths()
/system/security/keystore2/src/km_compat/
Dkm_compat_type_conversion.h563 case KMV1::Tag::USER_ID: in convertKeyParameterToLegacy()
873 case V4_0::Tag::USER_ID: in convertKeyParameterFromLegacy()
Dkm_compat.cpp119 case Tag::USER_ID: in isKeyCreationParameter()