/system/security/keystore2/src/ |
D | super_key.rs | 1334 const USER_ID: u32 = 0; constant 1357 .init_user(&mut keystore_db, &legacy_importer, USER_ID, pw) in setup_test() 1415 USER_ID, in test_init_user() 1428 USER_ID, in test_unlock_user() 1437 USER_ID, in test_unlock_user() 1444 .unlock_user(&mut keystore_db, &legacy_importer, USER_ID, &pw) in test_unlock_user() 1450 USER_ID, in test_unlock_user() 1464 USER_ID, in test_unlock_wrong_password() 1473 USER_ID, in test_unlock_wrong_password() 1480 .unlock_user(&mut keystore_db, &legacy_importer, USER_ID, &wrong_pw) in test_unlock_wrong_password() [all …]
|
D | key_parameter.rs | 899 #[key_param(tag = USER_ID, field = Integer)]
|
/system/gatekeeper/tests/ |
D | gatekeeper_messages_test.cpp | 35 static const uint32_t USER_ID = 3857; variable 52 EnrollRequest msg(USER_ID, {}, make_buffer(password_size), {}); in TEST() 65 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST() 76 EnrollRequest msg(USER_ID, {}, make_buffer(password_size), {}); in TEST() 88 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST() 104 …EnrollRequest msg(USER_ID, move(password_handle), move(provided_password), move(enrolled_password)… in TEST() 118 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST() 132 EnrollResponse msg(USER_ID, make_buffer(password_size)); in TEST() 144 ASSERT_EQ(USER_ID, deserialized_msg.user_id); in TEST() 154 VerifyRequest msg(USER_ID, 1, make_buffer(password_size), make_buffer(password_size)); in TEST() [all …]
|
/system/security/keystore2/tests/ |
D | keystore2_client_operation_tests.rs | 288 const USER_ID: u32 = 99; in keystore2_ops_prune_test() constant 291 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_ops_prune_test() 292 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_ops_prune_test() 388 const USER_ID: u32 = 99; in keystore2_forced_op_perm_denied_test() constant 391 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_perm_denied_test() 392 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_perm_denied_test() 419 const USER_ID: u32 = 99; in keystore2_forced_op_success_test() constant 422 let uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_success_test() 423 let gid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_forced_op_success_test()
|
D | keystore2_client_grant_key_tests.rs | 91 const USER_ID: u32 = 99; in keystore2_grant_key_with_invalid_perm_expecting_syserror() constant 93 let grantee_uid = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_with_invalid_perm_expecting_syserror() 112 const USER_ID: u32 = 99; in keystore2_grant_key_with_perm_none() constant 114 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_with_perm_none() 168 const USER_ID: u32 = 99; in keystore2_grant_get_info_use_key_perm() constant 170 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_get_info_use_key_perm() 251 const USER_ID: u32 = 99; in keystore2_grant_delete_key_success() constant 253 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_delete_key_success() 324 const USER_ID: u32 = 99; in keystore2_grant_key_fails_with_permission_denied() constant 326 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_fails_with_permission_denied() [all …]
|
D | keystore2_client_list_entries_tests.rs | 58 const USER_ID: u32 = 91; in keystore2_list_entries_success() constant 60 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_success() 199 const USER_ID: u32 = 92; in keystore2_list_entries_with_long_aliases_success() constant 201 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_with_long_aliases_success() 266 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_long_aliases_success() constant 268 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_long_aliases_success() 333 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_multi_procs_success() constant 335 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_multi_procs_success() 433 const USER_ID: u32 = 92; in keystore2_list_entries_batched_with_empty_keystore_success() constant 435 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_batched_with_empty_keystore_success() [all …]
|
D | keystore2_client_keystore_engine_tests.rs | 164 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() constant 166 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() 207 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success() constant 209 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success() 250 const USER_ID: u32 = 99; in keystore2_perofrm_crypto_op_using_keystore2_engine_pem_pub_key_success() constant 252 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_perofrm_crypto_op_using_keystore2_engine_pem_pub_key_success()
|
D | keystore2_client_ec_key_tests.rs | 430 const USER_ID: u32 = 99; in keystore2_key_owner_validation() constant 433 let uid1 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_1; in keystore2_key_owner_validation() 434 let gid1 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_1; in keystore2_key_owner_validation() 459 let uid2 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_2; in keystore2_key_owner_validation() 460 let gid2 = USER_ID * AID_USER_OFFSET + APPLICATION_ID_2; in keystore2_key_owner_validation()
|
/system/keymaster/ng/include/ |
D | keymaster_tags.h | 144 DECLARE_TYPED_TAG(USER_ID);
|
/system/keymint/hal/src/ |
D | hal.rs | 276 KeyParam::UserId(v) => (Tag::USER_ID, KeyParameterValue::Integer(v as i32)), in fromm() 556 keymint::Tag::Tag::USER_ID => Some(KeyParam::UserId(value_of!(val, Integer)? as u32)), in try_fromm()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 98 Tag::USER_ID, 499 tag: Tag::USER_ID, in check_common_auths()
|
/system/security/keystore2/src/km_compat/ |
D | km_compat_type_conversion.h | 563 case KMV1::Tag::USER_ID: in convertKeyParameterToLegacy() 873 case V4_0::Tag::USER_ID: in convertKeyParameterFromLegacy()
|
D | km_compat.cpp | 119 case Tag::USER_ID: in isKeyCreationParameter()
|