Searched refs:unique_id (Results 1 – 7 of 7) sorted by relevance
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 37 Buffer* unique_id) const override { in GenerateUniqueId() 39 unique_id->Reinitialize(application_id.data, application_id.data_length); in GenerateUniqueId() 103 keymaster_blob_t unique_id = {}; in TEST() local 108 &parsed_sw_set, &parsed_hw_set, &unique_id)); in TEST() 116 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST() 117 delete[] unique_id.data; in TEST()
|
/system/bt/gd/security/cert/ |
D | le_security_test.py | 157 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 203 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 236 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 271 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 306 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 341 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 375 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 411 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 447 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 482 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) [all …]
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 490 Buffer unique_id; in build_attestation_record() local 493 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id); in build_attestation_record() 497 key_desc->unique_id = ASN1_OCTET_STRING_new(); in build_attestation_record() 498 if (!key_desc->unique_id || in build_attestation_record() 499 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(), in build_attestation_record() 500 unique_id.available_read())) in build_attestation_record() 759 keymaster_blob_t* unique_id) { in parse_attestation_record() argument 777 unique_id->data = dup_buffer(record->unique_id->data, record->unique_id->length); in parse_attestation_record() 778 unique_id->data_length = record->unique_id->length; in parse_attestation_record()
|
/system/bt/gd/security/ |
D | facade.cc | 273 display_yes_no.set_unique_id(unique_id++); in DisplayPairingPrompt() 285 display_with_value.set_unique_id(unique_id++); in DisplayConfirmValue() 295 display_yes_no.set_unique_id(unique_id++); in DisplayYesNoDialog() 306 display_passkey.set_unique_id(unique_id++); in DisplayPasskey() 317 display_passkey_input.set_unique_id(unique_id++); in DisplayEnterPasskeyDialog() 327 display_cancel.set_unique_id(unique_id++); in Cancel() 373 uint32_t unique_id{1}; member in bluetooth::security::SecurityModuleFacadeService
|
D | facade.proto | 50 uint32 unique_id = 4; field 63 uint32 unique_id = 4; field
|
/system/bt/gd/cert/ |
D | py_security.py | 118 unique_id=uid, 151 ui_id = event.unique_id
|
/system/keymaster/include/keymaster/ |
D | attestation_record.h | 173 ASN1_INTEGER* unique_id; member 182 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 283 keymaster_blob_t* unique_id);
|