Home
last modified time | relevance | path

Searched refs:unique_id (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/tests/
Dattestation_record_test.cpp37 Buffer* unique_id) const override { in GenerateUniqueId()
39 unique_id->Reinitialize(application_id.data, application_id.data_length); in GenerateUniqueId()
103 keymaster_blob_t unique_id = {}; in TEST() local
108 &parsed_sw_set, &parsed_hw_set, &unique_id)); in TEST()
116 EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11)); in TEST()
117 delete[] unique_id.data; in TEST()
/system/bt/gd/security/cert/
Dle_security_test.py157 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
203 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
236 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
271 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
306 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
341 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
375 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
411 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address))
447 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
482 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address))
[all …]
/system/keymaster/km_openssl/
Dattestation_record.cpp490 Buffer unique_id; in build_attestation_record() local
493 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id); in build_attestation_record()
497 key_desc->unique_id = ASN1_OCTET_STRING_new(); in build_attestation_record()
498 if (!key_desc->unique_id || in build_attestation_record()
499 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(), in build_attestation_record()
500 unique_id.available_read())) in build_attestation_record()
759 keymaster_blob_t* unique_id) { in parse_attestation_record() argument
777 unique_id->data = dup_buffer(record->unique_id->data, record->unique_id->length); in parse_attestation_record()
778 unique_id->data_length = record->unique_id->length; in parse_attestation_record()
/system/bt/gd/security/
Dfacade.cc273 display_yes_no.set_unique_id(unique_id++); in DisplayPairingPrompt()
285 display_with_value.set_unique_id(unique_id++); in DisplayConfirmValue()
295 display_yes_no.set_unique_id(unique_id++); in DisplayYesNoDialog()
306 display_passkey.set_unique_id(unique_id++); in DisplayPasskey()
317 display_passkey_input.set_unique_id(unique_id++); in DisplayEnterPasskeyDialog()
327 display_cancel.set_unique_id(unique_id++); in Cancel()
373 uint32_t unique_id{1}; member in bluetooth::security::SecurityModuleFacadeService
Dfacade.proto50 uint32 unique_id = 4; field
63 uint32 unique_id = 4; field
/system/bt/gd/cert/
Dpy_security.py118 unique_id=uid,
151 ui_id = event.unique_id
/system/keymaster/include/keymaster/
Dattestation_record.h173 ASN1_INTEGER* unique_id; member
182 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING),
283 keymaster_blob_t* unique_id);