/aosp12/system/keymaster/tests/ |
H A D | attestation_record_test.cpp | 128 keymaster_blob_t unique_id = {}; in TEST() local 133 &parsed_sw_set, &parsed_hw_set, &unique_id)); in TEST() 143 std::string(reinterpret_cast<const char*>(unique_id.data), unique_id.data_length)); in TEST() 144 delete[] unique_id.data; in TEST() 219 keymaster_blob_t unique_id = {}; in TEST() local 228 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST() 242 std::string(reinterpret_cast<const char*>(unique_id.data), unique_id.data_length)); in TEST() 243 delete[] unique_id.data; in TEST() 326 keymaster_blob_t unique_id = {}; in TEST() local 336 &parsed_hw_set, &unique_id, &verified_boot_key, &verified_boot_state, in TEST()
|
/aosp12/system/bt/gd/security/cert/ |
H A D | le_security_test.py | 169 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 216 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 251 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 288 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 325 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 362 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 398 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.cert_address)) 474 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 510 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) 582 … message_type=UiCallbackType.PAIRING_PROMPT, boolean=True, unique_id=1, address=self.dut_address)) [all …]
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 924 Buffer unique_id = context.GenerateUniqueId( in build_eat_record() local 930 cppbor::Bstr(std::pair(unique_id.begin(), unique_id.available_read()))); in build_eat_record() 959 Buffer unique_id(UNIQUE_ID_SIZE); in generate_unique_id() local 960 hmac.Sign(input.data(), input.size(), unique_id.peek_write(), unique_id.available_write()); in generate_unique_id() 961 unique_id.advance_write(UNIQUE_ID_SIZE); in generate_unique_id() 962 return unique_id; in generate_unique_id() 1071 Buffer unique_id = context.GenerateUniqueId( in build_attestation_record() local 1077 if (!key_desc->unique_id || in build_attestation_record() 1078 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(), in build_attestation_record() 1420 unique_id->data = dup_buffer(record->unique_id->data, record->unique_id->length); in parse_attestation_record() [all …]
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | attestation_record.cpp | 127 ASN1_INTEGER* unique_id; member 136 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 265 hidl_vec<uint8_t>* unique_id) { in MAKE_OPENSSL_PTR_TYPE() 280 auto& uid = record->unique_id; in MAKE_OPENSSL_PTR_TYPE() 281 unique_id->resize(uid->length); in MAKE_OPENSSL_PTR_TYPE() 282 memcpy(unique_id->data(), uid->data, uid->length); in MAKE_OPENSSL_PTR_TYPE()
|
H A D | attestation_record.h | 51 hidl_vec<uint8_t>* unique_id);
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 70 std::vector<uint8_t> unique_id; member 80 std::vector<uint8_t>* unique_id);
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | attestation_record.cpp | 171 ASN1_INTEGER* unique_id; member 180 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 322 hidl_vec<uint8_t>* unique_id) { in MAKE_OPENSSL_PTR_TYPE() 337 auto& uid = record->unique_id; in MAKE_OPENSSL_PTR_TYPE() 338 unique_id->resize(uid->length); in MAKE_OPENSSL_PTR_TYPE() 339 memcpy(unique_id->data(), uid->data, uid->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | attestation_record.cpp | 182 ASN1_INTEGER* unique_id; member 193 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 341 vector<uint8_t>* unique_id) { in MAKE_OPENSSL_PTR_TYPE() 356 auto& uid = record->unique_id; in MAKE_OPENSSL_PTR_TYPE() 357 unique_id->resize(uid->length); in MAKE_OPENSSL_PTR_TYPE() 358 memcpy(unique_id->data(), uid->data, uid->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/bt/gd/security/ |
H A D | facade.cc | 420 display_yes_no.set_unique_id(unique_id++); in DisplayPairingPrompt() 433 display_with_value.set_unique_id(unique_id++); in DisplayConfirmValue() 444 display_yes_no.set_unique_id(unique_id++); in DisplayYesNoDialog() 457 display_passkey.set_unique_id(unique_id++); in DisplayPasskey() 468 display_passkey_input.set_unique_id(unique_id++); in DisplayEnterPasskeyDialog() 479 display_pin_input.set_unique_id(unique_id++); in DisplayEnterPinDialog() 488 display_cancel.set_unique_id(unique_id++); in Cancel() 536 uint32_t unique_id{1}; member in bluetooth::security::SecurityModuleFacadeService
|
H A D | facade.proto | 62 uint32 unique_id = 4; 77 uint32 unique_id = 5;
|
/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | attestation_record.cpp | 186 ASN1_INTEGER* unique_id; member 195 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 383 auto& uid = record->unique_id; in MAKE_OPENSSL_PTR_TYPE() 384 result.unique_id.resize(uid->length); in MAKE_OPENSSL_PTR_TYPE() 385 memcpy(result.unique_id.data(), uid->data, uid->length); in MAKE_OPENSSL_PTR_TYPE()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 205 ASN1_INTEGER* unique_id; member 214 ASN1_SIMPLE(KM_KEY_DESCRIPTION, unique_id, ASN1_OCTET_STRING), 370 keymaster_blob_t* unique_id); 390 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | attestation_record.h | 60 hidl_vec<uint8_t>* unique_id);
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 49 hidl_vec<uint8_t> unique_id; member
|
/aosp12/system/bt/gd/cert/ |
H A D | py_security.py | 139 unique_id=uid, 209 ui_id = event.unique_id
|
/aosp12/hardware/google/gchips/libvendorgraphicbuffer/include/ |
H A D | VendorGraphicBuffer.h | 117 uint64_t unique_id = 0; variable
|
/aosp12/frameworks/native/services/inputflinger/host/ |
H A D | InputDriver.cpp | 298 input_bus_t bus, const char* unique_id) { in create_device_identifier() argument 300 return driver->createDeviceIdentifier(name, product_id, vendor_id, bus, unique_id); in create_device_identifier()
|
H A D | InputDriver.h | 139 input_bus_t bus, const char* unique_id);
|
/aosp12/hardware/google/gchips/include/ |
H A D | ExynosExif.h | 246 char unique_id[30]; member
|
/aosp12/hardware/google/gchips/libvendorgraphicbuffer/gralloc3/ |
H A D | vendor_graphicbuffer_meta.cpp | 278 unique_id = gralloc_hnd->backing_store_id; in init()
|
/aosp12/hardware/google/graphics/common/libhwjpeg/ |
H A D | AppMarkerWriter.cpp | 173 m_szUniqueID = strlen(m_pExif->unique_id); // len should be 32! in PrepareAppWriter() 416 exifwriter.WriteASCII(EXIF_TAG_IMAGE_UNIQUE_ID, m_szUniqueID + 1, m_pExif->unique_id); in WriteAPP1()
|
/aosp12/hardware/google/gchips/libvendorgraphicbuffer/gralloc4/ |
H A D | vendor_graphicbuffer_meta.cpp | 305 unique_id = gralloc_hnd->backing_store_id; in init()
|
/aosp12/hardware/libhardware/include/hardware/ |
H A D | input.h | 418 input_bus_t bus, const char* unique_id);
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintTest.cpp | 1595 EXPECT_GT(unique_id->size(), 0); in TEST_P() 1602 vector<uint8_t> unique_id; in TEST_P() local 1603 get_unique_id(app_id, cert_date, &unique_id); in TEST_P() 1608 EXPECT_EQ(unique_id, unique_id2); in TEST_P() 1617 EXPECT_EQ(unique_id, unique_id3); in TEST_P() 1621 EXPECT_EQ(unique_id, unique_id4); in TEST_P() 1627 EXPECT_NE(unique_id, unique_id5); in TEST_P() 1632 EXPECT_NE(unique_id, unique_id6); in TEST_P() 1636 EXPECT_NE(unique_id, unique_id7); in TEST_P() 1640 EXPECT_NE(unique_id, unique_id8); in TEST_P() [all …]
|
/aosp12/hardware/interfaces/identity/aidl/vts/ |
H A D | Util.cpp | 348 EXPECT_EQ(attRec.unique_id.size(), 0); in validateAttestationCertificate()
|