Home
last modified time | relevance | path

Searched refs:mac (Results 1 – 25 of 31) sorted by relevance

12

/system/security/keystore/tests/
Dverification_token_seralization_test.cpp36 token.mac.resize(32); in TEST()
38 token.mac[n] = n; in TEST()
48 ASSERT_EQ(token.mac, deserialized.value().mac); in TEST()
56 token.mac.resize(0); in TEST()
65 ASSERT_EQ(token.mac, deserialized.value().mac); in TEST()
/system/connectivity/wificond/
Dclient_interface_binder.cpp67 const std::array<uint8_t, ETH_ALEN>& mac = impl_->GetMacAddress(); in getMacAddress() local
68 *out_mac_address = vector<uint8_t>(mac.begin(), mac.end()); in getMacAddress()
91 Status ClientInterfaceBinder::setMacAddress(const vector<uint8_t>& mac, bool* success) { in setMacAddress() argument
96 if (mac.size() != ETH_ALEN) { in setMacAddress()
97 LOG(ERROR) << "Invalid MAC length " << mac.size(); in setMacAddress()
102 std::copy_n(mac.begin(), ETH_ALEN, mac_array.begin()); in setMacAddress()
Dclient_interface_impl.cpp239 bool ClientInterfaceImpl::SetMacAddress(const std::array<uint8_t, ETH_ALEN>& mac) { in SetMacAddress() argument
244 if (!if_tool_->SetMacAddress(interface_name_.c_str(), mac)) { in SetMacAddress()
246 << LoggingUtils::GetMacString(mac) << ") failed."; in SetMacAddress()
Dclient_interface_binder.h51 const ::std::vector<uint8_t>& mac, bool* success) override;
Dclient_interface_impl.h82 bool SetMacAddress(const std::array<uint8_t, ETH_ALEN>& mac);
/system/keymaster/ng/
DAndroidKeymaster41Device.cpp51 serializableToken.mac = in deviceLocked()
52 KeymasterBlob(verificationToken.mac.data(), verificationToken.mac.size()); in deviceLocked()
DAndroidKeymaster4Device.cpp291 KeymasterBlob mac(authToken.mac.data(), authToken.mac.size()); in verifyAuthorization() local
292 request.auth_token.mac = mac; in verifyAuthorization()
301 token.mac = kmBlob2hidlVec(response.token.mac); in verifyAuthorization()
/system/core/trusty/utils/rpmb_dev/
Drpmb_dev.c90 struct rpmb_key* mac) { in rpmb_mac() argument
109 hmac_ret = HMAC_Final(hmac_ctx, mac->byte, &md_len); in rpmb_mac()
110 if (md_len != sizeof(mac->byte)) { in rpmb_mac()
111 ALOGE("bad md_len %d != %zd\n", md_len, sizeof(mac->byte)); in rpmb_mac()
303 struct rpmb_key mac; in rpmb_dev_process_cmd() local
320 if (rpmb_mac(s->header.key, s->cmd, s->cmd_count, &mac) != 0) { in rpmb_dev_process_cmd()
325 mac = s->cmd[s->cmd_count - 1].key_mac; in rpmb_dev_process_cmd()
327 memset(mac.byte, 0, sizeof(mac.byte)); in rpmb_dev_process_cmd()
330 if (memcmp(&mac, s->cmd[s->cmd_count - 1].key_mac.byte, sizeof(mac))) { in rpmb_dev_process_cmd()
/system/connectivity/wificond/tests/
Dnl80211_packet_unittest.cpp246 std::vector<uint8_t> mac; in TEST() local
247 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac)); in TEST()
251 EXPECT_EQ(expected_mac, mac); in TEST()
268 std::vector<uint8_t> mac; in TEST() local
269 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac)); in TEST()
273 EXPECT_EQ(expected_mac, mac); in TEST()
/system/security/identity/binder/android/security/identity/
DGetEntriesResultParcel.aidl27 byte[] mac;
/system/connectivity/wificond/aidl/android/net/wifi/
DIClientInterface.aidl55 boolean setMacAddress(in byte[] mac); in setMacAddress() argument
/system/security/identity/
DCredential.cpp277 aidlAuthToken.mac.clear(); in getEntries()
281 aidlVerificationToken.mac.clear(); in getEntries()
308 aidlAuthToken.mac = authToken.mac; in getEntries()
324 aidlVerificationToken.mac = token->mac; in getEntries()
460 status = halBinder_->finishRetrieval(&ret.mac, &ret.deviceNameSpaces); in getEntries()
DCredentialData.cpp93 vector<uint8_t> mac = sacp.mac; in saveToDisk() local
94 array.add(mac); in saveToDisk()
164 sacp.mac = itemMac->value(); in parseSacp()
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp104 if (authToken.mac.size() == mac_len) { in injectAuthToken()
118 memcpy(auth_token->hmac, authToken.mac.data(), mac_len); in injectAuthToken()
320 KeymasterBlob mac(authToken.mac.data(), authToken.mac.size()); in verifyAuthorization() local
321 request.auth_token.mac = mac; in verifyAuthorization()
330 token.mac = kmBlob2hidlVec(response.token.mac); in verifyAuthorization()
/system/extras/libfec/
DAndroid.bp68 // libavb isn't available on mac.
/system/security/keystore/
Doperation_struct.h48 bool hasAuthToken() const { return authToken.mac.size() != 0; } in hasAuthToken()
Dkeymaster_enforcement.cpp135 if (auth_token.mac.size() && in AuthorizeUpdateOrFinish()
/system/core/fastboot/fuzzy_fastboot/
DAndroid.bp37 // This is needed to avoid link time errors when building for mac
/system/keymaster/android_keymaster/
Dandroid_keymaster_messages.cpp693 sizeof(authenticator_type) + sizeof(timestamp) + blob_size(mac); in SerializedSize()
702 return serialize_blob(mac, buf, end); in Serialize()
711 deserialize_blob(&mac, buf_ptr, end); in Deserialize()
716 sizeof(security_level) + blob_size(mac); in SerializedSize()
724 return serialize_blob(mac, buf, end); in Serialize()
732 deserialize_blob(&mac, buf_ptr, end); in Deserialize()
/system/vold/
DKeyStorage.cpp290 std::string mac; in encryptWithKeymasterKey() local
291 if (!opHandle.finish(&mac)) return false; in encryptWithKeymasterKey()
292 if (!checkSize("mac", mac.size(), GCM_MAC_BYTES)) return false; in encryptWithKeymasterKey()
293 *ciphertext = nonce + body + mac; in encryptWithKeymasterKey()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h829 mac = move(other.mac); in HardwareAuthToken()
841 KeymasterBlob mac; member
851 mac = move(other.mac); in VerificationToken()
862 KeymasterBlob mac{};
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp195 response.error = hmacSha256(hmac_key_, data_chunks, 5, &response.token.mac); in VerifyAuthorization()
/system/tools/hidl/test/java_test/src/com/android/commands/hidl_test_java/
DHidlTestJava.java797 byte[] mac = new byte[6]; in client()
799 mac[j] = (byte)k; in client()
802 in.addresses.add(mac); in client()
821 byte[] mac = new byte[6]; in client()
823 mac[j] = (byte)k; in client()
826 in.add(mac); in client()
/system/sepolicy/prebuilts/api/26.0/private/
Dpriv_app.te88 # access the mac address
/system/sepolicy/prebuilts/api/27.0/private/
Dpriv_app.te87 # access the mac address

12