/hardware/libhardware/include/hardware/ |
keymaster.h | 170 int (*sign_data)(const struct keymaster_device* dev, member in struct:keymaster_device
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 440 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 463 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 465 sign_data = os_malloc(sign_len); 466 if (sign_data == NULL) 468 pos = sign_data; 475 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 479 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 481 os_free(sign_data); 484 os_free(sign_data);
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 233 ASSERT_TRUE(sDevice->sign_data != NULL) 234 << "Should implement sign_data"; 547 sDevice->sign_data(sDevice, ¶ms, key_blob, key_blob_length, 581 sDevice->sign_data(sDevice, ¶ms, key_blob, key_blob_length, 597 sDevice->sign_data(sDevice, ¶ms, NULL, 0, 622 sDevice->sign_data(sDevice, ¶ms, key_blob, key_blob_length, 647 sDevice->sign_data(sDevice, ¶ms, key_blob, key_blob_length,
|
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 490 dev->sign_data = openssl_sign_data;
|
/system/security/keystore/ |
keystore.cpp | [all...] |
/device/samsung/tuna/keymaster/ |
keymaster_tuna.cpp | 904 dev->sign_data = tee_sign_data;
|