/external/e2fsprogs/tests/d_loaddump/ |
script | 6 VERIFY_DATA=test.verify 33 echo "debugfs -R ''dump test_data $VERIFY_DATA'' $TMPFILE" > $OUT.new 34 $DEBUGFS -R "dump test_data $VERIFY_DATA" $TMPFILE >> $OUT.new 2>&1 39 echo "cmp $TEST_DATA $VERIFY_DATA" >> $OUT 40 cmp $TEST_DATA $VERIFY_DATA >>$OUT 48 rm -f $test_name.ok $test_name.failed $VERIFY_DATA $TEST_DATA $TMPFILE 60 unset VERIFY_FSCK_OPT NATIVE_FSCK_OPT OUT EXP TEST_DATA VERIFY_DATA
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
HandshakeProtocol.java | 133 // reference verify_data used to verify finished message 134 private byte[] verify_data = new byte[12]; field in class:HandshakeProtocol 333 * Computers reference TLS verify_data that is used to verify finished message 338 computerVerifyDataTLS(label, verify_data); 342 * Computer TLS verify_data 364 * Computer reference SSLv3 verify_data that is used to verify finished message 369 verify_data = new byte[36]; 370 computerVerifyDataSSLv3(sender, verify_data); 374 * Computer SSLv3 verify_data 421 if (!Arrays.equals(verify_data, data)) [all...] |
ClientHandshakeImpl.java | 339 byte[] verify_data; 341 verify_data = new byte[12]; 342 computerVerifyDataTLS("client finished", verify_data); 344 verify_data = new byte[36]; 345 computerVerifyDataSSLv3(SSLv3Constants.client, verify_data); 347 clientFinished = new Finished(verify_data);
|
ServerHandshakeImpl.java | 604 byte[] verify_data; 607 verify_data = new byte[12]; 608 computerVerifyDataTLS("server finished", verify_data); 610 verify_data = new byte[36]; 611 computerVerifyDataSSLv3(SSLv3Constants.server, verify_data); 613 serverFinished = new Finished(verify_data);
|
/device/samsung/tuna/reflash-bootloader/ |
reflash-bootloader.c | 151 static void verify_data(int to_fd, off_t to_offset, function 328 verify_data(out_fd, MMC_PIT_OFFSET, in_fd, IMG_PIT_OFFSET, PIT_SIZE); 332 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE); 335 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1); 344 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE); 347 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 762 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 808 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 815 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 842 verify_data, TLS_VERIFY_DATA_LEN)) { 843 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 848 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 849 verify_data, TLS_VERIFY_DATA_LEN); 851 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 852 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_server_read.c | 973 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1019 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1026 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1053 verify_data, TLS_VERIFY_DATA_LEN)) { 1054 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1059 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1060 verify_data, TLS_VERIFY_DATA_LEN); 1062 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1063 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_client_write.c | 596 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 629 verify_data, TLS_VERIFY_DATA_LEN)) { 630 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 635 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 636 verify_data, TLS_VERIFY_DATA_LEN); 647 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
|
tlsv1_server_write.c | 588 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 621 verify_data, TLS_VERIFY_DATA_LEN)) { 622 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 627 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 628 verify_data, TLS_VERIFY_DATA_LEN); 639 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 764 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 810 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 865 verify_data, TLS_VERIFY_DATA_LEN)) { 866 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 871 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 872 verify_data, TLS_VERIFY_DATA_LEN); 874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 875 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_server_read.c | 1067 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1113 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1168 verify_data, TLS_VERIFY_DATA_LEN)) { 1169 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1174 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1175 verify_data, TLS_VERIFY_DATA_LEN); 1177 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1178 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
tlsv1_server_write.c | 576 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 630 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 631 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 636 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 637 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 640 pos = hs_start = verify_data;
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 182 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 236 ASSERT_TRUE(sDevice->verify_data != NULL) 237 << "Should implement verify_data"; 669 sDevice->verify_data(sDevice, ¶ms, key_blob, key_blob_length, 691 sDevice->verify_data(sDevice, ¶ms, key_blob, key_blob_length, 704 sDevice->verify_data(sDevice, ¶ms, NULL, 0, 726 sDevice->verify_data(sDevice, ¶ms, key_blob, key_blob_length, 748 sDevice->verify_data(sDevice, ¶ms, key.get(), key.length(),
|
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 491 dev->verify_data = openssl_verify_data;
|
/system/security/keystore/ |
keystore.cpp | [all...] |
/device/samsung/tuna/keymaster/ |
keymaster_tuna.cpp | 905 dev->verify_data = tee_verify_data;
|