HomeSort by relevance Sort by last modified time
    Searched refs:verify_data (Results 1 - 17 of 17) sorted by null

  /device/samsung/tuna/reflash-bootloader/
reflash-bootloader.c 151 static void verify_data(int to_fd, off_t to_offset, function
328 verify_data(out_fd, MMC_PIT_OFFSET, in_fd, IMG_PIT_OFFSET, PIT_SIZE);
332 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE);
335 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1);
344 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE);
347 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocol.java 133 // reference verify_data used to verify finished message
134 private byte[] verify_data = new byte[12]; field in class:HandshakeProtocol
333 * Computers reference TLS verify_data that is used to verify finished message
338 computerVerifyDataTLS(label, verify_data);
342 * Computer TLS verify_data
364 * Computer reference SSLv3 verify_data that is used to verify finished message
369 verify_data = new byte[36];
370 computerVerifyDataSSLv3(sender, verify_data);
374 * Computer SSLv3 verify_data
421 if (!Arrays.equals(verify_data, data))
    [all...]
ClientHandshakeImpl.java 339 byte[] verify_data;
341 verify_data = new byte[12];
342 computerVerifyDataTLS("client finished", verify_data);
344 verify_data = new byte[36];
345 computerVerifyDataSSLv3(SSLv3Constants.client, verify_data);
347 clientFinished = new Finished(verify_data);
ServerHandshakeImpl.java 604 byte[] verify_data;
607 verify_data = new byte[12];
608 computerVerifyDataTLS("server finished", verify_data);
610 verify_data = new byte[36];
611 computerVerifyDataSSLv3(SSLv3Constants.server, verify_data);
613 serverFinished = new Finished(verify_data);
  /hardware/libhardware/include/hardware/
keymaster.h 182 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client_write.c 596 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
629 verify_data, TLS_VERIFY_DATA_LEN)) {
630 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
635 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
636 verify_data, TLS_VERIFY_DATA_LEN);
647 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
tlsv1_server_write.c 588 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
621 verify_data, TLS_VERIFY_DATA_LEN)) {
622 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
627 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
628 verify_data, TLS_VERIFY_DATA_LEN);
639 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
tlsv1_client_read.c 762 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
808 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
815 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
842 verify_data, TLS_VERIFY_DATA_LEN)) {
843 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
848 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
849 verify_data, TLS_VERIFY_DATA_LEN);
851 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
852 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
tlsv1_server_read.c 973 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1019 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1026 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1053 verify_data, TLS_VERIFY_DATA_LEN)) {
1054 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1059 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1060 verify_data, TLS_VERIFY_DATA_LEN);
1062 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1063 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_write.c 576 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
630 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
631 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
636 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
637 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
640 pos = hs_start = verify_data;
tlsv1_client_read.c 764 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
810 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
865 verify_data, TLS_VERIFY_DATA_LEN)) {
866 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
871 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
872 verify_data, TLS_VERIFY_DATA_LEN);
874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
875 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
tlsv1_server_read.c 1067 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1113 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1168 verify_data, TLS_VERIFY_DATA_LEN)) {
1169 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1174 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1175 verify_data, TLS_VERIFY_DATA_LEN);
1177 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1178 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 236 ASSERT_TRUE(sDevice->verify_data != NULL)
237 << "Should implement verify_data";
669 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
691 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
704 sDevice->verify_data(sDevice, &params, NULL, 0,
726 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
748 sDevice->verify_data(sDevice, &params, key.get(), key.length(),
  /system/security/softkeymaster/
keymaster_openssl.cpp 491 dev->verify_data = openssl_verify_data;
  /system/security/keystore/
keystore.cpp     [all...]
  /device/samsung/tuna/keymaster/
keymaster_tuna.cpp 905 dev->verify_data = tee_verify_data;

Completed in 339 milliseconds