HomeSort by relevance Sort by last modified time
    Searched defs:verify_data (Results 1 - 7 of 7) sorted by null

  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 764 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
810 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
865 verify_data, TLS_VERIFY_DATA_LEN)) {
866 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
871 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
872 verify_data, TLS_VERIFY_DATA_LEN);
874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
875 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
tlsv1_server_write.c 576 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
630 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
631 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
636 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
637 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
640 pos = hs_start = verify_data;
tlsv1_client_write.c 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_read.c 1067 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1113 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1168 verify_data, TLS_VERIFY_DATA_LEN)) {
1169 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1174 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1175 verify_data, TLS_VERIFY_DATA_LEN);
1177 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1178 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
  /hardware/libhardware/include/hardware/
keymaster.h 182 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
  /device/samsung/tuna/reflash-bootloader/
reflash-bootloader.c 151 static void verify_data(int to_fd, off_t to_offset, function
328 verify_data(out_fd, MMC_PIT_OFFSET, in_fd, IMG_PIT_OFFSET, PIT_SIZE);
332 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE);
335 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1);
344 verify_data(out_fd, MMC_XLOADER_OFFSET, in_fd, type->offset, XLOADER_SIZE);
347 verify_data(out_fd, MMC_SBL_OFFSET, in_fd, IMG_SBL_OFFSET, -1);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocol.java 133 // reference verify_data used to verify finished message
134 private byte[] verify_data = new byte[12]; field in class:HandshakeProtocol
333 * Computers reference TLS verify_data that is used to verify finished message
338 computerVerifyDataTLS(label, verify_data);
342 * Computer TLS verify_data
364 * Computer reference SSLv3 verify_data that is used to verify finished message
369 verify_data = new byte[36];
370 computerVerifyDataSSLv3(sender, verify_data);
374 * Computer SSLv3 verify_data
421 if (!Arrays.equals(verify_data, data))
    [all...]

Completed in 440 milliseconds