/external/ltp/testcases/kernel/input/ |
input01.c | 35 static int verify_data(struct input_event *iev, int nb); 118 if (verify_data(&iev[i], nb++)) 126 static int verify_data(struct input_event *iev, int nb) function
|
/external/mesa3d/src/compiler/glsl/tests/ |
uniform_initializer_utils.cpp | 201 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 209 verify_data(storage + (i * element_type->components()), 0,
|
/hardware/libhardware/include/hardware/ |
keymaster0.h | 122 int (*verify_data)(const struct keymaster0_device* dev, member in struct:keymaster0_device
|
keymaster1.h | 118 int (*verify_data)(const struct keymaster1_device* dev, const void* signing_params, member in struct:keymaster1_device
|
/external/boringssl/src/ssl/ |
tls13_both.cc | 428 const uint8_t *verify_data; local 432 verify_data = hs->expected_client_finished; 439 verify_data = verify_data_buf; 444 CRYPTO_memcmp(verify_data, ssl->init_msg, verify_data_len) == 0; 583 uint8_t verify_data[EVP_MAX_MD_SIZE]; local 585 if (!tls13_finished_mac(hs, verify_data, &verify_data_len, ssl->server)) { 593 !CBB_add_bytes(&body, verify_data, verify_data_len) ||
|
tls13_enc.cc | 397 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local 398 if (!tls13_psk_binder(verify_data, digest, ssl->session->master_key, 404 OPENSSL_memcpy(msg + len - hash_len, verify_data, hash_len); 431 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local 433 if (!tls13_psk_binder(verify_data, SSL_TRANSCRIPT_md(&hs->transcript), 444 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local [all...] |
tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data"); [all...] |
tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
/external/syslinux/gpxe/src/net/ |
tls.c | 705 uint8_t verify_data[12]; member in struct:__anon35022 715 finished.verify_data, sizeof ( finished.verify_data ), [all...] |