HomeSort by relevance Sort by last modified time
    Searched defs:verify_data (Results 1 - 11 of 11) sorted by null

  /external/ltp/testcases/kernel/input/
input01.c 35 static int verify_data(struct input_event *iev, int nb);
118 if (verify_data(&iev[i], nb++))
126 static int verify_data(struct input_event *iev, int nb) function
  /external/mesa3d/src/compiler/glsl/tests/
uniform_initializer_utils.cpp 201 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
209 verify_data(storage + (i * element_type->components()), 0,
  /hardware/libhardware/include/hardware/
keymaster0.h 122 int (*verify_data)(const struct keymaster0_device* dev, member in struct:keymaster0_device
keymaster1.h 118 int (*verify_data)(const struct keymaster1_device* dev, const void* signing_params, member in struct:keymaster1_device
  /external/boringssl/src/ssl/
tls13_both.cc 327 const uint8_t *verify_data; local
331 verify_data = hs->expected_client_finished;
338 verify_data = verify_data_buf;
341 int finished_ok = CBS_mem_equal(&msg.body, verify_data, verify_data_len);
478 uint8_t verify_data[EVP_MAX_MD_SIZE]; local
480 if (!tls13_finished_mac(hs, verify_data, &verify_data_len, ssl->server)) {
489 !CBB_add_bytes(&body, verify_data, verify_data_len) ||
tls13_enc.cc 436 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
437 if (!tls13_psk_binder(verify_data, ssl->session->ssl_version, digest,
444 OPENSSL_memcpy(msg + len - hash_len, verify_data, hash_len);
468 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
470 if (!tls13_psk_binder(verify_data, hs->ssl->version, hs->transcript.Digest(),
481 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0;
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 1316 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
    [all...]
tlsv1_client_write.c 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_read.c 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
    [all...]
tlsv1_server_write.c 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
  /external/syslinux/gpxe/src/net/
tls.c 705 uint8_t verify_data[12]; member in struct:__anon38448
715 finished.verify_data, sizeof ( finished.verify_data ),
    [all...]

Completed in 286 milliseconds