HomeSort by relevance Sort by last modified time
    Searched refs:verify_data (Results 1 - 25 of 33) sorted by null

1 2

  /external/avb/examples/things/
avb_atx_slot_verify.h 77 AvbSlotVerifyData** verify_data,
avb_atx_slot_verify.c 131 AvbSlotVerifyData** verify_data,
151 verify_data);
159 for (i = 0; i < (*verify_data)->num_vbmeta_images; i++) {
161 (*verify_data)->vbmeta_images[i].vbmeta_data,
162 (*verify_data)->vbmeta_images[i].vbmeta_size);
169 uint64_t rollback_index_value = (*verify_data)->rollback_indexes[i];
198 avb_slot_verify_data_free(*verify_data);
199 *verify_data = NULL;
  /external/mesa3d/src/compiler/glsl/tests/
uniform_initializer_utils.h 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
copy_constant_to_storage_tests.cpp 84 verify_data(storage, 0, val, red_zone_size, 0xF00F);
104 verify_data(storage, 0, val, red_zone_size, 0xF00F);
124 verify_data(storage, 0, val, red_zone_size, 0xF00F);
144 verify_data(storage, 0, val, red_zone_size, 0xF00F);
169 verify_data(storage, 0, val, red_zone_size, 0xF00F);
uniform_initializer_utils.cpp 201 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
209 verify_data(storage + (i * element_type->components()), 0,
set_uniform_initializer_tests.cpp 173 verify_data(prog->data->UniformStorage[actual_index].storage, 0, val,
329 verify_data(prog->data->UniformStorage[actual_index].storage, array_size,
  /external/ltp/testcases/kernel/input/
input01.c 35 static int verify_data(struct input_event *iev, int nb);
118 if (verify_data(&iev[i], nb++))
126 static int verify_data(struct input_event *iev, int nb) function
  /external/vboot_reference/tests/
run_rsa_tests.sh 24 ${BIN_DIR}/verify_data $algorithmcounter \
vb2_rsa_tests.sh 24 ${BIN_DIR}/verify_data $algorithmcounter \
  /system/core/fs_mgr/
fs_mgr_avb.cpp 100 static std::pair<size_t, bool> verify_vbmeta_digest(const AvbSlotVerifyData& verify_data,
104 for (size_t n = 0; n < verify_data.num_vbmeta_images; n++) {
105 hasher.update(verify_data.vbmeta_images[n].vbmeta_data,
106 verify_data.vbmeta_images[n].vbmeta_size);
107 total_size += verify_data.vbmeta_images[n].vbmeta_size;
124 bool VerifyVbmetaImages(const AvbSlotVerifyData& verify_data);
200 bool FsManagerAvbVerifier::VerifyVbmetaImages(const AvbSlotVerifyData& verify_data) {
201 if (verify_data.num_vbmeta_images == 0) {
211 verify_vbmeta_digest<SHA256Hasher>(verify_data, digest_);
214 verify_vbmeta_digest<SHA512Hasher>(verify_data, digest_)
    [all...]
  /external/autotest/client/site_tests/firmware_VbootCrypto/src/
Makefile 29 UTIL_BINS = verify_data signature_digest_utility
  /hardware/libhardware/include/hardware/
keymaster0.h 122 int (*verify_data)(const struct keymaster0_device* dev, member in struct:keymaster0_device
keymaster1.h 118 int (*verify_data)(const struct keymaster1_device* dev, const void* signing_params, member in struct:keymaster1_device
  /external/scapy/scapy/layers/tls/crypto/
prf.py 172 The various uses of the PRF (key derivation, computation of verify_data,
228 Return verify_data based on handshake messages, connection end,
231 Every TLS 1.2 cipher suite has a verify_data of length 12. Note also:
261 verify_data = md5_hash + sha1_hash
274 verify_data = self.prf(master_secret, label, s1 + s2, 12)
281 verify_data = self.prf(master_secret, label, s, 12)
283 return verify_data
  /external/autotest/client/common_lib/hosts/
repair_unittest.py     [all...]
  /external/boringssl/src/ssl/
tls13_both.cc 327 const uint8_t *verify_data; local
331 verify_data = hs->expected_client_finished;
338 verify_data = verify_data_buf;
341 int finished_ok = CBS_mem_equal(&msg.body, verify_data, verify_data_len);
478 uint8_t verify_data[EVP_MAX_MD_SIZE]; local
480 if (!tls13_finished_mac(hs, verify_data, &verify_data_len, ssl->server)) {
489 !CBB_add_bytes(&body, verify_data, verify_data_len) ||
tls13_enc.cc 436 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
437 if (!tls13_psk_binder(verify_data, ssl->session->ssl_version, digest,
444 OPENSSL_memcpy(msg + len - hash_len, verify_data, hash_len);
468 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
470 if (!tls13_psk_binder(verify_data, hs->ssl->version, hs->transcript.Digest(),
481 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0;
  /system/core/trusty/keymaster/
trusty_keymaster_device_test.cpp 304 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, ptr, size, message.get(), message_len,
328 device.verify_data(&sig_params, ptr, size, message.get(), message_len, signature, siglen));
350 device.verify_data(&sig_params, ptr, size, message.get(), message_len, signature, siglen));
371 device.verify_data(&sig_params, ptr, size, message.get(), message_len - 1, signature,
392 device.verify_data(&sig_params, ptr, size, message.get(), message_len + 1, signature,
411 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, ptr, size, message,
432 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, ptr, size, message.get(), message_len,
463 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, key, size, message.get(), message_size,
484 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, key, size, message,
555 EXPECT_EQ(KM_ERROR_OK, device.verify_data(&sig_params, key, size, message
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
prf.go 113 finishedVerifyLength = 12 // Length of verify_data in a Finished message.
253 // finishedSum30 calculates the contents of the verify_data member of a SSLv3
288 // clientSum returns the contents of the verify_data member of a client's
300 // serverSum returns the contents of the verify_data member of a server's
  /prebuilts/go/linux-x86/src/crypto/tls/
prf.go 113 finishedVerifyLength = 12 // Length of verify_data in a Finished message.
253 // finishedSum30 calculates the contents of the verify_data member of a SSLv3
288 // clientSum returns the contents of the verify_data member of a client's
300 // serverSum returns the contents of the verify_data member of a server's
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
tlsv1_client_write.c 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_read.c 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
    [all...]
  /external/boringssl/src/ssl/test/runner/
prf.go 114 finishedVerifyLength = 12 // Length of verify_data in a Finished message.
283 // finishedSum30 calculates the contents of the verify_data member of a SSLv3
318 // clientSum returns the contents of the verify_data member of a client's
337 // serverSum returns the contents of the verify_data member of a server's
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 361 ASSERT_TRUE(sDevice->verify_data != NULL)
362 << "Should implement verify_data";
    [all...]

Completed in 732 milliseconds

1 2