Searched refs:verify_data (Results 1 - 7 of 7) sorted by relevance
/external/chromium/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 307 SSL3Opaque verify_data[12]; member in struct:__anon1167
|
H A D | ssl3con.c | 7786 rv |= PK11_DigestFinal(prf_context, tlsFinished->verify_data, 7787 &len, sizeof tlsFinished->verify_data); 7799 outData.data = tlsFinished->verify_data; 7800 outData.len = sizeof tlsFinished->verify_data; 7803 outData.len == sizeof tlsFinished->verify_data);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 596 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 629 verify_data, TLS_VERIFY_DATA_LEN)) { 630 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 635 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 636 verify_data, TLS_VERIFY_DATA_LEN); 647 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
|
H A D | tlsv1_server_write.c | 588 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 621 verify_data, TLS_VERIFY_DATA_LEN)) { 622 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 627 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 628 verify_data, TLS_VERIFY_DATA_LEN); 639 os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
|
H A D | tlsv1_client_read.c | 762 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 808 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 815 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 842 verify_data, TLS_VERIFY_DATA_LEN)) { 843 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 848 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 849 verify_data, TLS_VERIFY_DATA_LEN); 851 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 852 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
H A D | tlsv1_server_read.c | 973 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1019 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1026 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1053 verify_data, TLS_VERIFY_DATA_LEN)) { 1054 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1059 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1060 verify_data, TLS_VERIFY_DATA_LEN); 1062 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1063 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/wpa_supplicant/ |
H A D | tlsv1_client.c | 960 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1006 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1013 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1040 verify_data, TLS_VERIFY_DATA_LEN)) { 1041 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1046 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1047 verify_data, TLS_VERIFY_DATA_LEN); 1049 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1050 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data"); 1592 u8 verify_data[TLS_VERIFY_DATA_LE local [all...] |
Completed in 376 milliseconds