Searched refs:verify_data (Results 1 - 25 of 33) sorted by relevance

12

/external/avb/examples/things/
H A Davb_atx_slot_verify.h77 AvbSlotVerifyData** verify_data,
H A Davb_atx_slot_verify.c131 AvbSlotVerifyData** verify_data,
151 verify_data);
159 for (i = 0; i < (*verify_data)->num_vbmeta_images; i++) {
161 (*verify_data)->vbmeta_images[i].vbmeta_data,
162 (*verify_data)->vbmeta_images[i].vbmeta_size);
169 uint64_t rollback_index_value = (*verify_data)->rollback_indexes[i];
198 avb_slot_verify_data_free(*verify_data);
199 *verify_data = NULL;
125 avb_atx_slot_verify( AvbAtxOps* atx_ops, const char* ab_suffix, AvbAtxLockState lock_state, AvbAtxSlotState slot_state, AvbAtxOemDataState oem_data_state, AvbSlotVerifyData** verify_data, uint8_t vbh_extension[AVB_SHA256_DIGEST_SIZE]) argument
/external/mesa3d/src/compiler/glsl/tests/
H A Duniform_initializer_utils.h46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
H A Dcopy_constant_to_storage_tests.cpp84 verify_data(storage, 0, val, red_zone_size, 0xF00F);
104 verify_data(storage, 0, val, red_zone_size, 0xF00F);
124 verify_data(storage, 0, val, red_zone_size, 0xF00F);
144 verify_data(storage, 0, val, red_zone_size, 0xF00F);
169 verify_data(storage, 0, val, red_zone_size, 0xF00F);
H A Duniform_initializer_utils.cpp201 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
209 verify_data(storage + (i * element_type->components()), 0,
H A Dset_uniform_initializer_tests.cpp173 verify_data(prog->data->UniformStorage[actual_index].storage, 0, val,
329 verify_data(prog->data->UniformStorage[actual_index].storage, array_size,
/external/ltp/testcases/kernel/input/
H A Dinput01.c35 static int verify_data(struct input_event *iev, int nb);
118 if (verify_data(&iev[i], nb++))
126 static int verify_data(struct input_event *iev, int nb) function
/external/vboot_reference/tests/
H A Drun_rsa_tests.sh24 ${BIN_DIR}/verify_data $algorithmcounter \
H A Dvb2_rsa_tests.sh24 ${BIN_DIR}/verify_data $algorithmcounter \
/external/autotest/client/site_tests/firmware_VbootCrypto/src/
H A DMakefile29 UTIL_BINS = verify_data signature_digest_utility
/external/scapy/scapy/layers/tls/crypto/
H A Dprf.py172 The various uses of the PRF (key derivation, computation of verify_data,
228 Return verify_data based on handshake messages, connection end,
231 Every TLS 1.2 cipher suite has a verify_data of length 12. Note also:
261 verify_data = md5_hash + sha1_hash
274 verify_data = self.prf(master_secret, label, s1 + s2, 12)
281 verify_data = self.prf(master_secret, label, s, 12)
283 return verify_data
/external/autotest/client/common_lib/hosts/
H A Drepair_unittest.py884 Create `verify_data` for the `RepairStrategy` constructor.
886 `RepairStrategy` expects `verify_data` as a list of tuples
889 creates one entry in the returned list of `verify_data` tuples
898 tuple in the `verify_data` list.
899 @return A list suitable to be the `verify_data` parameter for
945 verify_data = self._make_verify_data(*verify_input)
947 return hosts.RepairStrategy(verify_data, repair_data)
976 `verify_data`. Functional testing here is mainly confined to
990 verify_data = self._make_verify_data(('main', 0, ()))
991 strategy = hosts.RepairStrategy(verify_data, [])
[all...]
/external/boringssl/src/ssl/
H A Dtls13_both.cc327 const uint8_t *verify_data; local
331 verify_data = hs->expected_client_finished;
338 verify_data = verify_data_buf;
341 int finished_ok = CBS_mem_equal(&msg.body, verify_data, verify_data_len);
478 uint8_t verify_data[EVP_MAX_MD_SIZE]; local
480 if (!tls13_finished_mac(hs, verify_data, &verify_data_len, ssl->server)) {
489 !CBB_add_bytes(&body, verify_data, verify_data_len) ||
H A Dtls13_enc.cc436 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
437 if (!tls13_psk_binder(verify_data, ssl->session->ssl_version, digest,
444 OPENSSL_memcpy(msg + len - hash_len, verify_data, hash_len);
468 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local
470 if (!tls13_psk_binder(verify_data, hs->ssl->version, hs->transcript.Digest(),
481 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_client_read.c1316 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1362 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1369 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1417 verify_data, TLS_VERIFY_DATA_LEN)) {
1418 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1423 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1424 verify_data, TLS_VERIFY_DATA_LEN);
1426 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1427 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
/external/scapy/scapy/layers/tls/
H A Dhandshake.py991 verify_data = s.rcs.prf.compute_verify_data(con_end, "read",
993 if self.vdata != verify_data:
998 verify_data = s.compute_tls13_verify_data(con_end, "read")
999 if self.vdata != verify_data:

Completed in 566 milliseconds

12