/external/avb/examples/things/ |
H A D | avb_atx_slot_verify.h | 77 AvbSlotVerifyData** verify_data,
|
H A D | avb_atx_slot_verify.c | 131 AvbSlotVerifyData** verify_data, 151 verify_data); 159 for (i = 0; i < (*verify_data)->num_vbmeta_images; i++) { 161 (*verify_data)->vbmeta_images[i].vbmeta_data, 162 (*verify_data)->vbmeta_images[i].vbmeta_size); 169 uint64_t rollback_index_value = (*verify_data)->rollback_indexes[i]; 198 avb_slot_verify_data_free(*verify_data); 199 *verify_data = NULL; 125 avb_atx_slot_verify( AvbAtxOps* atx_ops, const char* ab_suffix, AvbAtxLockState lock_state, AvbAtxSlotState slot_state, AvbAtxOemDataState oem_data_state, AvbSlotVerifyData** verify_data, uint8_t vbh_extension[AVB_SHA256_DIGEST_SIZE]) argument
|
/external/mesa3d/src/compiler/glsl/tests/ |
H A D | uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
H A D | copy_constant_to_storage_tests.cpp | 84 verify_data(storage, 0, val, red_zone_size, 0xF00F); 104 verify_data(storage, 0, val, red_zone_size, 0xF00F); 124 verify_data(storage, 0, val, red_zone_size, 0xF00F); 144 verify_data(storage, 0, val, red_zone_size, 0xF00F); 169 verify_data(storage, 0, val, red_zone_size, 0xF00F);
|
H A D | uniform_initializer_utils.cpp | 201 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 209 verify_data(storage + (i * element_type->components()), 0,
|
H A D | set_uniform_initializer_tests.cpp | 173 verify_data(prog->data->UniformStorage[actual_index].storage, 0, val, 329 verify_data(prog->data->UniformStorage[actual_index].storage, array_size,
|
/external/ltp/testcases/kernel/input/ |
H A D | input01.c | 35 static int verify_data(struct input_event *iev, int nb); 118 if (verify_data(&iev[i], nb++)) 126 static int verify_data(struct input_event *iev, int nb) function
|
/external/vboot_reference/tests/ |
H A D | run_rsa_tests.sh | 24 ${BIN_DIR}/verify_data $algorithmcounter \
|
H A D | vb2_rsa_tests.sh | 24 ${BIN_DIR}/verify_data $algorithmcounter \
|
/external/autotest/client/site_tests/firmware_VbootCrypto/src/ |
H A D | Makefile | 29 UTIL_BINS = verify_data signature_digest_utility
|
/external/scapy/scapy/layers/tls/crypto/ |
H A D | prf.py | 172 The various uses of the PRF (key derivation, computation of verify_data, 228 Return verify_data based on handshake messages, connection end, 231 Every TLS 1.2 cipher suite has a verify_data of length 12. Note also: 261 verify_data = md5_hash + sha1_hash 274 verify_data = self.prf(master_secret, label, s1 + s2, 12) 281 verify_data = self.prf(master_secret, label, s, 12) 283 return verify_data
|
/external/autotest/client/common_lib/hosts/ |
H A D | repair_unittest.py | 884 Create `verify_data` for the `RepairStrategy` constructor. 886 `RepairStrategy` expects `verify_data` as a list of tuples 889 creates one entry in the returned list of `verify_data` tuples 898 tuple in the `verify_data` list. 899 @return A list suitable to be the `verify_data` parameter for 945 verify_data = self._make_verify_data(*verify_input) 947 return hosts.RepairStrategy(verify_data, repair_data) 976 `verify_data`. Functional testing here is mainly confined to 990 verify_data = self._make_verify_data(('main', 0, ())) 991 strategy = hosts.RepairStrategy(verify_data, []) [all...] |
/external/boringssl/src/ssl/ |
H A D | tls13_both.cc | 327 const uint8_t *verify_data; local 331 verify_data = hs->expected_client_finished; 338 verify_data = verify_data_buf; 341 int finished_ok = CBS_mem_equal(&msg.body, verify_data, verify_data_len); 478 uint8_t verify_data[EVP_MAX_MD_SIZE]; local 480 if (!tls13_finished_mac(hs, verify_data, &verify_data_len, ssl->server)) { 489 !CBB_add_bytes(&body, verify_data, verify_data_len) ||
|
H A D | tls13_enc.cc | 436 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local 437 if (!tls13_psk_binder(verify_data, ssl->session->ssl_version, digest, 444 OPENSSL_memcpy(msg + len - hash_len, verify_data, hash_len); 468 uint8_t verify_data[EVP_MAX_MD_SIZE] = {0}; local 470 if (!tls13_psk_binder(verify_data, hs->ssl->version, hs->transcript.Digest(), 481 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_client_read.c | 1316 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1362 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1369 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1417 verify_data, TLS_VERIFY_DATA_LEN)) { 1418 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1423 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1424 verify_data, TLS_VERIFY_DATA_LEN); 1426 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1427 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/scapy/scapy/layers/tls/ |
H A D | handshake.py | 991 verify_data = s.rcs.prf.compute_verify_data(con_end, "read", 993 if self.vdata != verify_data: 998 verify_data = s.compute_tls13_verify_data(con_end, "read") 999 if self.vdata != verify_data:
|