Searched refs:verify_data (Results 1 - 5 of 5) sorted by relevance
/freebsd-13-stable/contrib/libarchive/libarchive/test/ |
H A D | test_read_format_rar5.c | 65 int verify_data(const uint8_t* data_ptr, int magic, int size) { function 171 verify_data(buff, 0, DATA_SIZE); 190 assertA(verify_data(buff, 1, DATA_SIZE)); 196 assertA(verify_data(buff, 2, DATA_SIZE)); 202 assertA(verify_data(buff, 3, DATA_SIZE)); 208 assertA(verify_data(buff, 4, DATA_SIZE)); 233 assertA(verify_data(buff, 1, DATA_SIZE)); 239 assertA(verify_data(buff, 2, DATA_SIZE)); 245 assertA(verify_data(buff, 3, DATA_SIZE)); 251 assertA(verify_data(buf [all...] |
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server_write.c | 836 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 890 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 891 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 896 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 897 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 900 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 901 verify_data[1 + 3 + 1] ^= 0x80; 906 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 786 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 838 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 839 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 844 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 845 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 848 pos = hs_start = verify_data; 854 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1100 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1183 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1189 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1237 verify_data, TLS_VERIFY_DATA_LEN)) { 1238 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1244 verify_data, TLS_VERIFY_DATA_LEN); 1246 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1247 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_client_read.c | 1316 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1362 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1369 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1417 verify_data, TLS_VERIFY_DATA_LEN)) { 1418 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1423 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1424 verify_data, TLS_VERIFY_DATA_LEN); 1426 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1427 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
Completed in 75 milliseconds