Searched refs:verify_data (Results 1 - 5 of 5) sorted by relevance
/freebsd-current/contrib/libarchive/libarchive/test/ |
H A D | test_read_format_rar5.c | 65 int verify_data(const uint8_t* data_ptr, int magic, int size) { function 171 assertA(1 == verify_data(buff, 0, DATA_SIZE)); 190 assertA(1 == verify_data(buff, 1, DATA_SIZE)); 196 assertA(1 == verify_data(buff, 2, DATA_SIZE)); 202 assertA(1 == verify_data(buff, 3, DATA_SIZE)); 208 assertA(1 == verify_data(buff, 4, DATA_SIZE)); 233 assertA(1 == verify_data(buff, 1, DATA_SIZE)); 239 assertA(1 == verify_data(buff, 2, DATA_SIZE)); 245 assertA(1 == verify_data(buff, 3, DATA_SIZE)); 251 assertA(1 == verify_data(buf [all...] |
/freebsd-current/contrib/wpa/src/tls/ |
H A D | tlsv1_server_write.c | 836 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 890 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 891 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 896 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 897 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 900 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 901 verify_data[1 + 3 + 1] ^= 0x80; 906 pos = hs_start = verify_data;
|
H A D | tlsv1_server_read.c | 1100 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1183 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1189 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1237 verify_data, TLS_VERIFY_DATA_LEN)) { 1238 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1244 verify_data, TLS_VERIFY_DATA_LEN); 1246 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1247 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_client_write.c | 774 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 826 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 827 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 832 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 833 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 836 pos = hs_start = verify_data; 842 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_client_read.c | 1324 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1370 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1377 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1425 verify_data, TLS_VERIFY_DATA_LEN)) { 1426 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1431 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1432 verify_data, TLS_VERIFY_DATA_LEN); 1434 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1435 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
Completed in 107 milliseconds