Searched refs:verify_data (Results 1 - 5 of 5) sorted by relevance

/freebsd-current/contrib/libarchive/libarchive/test/
H A Dtest_read_format_rar5.c65 int verify_data(const uint8_t* data_ptr, int magic, int size) { function
171 assertA(1 == verify_data(buff, 0, DATA_SIZE));
190 assertA(1 == verify_data(buff, 1, DATA_SIZE));
196 assertA(1 == verify_data(buff, 2, DATA_SIZE));
202 assertA(1 == verify_data(buff, 3, DATA_SIZE));
208 assertA(1 == verify_data(buff, 4, DATA_SIZE));
233 assertA(1 == verify_data(buff, 1, DATA_SIZE));
239 assertA(1 == verify_data(buff, 2, DATA_SIZE));
245 assertA(1 == verify_data(buff, 3, DATA_SIZE));
251 assertA(1 == verify_data(buf
[all...]
/freebsd-current/contrib/wpa/src/tls/
H A Dtlsv1_server_write.c836 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
890 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
891 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
896 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
897 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
900 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
901 verify_data[1 + 3 + 1] ^= 0x80;
906 pos = hs_start = verify_data;
H A Dtlsv1_server_read.c1100 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1183 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1189 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1237 verify_data, TLS_VERIFY_DATA_LEN)) {
1238 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1244 verify_data, TLS_VERIFY_DATA_LEN);
1246 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1247 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_client_write.c774 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
826 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
827 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
832 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
833 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
836 pos = hs_start = verify_data;
842 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_client_read.c1324 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1370 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1377 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1425 verify_data, TLS_VERIFY_DATA_LEN)) {
1426 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1431 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1432 verify_data, TLS_VERIFY_DATA_LEN);
1434 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1435 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");

Completed in 107 milliseconds