HomeSort by relevance Sort by last modified time
    Searched refs:verify_data (Results 1 - 25 of 28) sorted by null

1 2

  /external/chromium_org/third_party/mesa/src/src/glsl/tests/
uniform_initializer_utils.h 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
copy_constant_to_storage_tests.cpp 82 verify_data(storage, 0, val, red_zone_size);
101 verify_data(storage, 0, val, red_zone_size);
120 verify_data(storage, 0, val, red_zone_size);
139 verify_data(storage, 0, val, red_zone_size);
163 verify_data(storage, 0, val, red_zone_size);
uniform_initializer_utils.cpp 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
set_uniform_initializer_tests.cpp 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val,
335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
  /external/mesa3d/src/glsl/tests/
uniform_initializer_utils.h 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
copy_constant_to_storage_tests.cpp 82 verify_data(storage, 0, val, red_zone_size);
101 verify_data(storage, 0, val, red_zone_size);
120 verify_data(storage, 0, val, red_zone_size);
139 verify_data(storage, 0, val, red_zone_size);
163 verify_data(storage, 0, val, red_zone_size);
uniform_initializer_utils.cpp 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
set_uniform_initializer_tests.cpp 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val,
335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
  /system/security/softkeymaster/
module.cpp 70 dev->verify_data = openssl_verify_data;
  /libcore/crypto/src/main/java/org/conscrypt/
HandshakeProtocol.java 133 // reference verify_data used to verify finished message
134 private byte[] verify_data = new byte[12]; field in class:HandshakeProtocol
330 * Computers reference TLS verify_data that is used to verify finished message
335 computerVerifyDataTLS(label, verify_data);
339 * Computer TLS verify_data
361 * Computer reference SSLv3 verify_data that is used to verify finished message
366 verify_data = new byte[36];
367 computerVerifyDataSSLv3(sender, verify_data);
371 * Computer SSLv3 verify_data
418 if (!Arrays.equals(verify_data, data))
    [all...]
ClientHandshakeImpl.java 338 byte[] verify_data;
340 verify_data = new byte[12];
341 computerVerifyDataTLS("client finished", verify_data);
343 verify_data = new byte[36];
344 computerVerifyDataSSLv3(SSLv3Constants.client, verify_data);
346 clientFinished = new Finished(verify_data);
ServerHandshakeImpl.java 603 byte[] verify_data;
606 verify_data = new byte[12];
607 computerVerifyDataTLS("server finished", verify_data);
609 verify_data = new byte[36];
610 computerVerifyDataSSLv3(SSLv3Constants.server, verify_data);
612 serverFinished = new Finished(verify_data);
  /hardware/libhardware/include/hardware/
keymaster.h 230 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
  /external/chromium_org/third_party/tlslite/tlslite/
messages.py 559 self.verify_data = createByteArraySequence([])
561 def create(self, verify_data):
562 self.verify_data = verify_data
568 self.verify_data = p.getFixBytes(36)
570 self.verify_data = p.getFixBytes(12)
578 w.addFixSeq(self.verify_data, 1)
TLSRecordLayer.py     [all...]
  /external/chromium_org/net/third_party/nss/ssl/
ssl3prot.h 319 SSL3Opaque verify_data[12]; member in struct:__anon11507
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_write.c 576 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
630 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
631 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
636 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
637 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
640 pos = hs_start = verify_data;
tlsv1_client_read.c 764 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
810 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
865 verify_data, TLS_VERIFY_DATA_LEN)) {
866 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
871 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
872 verify_data, TLS_VERIFY_DATA_LEN);
874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
875 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
tlsv1_server_read.c 1067 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1113 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1168 verify_data, TLS_VERIFY_DATA_LEN)) {
1169 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1174 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1175 verify_data, TLS_VERIFY_DATA_LEN);
1177 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1178 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 361 ASSERT_TRUE(sDevice->verify_data != NULL)
362 << "Should implement verify_data";
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 451 dev->verify_data = exynos_km_verify_data;
  /device/asus/grouper/keymaster/
keymaster_grouper.cpp 919 dev->verify_data = tee_verify_data;
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 919 dev->verify_data = tee_verify_data;
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 919 dev->verify_data = tee_verify_data;

Completed in 2378 milliseconds

1 2