/external/chromium_org/third_party/mesa/src/src/glsl/tests/ |
uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/external/mesa3d/src/glsl/tests/ |
uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/system/security/softkeymaster/ |
module.cpp | 70 dev->verify_data = openssl_verify_data;
|
/libcore/crypto/src/main/java/org/conscrypt/ |
HandshakeProtocol.java | 133 // reference verify_data used to verify finished message 134 private byte[] verify_data = new byte[12]; field in class:HandshakeProtocol 330 * Computers reference TLS verify_data that is used to verify finished message 335 computerVerifyDataTLS(label, verify_data); 339 * Computer TLS verify_data 361 * Computer reference SSLv3 verify_data that is used to verify finished message 366 verify_data = new byte[36]; 367 computerVerifyDataSSLv3(sender, verify_data); 371 * Computer SSLv3 verify_data 418 if (!Arrays.equals(verify_data, data)) [all...] |
ClientHandshakeImpl.java | 338 byte[] verify_data; 340 verify_data = new byte[12]; 341 computerVerifyDataTLS("client finished", verify_data); 343 verify_data = new byte[36]; 344 computerVerifyDataSSLv3(SSLv3Constants.client, verify_data); 346 clientFinished = new Finished(verify_data);
|
ServerHandshakeImpl.java | 603 byte[] verify_data; 606 verify_data = new byte[12]; 607 computerVerifyDataTLS("server finished", verify_data); 609 verify_data = new byte[36]; 610 computerVerifyDataSSLv3(SSLv3Constants.server, verify_data); 612 serverFinished = new Finished(verify_data);
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 230 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
|
/external/chromium_org/third_party/tlslite/tlslite/ |
messages.py | 559 self.verify_data = createByteArraySequence([]) 561 def create(self, verify_data): 562 self.verify_data = verify_data 568 self.verify_data = p.getFixBytes(36) 570 self.verify_data = p.getFixBytes(12) 578 w.addFixSeq(self.verify_data, 1)
|
TLSRecordLayer.py | [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3prot.h | 319 SSL3Opaque verify_data[12]; member in struct:__anon11507
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
tlsv1_server_write.c | 576 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 630 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 631 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 636 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 637 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 640 pos = hs_start = verify_data;
|
tlsv1_client_read.c | 764 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 810 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 865 verify_data, TLS_VERIFY_DATA_LEN)) { 866 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 871 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 872 verify_data, TLS_VERIFY_DATA_LEN); 874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 875 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_server_read.c | 1067 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1113 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1168 verify_data, TLS_VERIFY_DATA_LEN)) { 1169 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1174 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1175 verify_data, TLS_VERIFY_DATA_LEN); 1177 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1178 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 361 ASSERT_TRUE(sDevice->verify_data != NULL) 362 << "Should implement verify_data"; [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 451 dev->verify_data = exynos_km_verify_data;
|
/device/asus/grouper/keymaster/ |
keymaster_grouper.cpp | 919 dev->verify_data = tee_verify_data;
|
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 919 dev->verify_data = tee_verify_data;
|
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 919 dev->verify_data = tee_verify_data;
|