/external/chromium_org/third_party/mesa/src/src/glsl/tests/ |
uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/external/mesa3d/src/glsl/tests/ |
uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/system/security/softkeymaster/ |
module.cpp | 69 dev->verify_data = openssl_verify_data;
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 269 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 774 verify_data[1 + 3 + 1] ^= 0x80; 779 pos = hs_start = verify_data;
|
tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
tlsv1_client_read.c | 855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 956 verify_data, TLS_VERIFY_DATA_LEN)) { 957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 963 verify_data, TLS_VERIFY_DATA_LEN); 965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_server_read.c | 992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1129 verify_data, TLS_VERIFY_DATA_LEN)) { 1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1136 verify_data, TLS_VERIFY_DATA_LEN); 1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1139 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/chromium_org/third_party/tlslite/tlslite/ |
messages.py | 700 self.verify_data = bytearray(0) 702 def create(self, verify_data): 703 self.verify_data = verify_data 709 self.verify_data = p.getFixBytes(36) 711 self.verify_data = p.getFixBytes(12) 719 w.addFixSeq(self.verify_data, 1)
|
tlsconnection.py | [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3prot.h | 320 SSL3Opaque verify_data[12]; member in struct:__anon13699
|
ssl3con.c | [all...] |
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 362 ASSERT_TRUE(sDevice->verify_data != NULL) 363 << "Should implement verify_data"; [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 451 dev->verify_data = exynos_km_verify_data;
|
/device/asus/grouper/keymaster/ |
keymaster_grouper.cpp | 920 dev->verify_data = tee_verify_data;
|
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 919 dev->verify_data = tee_verify_data;
|
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 919 dev->verify_data = tee_verify_data;
|
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 778 dev->verify_data = qcom_km_verify_data;
|
/system/security/keystore/ |
keystore.cpp | [all...] |