/external/chromium_org/third_party/mesa/src/src/glsl/tests/ |
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
/external/mesa3d/src/glsl/tests/ |
uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 956 verify_data, TLS_VERIFY_DATA_LEN)) { 957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 963 verify_data, TLS_VERIFY_DATA_LEN); 965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
tlsv1_server_write.c | 709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 774 verify_data[1 + 3 + 1] ^= 0x80; 779 pos = hs_start = verify_data;
|
tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
tlsv1_server_read.c | 992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1129 verify_data, TLS_VERIFY_DATA_LEN)) { 1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1136 verify_data, TLS_VERIFY_DATA_LEN); 1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1139 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 269 int (*verify_data)(const struct keymaster_device* dev, member in struct:keymaster_device
|
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3prot.h | 320 SSL3Opaque verify_data[12]; member in struct:__anon13699
|