HomeSort by relevance Sort by last modified time
    Searched refs:verify_data (Results 1 - 19 of 19) sorted by null

  /external/mesa3d/src/glsl/tests/
uniform_initializer_utils.h 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
copy_constant_to_storage_tests.cpp 82 verify_data(storage, 0, val, red_zone_size);
101 verify_data(storage, 0, val, red_zone_size);
120 verify_data(storage, 0, val, red_zone_size);
139 verify_data(storage, 0, val, red_zone_size);
163 verify_data(storage, 0, val, red_zone_size);
uniform_initializer_utils.cpp 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
set_uniform_initializer_tests.cpp 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val,
335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
  /external/vboot_reference/tests/
run_rsa_tests.sh 24 ${BIN_DIR}/verify_data $algorithmcounter \
vb2_rsa_tests.sh 24 ${BIN_DIR}/verify_data $algorithmcounter \
  /external/autotest/client/site_tests/firmware_VbootCrypto/src/
Makefile 29 UTIL_BINS = verify_data signature_digest_utility
  /hardware/libhardware/include/hardware/
keymaster0.h 122 int (*verify_data)(const struct keymaster0_device* dev, member in struct:keymaster0_device
keymaster1.h 118 int (*verify_data)(const struct keymaster1_device* dev, const void* signing_params, member in struct:keymaster1_device
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
tlsv1_client_write.c 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
tlsv1_server_read.c 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
    [all...]
tlsv1_client_read.c 1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
    [all...]
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 362 ASSERT_TRUE(sDevice->verify_data != NULL)
363 << "Should implement verify_data";
    [all...]
  /system/keymaster/
android_keymaster_test_utils.h 342 verify_data = counting_verify_data;
451 return device(dev)->verify_data(device(dev), signing_params, dup_blob.get(),
soft_keymaster_device.cpp 248 km1_device_.verify_data = nullptr;
    [all...]
  /system/security/softkeymaster/
keymaster_openssl.cpp 764 dev->verify_data = openssl_verify_data;
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 778 dev->verify_data = qcom_km_verify_data;
  /external/vboot_reference/
Makefile 560 utility/verify_data
    [all...]

Completed in 527 milliseconds