Searched defs:verify_data (Results 1 - 15 of 15) sorted by relevance

/external/chromium_org/third_party/mesa/src/src/glsl/tests/
H A Duniform_initializer_utils.cpp185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
/external/mesa3d/src/glsl/tests/
H A Duniform_initializer_utils.cpp185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3prot.h320 SSL3Opaque verify_data[12]; member in struct:__anon9694

Completed in 5829 milliseconds