Searched refs:verify_data (Results 1 - 24 of 24) sorted by relevance

/external/chromium_org/third_party/mesa/src/src/glsl/tests/
H A Duniform_initializer_utils.h46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
H A Dcopy_constant_to_storage_tests.cpp82 verify_data(storage, 0, val, red_zone_size);
101 verify_data(storage, 0, val, red_zone_size);
120 verify_data(storage, 0, val, red_zone_size);
139 verify_data(storage, 0, val, red_zone_size);
163 verify_data(storage, 0, val, red_zone_size);
H A Duniform_initializer_utils.cpp185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
H A Dset_uniform_initializer_tests.cpp179 verify_data(prog->UniformStorage[actual_index].storage, 0, val,
335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
/external/mesa3d/src/glsl/tests/
H A Duniform_initializer_utils.h46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
H A Dcopy_constant_to_storage_tests.cpp82 verify_data(storage, 0, val, red_zone_size);
101 verify_data(storage, 0, val, red_zone_size);
120 verify_data(storage, 0, val, red_zone_size);
139 verify_data(storage, 0, val, red_zone_size);
163 verify_data(storage, 0, val, red_zone_size);
H A Duniform_initializer_utils.cpp185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
H A Dset_uniform_initializer_tests.cpp179 verify_data(prog->UniformStorage[actual_index].storage, 0, val,
335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_server_write.c709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
774 verify_data[1 + 3 + 1] ^= 0x80;
779 pos = hs_start = verify_data;
H A Dtlsv1_client_write.c645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
707 pos = hs_start = verify_data;
713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_client_read.c855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
956 verify_data, TLS_VERIFY_DATA_LEN)) {
957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
963 verify_data, TLS_VERIFY_DATA_LEN);
965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
H A Dtlsv1_server_read.c992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1129 verify_data, TLS_VERIFY_DATA_LEN)) {
1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1136 verify_data, TLS_VERIFY_DATA_LEN);
1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1139 tlsv1_server_log(conn, "Mismatch in verify_data");
/external/chromium_org/third_party/tlslite/tlslite/
H A Dmessages.py700 self.verify_data = bytearray(0)
702 def create(self, verify_data):
703 self.verify_data = verify_data
709 self.verify_data = p.getFixBytes(36)
711 self.verify_data = p.getFixBytes(12)
719 w.addFixSeq(self.verify_data, 1)
H A Dtlsconnection.py1887 if finished.verify_data != verifyData:
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3prot.h320 SSL3Opaque verify_data[12]; member in struct:__anon9694
H A Dssl3con.c10606 hashes->len, tlsFinished->verify_data,
10607 sizeof tlsFinished->verify_data);

Completed in 873 milliseconds