/external/chromium_org/third_party/mesa/src/src/glsl/tests/ |
H A D | uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
H A D | copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
H A D | uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
H A D | set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/external/mesa3d/src/glsl/tests/ |
H A D | uniform_initializer_utils.h | 46 verify_data(gl_constant_value *storage, unsigned storage_array_size,
|
H A D | copy_constant_to_storage_tests.cpp | 82 verify_data(storage, 0, val, red_zone_size); 101 verify_data(storage, 0, val, red_zone_size); 120 verify_data(storage, 0, val, red_zone_size); 139 verify_data(storage, 0, val, red_zone_size); 163 verify_data(storage, 0, val, red_zone_size);
|
H A D | uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
H A D | set_uniform_initializer_tests.cpp | 179 verify_data(prog->UniformStorage[actual_index].storage, 0, val, 335 verify_data(prog->UniformStorage[actual_index].storage, array_size,
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_write.c | 709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 774 verify_data[1 + 3 + 1] ^= 0x80; 779 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_client_read.c | 855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 956 verify_data, TLS_VERIFY_DATA_LEN)) { 957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 963 verify_data, TLS_VERIFY_DATA_LEN); 965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
H A D | tlsv1_server_read.c | 992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1129 verify_data, TLS_VERIFY_DATA_LEN)) { 1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1136 verify_data, TLS_VERIFY_DATA_LEN); 1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1139 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_write.c | 709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 774 verify_data[1 + 3 + 1] ^= 0x80; 779 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_client_read.c | 855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 956 verify_data, TLS_VERIFY_DATA_LEN)) { 957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 963 verify_data, TLS_VERIFY_DATA_LEN); 965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
H A D | tlsv1_server_read.c | 992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1129 verify_data, TLS_VERIFY_DATA_LEN)) { 1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1136 verify_data, TLS_VERIFY_DATA_LEN); 1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1139 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_write.c | 709 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 763 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 764 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 769 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 770 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 773 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 774 verify_data[1 + 3 + 1] ^= 0x80; 779 pos = hs_start = verify_data;
|
H A D | tlsv1_client_write.c | 645 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 697 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 698 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 703 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 704 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 707 pos = hs_start = verify_data; 713 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_client_read.c | 855 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 901 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 908 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 956 verify_data, TLS_VERIFY_DATA_LEN)) { 957 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 962 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 963 verify_data, TLS_VERIFY_DATA_LEN); 965 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 966 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
H A D | tlsv1_server_read.c | 992 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1075 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1081 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1129 verify_data, TLS_VERIFY_DATA_LEN)) { 1130 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1135 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1136 verify_data, TLS_VERIFY_DATA_LEN); 1138 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1139 tlsv1_server_log(conn, "Mismatch in verify_data");
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | messages.py | 700 self.verify_data = bytearray(0) 702 def create(self, verify_data): 703 self.verify_data = verify_data 709 self.verify_data = p.getFixBytes(36) 711 self.verify_data = p.getFixBytes(12) 719 w.addFixSeq(self.verify_data, 1)
|
H A D | tlsconnection.py | 1887 if finished.verify_data != verifyData:
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 320 SSL3Opaque verify_data[12]; member in struct:__anon9694
|
H A D | ssl3con.c | 10606 hashes->len, tlsFinished->verify_data, 10607 sizeof tlsFinished->verify_data);
|