Searched defs:verify_data (Results 1 - 17 of 17) sorted by relevance

/external/mesa3d/src/glsl/tests/
H A Duniform_initializer_utils.cpp185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function
192 verify_data(storage + (i * element_type->components()), 0,
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_read.c1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1420 verify_data, TLS_VERIFY_DATA_LEN)) {
1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1427 verify_data, TLS_VERIFY_DATA_LEN);
1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_read.c1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1420 verify_data, TLS_VERIFY_DATA_LEN)) {
1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1427 verify_data, TLS_VERIFY_DATA_LEN);
1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_write.c783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
845 pos = hs_start = verify_data;
851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
H A Dtlsv1_server_read.c1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1209 verify_data, TLS_VERIFY_DATA_LEN)) {
1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
1216 verify_data, TLS_VERIFY_DATA_LEN);
1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1219 tlsv1_server_log(conn, "Mismatch in verify_data");
H A Dtlsv1_server_write.c833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local
887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) {
888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN);
897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)");
898 verify_data[1 + 3 + 1] ^= 0x80;
903 pos = hs_start = verify_data;
H A Dtlsv1_client_read.c1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local
1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1420 verify_data, TLS_VERIFY_DATA_LEN)) {
1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1427 verify_data, TLS_VERIFY_DATA_LEN);
1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
/external/robolectric/v3/runtime/
H A Dandroid-all-4.1.2_r1-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...
H A Dandroid-all-4.2.2_r1.2-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...
H A Dandroid-all-4.3_r2-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...
H A Dandroid-all-4.4_r1-robolectric-1.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ...

Completed in 448 milliseconds