/external/mesa3d/src/glsl/tests/ |
H A D | uniform_initializer_utils.cpp | 185 verify_data(gl_constant_value *storage, unsigned storage_array_size, function 192 verify_data(storage + (i * element_type->components()), 0,
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_read.c | 1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1420 verify_data, TLS_VERIFY_DATA_LEN)) { 1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1427 verify_data, TLS_VERIFY_DATA_LEN); 1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_read.c | 1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1420 verify_data, TLS_VERIFY_DATA_LEN)) { 1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1427 verify_data, TLS_VERIFY_DATA_LEN); 1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 783 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 835 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 836 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 841 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 842 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 845 pos = hs_start = verify_data; 851 pos += TLS_VERIFY_DATA_LEN; /* verify_data already in place */
|
H A D | tlsv1_server_read.c | 1072 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1155 tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)", 1161 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1209 verify_data, TLS_VERIFY_DATA_LEN)) { 1210 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1215 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)", 1216 verify_data, TLS_VERIFY_DATA_LEN); 1218 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1219 tlsv1_server_log(conn, "Mismatch in verify_data");
|
H A D | tlsv1_server_write.c | 833 u8 verify_data[1 + 3 + TLS_VERIFY_DATA_LEN]; local 887 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN)) { 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data"); 893 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 894 verify_data + 1 + 3, TLS_VERIFY_DATA_LEN); 897 tlsv1_server_log(conn, "TESTING: Break verify_data (server)"); 898 verify_data[1 + 3 + 1] ^= 0x80; 903 pos = hs_start = verify_data;
|
H A D | tlsv1_client_read.c | 1319 u8 verify_data[TLS_VERIFY_DATA_LEN]; local 1365 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length " 1372 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 1420 verify_data, TLS_VERIFY_DATA_LEN)) { 1421 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data"); 1426 wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)", 1427 verify_data, TLS_VERIFY_DATA_LEN); 1429 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { 1430 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
/external/robolectric/v3/runtime/ |
H A D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.3_r2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |