/third_party/node/test/parallel/ |
D | test-webcrypto-webidl.js | 129 for (const good of [{}, [], new Array(), function() {}]) { 130 assert.deepStrictEqual(converters.object(good), good); 144 for (const good of [Buffer.alloc(0), new Uint8Array()]) { 145 assert.deepStrictEqual(converters.Uint8Array(good), good); 165 for (const good of [ 181 assert.deepStrictEqual(converters.BufferSource(good), good); 226 for (const good of [ 234 assert.deepStrictEqual(converters.JsonWebKey(good), good); 235 assert.deepStrictEqual(converters.JsonWebKey({ ...good, filtered: 'out' }), good); 241 for (const good of ['jwk', 'spki', 'pkcs8', 'raw']) { [all …]
|
/third_party/openssl/test/recipes/ |
D | 15-test_genrsa.t | 45 my $good = 11; # Log2 of number of bits (2 << 11 == 2048) 47 while ($good > $bad + 1) { 48 my $checked = int(($good + $bad + 1) / 2); 56 $good = $checked; 62 $good++ if $good == $bad; 63 $good = 2 ** $good; 64 note "Found lowest allowed amount of bits to be $good"; 68 '-pkeyopt', "rsa_keygen_bits:$good", 70 "genpkey $good"); 96 ok(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', $good ])), [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | paramTagWrapping.symbols | 1 === tests/cases/conformance/jsdoc/good.js === 10 function good(x, y, z) { 11 >good : Symbol(good, Decl(good.js, 0, 0)) 12 >x : Symbol(x, Decl(good.js, 8, 14)) 13 >y : Symbol(y, Decl(good.js, 8, 16)) 14 >z : Symbol(z, Decl(good.js, 8, 19)) 17 good(1, 2, 3) 18 >good : Symbol(good, Decl(good.js, 0, 0))
|
D | privateNameInInExpression(target=es2022).errors.txt | 60 n; // good n is never 66 u; // good u is Foo 68 u; // good u is object | null 73 u; // good u is Foo 75 u; // good u is object 79 u; // good u is Foo 83 u; // good u is typeof Foo 87 u; // good u is typeof Foo 93 fb; // good fb is Foo 95 fb; // good fb is Bar [all …]
|
D | privateNameInInExpression(target=esnext).errors.txt | 60 n; // good n is never 66 u; // good u is Foo 68 u; // good u is object | null 73 u; // good u is Foo 75 u; // good u is object 79 u; // good u is Foo 83 u; // good u is typeof Foo 87 u; // good u is typeof Foo 93 fb; // good fb is Foo 95 fb; // good fb is Bar [all …]
|
D | privateNameInInExpression(target=es2022).types | 139 n; // good n is never 148 u; // good u is Foo 152 u; // good u is object | null 166 u; // good u is Foo 170 u; // good u is object 179 u; // good u is Foo 188 u; // good u is typeof Foo 197 u; // good u is typeof Foo 208 fb; // good fb is Foo 212 fb; // good fb is Bar [all …]
|
D | privateNameInInExpression(target=esnext).types | 139 n; // good n is never 148 u; // good u is Foo 152 u; // good u is object | null 166 u; // good u is Foo 170 u; // good u is object 179 u; // good u is Foo 188 u; // good u is typeof Foo 197 u; // good u is typeof Foo 208 fb; // good fb is Foo 212 fb; // good fb is Bar [all …]
|
D | paramTagWrapping.types | 1 === tests/cases/conformance/jsdoc/good.js === 10 function good(x, y, z) { 11 >good : (x: number, y: number, z: number) => void 17 good(1, 2, 3) 18 >good(1, 2, 3) : void 19 >good : (x: number, y: number, z: number) => void
|
D | privateNameInInExpression(target=esnext).symbols | 116 n; // good n is never 124 u; // good u is Foo 128 u; // good u is object | null 139 u; // good u is Foo 143 u; // good u is object 151 u; // good u is Foo 159 u; // good u is typeof Foo 167 u; // good u is typeof Foo 177 fb; // good fb is Foo 181 fb; // good fb is Bar [all …]
|
D | privateNameInInExpression(target=es2022).symbols | 116 n; // good n is never 124 u; // good u is Foo 128 u; // good u is object | null 139 u; // good u is Foo 143 u; // good u is object 151 u; // good u is Foo 159 u; // good u is typeof Foo 167 u; // good u is typeof Foo 177 fb; // good fb is Foo 181 fb; // good fb is Bar [all …]
|
/third_party/node/test/message/ |
D | if-error-has-good-stack.out | 6 at z (*if-error-has-good-stack.js:*:* 7 at y (*if-error-has-good-stack.js:*:*) 8 at x (*if-error-has-good-stack.js:*:*) 9 at Object.<anonymous> (*if-error-has-good-stack.js:*:*) 10 at c (*if-error-has-good-stack.js:*:*) 11 at b (*if-error-has-good-stack.js:*:*) 12 at a (*if-error-has-good-stack.js:*:*) 13 at Object.<anonymous> (*if-error-has-good-stack.js:*:*) { 17 at c (*if-error-has-good-stack.js:*:*) 18 at b (*if-error-has-good-stack.js:*:*) [all …]
|
/third_party/node/deps/openssl/openssl/ssl/record/ |
D | tls_pad.c | 31 size_t good, 77 size_t good; in ssl3_cbc_remove_padding_and_mac() local 87 good = constant_time_ge_s(*reclen, padding_length + overhead); in ssl3_cbc_remove_padding_and_mac() 89 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 90 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 93 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac() 122 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local 144 good = constant_time_ge_s(*reclen, overhead + padding_length); in tls1_cbc_remove_padding_and_mac() 165 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac() 172 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac() [all …]
|
/third_party/openssl/ssl/record/ |
D | tls_pad.c | 31 size_t good, 77 size_t good; in ssl3_cbc_remove_padding_and_mac() local 87 good = constant_time_ge_s(*reclen, padding_length + overhead); in ssl3_cbc_remove_padding_and_mac() 89 good &= constant_time_ge_s(block_size, padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 90 *reclen -= good & (padding_length + 1); in ssl3_cbc_remove_padding_and_mac() 93 block_size, mac_size, good, libctx); in ssl3_cbc_remove_padding_and_mac() 122 size_t good = -1; in tls1_cbc_remove_padding_and_mac() local 144 good = constant_time_ge_s(*reclen, overhead + padding_length); in tls1_cbc_remove_padding_and_mac() 165 good &= ~(mask & (padding_length ^ b)); in tls1_cbc_remove_padding_and_mac() 172 good = constant_time_eq_s(0xff, good & 0xff); in tls1_cbc_remove_padding_and_mac() [all …]
|
/third_party/ltp/tools/sparse/sparse-src/validation/ |
D | enum-typecheck.c | 1 enum good { G, }; enum 3 enum good g; 5 enum good compat_int(void) { return 1; } in compat_int() 7 void parg(enum good); 10 void farg(enum good a); 13 enum good pret(void); 16 enum good fret(void); 20 enum good *ptr; 23 enum good *gptr = &g;
|
/third_party/libabigail/src/ |
D | abg-ini.cc | 975 good() const in good() function in abigail::ini::read_context 979 return in_.good(); in good() 1019 if (!good()) in handle_escape() 1025 if (!good()) in handle_escape() 1047 if (!good()) in handle_escape() 1083 if (!good()) in read_next_char() 1130 for (char c = peek(); good(); c = peek()) in skip_white_spaces() 1135 return good() || eof(); in skip_white_spaces() 1146 for (char c = peek(); good(); c = peek()) in skip_comments() 1151 return good() || eof(); in skip_comments() [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 15-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
D | 16-dtls-certstatus.cnf | 5 test-0 = 0-certstatus-good 9 [0-certstatus-good] 10 ssl_conf = 0-certstatus-good-ssl 12 [0-certstatus-good-ssl] 13 server = 0-certstatus-good-server 14 client = 0-certstatus-good-client 16 [0-certstatus-good-server] 21 [0-certstatus-good-client] 29 server = 0-certstatus-good-server-extra 31 [0-certstatus-good-server-extra]
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_pk1.c | 174 unsigned int good, found_zero_byte, mask; in RSA_padding_check_PKCS1_type_2() local 208 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2() 209 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2() 226 good &= constant_time_ge(zero_index, 2 + 8); in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 270 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2() 303 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local 326 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2_TLS() [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_pk1.c | 174 unsigned int good, found_zero_byte, mask; in RSA_padding_check_PKCS1_type_2() local 208 good = constant_time_is_zero(em[0]); in RSA_padding_check_PKCS1_type_2() 209 good &= constant_time_eq(em[1], 2); in RSA_padding_check_PKCS1_type_2() 226 good &= constant_time_ge(zero_index, 2 + 8); in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 270 err_clear_last_constant_time(1 & good); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2() 303 unsigned int i, good, version_good; in ossl_rsa_padding_check_PKCS1_type_2_TLS() local 326 good = constant_time_is_zero(from[0]); in ossl_rsa_padding_check_PKCS1_type_2_TLS() [all …]
|
/third_party/python/Lib/test/ |
D | test_robotparser.py | 15 good = [] variable in BaseRobotTest 31 for url in self.good: 53 good = ['/', '/test.html'] variable in UserAgentWildcardTest 70 good = ['/', '/test.html', ('cybermapper', '/cyberworld/map/index.html')] variable in CrawlDelayAndCustomAgentTest 85 good = ['/', '/test.html'] variable in SitemapTest 97 good = [] variable in RejectAllRobotsTest 107 for url in self.good + self.bad: 131 good = ['/foo'] variable in EmptyFileTest 147 good = [('figtree', '/foo.html')] variable in CrawlDelayAndRequestRateTest 166 good = ['/tmp'] variable in InvalidRequestRateTest [all …]
|
/third_party/openssl/test/ |
D | pkey_meth_test.c | 26 int good = 1; in test_asn1_meths() local 34 good = 0; in test_asn1_meths() 38 if (!good) { in test_asn1_meths() 50 return good; in test_asn1_meths() 59 int good = 1; in test_pkey_meths() local 67 good = 0; in test_pkey_meths() 71 if (!good) { in test_pkey_meths() 79 return good; in test_pkey_meths()
|
D | x509_internal_test.c | 32 int prev = -1, good = 1; in test_standard_exts() local 38 good = 0; in test_standard_exts() 42 if (!good) { in test_standard_exts() 48 return good; in test_standard_exts() 83 int good = 1; in test_a2i_ipaddress() local 90 good = 0; in test_a2i_ipaddress() 98 good = 0; in test_a2i_ipaddress() 102 return good; in test_a2i_ipaddress()
|
/third_party/vulkan-headers/ |
D | INTEGRATION.md | 4 …nt in the Vulkan header integration process, include the fix in the known-good update commit, prop… 12 Update the Vulkan-Loader, Vulkan-ValidationLayers, and Vulkan-Tools known-good files 16 …good of a repository needs to be updated, all repositories of interest that appear in its known-go… 23 * Typically the Vulkan-Loader's known-good is updated first, but the Vulkan-ValidationLayers known-… 24 …good files (see the [update LunarG known-good section](https://github.com/KhronosGroup/Vulkan-Head… 47 … warnings must be resolved and included in the pull request for the repository's known-good update. 61 ### 5. Update the known-good files 63 …good commits for each dependent repository. Some repositories require an additional known-good fil… 73 …good files, etc.) in a single commit on a branch and push it up to the online repository. In Vulka… 77 Verify the branch with the proposed known-good commit is rebased on the tip of `master` and create … [all …]
|
/third_party/astc-encoder/Test/ |
D | astc_minify_test.sh | 6 ./astcenc/astcenc-avx2-good -tl in.png out-good.png ${BLOCK_SIZE} ${QUALITY} -silent 10 compare out-good.png out-bad.png out-vs-out-diff.png 13 ./astcenc/astc_test_autoextract ${BLOCK_SIZE} in.png out-good.png out-bad.png in-min.png 15 ./astcenc/astcenc-avx2-good -tl in-min.png out-min-good.png ${BLOCK_SIZE} ${QUALITY} -silent 19 compare out-min-good.png out-min-bad.png out-min-diff.png
|
/third_party/ltp/testcases/kernel/controllers/cgroup_xattr/ |
D | cgroup_xattr.c | 62 int good; member 67 { .name = "security.", .good = 0, }, /* see setup() */ 68 { .name = "trusted.test", .good = 1, }, 69 { .name = "trusted.", .good = 0, }, /* see setup() */ 70 { .name = "user.", .good = 0, }, 71 { .name = "system.", .good = 0, }, 155 tkeys[i].good = tst_kvercmp(3, 15, 0) < 0; in setup() 157 tkeys[i].good = tst_kvercmp(4, 5, 0) < 0; in setup() 332 fail = err && tkeys[i].good; in set_xattrs() 337 (tkeys[i].good) ? "can" : "can't", in set_xattrs() [all …]
|