/external/tink/go/jwt/ |
D | jwt_ecdsa_signer_key_manager_test.go | 35 km, err := registry.GetKeyManager(testECDSASignerKeyType) 36 if err != nil { 37 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err) 48 km, err := registry.GetKeyManager(testECDSASignerKeyType) 49 if err != nil { 50 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err) 58 km, err := registry.GetKeyManager(testECDSASignerKeyType) 59 if err != nil { 60 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err) 62 if _, err := km.NewKey(nil); err == nil { [all …]
|
D | jwt_mac_factory_test.go | 45 serializedKey, err := proto.Marshal(key) 46 if err != nil { 47 return nil, err 57 handle, err := testkeyset.NewHandle(testutil.NewTestKeyset(keyData, prefixType)) 58 if err != nil { 59 return nil, fmt.Errorf("creating keyset handle: %v", err) 65 verifiedJWT, err := p.VerifyMACAndDecode(compact, validator) 66 if err != nil { 67 return fmt.Errorf("p.VerifyMACAndDecode() err = %v, want nil", err) 69 subject, err := verifiedJWT.Subject() [all …]
|
D | jwt_signer_verifier_kid_test.go | 30 x, err := base64Decode("f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU") 31 if err != nil { 32 return nil, fmt.Errorf("base64 decoding x coordinate of public key: %v", err) 34 y, err := base64Decode("x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0") 35 if err != nil { 36 return nil, fmt.Errorf("base64 decoding y coordinate of public key: %v", err) 38 tv, err := subtle.NewECDSAVerifier("SHA256", "NIST_P256", "IEEE_P1363", x, y) 39 if err != nil { 40 return nil, fmt.Errorf("subtle.NewECDSAVerifier() err = %v, want nil", err) 47 k, err := base64Decode("jpsQnnGQmL-YBIffH1136cspYG6-0iY7X1fCE9-E9LI") [all …]
|
D | jwt_rsa_ssa_pkcs1_signer_key_manager_test.go | 35 pubKey, err := makeValidRSPublicKey() 36 if err != nil { 37 return nil, err 39 d, err := base64Decode( 46 if err != nil { 47 return nil, err 49 p, err := base64Decode( 53 if err != nil { 54 return nil, err 56 q, err := base64Decode( [all …]
|
D | jwt_mac_kid_test.go | 29 if _, err := newMACWithKID(nil, "", nil); err == nil { 30 t.Errorf("NewMACWithKID(nil, '', nil) err = nil, want error") 36 …key, err := base64.URLEncoding.WithPadding(base64.NoPadding).DecodeString("AyM1SysPpbyDfgZld3umj1q… 37 if err != nil { 38 return nil, fmt.Errorf("failed parsing test key: %v", err) 40 mac, err := subtle.NewHMAC("SHA256", key, 32) 41 if err != nil { 42 return nil, err 48 m, err := createMACwithKID(nil) 49 if err != nil { [all …]
|
/external/swiftshader/third_party/SPIRV-Tools/utils/vscode/src/lsp/protocol/ |
D | tsserver.go | 75 if ctx.Err() != nil { 82 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 83 sendParseError(ctx, r, err) 86 if err := h.server.DidChangeWorkspaceFolders(ctx, ¶ms); err != nil { 87 log.Printf("%v", err) 92 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 93 sendParseError(ctx, r, err) 96 if err := h.server.Initialized(ctx, ¶ms); err != nil { 97 log.Printf("%v", err) 101 if err := h.server.Exit(ctx); err != nil { [all …]
|
/external/angle/third_party/spirv-tools/src/utils/vscode/src/lsp/protocol/ |
D | tsserver.go | 75 if ctx.Err() != nil { 82 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 83 sendParseError(ctx, r, err) 86 if err := h.server.DidChangeWorkspaceFolders(ctx, ¶ms); err != nil { 87 log.Printf("%v", err) 92 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 93 sendParseError(ctx, r, err) 96 if err := h.server.Initialized(ctx, ¶ms); err != nil { 97 log.Printf("%v", err) 101 if err := h.server.Exit(ctx); err != nil { [all …]
|
/external/deqp-deps/SPIRV-Tools/utils/vscode/src/lsp/protocol/ |
D | tsserver.go | 75 if ctx.Err() != nil { 82 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 83 sendParseError(ctx, r, err) 86 if err := h.server.DidChangeWorkspaceFolders(ctx, ¶ms); err != nil { 87 log.Printf("%v", err) 92 if err := json.Unmarshal(*r.Params, ¶ms); err != nil { 93 sendParseError(ctx, r, err) 96 if err := h.server.Initialized(ctx, ¶ms); err != nil { 97 log.Printf("%v", err) 101 if err := h.server.Exit(ctx); err != nil { [all …]
|
/external/tink/go/hybrid/ |
D | hybrid_factory_test.go | 54 …primaryPrivProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(c, ht, primaryPtFmt, primaryDek,… 55 if err != nil { 56 …rateECIESAEADHKDFPrivateKey(c, ht, primaryPtFmt, primaryDek, primarySalt) err = %v, want nil", err) 58 sPrimaryPriv, err := proto.Marshal(primaryPrivProto) 59 if err != nil { 60 t.Fatalf("proto.Marshal(primaryPrivProto) err = %v, want nil", err) 67 rawPrivProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(c, ht, rawPtFmt, rawDek, rawSalt) 68 if err != nil { 69 …estutil.GenerateECIESAEADHKDFPrivateKey(c, ht, rawPtFmt, rawDek, rawSalt) err = %v, want nil", err) 71 sRawPriv, err := proto.Marshal(rawPrivProto) [all …]
|
/external/tink/go/signature/ |
D | signature_factory_test.go | 64 pubKeysetHandle, err := testkeyset.NewHandle(pubKeyset) 65 if err != nil { 66 t.Fatalf("testkeyset.NewHandle(pubKeyset) err = %v, want nil", err) 69 signer, err := signature.NewSigner(privKeysetHandle) 70 if err != nil { 71 t.Fatalf("signature.NewSigner(privKeysetHandle) err = %v, want nil", err) 74 sig, err := signer.Sign(data) 75 if err != nil { 76 t.Fatalf("signer.Sign(data) err = %v, want nil", err) 79 verifier, err := signature.NewVerifier(pubKeysetHandle) [all …]
|
/external/rust/android-crates-io/crates/etherparse/src/err/packet/ |
D | slice_error.rs | 8 Len(err::LenError), 10 LinuxSll(err::linux_sll::HeaderError), 12 Ip(err::ip::HeaderError), 14 Ipv4(err::ipv4::HeaderError), 16 Ipv6(err::ipv6::HeaderError), 18 Ipv4Exts(err::ip_auth::HeaderError), 20 Ipv6Exts(err::ipv6_exts::HeaderError), 22 Tcp(err::tcp::HeaderError), 30 Len(err) => err.fmt(f), in fmt() 31 LinuxSll(err) => err.fmt(f), in fmt() [all …]
|
/external/tink/go/daead/ |
D | daead_factory_test.go | 53 d, err := daead.New(keysetHandle) 54 if err != nil { 55 t.Errorf("daead.New failed: %s", err) 58 if err := validateDAEADFactoryCipher(d, d, expectedPrefix); err != nil { 59 t.Errorf("invalid cipher: %s", err) 70 d2, err := daead.New(keysetHandle2) 71 if err != nil { 72 t.Errorf("daead.New failed: %s", err) 74 if err := validateDAEADFactoryCipher(d2, d, cryptofmt.RawPrefix); err != nil { 75 t.Errorf("invalid cipher: %s", err) [all …]
|
/external/libdrm/tests/tegra/ |
D | vic-flip.c | 41 int err; in clear() local 43 err = drm_tegra_job_new(channel, &job); in clear() 44 if (err < 0) { in clear() 45 fprintf(stderr, "failed to create job: %s\n", strerror(-err)); in clear() 49 err = drm_tegra_job_get_pushbuf(job, &pushbuf); in clear() 50 if (err < 0) { in clear() 51 fprintf(stderr, "failed to create push buffer: %s\n", strerror(-err)); in clear() 55 err = drm_tegra_pushbuf_begin(pushbuf, 32, &ptr); in clear() 56 if (err < 0) { in clear() 57 fprintf(stderr, "failed to prepare push buffer: %s\n", strerror(-err)); in clear() [all …]
|
D | vic-blit.c | 41 int err; in clear() local 43 err = drm_tegra_job_new(channel, &job); in clear() 44 if (err < 0) { in clear() 45 fprintf(stderr, "failed to create job: %s\n", strerror(-err)); in clear() 49 err = drm_tegra_job_get_pushbuf(job, &pushbuf); in clear() 50 if (err < 0) { in clear() 51 fprintf(stderr, "failed to create push buffer: %s\n", strerror(-err)); in clear() 55 err = vic_clear(vic, output, 1023, 1023, 0, 0); in clear() 56 if (err < 0) { in clear() 57 fprintf(stderr, "failed to clear surface: %s\n", strerror(-err)); in clear() [all …]
|
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/ |
D | pinning.c | 13 int err; in get_map_id() local 21 err = bpf_obj_get_info_by_fd(bpf_map__fd(map), in get_map_id() 23 CHECK(err, "get map info", "err %d errno %d", err, errno); in get_map_id() 40 int err, map_fd; in test_pinning() local 47 err = libbpf_get_error(obj); in test_pinning() 48 if (CHECK(err != -EINVAL, "invalid open", "err %d errno %d\n", err, errno)) { in test_pinning() 55 err = libbpf_get_error(obj); in test_pinning() 56 if (CHECK(err, "default open", "err %d errno %d\n", err, errno)) { in test_pinning() 61 err = bpf_object__load(obj); in test_pinning() 62 if (CHECK(err, "default load", "err %d errno %d\n", err, errno)) in test_pinning() [all …]
|
/external/tink/testing/go/ |
D | jwt_service.go | 40 handle, err := toKeysetHandle(req.GetAnnotatedKeyset()) 41 if err != nil { 42 return &pb.CreationResponse{Err: err.Error()}, nil 44 _, err = jwt.NewMAC(handle) 45 if err != nil { 46 return &pb.CreationResponse{Err: err.Error()}, nil 52 handle, err := toKeysetHandle(req.GetAnnotatedKeyset()) 53 if err != nil { 54 return &pb.CreationResponse{Err: err.Error()}, nil 56 _, err = jwt.NewSigner(handle) [all …]
|
D | services_test.go | 42 genResponse, err := keysetService.Generate(ctx, genRequest) 43 if err != nil { 44 return nil, err 50 return nil, errors.New(r.Err) 58 response, err := keysetService.Public(ctx, request) 59 if err != nil { 60 return nil, err 66 return nil, errors.New(r.Err) 74 response, err := keysetService.FromJson(ctx, request) 75 if err != nil { [all …]
|
/external/tink/go/keyset/ |
D | mem_io_test.go | 35 h, err := keyset.NewHandle(mac.HMACSHA256Tag128KeyTemplate()) 36 if err != nil { 37 t.Fatal(err) 42 wantHandle, err := insecurecleartextkeyset.Read(&keyset.MemReaderWriter{Keyset: protoKeyset}) 43 if err != nil { 44 t.Fatal(err) 48 gotHandle, err := testkeyset.NewHandle(protoKeyset) 49 if err != nil { 50 t.Fatal(err) 59 handle, err := keyset.NewHandle(mac.HMACSHA256Tag128KeyTemplate()) [all …]
|
D | handle_test.go | 35 handle, err := keyset.NewHandle(template) 36 if err != nil { 37 t.Errorf("keyset.NewHandle(template) = %v, want nil", err) 50 if _, err = mac.New(handle); err != nil { 51 t.Errorf("mac.New(handle) err = %v, want nil", err) 59 if _, err := keyset.NewHandle(invalidTemplate); err == nil { 60 t.Errorf("keyset.NewHandle(invalidTemplate) err = nil, want error") 65 if _, err := keyset.NewHandle(nil); err == nil { 66 t.Error("keyset.NewHandle(nil) err = nil, want error") 71 keysetEncryptionHandle, err := keyset.NewHandle(aead.AES128GCMKeyTemplate()) [all …]
|
/external/tink/go/mac/ |
D | mac_factory_test.go | 56 keysetHandle, err := testkeyset.NewHandle(keyset) 57 if err != nil { 58 t.Errorf("testkeyset.NewHandle failed: %s", err) 61 p, err := mac.New(keysetHandle) 62 if err != nil { 63 t.Errorf("mac.New failed: %s", err) 65 expectedPrefix, err := cryptofmt.OutputPrefix(primaryKey) 66 if err != nil { 67 t.Errorf("cryptofmt.OutputPrefix failed: %s", err) 70 if err := verifyMacPrimitive(p, p, expectedPrefix, tagSize); err != nil { [all …]
|
/external/tink/go/aead/ |
D | aead_factory_test.go | 56 a, err := aead.New(keysetHandle) 57 if err != nil { 58 t.Errorf("aead.New failed: %s", err) 61 if err := validateAEADFactoryCipher(a, a, expectedPrefix); err != nil { 62 t.Errorf("invalid cipher: %s", err) 72 a2, err := aead.New(keysetHandle2) 73 if err != nil { 74 t.Errorf("aead.New failed: %s", err) 76 if err := validateAEADFactoryCipher(a2, a, cryptofmt.RawPrefix); err != nil { 77 t.Errorf("invalid cipher: %s", err) [all …]
|
/external/tink/go/prf/ |
D | prf_set_factory_test.go | 43 keyID, err := m.Add(template) 44 if err != nil { 45 return 0, fmt.Errorf("Could not add key from the given template: %v", err) 47 err = m.SetPrimary(keyID) 48 if err != nil { 49 return 0, fmt.Errorf("Could set key as primary: %v", err) 56 aescmacID, err := addKeyAndReturnID(manager, prf.AESCMACPRFKeyTemplate()) 57 if err != nil { 58 t.Errorf("Could not add AES CMAC PRF key: %v", err) 61 hmacsha256ID, err := addKeyAndReturnID(manager, prf.HMACSHA256PRFKeyTemplate()) [all …]
|
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/http2_interop/ |
D | http2interop.go | 53 if err := fh.Parse(r); err != nil { 54 return nil, err 76 if err := f.ParsePayload(r); err != nil { 77 return nil, err 84 raw, err := f.MarshalBinary() 85 if err != nil { 86 return err 88 if _, err := w.Write(raw); err != nil { 89 return err 95 conn, err := connect(ctx) [all …]
|
/external/tink/go/hybrid/internal/hpke/ |
D | encrypt_decrypt_test.go | 34 if _, err := NewEncrypt(pubKey); err == nil { 35 t.Error("NewEncrypt(unknown KEM): got success, want err") 37 if _, err := NewDecrypt(privKey); err == nil { 38 t.Error("NewDecrypt(unknown KEM): got success, want err") 47 if _, err := NewEncrypt(pubKey); err == nil { 48 t.Error("NewEncrypt(unknown KDF): got success, want err") 50 if _, err := NewDecrypt(privKey); err == nil { 51 t.Error("NewDecrypt(unknown KDF): got success, want err") 60 if _, err := NewEncrypt(pubKey); err == nil { 61 t.Error("NewEncrypt(unknown AEAD): got success, want err") [all …]
|
/external/grpc-grpc/tools/http2_interop/ |
D | http2interop.go | 53 if err := fh.Parse(r); err != nil { 54 return nil, err 76 if err := f.ParsePayload(r); err != nil { 77 return nil, err 84 raw, err := f.MarshalBinary() 85 if err != nil { 86 return err 88 if _, err := w.Write(raw); err != nil { 89 return err 95 conn, err := connect(ctx) [all …]
|