Home
last modified time | relevance | path

Searched full:err (Results 1 – 25 of 14469) sorted by relevance

12345678910>>...579

/external/tink/go/jwt/
Djwt_ecdsa_signer_key_manager_test.go35 km, err := registry.GetKeyManager(testECDSASignerKeyType)
36 if err != nil {
37 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err)
48 km, err := registry.GetKeyManager(testECDSASignerKeyType)
49 if err != nil {
50 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err)
58 km, err := registry.GetKeyManager(testECDSASignerKeyType)
59 if err != nil {
60 t.Fatalf("registry.GetKeyManager(%q) err = %v, want nil", testECDSASignerKeyType, err)
62 if _, err := km.NewKey(nil); err == nil {
[all …]
Djwt_mac_factory_test.go45 serializedKey, err := proto.Marshal(key)
46 if err != nil {
47 return nil, err
57 handle, err := testkeyset.NewHandle(testutil.NewTestKeyset(keyData, prefixType))
58 if err != nil {
59 return nil, fmt.Errorf("creating keyset handle: %v", err)
65 verifiedJWT, err := p.VerifyMACAndDecode(compact, validator)
66 if err != nil {
67 return fmt.Errorf("p.VerifyMACAndDecode() err = %v, want nil", err)
69 subject, err := verifiedJWT.Subject()
[all …]
Djwt_signer_verifier_kid_test.go30 x, err := base64Decode("f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU")
31 if err != nil {
32 return nil, fmt.Errorf("base64 decoding x coordinate of public key: %v", err)
34 y, err := base64Decode("x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0")
35 if err != nil {
36 return nil, fmt.Errorf("base64 decoding y coordinate of public key: %v", err)
38 tv, err := subtle.NewECDSAVerifier("SHA256", "NIST_P256", "IEEE_P1363", x, y)
39 if err != nil {
40 return nil, fmt.Errorf("subtle.NewECDSAVerifier() err = %v, want nil", err)
47 k, err := base64Decode("jpsQnnGQmL-YBIffH1136cspYG6-0iY7X1fCE9-E9LI")
[all …]
Djwt_rsa_ssa_pkcs1_signer_key_manager_test.go35 pubKey, err := makeValidRSPublicKey()
36 if err != nil {
37 return nil, err
39 d, err := base64Decode(
46 if err != nil {
47 return nil, err
49 p, err := base64Decode(
53 if err != nil {
54 return nil, err
56 q, err := base64Decode(
[all …]
Djwt_mac_kid_test.go29 if _, err := newMACWithKID(nil, "", nil); err == nil {
30 t.Errorf("NewMACWithKID(nil, '', nil) err = nil, want error")
36 …key, err := base64.URLEncoding.WithPadding(base64.NoPadding).DecodeString("AyM1SysPpbyDfgZld3umj1q…
37 if err != nil {
38 return nil, fmt.Errorf("failed parsing test key: %v", err)
40 mac, err := subtle.NewHMAC("SHA256", key, 32)
41 if err != nil {
42 return nil, err
48 m, err := createMACwithKID(nil)
49 if err != nil {
[all …]
/external/swiftshader/third_party/SPIRV-Tools/utils/vscode/src/lsp/protocol/
Dtsserver.go75 if ctx.Err() != nil {
82 if err := json.Unmarshal(*r.Params, &params); err != nil {
83 sendParseError(ctx, r, err)
86 if err := h.server.DidChangeWorkspaceFolders(ctx, &params); err != nil {
87 log.Printf("%v", err)
92 if err := json.Unmarshal(*r.Params, &params); err != nil {
93 sendParseError(ctx, r, err)
96 if err := h.server.Initialized(ctx, &params); err != nil {
97 log.Printf("%v", err)
101 if err := h.server.Exit(ctx); err != nil {
[all …]
/external/angle/third_party/spirv-tools/src/utils/vscode/src/lsp/protocol/
Dtsserver.go75 if ctx.Err() != nil {
82 if err := json.Unmarshal(*r.Params, &params); err != nil {
83 sendParseError(ctx, r, err)
86 if err := h.server.DidChangeWorkspaceFolders(ctx, &params); err != nil {
87 log.Printf("%v", err)
92 if err := json.Unmarshal(*r.Params, &params); err != nil {
93 sendParseError(ctx, r, err)
96 if err := h.server.Initialized(ctx, &params); err != nil {
97 log.Printf("%v", err)
101 if err := h.server.Exit(ctx); err != nil {
[all …]
/external/deqp-deps/SPIRV-Tools/utils/vscode/src/lsp/protocol/
Dtsserver.go75 if ctx.Err() != nil {
82 if err := json.Unmarshal(*r.Params, &params); err != nil {
83 sendParseError(ctx, r, err)
86 if err := h.server.DidChangeWorkspaceFolders(ctx, &params); err != nil {
87 log.Printf("%v", err)
92 if err := json.Unmarshal(*r.Params, &params); err != nil {
93 sendParseError(ctx, r, err)
96 if err := h.server.Initialized(ctx, &params); err != nil {
97 log.Printf("%v", err)
101 if err := h.server.Exit(ctx); err != nil {
[all …]
/external/tink/go/hybrid/
Dhybrid_factory_test.go54 …primaryPrivProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(c, ht, primaryPtFmt, primaryDek,…
55 if err != nil {
56 …rateECIESAEADHKDFPrivateKey(c, ht, primaryPtFmt, primaryDek, primarySalt) err = %v, want nil", err)
58 sPrimaryPriv, err := proto.Marshal(primaryPrivProto)
59 if err != nil {
60 t.Fatalf("proto.Marshal(primaryPrivProto) err = %v, want nil", err)
67 rawPrivProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(c, ht, rawPtFmt, rawDek, rawSalt)
68 if err != nil {
69 …estutil.GenerateECIESAEADHKDFPrivateKey(c, ht, rawPtFmt, rawDek, rawSalt) err = %v, want nil", err)
71 sRawPriv, err := proto.Marshal(rawPrivProto)
[all …]
/external/tink/go/signature/
Dsignature_factory_test.go64 pubKeysetHandle, err := testkeyset.NewHandle(pubKeyset)
65 if err != nil {
66 t.Fatalf("testkeyset.NewHandle(pubKeyset) err = %v, want nil", err)
69 signer, err := signature.NewSigner(privKeysetHandle)
70 if err != nil {
71 t.Fatalf("signature.NewSigner(privKeysetHandle) err = %v, want nil", err)
74 sig, err := signer.Sign(data)
75 if err != nil {
76 t.Fatalf("signer.Sign(data) err = %v, want nil", err)
79 verifier, err := signature.NewVerifier(pubKeysetHandle)
[all …]
/external/rust/android-crates-io/crates/etherparse/src/err/packet/
Dslice_error.rs8 Len(err::LenError),
10 LinuxSll(err::linux_sll::HeaderError),
12 Ip(err::ip::HeaderError),
14 Ipv4(err::ipv4::HeaderError),
16 Ipv6(err::ipv6::HeaderError),
18 Ipv4Exts(err::ip_auth::HeaderError),
20 Ipv6Exts(err::ipv6_exts::HeaderError),
22 Tcp(err::tcp::HeaderError),
30 Len(err) => err.fmt(f), in fmt()
31 LinuxSll(err) => err.fmt(f), in fmt()
[all …]
/external/tink/go/daead/
Ddaead_factory_test.go53 d, err := daead.New(keysetHandle)
54 if err != nil {
55 t.Errorf("daead.New failed: %s", err)
58 if err := validateDAEADFactoryCipher(d, d, expectedPrefix); err != nil {
59 t.Errorf("invalid cipher: %s", err)
70 d2, err := daead.New(keysetHandle2)
71 if err != nil {
72 t.Errorf("daead.New failed: %s", err)
74 if err := validateDAEADFactoryCipher(d2, d, cryptofmt.RawPrefix); err != nil {
75 t.Errorf("invalid cipher: %s", err)
[all …]
/external/libdrm/tests/tegra/
Dvic-flip.c41 int err; in clear() local
43 err = drm_tegra_job_new(channel, &job); in clear()
44 if (err < 0) { in clear()
45 fprintf(stderr, "failed to create job: %s\n", strerror(-err)); in clear()
49 err = drm_tegra_job_get_pushbuf(job, &pushbuf); in clear()
50 if (err < 0) { in clear()
51 fprintf(stderr, "failed to create push buffer: %s\n", strerror(-err)); in clear()
55 err = drm_tegra_pushbuf_begin(pushbuf, 32, &ptr); in clear()
56 if (err < 0) { in clear()
57 fprintf(stderr, "failed to prepare push buffer: %s\n", strerror(-err)); in clear()
[all …]
Dvic-blit.c41 int err; in clear() local
43 err = drm_tegra_job_new(channel, &job); in clear()
44 if (err < 0) { in clear()
45 fprintf(stderr, "failed to create job: %s\n", strerror(-err)); in clear()
49 err = drm_tegra_job_get_pushbuf(job, &pushbuf); in clear()
50 if (err < 0) { in clear()
51 fprintf(stderr, "failed to create push buffer: %s\n", strerror(-err)); in clear()
55 err = vic_clear(vic, output, 1023, 1023, 0, 0); in clear()
56 if (err < 0) { in clear()
57 fprintf(stderr, "failed to clear surface: %s\n", strerror(-err)); in clear()
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/
Dpinning.c13 int err; in get_map_id() local
21 err = bpf_obj_get_info_by_fd(bpf_map__fd(map), in get_map_id()
23 CHECK(err, "get map info", "err %d errno %d", err, errno); in get_map_id()
40 int err, map_fd; in test_pinning() local
47 err = libbpf_get_error(obj); in test_pinning()
48 if (CHECK(err != -EINVAL, "invalid open", "err %d errno %d\n", err, errno)) { in test_pinning()
55 err = libbpf_get_error(obj); in test_pinning()
56 if (CHECK(err, "default open", "err %d errno %d\n", err, errno)) { in test_pinning()
61 err = bpf_object__load(obj); in test_pinning()
62 if (CHECK(err, "default load", "err %d errno %d\n", err, errno)) in test_pinning()
[all …]
/external/tink/testing/go/
Djwt_service.go40 handle, err := toKeysetHandle(req.GetAnnotatedKeyset())
41 if err != nil {
42 return &pb.CreationResponse{Err: err.Error()}, nil
44 _, err = jwt.NewMAC(handle)
45 if err != nil {
46 return &pb.CreationResponse{Err: err.Error()}, nil
52 handle, err := toKeysetHandle(req.GetAnnotatedKeyset())
53 if err != nil {
54 return &pb.CreationResponse{Err: err.Error()}, nil
56 _, err = jwt.NewSigner(handle)
[all …]
Dservices_test.go42 genResponse, err := keysetService.Generate(ctx, genRequest)
43 if err != nil {
44 return nil, err
50 return nil, errors.New(r.Err)
58 response, err := keysetService.Public(ctx, request)
59 if err != nil {
60 return nil, err
66 return nil, errors.New(r.Err)
74 response, err := keysetService.FromJson(ctx, request)
75 if err != nil {
[all …]
/external/tink/go/keyset/
Dmem_io_test.go35 h, err := keyset.NewHandle(mac.HMACSHA256Tag128KeyTemplate())
36 if err != nil {
37 t.Fatal(err)
42 wantHandle, err := insecurecleartextkeyset.Read(&keyset.MemReaderWriter{Keyset: protoKeyset})
43 if err != nil {
44 t.Fatal(err)
48 gotHandle, err := testkeyset.NewHandle(protoKeyset)
49 if err != nil {
50 t.Fatal(err)
59 handle, err := keyset.NewHandle(mac.HMACSHA256Tag128KeyTemplate())
[all …]
Dhandle_test.go35 handle, err := keyset.NewHandle(template)
36 if err != nil {
37 t.Errorf("keyset.NewHandle(template) = %v, want nil", err)
50 if _, err = mac.New(handle); err != nil {
51 t.Errorf("mac.New(handle) err = %v, want nil", err)
59 if _, err := keyset.NewHandle(invalidTemplate); err == nil {
60 t.Errorf("keyset.NewHandle(invalidTemplate) err = nil, want error")
65 if _, err := keyset.NewHandle(nil); err == nil {
66 t.Error("keyset.NewHandle(nil) err = nil, want error")
71 keysetEncryptionHandle, err := keyset.NewHandle(aead.AES128GCMKeyTemplate())
[all …]
/external/tink/go/mac/
Dmac_factory_test.go56 keysetHandle, err := testkeyset.NewHandle(keyset)
57 if err != nil {
58 t.Errorf("testkeyset.NewHandle failed: %s", err)
61 p, err := mac.New(keysetHandle)
62 if err != nil {
63 t.Errorf("mac.New failed: %s", err)
65 expectedPrefix, err := cryptofmt.OutputPrefix(primaryKey)
66 if err != nil {
67 t.Errorf("cryptofmt.OutputPrefix failed: %s", err)
70 if err := verifyMacPrimitive(p, p, expectedPrefix, tagSize); err != nil {
[all …]
/external/tink/go/aead/
Daead_factory_test.go56 a, err := aead.New(keysetHandle)
57 if err != nil {
58 t.Errorf("aead.New failed: %s", err)
61 if err := validateAEADFactoryCipher(a, a, expectedPrefix); err != nil {
62 t.Errorf("invalid cipher: %s", err)
72 a2, err := aead.New(keysetHandle2)
73 if err != nil {
74 t.Errorf("aead.New failed: %s", err)
76 if err := validateAEADFactoryCipher(a2, a, cryptofmt.RawPrefix); err != nil {
77 t.Errorf("invalid cipher: %s", err)
[all …]
/external/tink/go/prf/
Dprf_set_factory_test.go43 keyID, err := m.Add(template)
44 if err != nil {
45 return 0, fmt.Errorf("Could not add key from the given template: %v", err)
47 err = m.SetPrimary(keyID)
48 if err != nil {
49 return 0, fmt.Errorf("Could set key as primary: %v", err)
56 aescmacID, err := addKeyAndReturnID(manager, prf.AESCMACPRFKeyTemplate())
57 if err != nil {
58 t.Errorf("Could not add AES CMAC PRF key: %v", err)
61 hmacsha256ID, err := addKeyAndReturnID(manager, prf.HMACSHA256PRFKeyTemplate())
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/http2_interop/
Dhttp2interop.go53 if err := fh.Parse(r); err != nil {
54 return nil, err
76 if err := f.ParsePayload(r); err != nil {
77 return nil, err
84 raw, err := f.MarshalBinary()
85 if err != nil {
86 return err
88 if _, err := w.Write(raw); err != nil {
89 return err
95 conn, err := connect(ctx)
[all …]
/external/tink/go/hybrid/internal/hpke/
Dencrypt_decrypt_test.go34 if _, err := NewEncrypt(pubKey); err == nil {
35 t.Error("NewEncrypt(unknown KEM): got success, want err")
37 if _, err := NewDecrypt(privKey); err == nil {
38 t.Error("NewDecrypt(unknown KEM): got success, want err")
47 if _, err := NewEncrypt(pubKey); err == nil {
48 t.Error("NewEncrypt(unknown KDF): got success, want err")
50 if _, err := NewDecrypt(privKey); err == nil {
51 t.Error("NewDecrypt(unknown KDF): got success, want err")
60 if _, err := NewEncrypt(pubKey); err == nil {
61 t.Error("NewEncrypt(unknown AEAD): got success, want err")
[all …]
/external/grpc-grpc/tools/http2_interop/
Dhttp2interop.go53 if err := fh.Parse(r); err != nil {
54 return nil, err
76 if err := f.ParsePayload(r); err != nil {
77 return nil, err
84 raw, err := f.MarshalBinary()
85 if err != nil {
86 return err
88 if _, err := w.Write(raw); err != nil {
89 return err
95 conn, err := connect(ctx)
[all …]

12345678910>>...579