/external/webrtc/webrtc/base/ |
D | sslidentity_unittest.cc | 116 size_t expected_len) { in TestDigestHelper() argument 121 memset(digest, 0, expected_len); in TestDigestHelper() 125 EXPECT_EQ(expected_len, digest_len); in TestDigestHelper() 128 memset(digest1, 0xff, expected_len); in TestDigestHelper() 132 EXPECT_EQ(expected_len, digest_len); in TestDigestHelper() 134 EXPECT_EQ(0, memcmp(digest, digest1, expected_len)); in TestDigestHelper() 138 size_t expected_len) { in TestDigestForGeneratedCert() argument 141 ASSERT_TRUE(expected_len <= sizeof(DigestType)); in TestDigestForGeneratedCert() 143 TestDigestHelper(digest[0], identity_rsa1_.get(), algorithm, expected_len); in TestDigestForGeneratedCert() 144 TestDigestHelper(digest[1], identity_rsa2_.get(), algorithm, expected_len); in TestDigestForGeneratedCert() [all …]
|
D | sslstreamadapterhelper.cc | 94 size_t expected_len; in SetPeerCertificateDigest() local 96 if (!GetDigestLength(digest_alg, &expected_len)) { in SetPeerCertificateDigest() 100 if (expected_len != digest_len) in SetPeerCertificateDigest()
|
D | opensslstreamadapter.cc | 341 size_t expected_len; in SetPeerCertificateDigest() local 343 if (!OpenSSLDigest::GetDigestSize(digest_alg, &expected_len)) { in SetPeerCertificateDigest() 347 if (expected_len != digest_len) in SetPeerCertificateDigest()
|
/external/pdfium/fpdfsdk/ |
D | fpdftext_embeddertest.cpp | 291 static const size_t expected_len = sizeof(expected_url); in TEST_F() local 304 EXPECT_EQ(static_cast<int>(expected_len - 1), in TEST_F() 305 FPDFLink_GetURL(pagelink, 0, fixed_buffer, expected_len - 1)); in TEST_F() 307 check_unsigned_shorts(expected_url, fixed_buffer, expected_len - 1)); in TEST_F() 308 EXPECT_EQ(0xbdbd, fixed_buffer[expected_len - 1]); in TEST_F() 312 EXPECT_EQ(static_cast<int>(expected_len), in TEST_F() 313 FPDFLink_GetURL(pagelink, 0, fixed_buffer, expected_len)); in TEST_F() 314 EXPECT_TRUE(check_unsigned_shorts(expected_url, fixed_buffer, expected_len)); in TEST_F() 315 EXPECT_EQ(0u, fixed_buffer[expected_len - 1]); in TEST_F() 316 EXPECT_EQ(0xbdbd, fixed_buffer[expected_len]); in TEST_F() [all …]
|
/external/boringssl/src/crypto/obj/ |
D | obj_test.cc | 83 int expected_len = static_cast<int>(strlen(expected)); in ExpectObj2Txt() local 86 if (len != expected_len) { in ExpectObj2Txt() 89 expected, len, expected_len); in ExpectObj2Txt() 96 if (len != expected_len) { in ExpectObj2Txt() 99 expected, len, expected_len); in ExpectObj2Txt() 113 if (len != expected_len) { in ExpectObj2Txt() 116 expected, len, expected_len); in ExpectObj2Txt()
|
/external/icu/icu4j/perf-tests/src/com/ibm/icu/dev/test/perf/ |
D | ResourceBundlePerf.java | 251 int expected_len; 252 GetBinaryIcu(String key, int expected_len) { 254 this.expected_len = expected_len; 259 if(got.remaining() != expected_len) throw new Error("not the expected len"); 269 int expected_len; 270 GetBinaryJava(String key, int expected_len) { 272 this.expected_len = expected_len; 276 if(got.remaining() != expected_len) throw new Error("not the expected len");
|
/external/boringssl/src/crypto/fipsmodule/ |
D | bcm.c | 106 size_t expected_len, const char *name) { in check_test() argument 107 if (OPENSSL_memcmp(actual, expected, expected_len) != 0) { in check_test() 109 hexdump(expected, expected_len); in check_test() 111 hexdump(actual, expected_len); in check_test()
|
/external/boringssl/src/crypto/base64/ |
D | base64_test.cc | 183 size_t expected_len = strlen(t.decoded); in TEST_P() local 184 if (expected_len % 3 != 0) { in TEST_P() 185 ret -= 3 - (expected_len % 3); in TEST_P()
|
/external/boringssl/src/crypto/test/ |
D | file_test.cc | 324 bool FileTest::ExpectBytesEqual(const uint8_t *expected, size_t expected_len, in ExpectBytesEqual() argument 326 if (expected_len == actual_len && in ExpectBytesEqual() 327 OPENSSL_memcmp(expected, actual, expected_len) == 0) { in ExpectBytesEqual() 331 std::string expected_hex = EncodeHex(expected, expected_len); in ExpectBytesEqual()
|
D | file_test.h | 161 bool ExpectBytesEqual(const uint8_t *expected, size_t expected_len,
|
/external/python/cpython2/Lib/test/ |
D | test_sets.py | 363 expected_len = 0 366 expected_len += 1 367 self.assertEqual(len(tmp), expected_len) 382 expected_len = len(self.set) 385 expected_len -= 1 386 self.assertEqual(len(self.set), expected_len)
|
D | test_set.py | 1143 expected_len = 0 1146 expected_len += 1 1147 self.assertEqual(len(tmp), expected_len) 1162 expected_len = len(self.set) 1165 expected_len -= 1 1166 self.assertEqual(len(self.set), expected_len)
|
D | test_itertools.py | 726 expected_len = prod(map(len, args)) 727 self.assertEqual(len(list(product(*args))), expected_len) 731 self.assertEqual(len(list(product(*args))), expected_len)
|
/external/boringssl/src/crypto/bio/ |
D | bio_test.cc | 169 size_t expected_len; member 222 EXPECT_EQ(Bytes(input.data(), param.expected_len), Bytes(out, out_len)); in TEST_P()
|
/external/android-clat/ |
D | clatd_test.cpp | 487 const uint8_t *expected, size_t expected_len, const char *msg) { in check_translated_packet() argument 491 EXPECT_EQ(expected_len, translated_len) << msg << ": Translated packet length incorrect\n"; in check_translated_packet() 899 size_t expected_len, const char *msg) { in check_translate_checksum_neutral() argument 903 EXPECT_EQ(expected_len, translated_len) << msg << ": Translated packet length incorrect\n"; in check_translate_checksum_neutral()
|
/external/autotest/client/site_tests/firmware_TouchMTB/tests/ |
D | mtb_unittest.py | 155 for tid, expected_len in expected_numbers.items(): 156 self.assertEqual(len(finger_paths[tid].tid_packets), expected_len)
|
/external/webrtc/talk/session/media/ |
D | srtpfilter_unittest.cc | 599 int out_len = 0, expected_len = sizeof(kPcmuFrame); in TestUnprotectRtp() local 601 EXPECT_EQ(expected_len, out_len); in TestUnprotectRtp() 605 int out_len = 0, expected_len = sizeof(kRtcpReport); in TestUnprotectRtcp() local 607 EXPECT_EQ(expected_len, out_len); in TestUnprotectRtcp()
|
/external/boringssl/src/ssl/ |
D | t1_lib.cc | 772 const size_t expected_len = ssl->s3->previous_client_finished_len + in ext_ri_parse_serverhello() local 776 assert(!expected_len || ssl->s3->previous_client_finished_len); in ext_ri_parse_serverhello() 777 assert(!expected_len || ssl->s3->previous_server_finished_len); in ext_ri_parse_serverhello() 793 if (CBS_len(&renegotiated_connection) != expected_len) { in ext_ri_parse_serverhello()
|
D | ssl_test.cc | 1787 size_t expected_len) { in ClientHelloMatches() argument 1819 if (client_hello.size() != expected_len || in ClientHelloMatches() 1820 OPENSSL_memcmp(client_hello.data(), expected, expected_len) != 0) { in ClientHelloMatches() 1827 for (size_t i = 0; i < expected_len; i++) { in ClientHelloMatches()
|