/external/webrtc/webrtc/base/ |
D | sslidentity_unittest.cc | 116 size_t expected_len) { in TestDigestHelper() argument 121 memset(digest, 0, expected_len); in TestDigestHelper() 125 EXPECT_EQ(expected_len, digest_len); in TestDigestHelper() 128 memset(digest1, 0xff, expected_len); in TestDigestHelper() 132 EXPECT_EQ(expected_len, digest_len); in TestDigestHelper() 134 EXPECT_EQ(0, memcmp(digest, digest1, expected_len)); in TestDigestHelper() 138 size_t expected_len) { in TestDigestForGeneratedCert() argument 141 ASSERT_TRUE(expected_len <= sizeof(DigestType)); in TestDigestForGeneratedCert() 143 TestDigestHelper(digest[0], identity_rsa1_.get(), algorithm, expected_len); in TestDigestForGeneratedCert() 144 TestDigestHelper(digest[1], identity_rsa2_.get(), algorithm, expected_len); in TestDigestForGeneratedCert() [all …]
|
D | sslstreamadapterhelper.cc | 94 size_t expected_len; in SetPeerCertificateDigest() local 96 if (!GetDigestLength(digest_alg, &expected_len)) { in SetPeerCertificateDigest() 100 if (expected_len != digest_len) in SetPeerCertificateDigest()
|
D | opensslstreamadapter.cc | 341 size_t expected_len; in SetPeerCertificateDigest() local 343 if (!OpenSSLDigest::GetDigestSize(digest_alg, &expected_len)) { in SetPeerCertificateDigest() 347 if (expected_len != digest_len) in SetPeerCertificateDigest()
|
/external/icu/icu4j/perf-tests/src/com/ibm/icu/dev/test/perf/ |
D | ResourceBundlePerf.java | 249 int expected_len; 250 GetBinaryIcu(String key, int expected_len) { 252 this.expected_len = expected_len; 257 if(got.remaining() != expected_len) throw new Error("not the expected len"); 267 int expected_len; 268 GetBinaryJava(String key, int expected_len) { 270 this.expected_len = expected_len; 274 if(got.remaining() != expected_len) throw new Error("not the expected len");
|
/external/boringssl/src/crypto/base64/ |
D | base64_test.cc | 64 size_t expected_len = strlen(t->decoded); in TestDecode() local 88 if (expected_len % 3 != 0) { in TestDecode() 89 ret -= 3 - (expected_len % 3); in TestDecode()
|
/external/boringssl/src/crypto/test/ |
D | file_test.cc | 250 bool FileTest::ExpectBytesEqual(const uint8_t *expected, size_t expected_len, in ExpectBytesEqual() argument 252 if (expected_len == actual_len && in ExpectBytesEqual() 253 memcmp(expected, actual, expected_len) == 0) { in ExpectBytesEqual() 257 std::string expected_hex = EncodeHex(expected, expected_len); in ExpectBytesEqual()
|
D | file_test.h | 128 bool ExpectBytesEqual(const uint8_t *expected, size_t expected_len,
|
/external/boringssl/src/crypto/bio/ |
D | bio_test.cc | 333 size_t expected_len, size_t max_len) { in ReadASN1() argument 349 (out_len != expected_len || memcmp(data, out, expected_len) != 0)) { in ReadASN1()
|
/external/android-clat/ |
D | clatd_test.cpp | 487 const uint8_t *expected, size_t expected_len, const char *msg) { in check_translated_packet() argument 491 EXPECT_EQ(expected_len, translated_len) << msg << ": Translated packet length incorrect\n"; in check_translated_packet() 899 size_t expected_len, const char *msg) { in check_translate_checksum_neutral() argument 903 EXPECT_EQ(expected_len, translated_len) << msg << ": Translated packet length incorrect\n"; in check_translate_checksum_neutral()
|
/external/autotest/client/site_tests/firmware_TouchMTB/tests/ |
D | mtb_unittest.py | 155 for tid, expected_len in expected_numbers.items(): 156 self.assertEqual(len(finger_paths[tid].tid_packets), expected_len)
|
/external/webrtc/talk/session/media/ |
D | srtpfilter_unittest.cc | 599 int out_len = 0, expected_len = sizeof(kPcmuFrame); in TestUnprotectRtp() local 601 EXPECT_EQ(expected_len, out_len); in TestUnprotectRtp() 605 int out_len = 0, expected_len = sizeof(kRtcpReport); in TestUnprotectRtcp() local 607 EXPECT_EQ(expected_len, out_len); in TestUnprotectRtcp()
|
/external/dbus/dbus/ |
D | dbus-object-tree.c | 1472 int expected_len; in run_decompose_tests() local 1479 expected_len = string_array_length (decompose_tests[i].result); in run_decompose_tests() 1482 expected_len != result_len || in run_decompose_tests() 1488 decompose_tests[i].path, expected_len, result_len, in run_decompose_tests()
|
/external/boringssl/src/ssl/ |
D | t1_lib.c | 871 const size_t expected_len = ssl->s3->previous_client_finished_len + in ext_ri_parse_serverhello() local 875 assert(!expected_len || ssl->s3->previous_client_finished_len); in ext_ri_parse_serverhello() 876 assert(!expected_len || ssl->s3->previous_server_finished_len); in ext_ri_parse_serverhello() 888 if (CBS_len(&renegotiated_connection) != expected_len) { in ext_ri_parse_serverhello()
|
/external/v8/test/cctest/ |
D | test-api.cc | 8319 Local<v8::Number> expected_len = Local<v8::Number>::Cast( in Utf16Helper() local 8322 CHECK_EQ(static_cast<int>(expected_len->Value()), length); in Utf16Helper() 14105 size_t expected_len = strlen(expected); in FunctionNameIs() local 14112 if (tail_len > expected_len + 2 && in FunctionNameIs() 14113 tail[expected_len] == ' ' && in FunctionNameIs() 14114 tail[expected_len + 1] == ':' && in FunctionNameIs() 14115 tail[expected_len + 2] && in FunctionNameIs() 14116 !strncmp(tail, expected, expected_len)) { in FunctionNameIs() 14120 if (tail_len != expected_len) in FunctionNameIs() 14123 return strncmp(tail, expected, expected_len) == 0; in FunctionNameIs()
|