/system/update_engine/common/ |
prefs_unittest.cc | 37 const char kKey[] = "test-key"; 82 ASSERT_TRUE(SetValue(kKey, test_data)); 84 EXPECT_TRUE(prefs_.GetString(kKey, &value)); 100 EXPECT_TRUE(prefs_.SetString(kKey, kValue)); 102 EXPECT_TRUE(base::ReadFileToString(prefs_dir_.Append(kKey), &value)); 116 EXPECT_TRUE(prefs_.SetString(kKey, kValue)); 118 EXPECT_TRUE(base::ReadFileToString(subdir.Append(kKey), &value)); 124 EXPECT_FALSE(prefs_.SetString(kKey, "test value")); 128 base::CreateDirectory(prefs_dir_.Append(kKey)); 129 EXPECT_FALSE(prefs_.SetString(kKey, "test value")) [all...] |
/system/connectivity/shill/ |
key_value_store_unittest.cc | 37 const string kKey("foo"); 39 EXPECT_FALSE(store_.Contains(kKey)); 40 store_.Set(kKey, brillo::Any(kValue)); 41 EXPECT_TRUE(store_.Contains(kKey)); 42 EXPECT_EQ(kValue, store_.Get(kKey).Get<string>()); 43 store_.Remove(kKey); 44 EXPECT_FALSE(store_.Contains(kKey)); 48 const string kKey("foo"); 51 EXPECT_FALSE(store_.ContainsBool(kKey)); 52 EXPECT_EQ(kDefaultValue, store_.LookupBool(kKey, kDefaultValue)) [all...] |
key_file_store_unittest.cc | 327 static const char kKey[] = "foo"; 331 kGroup, kKey, kValue)); 334 EXPECT_TRUE(store_->GetString(kGroup, kKey, &value)); 336 EXPECT_FALSE(store_->GetString("something-else", kKey, &value)); 338 EXPECT_TRUE(store_->GetString(kGroup, kKey, nullptr)); 493 static const char kKey[] = "test-int"; 496 ASSERT_TRUE(store_->SetUint64(kGroup, kKey, kValue)); 500 kGroup, kKey, 623 static const char kKey[] = "secret"; 626 kGroup, kKey, kROT47Text)) [all...] |
property_accessor_unittest.cc | 595 const string kKey = "entry_key"; 602 &StringMapWrapper::Set, kKey); 603 wrapper.value_[kKey] = kValue; 613 &StringMapWrapper::Set, kKey); 617 EXPECT_EQ(kValue, wrapper.value_[kKey]); 629 &StringMapWrapper::Set, kKey); 630 wrapper.value_[kKey] = kValue; 634 EXPECT_FALSE(ContainsKey(wrapper.value_, kKey));
|
property_store_unittest.cc | 317 const char kKey[] = "key"; 321 kKey, 329 EXPECT_TRUE(store.SetAnyProperty(kKey, kKeyValueStoreV, &error));
|
service_unittest.cc | 621 static const char kKey[] = "test-key"; 623 EXPECT_CALL(storage, SetString(storage_id_, kKey, kData)) 625 service_->SaveString(&storage, storage_id_, kKey, kData, false, true); 630 static const char kKey[] = "test-key"; 632 EXPECT_CALL(storage, SetCryptedString(storage_id_, kKey, kData)) 634 service_->SaveString(&storage, storage_id_, kKey, kData, true, true); 639 static const char kKey[] = "test-key"; 640 EXPECT_CALL(storage, DeleteKey(storage_id_, kKey)) 642 service_->SaveString(&storage, storage_id_, kKey, "data", false, false); 647 static const char kKey[] = "test-key" [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 69 const uint8_t kKey[] = {0xa3, 0x3d, 0xdd, 0xc3, 0x04, 0x78, 0x18, 73 if (!TestPBKDF2(NULL, 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey) || 74 !TestPBKDF2("", 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey)) { 84 const uint8_t kKey[] = {0x8b, 0xc2, 0xf9, 0x16, 0x7a, 0x81, 0xcd, 0xcf, 89 if (!TestPBKDF2("password", 8, NULL, 0, 2, EVP_sha256(), sizeof(kKey), 90 kKey) || 91 !TestPBKDF2("password", 8, "", 0, 2, EVP_sha256(), sizeof(kKey), kKey)) { [all...] |
/external/boringssl/src/crypto/cmac/ |
cmac_test.cc | 92 static const uint8_t kKey[16] = { 134 if (!test("RFC 4493 #1", kKey, sizeof(kKey), NULL, 0, kOut1) || 135 !test("RFC 4493 #2", kKey, sizeof(kKey), kMsg2, sizeof(kMsg2), kOut2) || 136 !test("RFC 4493 #3", kKey, sizeof(kKey), kMsg3, sizeof(kMsg3), kOut3) || 137 !test("RFC 4493 #4", kKey, sizeof(kKey), kMsg4, sizeof(kMsg4), kOut4)) {
|
/external/v8/test/cctest/ |
test-identity-map.cc | 188 const int kKey = 33; 192 t.map.Set(t.smi(kKey), &t); 194 t.CheckFind(t.smi(kKey + kShift), &t); 195 t.CheckGet(t.smi(kKey + kShift), &t);
|