/Zephyr-latest/tests/kernel/device/src/ |
D | mmio.c | 84 zassert_equal(rom->phys_addr, DT_INST_REG_ADDR(0), "bad phys_addr"); in ZTEST() 85 zassert_equal(rom->size, DT_INST_REG_SIZE(0), "bad size"); in ZTEST() 91 zassert_equal(rom->addr, DT_INST_REG_ADDR(0), "bad addr"); in ZTEST() 92 zassert_equal(regs, rom->addr, "bad regs"); in ZTEST() 172 zassert_not_equal(regs_corge, 0, "bad regs_corge"); in ZTEST() 173 zassert_not_equal(regs_grault, 0, "bad regs_grault"); in ZTEST() 177 "bad phys_addr (corge)"); in ZTEST() 179 "bad size (corge)"); in ZTEST() 181 "bad phys_addr (grault)"); in ZTEST() 183 "bad size (grault)"); in ZTEST() [all …]
|
D | mmio_multireg.c | 74 zassert_not_equal(regs_chip, 0, "bad regs_chip"); in ZTEST() 75 zassert_not_equal(regs_dale, 0, "bad regs_dale"); in ZTEST() 79 "bad phys_addr (chip)"); in ZTEST() 81 "bad size (chip)"); in ZTEST() 83 "bad phys_addr (dale)"); in ZTEST() 85 "bad size (dale)"); in ZTEST() 88 "bad addr (chip)"); in ZTEST() 89 zassert_equal(regs_chip, rom_chip->addr, "bad regs (chip)"); in ZTEST() 91 "bad addr (dale)"); in ZTEST() 92 zassert_equal(regs_dale, rom_dale->addr, "bad regs (dale)"); in ZTEST()
|
/Zephyr-latest/scripts/ci/ |
D | pylintrc | 71 bad-classmethod-argument, 72 bad-mcs-method-argument, 73 bad-mcs-classmethod-argument, 94 bad-reversed-sequence, 122 bad-except-order, 123 raising-bad-type, 124 bad-exception-context, 129 bad-super-call, 156 bad-format-character, 163 bad-string-format-type, [all …]
|
/Zephyr-latest/tests/subsys/fs/littlefs/src/ |
D | test_util.c | 33 "bad root init return"); in ZTEST() 34 zassert_str_equal(path.path, "/", "bad root init path"); in ZTEST() 38 "bad mnt init return"); in ZTEST() 39 zassert_str_equal(path.path, mnt.mnt_point, "bad mnt init path"); in ZTEST() 67 "bad overrun init return"); in ZTEST() 69 "bad overrun init"); in ZTEST() 72 "bad overrun path"); in ZTEST() 80 MNT "/" ELT1, "bad mnt init elt1"); in ZTEST() 83 MNT "/" ELT1 "/" ELT2, "bad mnt init elt1 elt2"); in ZTEST()
|
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/test_scripts/ |
D | run_test_tolerate_pipeline_variant_rx_tx_prio_invert.sh | 11 # peer while a bad peer tries to spam ATT requests. 22 # - The bad peer spams ATT requests as fast as possible. 25 # - Either: The DUT may disconnect the bad peer ACL after 26 # receiving a protocol violation occurs. The bad peer shall 27 # be able to reconnect and continue the bad behavior.
|
/Zephyr-latest/scripts/tests/twister/ |
D | test_quarantine.py | 191 'very bad dummy platform', 197 'bad scenario 1', 200 'bad sim', 204 'bad scenario 1', 227 'not quarantined with bad scenario', 241 platforms=['very bad dummy platform'], 246 scenarios=['bad scenario 1', 'bad scenario 2'], 249 simulations=['bad sim']
|
/Zephyr-latest/tests/subsys/settings_commit_prio/src/ |
D | main.c | 19 zassert_equal(prio, 0, "Bad commit order"); in commit0() 27 zassert_equal(prio, 1, "Bad commit order"); in commit1() 35 zassert_equal(prio, 2, "Bad commit order"); in commit2() 43 zassert_equal(prio, 3, "Bad commit order"); in commit3() 51 zassert_equal(prio, 0, "Bad commit order"); in commit5()
|
/Zephyr-latest/tests/net/socket/socketpair/src/ |
D | expected_failures.c | 22 zassert_equal(res, -1, "socketpair should fail with bad address family"); in ZTEST_USER_F() 24 "errno should be EAFNOSUPPORT with bad address family"); in ZTEST_USER_F() 36 "errno should be EPROTOTYPE with bad socket type"); in ZTEST_USER_F() 48 "errno should be EPROTONOSUPPORT with bad protocol"); in ZTEST_USER_F() 61 "errno should be EFAULT with bad socket vector"); in ZTEST_USER_F()
|
/Zephyr-latest/scripts/dts/python-devicetree/tests/test-bindings-include/ |
D | include-invalid-keys.yaml | 9 bad-key-1: 3 10 bad-key-2: 3
|
/Zephyr-latest/tests/subsys/settings/fcb/src/ |
D | settings_test_save_2_fcb.c | 58 zassert_true(val8 == 42U, "bad value read"); in ZTEST() 59 zassert_str_equal(val_string[0], test_ref_value[0], "bad value read"); in ZTEST() 82 "bad value read"); in ZTEST() 83 zassert_true(val8 == 42U, "bad value read"); in ZTEST()
|
D | settings_test_delete_fcb.c | 41 zassert_true(val8 == 153U, "bad value read"); in ZTEST() 48 zassert_true(val8 == 0x55, "bad value read"); in ZTEST()
|
D | settings_test_save_one_fcb.c | 47 zassert_true(val8 == 42U, "bad value read"); in ZTEST() 54 zassert_true(val8 == 44U, "bad value read"); in ZTEST()
|
/Zephyr-latest/tests/net/offloaded_netdev/src/ |
D | main.c | 155 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST() 157 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST() 166 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST() 168 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST() 217 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST() 219 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST() 228 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST() 230 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST() 280 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST() 282 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST() [all …]
|
/Zephyr-latest/tests/subsys/settings/file/src/ |
D | settings_test_compress_file.c | 55 zassert_true(val8 == i, "Bad value loaded"); in ZTEST() 66 zassert_true(rc == 0, "bad value read"); in ZTEST() 76 zassert_true(val64 == i, "Bad value loaded"); in ZTEST() 83 zassert_true(rc == 0, "bad value read"); in ZTEST()
|
D | settings_test_save_in_file.c | 42 zassert_true(rc == 0, "bad value read"); in ZTEST() 50 zassert_true(rc == 0, "bad value read"); in ZTEST()
|
D | settings_test_save_one_file.c | 45 zassert_true(val8 == 42U, "bad value read"); in ZTEST() 52 zassert_true(val8 == 44U, "bad value read"); in ZTEST()
|
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/dut/src/ |
D | main.c | 296 struct bt_conn *good, *bad; in dut_procedure() local 305 LOG_DBG("Central: Connect to bad peer"); in dut_procedure() 306 bad = connect(); in dut_procedure() 310 do_dlu(bad); in dut_procedure() 311 send_write_handle(bad); in dut_procedure() 330 * - a "bad" peer, spamming ATT requests as fast as possible. in test_procedure_0() 333 * The bad peer uses the tinyhost (raw hci) to send requests. in test_procedure_0() 335 * The DUT is allowed to disconnect the ACL of the bad peer. in test_procedure_0() 336 * If that happens, the bad peer will reconnect and continue. in test_procedure_0() 343 * - Bad peer sends ATT requests as fast as it can in test_procedure_0()
|
/Zephyr-latest/tests/bsim/bluetooth/host/security/ccc_update/src/ |
D | peripheral.c | 198 /* check that subscribtion is restored for bad client */ in connect_wait_unsubscribtion() 200 FAIL("Subscribtion has not been restored for bad client\n"); in connect_wait_unsubscribtion() 203 /* confirm to bad client that the subscribtion had not been restored */ in connect_wait_unsubscribtion() 205 /* wait for confirmation that bad client requested unsubscribtion */ in connect_wait_unsubscribtion() 210 FAIL("Bad client didn't manage to update CCC config\n"); in connect_wait_unsubscribtion() 213 /* confirm to bad client that unsubscribtion request has been well registered */ in connect_wait_unsubscribtion() 294 * test pass if the bad client manage to unsubscribe in run_peripheral()
|
/Zephyr-latest/drivers/firmware/scmi/ |
D | mailbox.h | 76 "bad bidirectional channel description"); \ 81 "bad unidirectional channel description"); \ 84 "bad SHMEM count"); \ 87 "bad mbox count"); \
|
/Zephyr-latest/subsys/net/ip/ |
D | icmpv4.h | 23 #define NET_ICMPV4_BAD_IP_HEADER 12 /* Bad IP header */ 28 #define NET_ICMPV4_BAD_IP_HEADER_LENGTH 2 /* Bad length field */
|
/Zephyr-latest/tests/kernel/common/src/ |
D | main.c | 58 zassert_equal(index, 17, "bad index"); in ZTEST() 62 zassert_equal(index, 0, "bad index"); in ZTEST()
|
/Zephyr-latest/tests/arch/common/semihost/src/ |
D | main.c | 20 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST() 38 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST() 66 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST()
|
/Zephyr-latest/drivers/ipm/ |
D | ipm_sedi.c | 120 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_send() 129 LOG_ERR("bad params when sending ipm msg on device: %p", dev); in ipm_sedi_send() 195 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_register_callback() 200 LOG_ERR("bad params when add ipm callback on device: %p", dev); in ipm_sedi_register_callback() 216 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_complete() 243 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_set_enable()
|
/Zephyr-latest/tests/drivers/charger/sbs_charger/src/ |
D | test_sbs_charger.c | 42 zassert_equal(ret, -ENOTSUP, "Getting bad property %d has a good status.", prop); in ZTEST_USER_F() 64 zassert_equal(ret, -ENOTSUP, "Setting bad property %d has a good status.", prop); in ZTEST_USER_F()
|
/Zephyr-latest/tests/subsys/fs/common/ |
D | test_fs_basic.c | 68 "stat written hello bad size"); in create_write_hello() 144 "stat old hello bad size"); in seek_within_hello() 209 "stat old hello bad size"); in truncate_hello() 233 "stat open 3/4 bad size"); in truncate_hello() 248 "stat closed truncated bad size"); in truncate_hello() 337 "stat sync bad size"); in sync_goodbye()
|