Home
last modified time | relevance | path

Searched refs:expected_result (Results 1 – 14 of 14) sorted by relevance

/mbedtls-3.5.0/tests/suites/
Dtest_suite_asn1parse.function231 /* overfull_result: expected_result from parsing the given string plus
308 int expected_value, int expected_result)
314 TEST_EQUAL(ret, expected_result);
315 if (expected_result == 0) {
359 const char *expected_hex, int expected_result)
366 int expected_result_for_mpi = expected_result;
369 int expected_result_for_int = expected_result;
381 if (expected_result == 0 &&
391 if (expected_result == 0 && expected_value < 0) {
459 const char *expected_hex, int expected_result)
[all …]
Dtest_suite_psa_crypto_se_driver_hal_mocks.function323 int expected_result)
354 &returned_id) == expected_result);
377 if (expected_result == PSA_SUCCESS) {
388 void mock_export(int mock_export_return_value, int expected_result)
425 &exported_length) == expected_result);
442 int expected_result)
470 TEST_ASSERT(psa_generate_key(&attributes, &returned_id) == expected_result);
492 if (expected_result == PSA_SUCCESS) {
505 int expected_result)
541 &exported_length) == expected_result);
[all …]
Dtest_suite_nist_kw.function238 data_t *expected_result)
255 TEST_ASSERT(result_len == expected_result->len);
257 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0);
272 data_t *expected_result, int expected_ret)
289 TEST_ASSERT(result_len == expected_result->len);
290 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0);
Dtest_suite_pkcs1_v15.function133 int expected_result)
227 output_size) == expected_result);
228 if (expected_result == 0) {
233 } else if (expected_result == MBEDTLS_ERR_RSA_INVALID_PADDING ||
234 expected_result == MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE) {
Dtest_suite_cmac.function128 data_t *expected_result)
182 TEST_ASSERT(memcmp(output, expected_result->x, block_size) == 0);
Dtest_suite_ccm.function328 data_t *expected_result, int output_ret)
337 const uint8_t *expected_tag = expected_result->x + msg->len;
375 ASSERT_COMPARE(io_msg_buf, msg->len, expected_result->x, msg->len);
382 const data_t encrypted_expected = { .x = expected_result->x,
413 data_t *expected_result, int output_ret)
453 ASSERT_COMPARE(io_msg_buf, expected_msg_len, expected_result->x, expected_msg_len);
470 expected_result,
Dtest_suite_psa_crypto_driver_wrappers.function1659 data_t *expected_result,
1709 ASSERT_COMPARE(expected_result->x, expected_result->len,
2890 data_t *expected_result,
2973 ASSERT_COMPARE(expected_result->x, expected_result->len,
Dtest_suite_ecp.function515 data_t *expected_result)
545 ASSERT_COMPARE(expected_result->x, expected_result->len,
Dtest_suite_psa_crypto.function3843 int expected_result)
3863 TEST_EQUAL(expected_result, psa_cipher_set_iv(&operation, output,
4682 psa_status_t expected_result = expected_result_arg;
4700 if (expected_result != PSA_ERROR_INVALID_ARGUMENT &&
4701 expected_result != PSA_ERROR_NOT_SUPPORTED) {
4725 TEST_EQUAL(status, expected_result);
4727 if (PSA_SUCCESS == expected_result) {
4745 expected_result);
4765 data_t *expected_result)
4814 ASSERT_COMPARE(expected_result->x, expected_result->len,
[all …]
Dtest_suite_x509parse.function418 int expected_result = ext_type & has_ext_type;
424 TEST_ASSERT(mbedtls_x509_crt_has_ext_type(&crt, has_ext_type) == expected_result);
Dtest_suite_ssl.function3303 int expected_result;
3361 buf, &end, step, &expected_result, &expected_chk_buf_ptr_args);
3368 TEST_EQUAL(ret, expected_result);
/mbedtls-3.5.0/library/
Dcmac.c837 const unsigned char *expected_result, in cmac_test_wth_cipher() argument
880 if ((ret = memcmp(output, &expected_result[i * block_size], block_size)) != 0) { in cmac_test_wth_cipher()
/mbedtls-3.5.0/tests/include/test/
Dssl_helpers.h542 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args);
/mbedtls-3.5.0/tests/src/test_helpers/
Dssl_helpers.c2129 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args) in tweak_tls13_certificate_msg_vector_len() argument
2164 *expected_result = MBEDTLS_ERR_SSL_DECODE_ERROR; in tweak_tls13_certificate_msg_vector_len()