Searched refs:expected_result (Results 1 – 17 of 17) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_asn1parse.function | 231 /* overfull_result: expected_result from parsing the given string plus 308 int expected_value, int expected_result) 314 TEST_EQUAL(ret, expected_result); 315 if (expected_result == 0) { 359 const char *expected_hex, int expected_result) 366 int expected_result_for_mpi = expected_result; 369 int expected_result_for_int = expected_result; 381 if (expected_result == 0 && 391 if (expected_result == 0 && expected_value < 0) { 459 const char *expected_hex, int expected_result) [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 323 int expected_result) 354 &returned_id) == expected_result); 377 if (expected_result == PSA_SUCCESS) { 388 void mock_export(int mock_export_return_value, int expected_result) 425 &exported_length) == expected_result); 442 int expected_result) 470 TEST_ASSERT(psa_generate_key(&attributes, &returned_id) == expected_result); 492 if (expected_result == PSA_SUCCESS) { 505 int expected_result) 541 &exported_length) == expected_result); [all …]
|
D | test_suite_nist_kw.function | 238 data_t *expected_result) 255 TEST_ASSERT(result_len == expected_result->len); 257 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0); 272 data_t *expected_result, int expected_ret) 289 TEST_ASSERT(result_len == expected_result->len); 290 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0);
|
D | test_suite_pkwrite.function | 77 int expected_result; 115 expected_result = MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; 117 expected_result = MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL; 123 is_der), expected_result); 147 is_der), expected_result);
|
D | test_suite_pkcs1_v15.function | 131 int expected_result) 225 output_size) == expected_result); 226 if (expected_result == 0) { 231 } else if (expected_result == MBEDTLS_ERR_RSA_INVALID_PADDING || 232 expected_result == MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE) {
|
D | test_suite_ccm.function | 342 data_t *expected_result, int output_ret) 351 const uint8_t *expected_tag = expected_result->x + msg->len; 390 TEST_MEMORY_COMPARE(io_msg_buf, msg->len, expected_result->x, msg->len); 397 const data_t encrypted_expected = { .x = expected_result->x, 429 data_t *expected_result, int output_ret) 470 TEST_MEMORY_COMPARE(io_msg_buf, expected_msg_len, expected_result->x, expected_msg_len); 487 expected_result,
|
D | test_suite_cmac.function | 134 data_t *expected_result) 188 TEST_ASSERT(memcmp(output, expected_result->x, block_size) == 0);
|
D | test_suite_ctr_drbg.function | 348 void ctr_drbg_threads(data_t *expected_result, int reseed, int arg_thread_count) 414 TEST_MEMORY_COMPARE(out, sizeof(out), expected_result->x, expected_result->len);
|
D | test_suite_psa_crypto_driver_wrappers.function | 1671 data_t *expected_result, 1721 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len, 2910 data_t *expected_result, 2993 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len,
|
D | test_suite_pk.function | 1069 data_t *result_str, int expected_result) 1102 expected_result == MBEDTLS_ERR_RSA_VERIFY_FAILED) { 1108 TEST_EQUAL(actual_result, expected_result); 1117 expected_result == MBEDTLS_ERR_RSA_VERIFY_FAILED) { 1123 TEST_EQUAL(actual_result, expected_result);
|
D | test_suite_psa_crypto.function | 4191 int expected_result) 4211 TEST_EQUAL(expected_result, psa_cipher_set_iv(&operation, output, 5032 psa_status_t expected_result = expected_result_arg; 5050 if (expected_result != PSA_ERROR_INVALID_ARGUMENT && 5051 expected_result != PSA_ERROR_NOT_SUPPORTED) { 5075 TEST_EQUAL(status, expected_result); 5077 if (PSA_SUCCESS == expected_result) { 5095 expected_result); 5115 data_t *expected_result) 5164 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len, [all …]
|
D | test_suite_ecp.function | 511 data_t *expected_result) 541 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len,
|
D | test_suite_x509parse.function | 466 int expected_result = ext_type & has_ext_type; 473 TEST_EQUAL(mbedtls_x509_crt_has_ext_type(&crt, has_ext_type), expected_result);
|
D | test_suite_ssl.function | 3382 int expected_result; 3439 buf, &end, step, &expected_result, &expected_chk_buf_ptr_args); 3446 TEST_EQUAL(ret, expected_result);
|
/mbedtls-latest/library/ |
D | cmac.c | 829 const unsigned char *expected_result, in cmac_test_wth_cipher() argument 872 if ((ret = memcmp(output, &expected_result[i * block_size], block_size)) != 0) { in cmac_test_wth_cipher()
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 606 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args);
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 2384 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args) in mbedtls_test_tweak_tls13_certificate_msg_vector_len() argument 2419 *expected_result = MBEDTLS_ERR_SSL_DECODE_ERROR; in mbedtls_test_tweak_tls13_certificate_msg_vector_len()
|