/mbedtls-latest/tests/ |
D | context-info.sh | 90 fail() function 143 fail "Memory error detected" 157 fail "pattern '$2' MUST be present in the output" 164 fail "pattern '$2' MUST NOT be present in the output" 171 fail "lines following pattern '$2' must be once in the output"
|
D | ssl-opt.sh | 1008 fail() { function 1421 fail "server or client failed to reach handshake stage" 1428 fail "server or client failed to reach handshake stage" 1439 fail "Server exited with status $SRV_RET" 1447 fail "bad client exit code (expected $CLI_EXPECT, got $CLI_EXIT)" 1459 fail "pattern '$2' MUST be present in the Server output" 1466 fail "pattern '$2' MUST be present in the Client output" 1474 fail "pattern '$2' MUST NOT be present in the Server output" 1483 fail "pattern '$2' MUST NOT be present in the Client output" 1498 fail "lines following pattern '$2' must be unique in Server output" [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_lms.data | 191 # LMOTS type (0x4) but an invalid LMS type (0x5), and should fail. 196 # LMOTS type (0x4) but an invalid LMS type (0x7), and should fail. 201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail. 206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail. 212 # test should fail to verify the signature. 217 # tests that it is the same. It also checks if the export correctly fail when 223 # byte, and then imports it. This should fail. 228 # and then imports it. This should fail. 233 # it's smaller than the LMS type offset, and imports it. This should fail, and 239 # it's smaller than the LMOTS type offset, and imports it. This should fail, and [all …]
|
D | test_suite_lmots.data | 91 # alters the random value (C) of the signature, and is expected to fail to 97 # sets an invalid LMOTS type (0x5), and is expected to fail to 103 # sets an invalid LMOTS type (0x3), and is expected to fail to 115 # byte, and then imports it. This should fail. 120 # and then imports it. This should fail. 125 # it's smaller than the LMOTS type offset, and imports it. This should fail, and 131 # LMOTS type to 0x3, and imports it. This should fail. 136 # LMOTS type to 0x5, and imports it. This should fail, and not attempt to read 143 # must fail as private key material must be deleted after a key is used to sign.
|
D | test_suite_psa_crypto_pake.function | 252 /* Error didn't trigger, make test fail */ 346 /* Error didn't trigger, make test fail */ 379 /* Error didn't trigger, make test fail */ 435 /* Error didn't trigger, make test fail */ 499 /* Error didn't trigger, make test fail */ 526 /* Error didn't trigger, make test fail */ 544 * This check is used for functions that might either succeed or fail depending
|
D | test_suite_mps.function | 239 * In this case, we expect the reader to fail. 275 * In this case, we expect mbedtls_mps_reader_reclaim() to fail, 841 * most of the random calls fail. 1056 * chunks than before CAN fail. */ 1065 * than before NEED NOT fail - no commits */ 1076 * than before NEED NOT fail - intermediate commit */ 1088 * than before NEED NOT fail - end commit */ 1100 * than before NEED NOT fail - intermediate & end commit */
|
D | test_suite_lmots.function | 170 /* Export into too-small buffer should fail */ 211 /* Running another sign operation should fail, since the key should now have
|
D | test_suite_memory_buffer_alloc.data | 19 Memory buffer: heap too small (header verification should fail)
|
D | test_suite_psa_crypto_util.data | 10 # If we add an even larger curve, this test case will fail in the full 72 # If we add an even larger curve, this test case will fail in the full
|
D | test_suite_platform_util.function | 49 * its output buffer. For us, this causes CMAC operations to fail in Msan
|
D | test_suite_psa_crypto_util.function | 34 /* Test with an output buffer smaller than required (expexted to fail). */
|
D | test_suite_platform.function | 73 * Windows CI reports random test fail on platform-suite. It might
|
D | test_suite_lms.function | 172 /* Export into too-small buffer should fail */
|
D | test_suite_bignum_random.function | 182 /* This may theoretically fail on rare platforms with padding in 249 /* This may theoretically fail on rare platforms with padding in
|
D | test_suite_psa_crypto_persistent_key.data | 72 Persistent key import garbage data, should fail
|
D | test_suite_psa_crypto_entropy.function | 243 /* The seed is written by nv_seed callback functions therefore the injection will fail */
|
D | test_suite_psa_crypto.function | 422 /* If the operation is not supported, just skip and not fail in case the 837 /* Error didn't trigger, make test fail */ 943 /* Error didn't trigger, make test fail */ 1011 /* Error didn't trigger, make test fail */ 1078 /* Error didn't trigger, make test fail */ 1138 /* Error didn't trigger, make test fail */ 1178 /* Error didn't trigger, make test fail */ 1703 * fail for large keys. */ 1961 * exactly one thread succeeds and the rest fail with valid errors. 4366 /* Should fail due to invalid alg type (to support invalid key type). [all …]
|
/mbedtls-latest/library/ |
D | sha1.c | 427 goto fail; in mbedtls_sha1_self_test() 436 goto fail; in mbedtls_sha1_self_test() 443 goto fail; in mbedtls_sha1_self_test() 448 goto fail; in mbedtls_sha1_self_test() 453 goto fail; in mbedtls_sha1_self_test() 467 fail: in mbedtls_sha1_self_test()
|
D | sha256.c | 910 goto fail; in mbedtls_sha256_common_self_test() 919 goto fail; in mbedtls_sha256_common_self_test() 927 goto fail; in mbedtls_sha256_common_self_test() 932 goto fail; in mbedtls_sha256_common_self_test() 938 goto fail; in mbedtls_sha256_common_self_test() 952 fail: in mbedtls_sha256_common_self_test()
|
D | sha512.c | 1042 goto fail; in mbedtls_sha512_common_self_test() 1051 goto fail; in mbedtls_sha512_common_self_test() 1058 goto fail; in mbedtls_sha512_common_self_test() 1063 goto fail; in mbedtls_sha512_common_self_test() 1068 goto fail; in mbedtls_sha512_common_self_test() 1082 fail: in mbedtls_sha512_common_self_test()
|
D | md5.c | 397 goto fail; in mbedtls_md5_self_test() 402 goto fail; in mbedtls_md5_self_test() 416 fail: in mbedtls_md5_self_test()
|
D | ripemd160.c | 461 goto fail; in mbedtls_ripemd160_self_test() 466 goto fail; in mbedtls_ripemd160_self_test() 480 fail: in mbedtls_ripemd160_self_test()
|
/mbedtls-latest/docs/architecture/testing/ |
D | invasive-testing.md | 97 …esource allocation can fail, but rarely does so in a typical test environment. How does the produc… 109 Storage can fail, either due to hardware errors or to active attacks on trusted storage. How does t… 235 * We can inject external libraries at link time. This can be a way to make system functions fail. 314 …are left over in the key store even if a test has failed (as that could cause other tests to fail). 358 …options)): replace entropy initialization functions by functions that can fail. This is the only f…
|
/mbedtls-latest/scripts/data_files/ |
D | query_config.fmt | 103 * fail.
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | testing.md | 44 fail (`mbedtls_pk_verify()` etc) return the expected error.
|