Home
last modified time | relevance | path

Searched refs:result (Results 1 – 25 of 88) sorted by relevance

1234

/mbedtls-latest/tests/suites/
Dtest_suite_bignum_random.function123 mbedtls_mpi_uint *result = NULL;
129 TEST_CALLOC(result, limbs);
132 mbedtls_mpi_core_random(result, min, upper_bound, limbs,
136 TEST_EQUAL(0, mbedtls_mpi_core_lt_ct(result, lower_bound, limbs));
137 TEST_ASSERT(0 != mbedtls_mpi_core_lt_ct(result, upper_bound, limbs));
143 mbedtls_free(result);
278 mbedtls_mpi_uint *result = NULL;
290 TEST_CALLOC(result, limbs);
309 TEST_EQUAL(0, mbedtls_mpi_core_random(result,
316 mbedtls_mpi R = { .s = 1, .n = limbs, .p = result };
[all …]
Dtest_suite_base64.function59 int dst_buf_size, int result)
72 TEST_ASSERT(mbedtls_base64_encode(dst_str, dst_buf_size, &len, src_str, src_len) == result);
79 if (result == 0) {
86 void mbedtls_base64_decode(char *src_string, char *dst_string, int result)
98 TEST_ASSERT(res == result);
99 if (result == 0) {
107 int result)
115 TEST_ASSERT(mbedtls_base64_encode(res, dst_buf_size, &len, src->x, src->len) == result);
122 if (result == 0) {
134 int result)
[all …]
Dtest_suite_nist_kw.function126 int is_wrap, int result)
138 TEST_ASSERT(ret == result);
240 unsigned char result[528];
246 memset(result, '+', sizeof(result));
253 result, &result_len, sizeof(result)) == 0);
257 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0);
261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) {
262 TEST_ASSERT(result[i] == '+');
274 unsigned char result[528];
280 memset(result, '+', sizeof(result));
[all …]
Dtest_suite_constant_time.function209 int result = mbedtls_ct_memcmp(a, b, size);
212 TEST_CF_PUBLIC(&result, sizeof(result));
214 TEST_EQUAL(result, 0);
224 result = mbedtls_ct_memcmp(a, b, size);
227 TEST_CF_PUBLIC(&result, sizeof(result));
229 TEST_ASSERT(result != 0);
338 uint8_t *src = NULL, *src2 = NULL, *result = NULL, *expected = NULL;
341 TEST_CALLOC(result, size + offset);
344 /* Apply offset to result only */
347 result[i] = 0xff;
[all …]
Dtest_suite_pkcs1_v21.function13 data_t *result_str, int result)
49 output) == result);
50 if (result == 0) {
65 int result)
104 NULL, 0) == result);
111 sizeof(output)) == result);
112 if (result == 0) {
130 int result)
168 digest, hash_digest->len, hash_digest->x, output) == result);
169 if (result == 0) {
[all …]
Dtest_suite_entropy.function325 void entropy_threshold(int threshold, int chunk_size, int result)
350 if (result >= 0) {
355 result *= 2;
357 TEST_ASSERT(weak.calls == (size_t) result);
359 TEST_ASSERT(ret == result);
371 int result)
374 * if result >= 0: result = expected number of calls to source 1
375 * if result < 0: result = expected return code from mbedtls_entropy_func()
398 if (result >= 0) {
403 result *= 2;
[all …]
Dtest_suite_timing.function46 int result;
49 result = mbedtls_timing_get_delay(&ctx);
50 TEST_ASSERT(result == -1);
53 result = mbedtls_timing_get_delay(&ctx);
54 TEST_ASSERT(result >= 0 && result <= 2);
Dtest_suite_rsa.function164 data_t *result_str, int result)
194 output) == result);
195 if (result == 0) {
212 data_t *result_str, int result)
230 result_str->x) == result);
328 data_t *result_str, int result)
357 output) == result);
358 if (result == 0) {
373 data_t *result_str, int result)
398 output) == result);
[all …]
Dtest_suite_pkparse.function114 void pk_parse_keyfile_rsa(char *key_file, char *password, int result)
130 TEST_EQUAL(res, result);
161 void pk_parse_public_keyfile_rsa(char *key_file, int result)
171 TEST_EQUAL(res, result);
198 void pk_parse_public_keyfile_ec(char *key_file, int result)
208 TEST_EQUAL(res, result);
238 void pk_parse_keyfile_ec(char *key_file, char *password, int result)
249 TEST_EQUAL(res, result);
279 void pk_parse_key(data_t *buf, int result)
287 mbedtls_test_rnd_std_rand, NULL) == result);
[all …]
Dtest_suite_x509parse.function590 void mbedtls_x509_crl_parse(char *crl_file, int result)
599 TEST_EQUAL(mbedtls_x509_crl_parse_file(&crl, crl_file), result);
654 int result, int flags_result,
689 TEST_EQUAL(ret, result);
699 TEST_ASSERT(ret == result || ret == MBEDTLS_ERR_ECP_IN_PROGRESS);
711 char *cn_name_str, int result, int flags_result,
770 TEST_EQUAL(res, result);
788 TEST_EQUAL(res, result);
1036 void mbedtls_x509_time_is_past(char *crt_file, char *entity, int result)
1046 TEST_EQUAL(mbedtls_x509_time_is_past(&crt.valid_from), result);
[all …]
Dtest_suite_bignum_mod_raw.function267 char *result)
285 TEST_EQUAL(mbedtls_test_read_mpi_core(&res, &limbs_res, result), 0);
336 char *result)
351 TEST_EQUAL(mbedtls_test_read_mpi_core(&res, &limbs_res, result), 0);
386 char *result)
405 TEST_EQUAL(mbedtls_test_read_mpi_core(&R, &limbs_R, result), 0);
579 /* A + B => Correct result */
583 /* A + B: alias X to A => Correct result */
588 /* A + B: alias X to B => Correct result */
596 /* A + A => Correct result */
[all …]
Dtest_suite_bignum.generated.data138 MPI add #46 positive + negative , result=0
144 MPI add #48 positive + negative with leading zero limb , result<0
150 MPI add #50 positive + large negative , result<0
165 MPI add #55 negative + positive , result=0
171 MPI add #57 negative + positive with leading zero limb , result>0
177 MPI add #59 negative + large positive , result>0
198 MPI add #66 positive with leading zero limb + negative , result>0
204 MPI add #68 positive with leading zero limb + negative with leading zero limb , result=0
210 MPI add #70 positive with leading zero limb + large negative , result<0
225 MPI add #75 negative with leading zero limb + positive , result<0
[all …]
Dtest_suite_bignum_core.function35 /* A + B => correct result and carry */
39 /* A + B; alias output and first operand => correct result and carry */
44 /* A + B; alias output and second operand => correct result and carry */
52 /* A + A => correct result and carry */
56 /* A + A, output aliased to both operands => correct result and carry */
63 /* B + A => correct result and carry */
67 /* B + A; alias output and first operand => correct result and carry */
72 /* B + A; alias output and second operand => correct result and carry */
116 /* cond = 1 => correct result and carry */
128 /* cond = 1 => correct result and carry */
[all …]
Dtest_suite_platform_printf.function29 int x, char *result)
32 const size_t n = strlen(result);
37 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
74 int arg1, int arg2, char *result)
77 const size_t n = strlen(result);
82 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
Dtest_suite_aria.function172 int result)
185 == result);
198 int result)
211 == result);
224 int result)
237 == result);
250 int result)
263 == result);
Dtest_suite_pkcs1_v15.function15 data_t *result_str, int result)
53 output) == result);
55 if (result == 0) {
70 data_t *message_str, int result)
106 NULL, 0) == result);
112 output, 1000) == result);
113 if (result == 0) {
272 data_t *result_str, int result)
308 output) == result);
309 if (result == 0) {
[all …]
Dtest_suite_bignum_mod.function100 char *result)
117 TEST_EQUAL(test_read_residue(&rR, &m, result, 0), 0);
184 char *result,
205 TEST_EQUAL(test_read_residue(&rR, &m, result, 1), 0);
293 /* a - b => Correct result, or expected error */
301 /* a - b: alias x to a => Correct result */
306 /* a - b: alias x to b => Correct result */
314 /* a - a => Correct result */
318 /* a - a: x, a, b all aliased together => Correct result */
369 /* a^-1: alias x to a => Correct result */
[all …]
Dtest_suite_ccm.function79 void mbedtls_ccm_setkey(int cipher_id, int key_size, int result)
92 TEST_ASSERT(ret == result);
191 data_t *add, data_t *result)
197 const size_t expected_tag_len = result->len - msg->len;
198 const uint8_t *expected_tag = result->x + msg->len;
216 TEST_MEMORY_COMPARE(io_msg_buf, msg->len, result->x, msg->len);
220 const data_t encrypted_expected = { .x = result->x,
248 data_t *msg, data_t *iv, data_t *result)
262 TEST_EQUAL(result->len, olen);
263 TEST_MEMORY_COMPARE(output, olen, result->x, result->len);
[all …]
/mbedtls-latest/library/
Dsha3.c542 int result; in mbedtls_sha3_kat_test() local
544 result = mbedtls_sha3(id, in mbedtls_sha3_kat_test()
547 if (result != 0) { in mbedtls_sha3_kat_test()
550 type_name, test_num, result); in mbedtls_sha3_kat_test()
553 return result; in mbedtls_sha3_kat_test()
558 result = memcmp(hash, test_hash_sha3_224[test_num], 28); in mbedtls_sha3_kat_test()
561 result = memcmp(hash, test_hash_sha3_256[test_num], 32); in mbedtls_sha3_kat_test()
564 result = memcmp(hash, test_hash_sha3_384[test_num], 48); in mbedtls_sha3_kat_test()
567 result = memcmp(hash, test_hash_sha3_512[test_num], 64); in mbedtls_sha3_kat_test()
573 if (0 != result) { in mbedtls_sha3_kat_test()
[all …]
/mbedtls-latest/tests/scripts/
Daudit-validity-dates.py126 result = der_loader(data)
128 result = None
129 return result
234 result = self.parser[data_type](data)
236 result = None
238 if result is not None:
239 audit_data = AuditData(data_type, result)
297 result = self.parse_bytes(data[m.start():m.end()])
298 if result is not None:
299 result.locations.append("{}#{}".format(filename, idx))
[all …]
Drun-test-suites.pl91 my $result = `$command`;
93 $suite_cases_passed = () = $result =~ /.. PASS/g;
94 $suite_cases_failed = () = $result =~ /.. FAILED/g;
95 $suite_cases_skipped = () = $result =~ /.. ----/g;
101 print $result;
109 print $result;
114 my ($passed, $tests, $skipped) = $result =~ /([0-9]*) \/ ([0-9]*) tests.*?([0-9]*) skipped/;
/mbedtls-latest/scripts/
Dcode_style.py142 result = subprocess.run([UNCRUSTIFY_EXE, "--version"],
145 if result.returncode != 0:
146 print_err("Could not get Uncrustify version:", str(result.stderr, "utf-8"))
149 return str(result.stdout, "utf-8")
159 result = subprocess.run(uncrustify_cmd, stdout=subprocess.PIPE,
161 if result.returncode != 0:
162 print_err("Uncrustify returned " + str(result.returncode) +
191 result = subprocess.run(uncrustify_cmd, check=False)
192 if result.returncode != 0:
194 str(result.returncode) + " correcting file " +
/mbedtls-latest/tests/src/
Dhelpers.c50 mbedtls_test_result_t result; in mbedtls_test_get_result() local
56 result = mbedtls_test_info.result; in mbedtls_test_get_result()
62 return result; in mbedtls_test_get_result()
65 static void mbedtls_test_set_result_internal(mbedtls_test_result_t result, const char *test, in mbedtls_test_set_result_internal() argument
71 mbedtls_test_info.result = result; in mbedtls_test_set_result_internal()
385 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_fail_internal()
453 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_equal()
491 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_le_u()
529 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_le_s()
/mbedtls-latest/programs/pkey/
Dpk_decrypt.c47 unsigned char result[1024]; in main() local
56 memset(result, 0, sizeof(result)); in main()
121 if ((ret = mbedtls_pk_decrypt(&pk, buf, i, result, &olen, sizeof(result), in main()
130 mbedtls_printf("The decrypted result is: '%s'\n\n", result); in main()
Drsa_decrypt.c47 unsigned char result[1024]; in main() local
52 memset(result, 0, sizeof(result)); in main()
149 buf, result, 1024); in main()
158 mbedtls_printf("The decrypted result is: '%s'\n\n", result); in main()

1234