/mbedtls-latest/tests/suites/ |
D | test_suite_bignum_random.function | 123 mbedtls_mpi_uint *result = NULL; 129 TEST_CALLOC(result, limbs); 132 mbedtls_mpi_core_random(result, min, upper_bound, limbs, 136 TEST_EQUAL(0, mbedtls_mpi_core_lt_ct(result, lower_bound, limbs)); 137 TEST_ASSERT(0 != mbedtls_mpi_core_lt_ct(result, upper_bound, limbs)); 143 mbedtls_free(result); 278 mbedtls_mpi_uint *result = NULL; 290 TEST_CALLOC(result, limbs); 309 TEST_EQUAL(0, mbedtls_mpi_core_random(result, 316 mbedtls_mpi R = { .s = 1, .n = limbs, .p = result }; [all …]
|
D | test_suite_base64.function | 59 int dst_buf_size, int result) 72 TEST_ASSERT(mbedtls_base64_encode(dst_str, dst_buf_size, &len, src_str, src_len) == result); 79 if (result == 0) { 86 void mbedtls_base64_decode(char *src_string, char *dst_string, int result) 98 TEST_ASSERT(res == result); 99 if (result == 0) { 107 int result) 115 TEST_ASSERT(mbedtls_base64_encode(res, dst_buf_size, &len, src->x, src->len) == result); 122 if (result == 0) { 134 int result) [all …]
|
D | test_suite_nist_kw.function | 126 int is_wrap, int result) 138 TEST_ASSERT(ret == result); 240 unsigned char result[528]; 246 memset(result, '+', sizeof(result)); 253 result, &result_len, sizeof(result)) == 0); 257 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0); 261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) { 262 TEST_ASSERT(result[i] == '+'); 274 unsigned char result[528]; 280 memset(result, '+', sizeof(result)); [all …]
|
D | test_suite_constant_time.function | 209 int result = mbedtls_ct_memcmp(a, b, size); 212 TEST_CF_PUBLIC(&result, sizeof(result)); 214 TEST_EQUAL(result, 0); 224 result = mbedtls_ct_memcmp(a, b, size); 227 TEST_CF_PUBLIC(&result, sizeof(result)); 229 TEST_ASSERT(result != 0); 338 uint8_t *src = NULL, *src2 = NULL, *result = NULL, *expected = NULL; 341 TEST_CALLOC(result, size + offset); 344 /* Apply offset to result only */ 347 result[i] = 0xff; [all …]
|
D | test_suite_pkcs1_v21.function | 13 data_t *result_str, int result) 49 output) == result); 50 if (result == 0) { 65 int result) 104 NULL, 0) == result); 111 sizeof(output)) == result); 112 if (result == 0) { 130 int result) 168 digest, hash_digest->len, hash_digest->x, output) == result); 169 if (result == 0) { [all …]
|
D | test_suite_entropy.function | 325 void entropy_threshold(int threshold, int chunk_size, int result) 350 if (result >= 0) { 355 result *= 2; 357 TEST_ASSERT(weak.calls == (size_t) result); 359 TEST_ASSERT(ret == result); 371 int result) 374 * if result >= 0: result = expected number of calls to source 1 375 * if result < 0: result = expected return code from mbedtls_entropy_func() 398 if (result >= 0) { 403 result *= 2; [all …]
|
D | test_suite_timing.function | 46 int result; 49 result = mbedtls_timing_get_delay(&ctx); 50 TEST_ASSERT(result == -1); 53 result = mbedtls_timing_get_delay(&ctx); 54 TEST_ASSERT(result >= 0 && result <= 2);
|
D | test_suite_rsa.function | 164 data_t *result_str, int result) 194 output) == result); 195 if (result == 0) { 212 data_t *result_str, int result) 230 result_str->x) == result); 328 data_t *result_str, int result) 357 output) == result); 358 if (result == 0) { 373 data_t *result_str, int result) 398 output) == result); [all …]
|
D | test_suite_pkparse.function | 114 void pk_parse_keyfile_rsa(char *key_file, char *password, int result) 130 TEST_EQUAL(res, result); 161 void pk_parse_public_keyfile_rsa(char *key_file, int result) 171 TEST_EQUAL(res, result); 198 void pk_parse_public_keyfile_ec(char *key_file, int result) 208 TEST_EQUAL(res, result); 238 void pk_parse_keyfile_ec(char *key_file, char *password, int result) 249 TEST_EQUAL(res, result); 279 void pk_parse_key(data_t *buf, int result) 287 mbedtls_test_rnd_std_rand, NULL) == result); [all …]
|
D | test_suite_x509parse.function | 590 void mbedtls_x509_crl_parse(char *crl_file, int result) 599 TEST_EQUAL(mbedtls_x509_crl_parse_file(&crl, crl_file), result); 654 int result, int flags_result, 689 TEST_EQUAL(ret, result); 699 TEST_ASSERT(ret == result || ret == MBEDTLS_ERR_ECP_IN_PROGRESS); 711 char *cn_name_str, int result, int flags_result, 770 TEST_EQUAL(res, result); 788 TEST_EQUAL(res, result); 1036 void mbedtls_x509_time_is_past(char *crt_file, char *entity, int result) 1046 TEST_EQUAL(mbedtls_x509_time_is_past(&crt.valid_from), result); [all …]
|
D | test_suite_bignum_mod_raw.function | 267 char *result) 285 TEST_EQUAL(mbedtls_test_read_mpi_core(&res, &limbs_res, result), 0); 336 char *result) 351 TEST_EQUAL(mbedtls_test_read_mpi_core(&res, &limbs_res, result), 0); 386 char *result) 405 TEST_EQUAL(mbedtls_test_read_mpi_core(&R, &limbs_R, result), 0); 579 /* A + B => Correct result */ 583 /* A + B: alias X to A => Correct result */ 588 /* A + B: alias X to B => Correct result */ 596 /* A + A => Correct result */ [all …]
|
D | test_suite_bignum.generated.data | 138 MPI add #46 positive + negative , result=0 144 MPI add #48 positive + negative with leading zero limb , result<0 150 MPI add #50 positive + large negative , result<0 165 MPI add #55 negative + positive , result=0 171 MPI add #57 negative + positive with leading zero limb , result>0 177 MPI add #59 negative + large positive , result>0 198 MPI add #66 positive with leading zero limb + negative , result>0 204 MPI add #68 positive with leading zero limb + negative with leading zero limb , result=0 210 MPI add #70 positive with leading zero limb + large negative , result<0 225 MPI add #75 negative with leading zero limb + positive , result<0 [all …]
|
D | test_suite_bignum_core.function | 35 /* A + B => correct result and carry */ 39 /* A + B; alias output and first operand => correct result and carry */ 44 /* A + B; alias output and second operand => correct result and carry */ 52 /* A + A => correct result and carry */ 56 /* A + A, output aliased to both operands => correct result and carry */ 63 /* B + A => correct result and carry */ 67 /* B + A; alias output and first operand => correct result and carry */ 72 /* B + A; alias output and second operand => correct result and carry */ 116 /* cond = 1 => correct result and carry */ 128 /* cond = 1 => correct result and carry */ [all …]
|
D | test_suite_platform_printf.function | 29 int x, char *result) 32 const size_t n = strlen(result); 37 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1); 74 int arg1, int arg2, char *result) 77 const size_t n = strlen(result); 82 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
|
D | test_suite_aria.function | 172 int result) 185 == result); 198 int result) 211 == result); 224 int result) 237 == result); 250 int result) 263 == result);
|
D | test_suite_pkcs1_v15.function | 15 data_t *result_str, int result) 53 output) == result); 55 if (result == 0) { 70 data_t *message_str, int result) 106 NULL, 0) == result); 112 output, 1000) == result); 113 if (result == 0) { 272 data_t *result_str, int result) 308 output) == result); 309 if (result == 0) { [all …]
|
D | test_suite_bignum_mod.function | 100 char *result) 117 TEST_EQUAL(test_read_residue(&rR, &m, result, 0), 0); 184 char *result, 205 TEST_EQUAL(test_read_residue(&rR, &m, result, 1), 0); 293 /* a - b => Correct result, or expected error */ 301 /* a - b: alias x to a => Correct result */ 306 /* a - b: alias x to b => Correct result */ 314 /* a - a => Correct result */ 318 /* a - a: x, a, b all aliased together => Correct result */ 369 /* a^-1: alias x to a => Correct result */ [all …]
|
D | test_suite_ccm.function | 79 void mbedtls_ccm_setkey(int cipher_id, int key_size, int result) 92 TEST_ASSERT(ret == result); 191 data_t *add, data_t *result) 197 const size_t expected_tag_len = result->len - msg->len; 198 const uint8_t *expected_tag = result->x + msg->len; 216 TEST_MEMORY_COMPARE(io_msg_buf, msg->len, result->x, msg->len); 220 const data_t encrypted_expected = { .x = result->x, 248 data_t *msg, data_t *iv, data_t *result) 262 TEST_EQUAL(result->len, olen); 263 TEST_MEMORY_COMPARE(output, olen, result->x, result->len); [all …]
|
/mbedtls-latest/library/ |
D | sha3.c | 542 int result; in mbedtls_sha3_kat_test() local 544 result = mbedtls_sha3(id, in mbedtls_sha3_kat_test() 547 if (result != 0) { in mbedtls_sha3_kat_test() 550 type_name, test_num, result); in mbedtls_sha3_kat_test() 553 return result; in mbedtls_sha3_kat_test() 558 result = memcmp(hash, test_hash_sha3_224[test_num], 28); in mbedtls_sha3_kat_test() 561 result = memcmp(hash, test_hash_sha3_256[test_num], 32); in mbedtls_sha3_kat_test() 564 result = memcmp(hash, test_hash_sha3_384[test_num], 48); in mbedtls_sha3_kat_test() 567 result = memcmp(hash, test_hash_sha3_512[test_num], 64); in mbedtls_sha3_kat_test() 573 if (0 != result) { in mbedtls_sha3_kat_test() [all …]
|
/mbedtls-latest/tests/scripts/ |
D | audit-validity-dates.py | 126 result = der_loader(data) 128 result = None 129 return result 234 result = self.parser[data_type](data) 236 result = None 238 if result is not None: 239 audit_data = AuditData(data_type, result) 297 result = self.parse_bytes(data[m.start():m.end()]) 298 if result is not None: 299 result.locations.append("{}#{}".format(filename, idx)) [all …]
|
D | run-test-suites.pl | 91 my $result = `$command`; 93 $suite_cases_passed = () = $result =~ /.. PASS/g; 94 $suite_cases_failed = () = $result =~ /.. FAILED/g; 95 $suite_cases_skipped = () = $result =~ /.. ----/g; 101 print $result; 109 print $result; 114 my ($passed, $tests, $skipped) = $result =~ /([0-9]*) \/ ([0-9]*) tests.*?([0-9]*) skipped/;
|
/mbedtls-latest/scripts/ |
D | code_style.py | 142 result = subprocess.run([UNCRUSTIFY_EXE, "--version"], 145 if result.returncode != 0: 146 print_err("Could not get Uncrustify version:", str(result.stderr, "utf-8")) 149 return str(result.stdout, "utf-8") 159 result = subprocess.run(uncrustify_cmd, stdout=subprocess.PIPE, 161 if result.returncode != 0: 162 print_err("Uncrustify returned " + str(result.returncode) + 191 result = subprocess.run(uncrustify_cmd, check=False) 192 if result.returncode != 0: 194 str(result.returncode) + " correcting file " +
|
/mbedtls-latest/tests/src/ |
D | helpers.c | 50 mbedtls_test_result_t result; in mbedtls_test_get_result() local 56 result = mbedtls_test_info.result; in mbedtls_test_get_result() 62 return result; in mbedtls_test_get_result() 65 static void mbedtls_test_set_result_internal(mbedtls_test_result_t result, const char *test, in mbedtls_test_set_result_internal() argument 71 mbedtls_test_info.result = result; in mbedtls_test_set_result_internal() 385 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_fail_internal() 453 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_equal() 491 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_le_u() 529 if (mbedtls_test_info.result != MBEDTLS_TEST_RESULT_FAILED) { in mbedtls_test_le_s()
|
/mbedtls-latest/programs/pkey/ |
D | pk_decrypt.c | 47 unsigned char result[1024]; in main() local 56 memset(result, 0, sizeof(result)); in main() 121 if ((ret = mbedtls_pk_decrypt(&pk, buf, i, result, &olen, sizeof(result), in main() 130 mbedtls_printf("The decrypted result is: '%s'\n\n", result); in main()
|
D | rsa_decrypt.c | 47 unsigned char result[1024]; in main() local 52 memset(result, 0, sizeof(result)); in main() 149 buf, result, 1024); in main() 158 mbedtls_printf("The decrypted result is: '%s'\n\n", result); in main()
|