/openthread-latest/tests/scripts/thread-cert/border_router/ |
D | test_dnssd_instance_name_with_space.py | 191 def _assert_dig_result_matches(self, dig_result, expected_result): argument 192 self.assertEqual(dig_result['opcode'], expected_result.get('opcode', 'QUERY'), dig_result) 193 self.assertEqual(dig_result['status'], expected_result.get('status', 'NOERROR'), dig_result) 195 if 'QUESTION' in expected_result: 196 … self.assertEqual(len(dig_result['QUESTION']), len(expected_result['QUESTION']), dig_result) 198 for question in expected_result['QUESTION']: 201 if 'ANSWER' in expected_result: 202 self.assertEqual(len(dig_result['ANSWER']), len(expected_result['ANSWER']), dig_result) 204 for record in expected_result['ANSWER']: 207 if 'ADDITIONAL' in expected_result: [all …]
|
D | test_dnssd_server.py | 319 def _assert_dig_result_matches(self, dig_result, expected_result): argument 320 self.assertEqual(dig_result['opcode'], expected_result.get('opcode', 'QUERY'), dig_result) 321 self.assertEqual(dig_result['status'], expected_result.get('status', 'NOERROR'), dig_result) 323 if 'QUESTION' in expected_result: 324 … self.assertEqual(len(dig_result['QUESTION']), len(expected_result['QUESTION']), dig_result) 326 for question in expected_result['QUESTION']: 329 if 'ANSWER' in expected_result: 330 self.assertEqual(len(dig_result['ANSWER']), len(expected_result['ANSWER']), dig_result) 332 for record in expected_result['ANSWER']: 335 if 'ADDITIONAL' in expected_result: [all …]
|
D | test_dnssd_server_multi_border_routers.py | 399 def _assert_dig_result_matches(self, dig_result, expected_result): argument 400 self.assertEqual(dig_result['opcode'], expected_result.get('opcode', 'QUERY'), dig_result) 401 self.assertEqual(dig_result['status'], expected_result.get('status', 'NOERROR'), dig_result) 403 if 'QUESTION' in expected_result: 404 … self.assertEqual(len(dig_result['QUESTION']), len(expected_result['QUESTION']), dig_result) 406 for question in expected_result['QUESTION']: 409 if 'ANSWER' in expected_result: 410 self.assertEqual(len(dig_result['ANSWER']), len(expected_result['ANSWER']), dig_result) 412 for record in expected_result['ANSWER']: 415 if 'ADDITIONAL' in expected_result: [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_asn1parse.function | 231 /* overfull_result: expected_result from parsing the given string plus 308 int expected_value, int expected_result) 314 TEST_EQUAL(ret, expected_result); 315 if (expected_result == 0) { 359 const char *expected_hex, int expected_result) 366 int expected_result_for_mpi = expected_result; 369 int expected_result_for_int = expected_result; 381 if (expected_result == 0 && 391 if (expected_result == 0 && expected_value < 0) { 459 const char *expected_hex, int expected_result) [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 323 int expected_result) 354 &returned_id) == expected_result); 377 if (expected_result == PSA_SUCCESS) { 388 void mock_export(int mock_export_return_value, int expected_result) 425 &exported_length) == expected_result); 442 int expected_result) 470 TEST_ASSERT(psa_generate_key(&attributes, &returned_id) == expected_result); 492 if (expected_result == PSA_SUCCESS) { 505 int expected_result) 541 &exported_length) == expected_result); [all …]
|
D | test_suite_nist_kw.function | 238 data_t *expected_result) 255 TEST_ASSERT(result_len == expected_result->len); 257 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0); 272 data_t *expected_result, int expected_ret) 289 TEST_ASSERT(result_len == expected_result->len); 290 TEST_ASSERT(memcmp(expected_result->x, result, result_len) == 0);
|
D | test_suite_pkcs1_v15.function | 131 int expected_result) 225 output_size) == expected_result); 226 if (expected_result == 0) { 231 } else if (expected_result == MBEDTLS_ERR_RSA_INVALID_PADDING || 232 expected_result == MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE) {
|
D | test_suite_cmac.function | 134 data_t *expected_result) 188 TEST_ASSERT(memcmp(output, expected_result->x, block_size) == 0);
|
D | test_suite_ccm.function | 342 data_t *expected_result, int output_ret) 351 const uint8_t *expected_tag = expected_result->x + msg->len; 390 TEST_MEMORY_COMPARE(io_msg_buf, msg->len, expected_result->x, msg->len); 397 const data_t encrypted_expected = { .x = expected_result->x, 429 data_t *expected_result, int output_ret) 470 TEST_MEMORY_COMPARE(io_msg_buf, expected_msg_len, expected_result->x, expected_msg_len); 487 expected_result,
|
D | test_suite_ctr_drbg.function | 347 void ctr_drbg_threads(data_t *expected_result, int reseed, int arg_thread_count) 413 TEST_MEMORY_COMPARE(out, sizeof(out), expected_result->x, expected_result->len);
|
D | test_suite_psa_crypto_driver_wrappers.function | 1655 data_t *expected_result, 1705 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len, 2894 data_t *expected_result, 2977 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len,
|
D | test_suite_pk.function | 1087 data_t *result_str, int expected_result) 1120 expected_result == MBEDTLS_ERR_RSA_VERIFY_FAILED) { 1126 TEST_EQUAL(actual_result, expected_result); 1135 expected_result == MBEDTLS_ERR_RSA_VERIFY_FAILED) { 1141 TEST_EQUAL(actual_result, expected_result);
|
D | test_suite_psa_crypto.function | 4211 int expected_result) 4231 TEST_EQUAL(expected_result, psa_cipher_set_iv(&operation, output, 5052 psa_status_t expected_result = expected_result_arg; 5070 if (expected_result != PSA_ERROR_INVALID_ARGUMENT && 5071 expected_result != PSA_ERROR_NOT_SUPPORTED) { 5095 TEST_EQUAL(status, expected_result); 5097 if (PSA_SUCCESS == expected_result) { 5115 expected_result); 5135 data_t *expected_result) 5184 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len, [all …]
|
D | test_suite_ecp.function | 511 data_t *expected_result) 541 TEST_MEMORY_COMPARE(expected_result->x, expected_result->len,
|
D | test_suite_x509parse.function | 453 int expected_result = ext_type & has_ext_type; 460 TEST_EQUAL(mbedtls_x509_crt_has_ext_type(&crt, has_ext_type), expected_result);
|
D | test_suite_ssl.function | 3369 int expected_result; 3426 buf, &end, step, &expected_result, &expected_chk_buf_ptr_args); 3433 TEST_EQUAL(ret, expected_result);
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | cmac.c | 829 const unsigned char *expected_result, in cmac_test_wth_cipher() argument 872 if ((ret = memcmp(output, &expected_result[i * block_size], block_size)) != 0) { in cmac_test_wth_cipher()
|
/openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
D | ssl_helpers.h | 606 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args);
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 2365 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args) in mbedtls_test_tweak_tls13_certificate_msg_vector_len() argument 2400 *expected_result = MBEDTLS_ERR_SSL_DECODE_ERROR; in mbedtls_test_tweak_tls13_certificate_msg_vector_len()
|