/third_party/pulseaudio/src/tests/ |
H A D | json-test.c | 45 fail_unless(o != NULL); in START_TEST() 46 fail_unless(pa_json_object_get_type(o) == PA_JSON_TYPE_STRING); in START_TEST() 47 fail_unless(pa_streq(pa_json_object_get_string(o), strings_compare[i])); in START_TEST() 80 fail_unless(o != NULL); in START_TEST() 81 fail_unless(pa_json_object_get_type(o) == PA_JSON_TYPE_ARRAY); in START_TEST() 82 fail_unless(pa_json_object_get_array_length(o) == PA_ELEMENTSOF(test_strings)); in START_TEST() 87 fail_unless(v != NULL); in START_TEST() 88 fail_unless(pa_json_object_get_type(v) == PA_JSON_TYPE_STRING); in START_TEST() 89 fail_unless(pa_streq(pa_json_object_get_string(v), test_strings[i])); in START_TEST() 106 fail_unless( in START_TEST() [all...] |
H A D | format-test.c | 47 fail_unless(!pa_format_info_is_compatible(f1, f2)); in START_TEST() 55 fail_unless(pa_format_info_is_compatible(f1, f2)); in START_TEST() 56 fail_unless(pa_format_info_is_compatible(f2, f1)); in START_TEST() 62 fail_unless(!pa_format_info_is_compatible(f1, f2)); in START_TEST() 63 fail_unless(!pa_format_info_is_compatible(f2, f1)); in START_TEST() 71 fail_unless(pa_format_info_is_compatible(f1, f2)); in START_TEST() 72 fail_unless(pa_format_info_is_compatible(f2, f1)); in START_TEST() 78 fail_unless(!pa_format_info_is_compatible(f1, f2)); in START_TEST() 79 fail_unless(!pa_format_info_is_compatible(f2, f1)); in START_TEST() 87 fail_unless(!pa_format_info_is_compatibl in START_TEST() [all...] |
H A D | memblockq-test.c | 67 fail_unless(chunk != NULL); in dump_chunk() 91 fail_unless(pa_streq(str, fixed[n])); in dump() 108 fail_unless(pa_streq(str, manual[n])); in dump() 206 fail_unless(bq != NULL); in START_TEST() 254 fail_unless(bq != NULL); in START_TEST() 265 fail_unless(ret == 0); in START_TEST() 268 fail_unless(ret == 0); in START_TEST() 271 fail_unless(ret == 0); in START_TEST() 274 fail_unless(ret == 0); in START_TEST() 280 fail_unless(re in START_TEST() [all...] |
/third_party/lwip/test/unit/ip4/ |
H A D | test_ip4.c | 21 fail_unless((start & 7) == 0); in create_ip4_input_fragment() 22 fail_unless(((len & 7) == 0) || last); in create_ip4_input_fragment() 23 fail_unless(input_netif != NULL); in create_ip4_input_fragment() 26 fail_unless(p != NULL); in create_ip4_input_fragment() 51 fail_unless(err == ERR_OK); in create_ip4_input_fragment() 87 fail_unless(lwip_stats.ip_frag.recv == 1); in START_TEST() 88 fail_unless(lwip_stats.ip_frag.err == 0); in START_TEST() 89 fail_unless(lwip_stats.ip_frag.memerr == 0); in START_TEST() 90 fail_unless(lwip_stats.ip_frag.drop == 0); in START_TEST() 91 fail_unless(lwip_stat in START_TEST() [all...] |
/third_party/curl/tests/unit/ |
H A D | unit1302.c | 61 fail_unless(rc == CURLE_OK, "return code should be CURLE_OK"); 62 fail_unless(size == 4, "size should be 4"); 67 fail_unless(rc == CURLE_OK, "return code should be CURLE_OK"); 68 fail_unless(size == 4, "size should be 4"); 73 fail_unless(rc == CURLE_OK, "return code should be CURLE_OK"); 74 fail_unless(size == 4, "size should be 4"); 79 fail_unless(rc == CURLE_OK, "return code should be CURLE_OK"); 80 fail_unless(size == 8, "size should be 8"); 85 fail_unless(rc == CURLE_OK, "return code should be CURLE_OK"); 86 fail_unless(siz [all...] |
H A D | unit1398.c | 45 fail_unless(rc == 3, "return code should be 3"); 46 fail_unless(!strcmp(output, "bug"), "wrong output"); 50 fail_unless(rc == 3, "return code should be 3"); 51 fail_unless(!strcmp(output, "bug"), "wrong output"); 56 fail_unless(rc == 2, "return code should be 2"); 57 fail_unless(!strcmp(output, "bu"), "wrong output"); 61 fail_unless(rc == 3, "return code should be 3"); 62 fail_unless(!strcmp(output, "bug"), "wrong output"); 66 fail_unless(rc == 3, "return code should be 3"); 67 fail_unless(!strcm [all...] |
H A D | unit1661.c | 34 fail_unless(p, "pointer to free may not be NULL"); in test_free() 62 fail_unless(!bufref.ptr, "Initial reference must be NULL"); 63 fail_unless(!bufref.len, "Initial length must be NULL"); 64 fail_unless(!bufref.dtor, "Destructor must be NULL"); 74 fail_unless((char *) bufref.ptr == buffer, "Referenced data badly set"); 75 fail_unless(bufref.len == 13, "Data size badly set"); 76 fail_unless(bufref.dtor == test_free, "Destructor badly set"); 82 fail_unless((char *) Curl_bufref_ptr(&bufref) == buffer, 89 fail_unless(Curl_bufref_len(&bufref) == 13, "Wrong data size returned"); 97 fail_unless(freecoun [all...] |
H A D | unit1603.c | 74 fail_unless(nodep, "insertion into hash failed"); 76 fail_unless(nodep == key1, "hash retrieval failed"); 79 fail_unless(nodep, "insertion into hash failed"); 81 fail_unless(nodep == key2, "hash retrieval failed"); 84 fail_unless(nodep, "insertion into hash failed"); 86 fail_unless(nodep == key3, "hash retrieval failed"); 90 fail_unless(nodep, "insertion into hash failed"); 92 fail_unless(nodep == key4, "hash retrieval failed"); 96 fail_unless(nodep == key1, "hash retrieval failed"); 98 fail_unless(node [all...] |
H A D | unit1304.c | 58 fail_unless(result == 1, "Host not found should return 1"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 62 fail_unless(login[0] == 0, "login should not have been changed"); 71 fail_unless(result == 0, "Host should have been found"); 73 fail_unless(password[0] == 0, "password should not have been changed"); 75 fail_unless(strncmp(login, "me", 2) == 0, 85 fail_unless(result == 1, "Host not found should return 1"); 87 fail_unless(password[0] == 0, "password should not have been changed"); 89 fail_unless(strncmp(login, "me", 2) == 0, 100 fail_unless(resul [all...] |
H A D | unit1300.c | 76 fail_unless(llist.size == 0, "list initial size should be zero"); 77 fail_unless(llist.head == NULL, "list head should initiate to NULL"); 78 fail_unless(llist.tail == NULL, "list tail should initiate to NULL"); 79 fail_unless(llist.dtor == test_Curl_llist_dtor, 94 fail_unless(Curl_llist_count(&llist) == 1, 97 fail_unless(llist.head->ptr == &unusedData_case1, 100 fail_unless(llist.tail == llist.head, 114 fail_unless(llist.head->next->ptr == &unusedData_case3, 116 fail_unless(llist.tail->ptr == &unusedData_case3, 130 fail_unless(llis [all...] |
H A D | unit2602.c | 64 fail_unless(Curl_dynhds_count(&hds) == 2, "should hold 2"); 72 fail_unless(Curl_dynhds_count(&hds) == 2, "should hold 2"); 75 fail_unless(result, "add should have failed"); 77 fail_unless(Curl_dynhds_count_name(&hds, "test", 4) == 0, "false positive"); 78 fail_unless(Curl_dynhds_count_name(&hds, "test1", 4) == 0, "false positive"); 80 fail_unless(Curl_dynhds_get(&hds, "test1", 5), "false negative"); 81 fail_unless(Curl_dynhds_count_name(&hds, "test1", 5) == 1, "should"); 82 fail_unless(Curl_dynhds_ccount_name(&hds, "test2") == 1, "should"); 83 fail_unless(Curl_dynhds_cget(&hds, "test2"), "should"); 84 fail_unless(Curl_dynhds_ccount_nam [all...] |
H A D | unit1653.c | 74 fail_unless(ret == CURLUE_OK, "parse_port returned error"); 76 fail_unless(ret != CURLUE_OK, "curl_url_get portnum returned something"); 88 fail_unless(ret != CURLUE_OK, "parse_port true on error"); 99 fail_unless(ret == CURLUE_OK, "parse_port returned error"); 101 fail_unless(ret == CURLUE_OK, "curl_url_get portnum returned error"); 102 fail_unless(portnum && !strcmp(portnum, "808"), "Check portnumber"); 116 fail_unless(ret == CURLUE_OK, "parse_port returned error"); 118 fail_unless(ret == CURLUE_OK, "curl_url_get portnum returned error"); 119 fail_unless(portnum && !strcmp(portnum, "80"), "Check portnumber"); 132 fail_unless(re [all...] |
H A D | unit1652.c | 100 fail_unless(verify(result, input) == 0, "Simple string test"); 104 fail_unless(verify(result, "Simple Test 42 testing 43\n") == 0, 109 fail_unless(strlen(result) == 1, "Empty string"); 111 fail_unless(verify(result, "(nil)") == 0, "Passing NULL as string"); 117 fail_unless(strlen(result) == 2048, "No truncation of infof input"); 118 fail_unless(verify(result, input) == 0, "No truncation of infof input"); 119 fail_unless(result[sizeof(result) - 1] == '\0', 125 fail_unless(strlen(result) == 2048, "Truncation of infof input 1"); 126 fail_unless(result[sizeof(result) - 1] == '\0', "Truncation of infof input 1"); 132 fail_unless(strle [all...] |
H A D | unit1655.c | 115 fail_unless(d == playlist[i].expected_result, 123 fail_unless(victim.canary1 == 87, 126 fail_unless(victim.canary2 == 35, 128 fail_unless(victim.canary3 == 41, 133 fail_unless(olen <= sizeof(victim.dohbuffer), "wrote outside bounds"); 134 fail_unless(olen > strlen(name), "unrealistic low size"); 155 fail_unless(ret == DOH_OK, "sunshine case 1 should pass fine"); 157 fail_unless(olen1 > strlen(sunshine1), "bad out length"); 162 fail_unless(ret2 == DOH_OK, "dotshine case should pass fine"); 164 fail_unless(olen [all...] |
H A D | unit2601.c | 110 fail_unless(q.chunk_size == chunk_size, "chunk_size init wrong"); in check_bufq() 111 fail_unless(q.max_chunks == max_chunks, "max_chunks init wrong"); in check_bufq() 112 fail_unless(q.head == NULL, "init: head not NULL"); in check_bufq() 113 fail_unless(q.tail == NULL, "init: tail not NULL"); in check_bufq() 114 fail_unless(q.spare == NULL, "init: spare not NULL"); in check_bufq() 115 fail_unless(Curl_bufq_len(&q) == 0, "init: bufq length != 0"); in check_bufq() 118 fail_unless(n >= 0, "write: negative size returned"); in check_bufq() 119 fail_unless((size_t)n <= wsize, "write: wrong size returned"); in check_bufq() 120 fail_unless(result == CURLE_OK, "write: wrong result returned"); in check_bufq() 131 fail_unless(resul in check_bufq() [all...] |
/third_party/lwip/test/unit/udp/ |
H A D | test_udp.c | 34 fail_unless(MEMP_STATS_GET(used, MEMP_UDP_PCB) == 0); in udp_remove_all() 40 fail_unless((netif == &test_netif1) || (netif == &test_netif2)); in default_netif_output() 41 fail_unless(p != NULL); in default_netif_output() 42 fail_unless(ipaddr != NULL); in default_netif_output() 50 fail_unless((netif == &test_netif1) || (netif == &test_netif2)); in default_netif_linkoutput() 51 fail_unless(p != NULL); in default_netif_linkoutput() 59 fail_unless(netif != NULL); in default_netif_init() 74 fail_unless(netif_list != NULL); /* the loopif */ in default_netif_add() 75 fail_unless(netif_list->next == NULL); in default_netif_add() 77 fail_unless(netif_lis in default_netif_add() [all...] |
/third_party/lwip/test/unit/api/ |
H A D | test_sockets.c | 44 fail_unless(test_sockets_get_used_count() == 0); in sockets_teardown() 67 fail_unless(ret == 0); in test_sockets_alloc_socket_nonblocking() 81 fail_unless(s >= 0); in START_TEST() 86 fail_unless(s2[i] >= 0); in START_TEST() 91 fail_unless(s == -1); in START_TEST() 94 fail_unless(ret == 0); in START_TEST() 97 fail_unless(s2[0] >= 0); in START_TEST() 102 fail_unless(ret == 0); in START_TEST() 115 fail_unless(s >= 0); in test_sockets_allfunctions_basic_domain() 118 fail_unless(re in test_sockets_allfunctions_basic_domain() [all...] |
/third_party/lwip/test/unit/core/ |
H A D | test_mem.c | 40 fail_unless(lwip_stats.mem.used == 0); in START_TEST() 43 fail_unless(p1 != NULL); in START_TEST() 44 fail_unless(lwip_stats.mem.used >= SIZE1); in START_TEST() 48 fail_unless(p2 != NULL); in START_TEST() 49 fail_unless(lwip_stats.mem.used >= SIZE2 + s1); in START_TEST() 55 fail_unless(lwip_stats.mem.used <= s2 - SIZE2); in START_TEST() 58 fail_unless(lwip_stats.mem.used == 0); in START_TEST() 70 fail_unless(p[i] != NULL); in malloc_keep_x() 88 fail_unless(p[x] != NULL); in malloc_keep_x() 100 fail_unless(lwip_stat in START_TEST() [all...] |
H A D | test_timers.c | 57 fail_unless(cyclic_fired == 0); in do_test_cyclic_timers() 61 fail_unless(cyclic_fired == 1); in do_test_cyclic_timers() 63 fail_unless((*list_head)->time == (u32_t)(lwip_sys_now + test_cyclic.interval_ms - HANDLER_EXECUTION_TIME)); in do_test_cyclic_timers() 74 fail_unless(cyclic_fired == 0); in do_test_cyclic_timers() 78 fail_unless(cyclic_fired == 1); in do_test_cyclic_timers() 80 fail_unless((*list_head)->time == (u32_t)(lwip_sys_now + test_cyclic.interval_ms)); in do_test_cyclic_timers() 108 fail_unless(fired[0] == 0); in START_TEST() 109 fail_unless(fired[1] == 0); in START_TEST() 110 fail_unless(fired[2] == 1); in START_TEST() 115 fail_unless(fire in START_TEST() [all...] |
H A D | test_netif.c | 73 fail_unless(dummy_active); in test_netif_ext_callback_dummy() 82 fail_unless(netif == &net_test); in test_netif_ext_callback() 84 fail_unless(expected_reasons == reason); in test_netif_ext_callback() 115 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 120 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 125 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 131 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 137 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 143 fail_unless(callback_ctr == 1); in NETIF_DECLARE_EXT_CALLBACK() 149 fail_unless(callback_ct in NETIF_DECLARE_EXT_CALLBACK() [all...] |
H A D | test_pbuf.c | 48 fail_unless(p != NULL); in START_TEST() 54 fail_unless(p != NULL); in START_TEST() 60 fail_unless(p != NULL); in START_TEST() 66 fail_unless(p != NULL); in START_TEST() 80 fail_unless(lwip_stats.mem.used == 0); in START_TEST() 81 fail_unless(MEMP_STATS_GET(used, MEMP_PBUF_POOL) == 0); in START_TEST() 84 fail_unless(p1 != NULL); in START_TEST() 85 fail_unless(p1->ref == 1); in START_TEST() 88 fail_unless(p2 != NULL); in START_TEST() 89 fail_unless(p in START_TEST() [all...] |
/third_party/lwip/test/unit/ip6/ |
H A D | test_ip6.c | 22 fail_unless(netif == &test_netif6); in default_netif_linkoutput() 23 fail_unless(p != NULL); in default_netif_linkoutput() 31 fail_unless(netif != NULL); in default_netif_init() 44 fail_unless(netif_default == NULL); in default_netif_add() 46 fail_unless(n == &test_netif6); in default_netif_add() 53 fail_unless(netif_default == &test_netif6); in default_netif_remove() 95 fail_unless(linkoutput_ctr == 0); in test_ip6_ll_addr_iter() 100 fail_unless(linkoutput_ctr == 0); in test_ip6_ll_addr_iter() 102 fail_unless(linkoutput_ctr == 0); in test_ip6_ll_addr_iter() 107 fail_unless(linkoutput_ct in test_ip6_ll_addr_iter() [all...] |
/third_party/lwip/test/unit/mdns/ |
H A D | test_mdns.c | 52 fail_unless(offset == sizeof(data)); in START_TEST() 53 fail_unless(domain.length == sizeof(data)); in START_TEST() 71 fail_unless(offset == sizeof(data)); in START_TEST() 72 fail_unless(domain.length == sizeof(data)); in START_TEST() 90 fail_unless(offset == MDNS_READNAME_ERROR); in START_TEST() 115 fail_unless(offset == MDNS_READNAME_ERROR); in START_TEST() 171 fail_unless(offset == MDNS_READNAME_ERROR); in START_TEST() 196 fail_unless(offset == sizeof(data)); in START_TEST() 197 fail_unless(domain.length == sizeof(fullname)); in START_TEST() 225 fail_unless(offse in START_TEST() [all...] |
/third_party/lwip/test/unit/etharp/ |
H A D | test_etharp.c | 38 fail_unless(netif == &test_netif); in default_netif_linkoutput() 39 fail_unless(p != NULL); in default_netif_linkoutput() 47 fail_unless(netif != NULL); in default_netif_init() 63 fail_unless(netif_default == NULL); in default_netif_add() 72 fail_unless(netif_default == &test_netif); in default_netif_remove() 155 fail_unless(pcb != NULL); in START_TEST() 165 fail_unless(p != NULL); in START_TEST() 171 fail_unless(err2 == ERR_OK); in START_TEST() 173 fail_unless(linkoutput_ctr == (2*i) + 1); in START_TEST() 179 fail_unless(linkoutput_ct in START_TEST() [all...] |
/third_party/curl/tests/libtest/ |
H A D | lib1301.c | 26 #define fail_unless(expr, msg) \ macro 41 fail_unless(rc != 0, "return code should be non-zero"); in test() 44 fail_unless(rc == 0, "return code should be zero"); in test() 47 fail_unless(rc == 0, "return code should be zero"); in test() 50 fail_unless(rc != 0, "return code should be non-zero"); in test() 53 fail_unless(rc != 0, "return code should be non-zero"); in test() 56 fail_unless(rc != 0, "return code should be non-zero"); in test() 59 fail_unless(rc != 0, "return code should be non-zero"); in test()
|