| /src/external/mpl/dhcp/dist/common/tests/ |
| misc_unittest.c | 174 int expected_len = 12; local 177 print_hex_only (data_len, data, expected_len, buf); 187 if (buf[expected_len] != 'x') { 192 print_hex_only (data_len, data, expected_len, NULL); 202 print_hex_only (data_len, NULL, expected_len, buf); 209 print_hex_only (data_len, data, expected_len - 1, buf); 216 print_hex_only (0, data, expected_len, buf);
|
| option_unittest.c | 172 unsigned expected_len = 8; local 189 len = parse_X(&cfile, output, expected_len); 192 if (len != expected_len) {
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| hexstr_test.c | 22 size_t expected_len; member in struct:testdata 77 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) 99 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) 127 && TEST_mem_eq(buf, len, test->expected, test->expected_len)
|
| trace_api_test.c | 125 static const size_t expected_len = sizeof(expected) - 1; local 154 if (!TEST_strn2_eq(p_buf, len, expected, expected_len))
|
| ssl_test.c | 198 size_t expected_len = 0; local 204 expected_len = strlen(test_ctx->expected_session_ticket_app_data); 205 if (result_len == 0 && expected_len == 0)
|
| asn1_encode_test.c | 527 const unsigned char *expected, size_t expected_len, 538 if ((size_t)len != expected_len 539 || memcmp(data, expected, expected_len) != 0) {
|
| quic_wire_test.c | 1513 char expected_len; member in struct:pn_test 1550 if (!TEST_int_eq(pn_len, (int)t->expected_len)) 1556 if (!TEST_mem_eq(t->expected_bytes, t->expected_len, buf, pn_len))
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| hexstr_test.c | 23 size_t expected_len; member in struct:testdata 72 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) 94 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) 122 && TEST_mem_eq(buf, len, test->expected, test->expected_len)
|
| trace_api_test.c | 78 static const char expected_len = sizeof(expected) - 1; local 101 if (!TEST_strn2_eq(p_buf, len, expected, expected_len))
|
| ssl_test.c | 198 size_t expected_len = 0; local 204 expected_len = strlen(test_ctx->expected_session_ticket_app_data); 205 if (result_len == 0 && expected_len == 0)
|
| asn1_encode_test.c | 521 const unsigned char *expected, size_t expected_len, 532 if ((size_t)len != expected_len 533 || memcmp(data, expected, expected_len) != 0) {
|
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/ |
| args.exp | 45 set expected_len [expr 1 + [llength $arglist]] 46 gdb_test "print argc" "\\\$$::decimal = $expected_len" "argc for $name"
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.base/ |
| args.exp | 45 set expected_len [expr 1 + [llength $arglist]] 46 gdb_test "print argc" "\\\$$::decimal = $expected_len" "argc for $name"
|
| /src/external/cddl/osnet/dist/lib/pyzfs/common/ |
| allow.py | 346 def mungeargs(expected_len): 347 if un and len(args) == expected_len-1: 348 return (None, args[expected_len-2]) 349 elif len(args) == expected_len: 350 return (args[expected_len-2].split(","), 351 args[expected_len-1])
|
| /src/crypto/external/bsd/openssl/dist/providers/fips/ |
| self_test_kats.c | 41 if (out_len != t->expected_len 113 if (ct_len != (int)t->base.expected_len 131 t->base.expected, t->base.expected_len) 229 if (t->expected_len > sizeof(out)) 231 if (EVP_KDF_derive(ctx, out, t->expected_len, params) <= 0) 236 if (memcmp(out, t->expected, t->expected_len) != 0) 421 if (secret_len != t->expected_len 422 || memcmp(secret, t->expected, t->expected_len) != 0) 596 if (outlen != t->expected_len 597 || memcmp(out, t->expected, t->expected_len) != 0 [all...] |
| self_test.c | 179 unsigned char *expected, size_t expected_len, 217 if (expected_len != out_len
|
| /src/usr.sbin/perfused/ |
| msg.c | 279 size_t expected_len, enum perfuse_xchg_pb_reply reply) 343 if ((expected_len != PERFUSE_UNSPEC_REPLY_LEN) && 344 (foh->len - sizeof(*foh) < expected_len) && 348 foh->len - sizeof(*foh), expected_len); 351 if ((expected_len != 0) && 352 (foh->len - sizeof(*foh) > expected_len))
|
| /src/crypto/external/apache2/openssl/dist/providers/fips/ |
| self_test_kats.c | 51 if (out_len != t->expected_len 124 if (ct_len != (int)t->base.expected_len 143 t->base.expected, t->base.expected_len) 272 if (t->expected_len > sizeof(out)) 274 if (EVP_KDF_derive(ctx, out, t->expected_len, params) <= 0) 279 if (memcmp(out, t->expected, t->expected_len) != 0) 407 size_t secret_len = t->expected_len; 444 if (secret_len != t->expected_len 445 || memcmp(secret, t->expected, t->expected_len) != 0) 884 if (outlen != t->expected_len [all...] |
| self_test.c | 246 unsigned char *expected, size_t expected_len, 287 if (expected_len != out_len
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ssl_test.c | 195 size_t expected_len = 0; local 201 expected_len = strlen(test_ctx->expected_session_ticket_app_data); 202 if (result_len == 0 && expected_len == 0)
|
| asn1_encode_test.c | 521 const unsigned char *expected, size_t expected_len, 532 if ((size_t)len != expected_len 533 || memcmp(data, expected, expected_len) != 0) {
|
| /src/crypto/external/bsd/heimdal/dist/lib/asn1/ |
| check-gen.c | 784 size_t expected_len; member in struct:test_data 826 if (td[i].expected_len != sz) { 889 if (td[i].expected_len != sz) { 949 if (td[i].expected_len != sz) {
|
| /src/crypto/external/bsd/openssh/dist/ |
| krl.c | 994 size_t expected_len) 1003 if (expected_len != 0 && rlen != expected_len) {
|
| /src/external/bsd/unbound/dist/validator/ |
| val_secalgo.c | 1764 unsigned int expected_len; local 1808 expected_len = 1 + /* T */ 1813 if (keylen != expected_len ) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_clnt.c | 1305 size_t expected_len = s->s3.previous_client_finished_len local 1311 if (!ossl_assert(expected_len == 0 1313 || !ossl_assert(expected_len == 0 1332 if (ilen != expected_len) {
|