HomeSort by: relevance | last modified time | path
    Searched defs:input_len (Results 1 - 25 of 28) sorted by relevancy

1 2

  /src/lib/libedit/TEST/
test_filecompletion.c 524 size_t input_len; local
532 input_len = wcslen(inputs[i].user_typed_text);
533 wmemcpy(buffer, inputs[i].user_typed_text, input_len);
534 buffer[input_len] = 0;
536 line.cursor = line.buffer + input_len ;
test_filecompletion.c 524 size_t input_len; local
532 input_len = wcslen(inputs[i].user_typed_text);
533 wmemcpy(buffer, inputs[i].user_typed_text, input_len);
534 buffer[input_len] = 0;
536 line.cursor = line.buffer + input_len ;
  /src/crypto/external/bsd/libsaslc/dist/test/
example_client.c 88 size_t input_len, output_len; local
146 input_len = strlen(input);
147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
example_client.c 88 size_t input_len, output_len; local
146 input_len = strlen(input);
147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
  /src/external/ibm-public/postfix/dist/src/util/
quote_for_json.c 157 ssize_t input_len; /* -1 or input length */ member in struct:TEST_CASE
200 res = tp->fn(res_buf, tp->input, tp->input_len);
quote_for_json.c 157 ssize_t input_len; /* -1 or input length */ member in struct:TEST_CASE
200 res = tp->fn(res_buf, tp->input, tp->input_len);
  /src/crypto/external/apache2/openssl/dist/test/
evp_extra_test2.c 1847 size_t input_len = ak->size; local
1854 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx,
1856 || !TEST_ptr_eq(p, input + input_len)
evp_extra_test2.c 1847 size_t input_len = ak->size; local
1854 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx,
1856 || !TEST_ptr_eq(p, input + input_len)
evp_extra_test.c 2212 size_t input_len = ak->size; local
2216 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
2217 || !TEST_ptr_eq(p, input + input_len)
2320 size_t input_len = ak->size; local
2325 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, input_len);
2327 || !TEST_true(p == input + input_len))
3299 size_t input_len = ak->size; local
3306 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len)))
3580 size_t input_len = sizeof(kExampleECPubKeyDER); local
3584 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)))
3611 size_t input_len = sizeof(kExampleECPubKeyDER); local
    [all...]
evp_test.c 493 * Return an allocated buffer, set |out_len|. If |input_len|
496 static unsigned char *unescape(const char *input, size_t input_len,
502 if (input_len == 0) {
508 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len)))
511 for (i = 0; i < input_len; i++) {
513 if (i == input_len - 1 || *++input != 'n') {
1585 size_t input_len; member in struct:mac_data_st
1699 return parse_bin(value, &mdata->input, &mdata->input_len);
1757 size_t input_len, donelen; local
1827 input_len = expected->input_len
1881 size_t input_len, donelen; local
2454 size_t input_len; member in struct:pkey_data_st
3335 size_t input_len; member in struct:encode_data_st
3396 size_t input_len, donelen, decode_length; local
    [all...]
evp_extra_test.c 2212 size_t input_len = ak->size; local
2216 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
2217 || !TEST_ptr_eq(p, input + input_len)
2320 size_t input_len = ak->size; local
2325 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, input_len);
2327 || !TEST_true(p == input + input_len))
3299 size_t input_len = ak->size; local
3306 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len)))
3580 size_t input_len = sizeof(kExampleECPubKeyDER); local
3584 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)))
3611 size_t input_len = sizeof(kExampleECPubKeyDER); local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
evp_extra_test2.c 453 size_t input_len = ak->size; local
460 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx,
462 || !TEST_ptr_eq(p, input + input_len)
evp_extra_test2.c 453 size_t input_len = ak->size; local
460 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx,
462 || !TEST_ptr_eq(p, input + input_len)
evp_extra_test.c 1698 size_t input_len = ak->size; local
1702 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1703 || !TEST_ptr_eq(p, input + input_len)
2373 size_t input_len = ak->size; local
2380 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len)))
2637 size_t input_len = sizeof(kExampleECPubKeyDER); local
2641 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)))
2648 input_len = sizeof(kExampleBadECPubKeyDER);
2650 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len)))
2668 size_t input_len = sizeof(kExampleECPubKeyDER) local
    [all...]
evp_test.c 231 * Return an allocated buffer, set |out_len|. If |input_len|
234 static unsigned char* unescape(const char *input, size_t input_len,
240 if (input_len == 0) {
246 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len)))
249 for (i = 0; i < input_len; i++) {
251 if (i == input_len - 1 || *++input != 'n') {
1136 size_t input_len; member in struct:mac_data_st
1256 return parse_bin(value, &mdata->input, &mdata->input_len);
1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) {
1705 size_t input_len; member in struct:pkey_data_st
2288 size_t input_len; member in struct:encode_data_st
    [all...]
evp_extra_test.c 1698 size_t input_len = ak->size; local
1702 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1703 || !TEST_ptr_eq(p, input + input_len)
2373 size_t input_len = ak->size; local
2380 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len)))
2637 size_t input_len = sizeof(kExampleECPubKeyDER); local
2641 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)))
2648 input_len = sizeof(kExampleBadECPubKeyDER);
2650 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len)))
2668 size_t input_len = sizeof(kExampleECPubKeyDER) local
    [all...]
evp_test.c 231 * Return an allocated buffer, set |out_len|. If |input_len|
234 static unsigned char* unescape(const char *input, size_t input_len,
240 if (input_len == 0) {
246 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len)))
249 for (i = 0; i < input_len; i++) {
251 if (i == input_len - 1 || *++input != 'n') {
1136 size_t input_len; member in struct:mac_data_st
1256 return parse_bin(value, &mdata->input, &mdata->input_len);
1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) {
1705 size_t input_len; member in struct:pkey_data_st
2288 size_t input_len; member in struct:encode_data_st
    [all...]
  /src/external/bsd/nvi/dist/vi/
v_txt.c 2873 size_t input_len, retain; local
2887 for (ttp = TAILQ_FIRST(tiqh), input_len = 0;;) {
2888 input_len += ttp == tp ? tp->cno : ttp->len + ttp->R_erase;
2907 if (input_len < orig_len) {
2908 retain = MIN(tp->owrite, orig_len - input_len);
2912 MEMCPYW(tp->lb + tp->cno, p + input_len, retain);
v_txt.c 2873 size_t input_len, retain; local
2887 for (ttp = TAILQ_FIRST(tiqh), input_len = 0;;) {
2888 input_len += ttp == tp ? tp->cno : ttp->len + ttp->R_erase;
2907 if (input_len < orig_len) {
2908 retain = MIN(tp->owrite, orig_len - input_len);
2912 MEMCPYW(tp->lb + tp->cno, p + input_len, retain);
  /src/crypto/external/bsd/openssl.old/dist/test/
evp_extra_test.c 1076 size_t input_len = ak->size; local
1080 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1081 || !TEST_ptr_eq(p, input + input_len)
1514 size_t input_len = ak->size; local
1526 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1527 || !TEST_ptr_eq(p, input + input_len)
1533 if (!TEST_ptr(pubkey = BIO_new_mem_buf(input, input_len))
1540 if (!TEST_ptr(eckey = d2i_ECParameters(NULL, &p, input_len))
1541 || !TEST_ptr_eq(p, input + input_len)
1637 size_t input_len = sizeof(kExampleECPubKeyDER) local
    [all...]
evp_extra_test.c 1076 size_t input_len = ak->size; local
1080 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1081 || !TEST_ptr_eq(p, input + input_len)
1514 size_t input_len = ak->size; local
1526 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len))
1527 || !TEST_ptr_eq(p, input + input_len)
1533 if (!TEST_ptr(pubkey = BIO_new_mem_buf(input, input_len))
1540 if (!TEST_ptr(eckey = d2i_ECParameters(NULL, &p, input_len))
1541 || !TEST_ptr_eq(p, input + input_len)
1637 size_t input_len = sizeof(kExampleECPubKeyDER) local
    [all...]
evp_test.c 224 * Return an allocated buffer, set |out_len|. If |input_len|
227 static unsigned char* unescape(const char *input, size_t input_len,
233 if (input_len == 0) {
239 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len)))
242 for (i = 0; i < input_len; i++) {
244 if (i == input_len - 1 || *++input != 'n') {
875 size_t input_len; member in struct:mac_data_st
952 return parse_bin(value, &mdata->input, &mdata->input_len);
1034 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1085 size_t input_len; member in struct:pkey_data_st
1575 size_t input_len; member in struct:encode_data_st
    [all...]
evp_test.c 224 * Return an allocated buffer, set |out_len|. If |input_len|
227 static unsigned char* unescape(const char *input, size_t input_len,
233 if (input_len == 0) {
239 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len)))
242 for (i = 0; i < input_len; i++) {
244 if (i == input_len - 1 || *++input != 'n') {
875 size_t input_len; member in struct:mac_data_st
952 return parse_bin(value, &mdata->input, &mdata->input_len);
1034 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1085 size_t input_len; member in struct:pkey_data_st
1575 size_t input_len; member in struct:encode_data_st
    [all...]
  /src/external/bsd/tmux/dist/
input.c 119 size_t input_len; member in struct:input_ctx
1180 ictx->input_len = 0;
1260 while (ictx->input_len + 1 >= available) {
1269 ictx->input_buf[ictx->input_len++] = ictx->ch;
1270 ictx->input_buf[ictx->input_len] = '\0';
2468 size_t len = ictx->input_len;
2534 size_t len = ictx->input_len;
2615 if (ictx->input_len < 1 || *p < '0' || *p > '9')
2752 if (ictx->input_len == 0) {
input.c 119 size_t input_len; member in struct:input_ctx
1180 ictx->input_len = 0;
1260 while (ictx->input_len + 1 >= available) {
1269 ictx->input_buf[ictx->input_len++] = ictx->ch;
1270 ictx->input_buf[ictx->input_len] = '\0';
2468 size_t len = ictx->input_len;
2534 size_t len = ictx->input_len;
2615 if (ictx->input_len < 1 || *p < '0' || *p > '9')
2752 if (ictx->input_len == 0) {

Completed in 88 milliseconds

1 2