| /src/lib/libedit/TEST/ |
| test_filecompletion.c | 524 size_t input_len; local 532 input_len = wcslen(inputs[i].user_typed_text); 533 wmemcpy(buffer, inputs[i].user_typed_text, input_len); 534 buffer[input_len] = 0; 536 line.cursor = line.buffer + input_len ;
|
| test_filecompletion.c | 524 size_t input_len; local 532 input_len = wcslen(inputs[i].user_typed_text); 533 wmemcpy(buffer, inputs[i].user_typed_text, input_len); 534 buffer[input_len] = 0; 536 line.cursor = line.buffer + input_len ;
|
| /src/crypto/external/bsd/libsaslc/dist/test/ |
| example_client.c | 88 size_t input_len, output_len; local 146 input_len = strlen(input); 147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
|
| example_client.c | 88 size_t input_len, output_len; local 146 input_len = strlen(input); 147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
|
| /src/external/ibm-public/postfix/dist/src/util/ |
| quote_for_json.c | 157 ssize_t input_len; /* -1 or input length */ member in struct:TEST_CASE 200 res = tp->fn(res_buf, tp->input, tp->input_len);
|
| quote_for_json.c | 157 ssize_t input_len; /* -1 or input length */ member in struct:TEST_CASE 200 res = tp->fn(res_buf, tp->input, tp->input_len);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_extra_test2.c | 1847 size_t input_len = ak->size; local 1854 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, 1856 || !TEST_ptr_eq(p, input + input_len)
|
| evp_extra_test2.c | 1847 size_t input_len = ak->size; local 1854 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, 1856 || !TEST_ptr_eq(p, input + input_len)
|
| evp_extra_test.c | 2212 size_t input_len = ak->size; local 2216 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 2217 || !TEST_ptr_eq(p, input + input_len) 2320 size_t input_len = ak->size; local 2325 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, input_len); 2327 || !TEST_true(p == input + input_len)) 3299 size_t input_len = ak->size; local 3306 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) 3580 size_t input_len = sizeof(kExampleECPubKeyDER); local 3584 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) 3611 size_t input_len = sizeof(kExampleECPubKeyDER); local [all...] |
| evp_test.c | 493 * Return an allocated buffer, set |out_len|. If |input_len| 496 static unsigned char *unescape(const char *input, size_t input_len, 502 if (input_len == 0) { 508 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) 511 for (i = 0; i < input_len; i++) { 513 if (i == input_len - 1 || *++input != 'n') { 1585 size_t input_len; member in struct:mac_data_st 1699 return parse_bin(value, &mdata->input, &mdata->input_len); 1757 size_t input_len, donelen; local 1827 input_len = expected->input_len 1881 size_t input_len, donelen; local 2454 size_t input_len; member in struct:pkey_data_st 3335 size_t input_len; member in struct:encode_data_st 3396 size_t input_len, donelen, decode_length; local [all...] |
| evp_extra_test.c | 2212 size_t input_len = ak->size; local 2216 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 2217 || !TEST_ptr_eq(p, input + input_len) 2320 size_t input_len = ak->size; local 2325 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, input_len); 2327 || !TEST_true(p == input + input_len)) 3299 size_t input_len = ak->size; local 3306 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) 3580 size_t input_len = sizeof(kExampleECPubKeyDER); local 3584 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) 3611 size_t input_len = sizeof(kExampleECPubKeyDER); local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_extra_test2.c | 453 size_t input_len = ak->size; local 460 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, 462 || !TEST_ptr_eq(p, input + input_len)
|
| evp_extra_test2.c | 453 size_t input_len = ak->size; local 460 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, 462 || !TEST_ptr_eq(p, input + input_len)
|
| evp_extra_test.c | 1698 size_t input_len = ak->size; local 1702 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1703 || !TEST_ptr_eq(p, input + input_len) 2373 size_t input_len = ak->size; local 2380 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) 2637 size_t input_len = sizeof(kExampleECPubKeyDER); local 2641 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) 2648 input_len = sizeof(kExampleBadECPubKeyDER); 2650 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len))) 2668 size_t input_len = sizeof(kExampleECPubKeyDER) local [all...] |
| evp_test.c | 231 * Return an allocated buffer, set |out_len|. If |input_len| 234 static unsigned char* unescape(const char *input, size_t input_len, 240 if (input_len == 0) { 246 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) 249 for (i = 0; i < input_len; i++) { 251 if (i == input_len - 1 || *++input != 'n') { 1136 size_t input_len; member in struct:mac_data_st 1256 return parse_bin(value, &mdata->input, &mdata->input_len); 1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { 1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { 1705 size_t input_len; member in struct:pkey_data_st 2288 size_t input_len; member in struct:encode_data_st [all...] |
| evp_extra_test.c | 1698 size_t input_len = ak->size; local 1702 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1703 || !TEST_ptr_eq(p, input + input_len) 2373 size_t input_len = ak->size; local 2380 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) 2637 size_t input_len = sizeof(kExampleECPubKeyDER); local 2641 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) 2648 input_len = sizeof(kExampleBadECPubKeyDER); 2650 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len))) 2668 size_t input_len = sizeof(kExampleECPubKeyDER) local [all...] |
| evp_test.c | 231 * Return an allocated buffer, set |out_len|. If |input_len| 234 static unsigned char* unescape(const char *input, size_t input_len, 240 if (input_len == 0) { 246 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) 249 for (i = 0; i < input_len; i++) { 251 if (i == input_len - 1 || *++input != 'n') { 1136 size_t input_len; member in struct:mac_data_st 1256 return parse_bin(value, &mdata->input, &mdata->input_len); 1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { 1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { 1705 size_t input_len; member in struct:pkey_data_st 2288 size_t input_len; member in struct:encode_data_st [all...] |
| /src/external/bsd/nvi/dist/vi/ |
| v_txt.c | 2873 size_t input_len, retain; local 2887 for (ttp = TAILQ_FIRST(tiqh), input_len = 0;;) { 2888 input_len += ttp == tp ? tp->cno : ttp->len + ttp->R_erase; 2907 if (input_len < orig_len) { 2908 retain = MIN(tp->owrite, orig_len - input_len); 2912 MEMCPYW(tp->lb + tp->cno, p + input_len, retain);
|
| v_txt.c | 2873 size_t input_len, retain; local 2887 for (ttp = TAILQ_FIRST(tiqh), input_len = 0;;) { 2888 input_len += ttp == tp ? tp->cno : ttp->len + ttp->R_erase; 2907 if (input_len < orig_len) { 2908 retain = MIN(tp->owrite, orig_len - input_len); 2912 MEMCPYW(tp->lb + tp->cno, p + input_len, retain);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_extra_test.c | 1076 size_t input_len = ak->size; local 1080 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1081 || !TEST_ptr_eq(p, input + input_len) 1514 size_t input_len = ak->size; local 1526 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1527 || !TEST_ptr_eq(p, input + input_len) 1533 if (!TEST_ptr(pubkey = BIO_new_mem_buf(input, input_len)) 1540 if (!TEST_ptr(eckey = d2i_ECParameters(NULL, &p, input_len)) 1541 || !TEST_ptr_eq(p, input + input_len) 1637 size_t input_len = sizeof(kExampleECPubKeyDER) local [all...] |
| evp_extra_test.c | 1076 size_t input_len = ak->size; local 1080 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1081 || !TEST_ptr_eq(p, input + input_len) 1514 size_t input_len = ak->size; local 1526 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1527 || !TEST_ptr_eq(p, input + input_len) 1533 if (!TEST_ptr(pubkey = BIO_new_mem_buf(input, input_len)) 1540 if (!TEST_ptr(eckey = d2i_ECParameters(NULL, &p, input_len)) 1541 || !TEST_ptr_eq(p, input + input_len) 1637 size_t input_len = sizeof(kExampleECPubKeyDER) local [all...] |
| evp_test.c | 224 * Return an allocated buffer, set |out_len|. If |input_len| 227 static unsigned char* unescape(const char *input, size_t input_len, 233 if (input_len == 0) { 239 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) 242 for (i = 0; i < input_len; i++) { 244 if (i == input_len - 1 || *++input != 'n') { 875 size_t input_len; member in struct:mac_data_st 952 return parse_bin(value, &mdata->input, &mdata->input_len); 1034 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { 1085 size_t input_len; member in struct:pkey_data_st 1575 size_t input_len; member in struct:encode_data_st [all...] |
| evp_test.c | 224 * Return an allocated buffer, set |out_len|. If |input_len| 227 static unsigned char* unescape(const char *input, size_t input_len, 233 if (input_len == 0) { 239 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) 242 for (i = 0; i < input_len; i++) { 244 if (i == input_len - 1 || *++input != 'n') { 875 size_t input_len; member in struct:mac_data_st 952 return parse_bin(value, &mdata->input, &mdata->input_len); 1034 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { 1085 size_t input_len; member in struct:pkey_data_st 1575 size_t input_len; member in struct:encode_data_st [all...] |
| /src/external/bsd/tmux/dist/ |
| input.c | 119 size_t input_len; member in struct:input_ctx 1180 ictx->input_len = 0; 1260 while (ictx->input_len + 1 >= available) { 1269 ictx->input_buf[ictx->input_len++] = ictx->ch; 1270 ictx->input_buf[ictx->input_len] = '\0'; 2468 size_t len = ictx->input_len; 2534 size_t len = ictx->input_len; 2615 if (ictx->input_len < 1 || *p < '0' || *p > '9') 2752 if (ictx->input_len == 0) {
|
| input.c | 119 size_t input_len; member in struct:input_ctx 1180 ictx->input_len = 0; 1260 while (ictx->input_len + 1 >= available) { 1269 ictx->input_buf[ictx->input_len++] = ictx->ch; 1270 ictx->input_buf[ictx->input_len] = '\0'; 2468 size_t len = ictx->input_len; 2534 size_t len = ictx->input_len; 2615 if (ictx->input_len < 1 || *p < '0' || *p > '9') 2752 if (ictx->input_len == 0) {
|