| /netbsd-src/external/mpl/dhcp/dist/common/tests/ |
| H A D | misc_unittest.c | 174 int expected_len = 12; in ATF_TC_BODY() local 177 print_hex_only (data_len, data, expected_len, buf); in ATF_TC_BODY() 187 if (buf[expected_len] != 'x') { in ATF_TC_BODY() 192 print_hex_only (data_len, data, expected_len, NULL); in ATF_TC_BODY() 202 print_hex_only (data_len, NULL, expected_len, buf); in ATF_TC_BODY() 209 print_hex_only (data_len, data, expected_len - 1, buf); in ATF_TC_BODY() 216 print_hex_only (0, data, expected_len, buf); in ATF_TC_BODY()
|
| H A D | option_unittest.c | 172 unsigned expected_len = 8; in ATF_TC_BODY() local 189 len = parse_X(&cfile, output, expected_len); in ATF_TC_BODY() 192 if (len != expected_len) { in ATF_TC_BODY()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/providers/fips/ |
| H A D | self_test_kats.c | 41 if (out_len != t->expected_len in self_test_digest() 113 if (ct_len != (int)t->base.expected_len in self_test_cipher() 131 t->base.expected, t->base.expected_len) in self_test_cipher() 229 if (t->expected_len > sizeof(out)) in self_test_kdf() 231 if (EVP_KDF_derive(ctx, out, t->expected_len, params) <= 0) in self_test_kdf() 236 if (memcmp(out, t->expected, t->expected_len) != 0) in self_test_kdf() 421 if (secret_len != t->expected_len in self_test_ka() 422 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka() 596 if (outlen != t->expected_len in self_test_asym_cipher() 597 || memcmp(out, t->expected, t->expected_len) != 0) in self_test_asym_cipher()
|
| H A D | self_test.c | 179 unsigned char *expected, size_t expected_len, in verify_integrity() argument 217 if (expected_len != out_len in verify_integrity()
|
| H A D | self_test_data.inc | 40 size_t expected_len; 66 size_t expected_len; 101 size_t expected_len; 122 size_t expected_len;
|
| /netbsd-src/external/cddl/osnet/dist/lib/pyzfs/common/ |
| H A D | allow.py | 346 def mungeargs(expected_len): argument 347 if un and len(args) == expected_len-1: 348 return (None, args[expected_len-2]) 349 elif len(args) == expected_len: 350 return (args[expected_len-2].split(","), 351 args[expected_len-1])
|
| /netbsd-src/usr.sbin/perfused/ |
| H A D | msg.c | 279 size_t expected_len, enum perfuse_xchg_pb_reply reply) in perfused_xchg_pb() argument 343 if ((expected_len != PERFUSE_UNSPEC_REPLY_LEN) && in perfused_xchg_pb() 344 (foh->len - sizeof(*foh) < expected_len) && in perfused_xchg_pb() 348 foh->len - sizeof(*foh), expected_len); in perfused_xchg_pb() 351 if ((expected_len != 0) && in perfused_xchg_pb() 352 (foh->len - sizeof(*foh) > expected_len)) in perfused_xchg_pb()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/ |
| H A D | trace_api_test.c | 78 static const char expected_len = sizeof(expected) - 1; in test_trace_channel() local 101 if (!TEST_strn2_eq(p_buf, len, expected, expected_len)) in test_trace_channel()
|
| H A D | ssl_test.c | 198 size_t expected_len = 0; in check_session_ticket_app_data() local 204 expected_len = strlen(test_ctx->expected_session_ticket_app_data); in check_session_ticket_app_data() 205 if (result_len == 0 && expected_len == 0) in check_session_ticket_app_data()
|
| H A D | asn1_encode_test.c | 521 const unsigned char *expected, size_t expected_len, in do_encode() argument 532 if ((size_t)len != expected_len in do_encode() 533 || memcmp(data, expected, expected_len) != 0) { in do_encode()
|
| H A D | evp_extra_test2.c | 908 const unsigned char *expected, size_t expected_len) in do_check_bn() argument 917 && TEST_int_gt(len = BN_bn2binpad(bn, buffer, expected_len), 0) in do_check_bn() 918 && TEST_mem_eq(expected, expected_len, buffer, len); in do_check_bn()
|
| H A D | evp_test.c | 99 const void *expected, size_t expected_len, in memory_err_compare() argument 105 r = !TEST_mem_ne(expected, expected_len, got, got_len); in memory_err_compare() 107 r = TEST_mem_eq(expected, expected_len, got, got_len); in memory_err_compare()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
| H A D | ssl_test.c | 195 size_t expected_len = 0; in check_session_ticket_app_data() local 201 expected_len = strlen(test_ctx->expected_session_ticket_app_data); in check_session_ticket_app_data() 202 if (result_len == 0 && expected_len == 0) in check_session_ticket_app_data()
|
| H A D | asn1_encode_test.c | 521 const unsigned char *expected, size_t expected_len, in do_encode() argument 532 if ((size_t)len != expected_len in do_encode() 533 || memcmp(data, expected, expected_len) != 0) { in do_encode()
|
| H A D | evp_test.c | 84 const void *expected, size_t expected_len, in memory_err_compare() argument 90 r = !TEST_mem_ne(expected, expected_len, got, got_len); in memory_err_compare() 92 r = TEST_mem_eq(expected, expected_len, got, got_len); in memory_err_compare()
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/asn1/ |
| H A D | check-gen.c | 784 size_t expected_len; member 826 if (td[i].expected_len != sz) { in check_tag_length() 889 if (td[i].expected_len != sz) { in check_tag_length64() 949 if (td[i].expected_len != sz) { in check_tag_length64s()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| H A D | extensions_clnt.c | 1238 size_t expected_len = s->s3->previous_client_finished_len in tls_parse_stoc_renegotiate() local 1244 if (!ossl_assert(expected_len == 0 in tls_parse_stoc_renegotiate() 1246 || !ossl_assert(expected_len == 0 in tls_parse_stoc_renegotiate() 1268 if (ilen != expected_len) { in tls_parse_stoc_renegotiate()
|
| /netbsd-src/external/bsd/unbound/dist/validator/ |
| H A D | val_secalgo.c | 1761 unsigned int expected_len; in _verify_nettle_dsa() local 1805 expected_len = 1 + /* T */ in _verify_nettle_dsa() 1810 if (keylen != expected_len ) { in _verify_nettle_dsa()
|
| /netbsd-src/crypto/external/bsd/openssh/dist/ |
| H A D | krl.c | 990 size_t expected_len) in blob_section() argument 999 if (expected_len != 0 && rlen != expected_len) { in blob_section()
|
| /netbsd-src/external/bsd/libevent/dist/test/ |
| H A D | regress_http.c | 3478 size_t expected_len, char const *expected) in http_stream_in_test_() argument 3501 if (evbuffer_get_length(reply) != expected_len) { in http_stream_in_test_() 3504 (unsigned long)expected_len, in http_stream_in_test_() 3508 if (memcmp(evbuffer_pullup(reply, -1), expected, expected_len) != 0) { in http_stream_in_test_()
|