/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 117 size_t input_len = GetInputLen(CKA_ENCRYPT); in TEST_P() local 123 sizeof(encrypted), kInput, input_len); in TEST_P() 125 EXPECT_LE(input_len, static_cast<size_t>(encrypted_len)); in TEST_P() 135 EXPECT_EQ(input_len, static_cast<size_t>(decrypted_len)); in TEST_P() 136 EXPECT_EQ(0, memcmp(kInput, decrypted, input_len)); in TEST_P() 141 size_t input_len = GetInputLen(CKA_ENCRYPT); in TEST_P() local 170 EXPECT_EQ(0, memcmp(kInput, decrypted, input_len)); in TEST_P() 175 size_t input_len = GetInputLen(CKA_ENCRYPT); in TEST_P() local 187 input_len - block_size()); in TEST_P() 219 EXPECT_EQ(0, memcmp(kInput, decrypted, input_len)); in TEST_P() [all …]
|
/dports/www/gitea/gitea-1.16.5/vendor/github.com/andybalholm/brotli/ |
H A D | decode.go | 2047 br.input_len = *available_in 2076 if br.byte_pos == br.input_len { 2085 br.input_len = *available_in 2096 br.input_len = uint(s.buffer_length) 2111 *available_in = br.input_len - br.byte_pos 2136 *available_in = br.input_len - br.byte_pos 2488 *available_in = br.input_len - br.byte_pos
|
H A D | bit_reader.go | 59 input_len uint member 67 input_len uint member 82 to.input_len = from.input_len 90 to.input_len = from.input_len 101 return uint(uint32(br.input_len-br.byte_pos) + (getAvailableBits(br) >> 3)) 107 return br.input_len-br.byte_pos >= num 132 if br.byte_pos == br.input_len {
|
/dports/www/gitea/gitea-1.16.5/vendor/github.com/pierrec/lz4/v4/internal/xxh32/ |
H A D | xxh32zero_arm.s | 99 MOVW input_len+4(FP), n 142 MOVW input_len+4(FP), v2 229 MOVW input_len +12(FP), n
|
/dports/graphics/librsvg2-rust/librsvg-2.52.8/vendor/pom/doc/ |
H A D | article.md | 239 $consumed + ($crate::InputLength::input_len(&($i)) - 240 $crate::InputLength::input_len(&i)), $($rest)*) 261 $consumed + ($crate::InputLength::input_len(&($i)) - 262 $crate::InputLength::input_len(&i)), $($rest)*)
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/test/ |
H A D | evp_extra_test.c | 1548 size_t input_len = ak->size; in test_d2i_AutoPrivateKey() local 1553 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey() 2205 size_t input_len = ak->size; in test_EVP_PKEY_check() local 2428 size_t input_len = sizeof(kExampleECPubKeyDER); in test_X509_PUBKEY_inplace() local 2432 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) in test_X509_PUBKEY_inplace() 2439 input_len = sizeof(kExampleBadECPubKeyDER); in test_X509_PUBKEY_inplace() 2441 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len))) in test_X509_PUBKEY_inplace() 2459 size_t input_len = sizeof(kExampleECPubKeyDER); in test_X509_PUBKEY_dup() local 2463 || !TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)) in test_X509_PUBKEY_dup() 2476 input_len = sizeof(kExampleBadECPubKeyDER); in test_X509_PUBKEY_dup() [all …]
|
H A D | evp_test.c | 235 static unsigned char* unescape(const char *input, size_t input_len, in unescape() argument 241 if (input_len == 0) { in unescape() 247 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) in unescape() 250 for (i = 0; i < input_len; i++) { in unescape() 252 if (i == input_len - 1 || *++input != 'n') { in unescape() 1125 size_t input_len; member 1612 size_t input_len; member 1745 expected->input_len) <= 0 in pkey_test_run() 1751 expected->input_len) <= 0) { in pkey_test_run() 1817 kdata->input, kdata->input_len) <= 0) in verify_test_run() [all …]
|
H A D | evp_extra_test2.c | 396 size_t input_len = ak->size; in test_d2i_AutoPrivateKey_ex() local 403 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, in test_d2i_AutoPrivateKey_ex() 405 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey_ex()
|
/dports/security/openssl/openssl-1.1.1n/test/ |
H A D | evp_test.c | 227 static unsigned char* unescape(const char *input, size_t input_len, in unescape() argument 233 if (input_len == 0) { in unescape() 239 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) in unescape() 242 for (i = 0; i < input_len; i++) { in unescape() 244 if (i == input_len - 1 || *++input != 'n') { in unescape() 875 size_t input_len; member 952 return parse_bin(value, &mdata->input, &mdata->input_len); in mac_test_parse() 1085 size_t input_len; member 1181 return parse_bin(value, &kdata->input, &kdata->input_len); in pkey_test_parse() 1268 kdata->input, kdata->input_len) <= 0) in verify_test_run() [all …]
|
H A D | evp_extra_test.c | 1076 size_t input_len = ak->size; in test_d2i_AutoPrivateKey() local 1080 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) in test_d2i_AutoPrivateKey() 1081 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey() 1514 size_t input_len = ak->size; in test_EVP_PKEY_check() local 1527 || !TEST_ptr_eq(p, input + input_len) in test_EVP_PKEY_check() 1533 if (!TEST_ptr(pubkey = BIO_new_mem_buf(input, input_len)) in test_EVP_PKEY_check() 1541 || !TEST_ptr_eq(p, input + input_len) in test_EVP_PKEY_check() 1637 size_t input_len = sizeof(kExampleECPubKeyDER); in test_X509_PUBKEY_inplace() local 1639 if (!TEST_ptr(xp = d2i_X509_PUBKEY(NULL, &p, input_len))) in test_X509_PUBKEY_inplace() 1646 input_len = sizeof(kExampleBadECPubKeyDER); in test_X509_PUBKEY_inplace() [all …]
|
/dports/security/openssl-devel/openssl-3.0.2/test/ |
H A D | evp_extra_test.c | 1548 size_t input_len = ak->size; in test_d2i_AutoPrivateKey() local 1553 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey() 2205 size_t input_len = ak->size; in test_EVP_PKEY_check() local 2428 size_t input_len = sizeof(kExampleECPubKeyDER); in test_X509_PUBKEY_inplace() local 2432 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) in test_X509_PUBKEY_inplace() 2439 input_len = sizeof(kExampleBadECPubKeyDER); in test_X509_PUBKEY_inplace() 2441 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len))) in test_X509_PUBKEY_inplace() 2459 size_t input_len = sizeof(kExampleECPubKeyDER); in test_X509_PUBKEY_dup() local 2463 || !TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)) in test_X509_PUBKEY_dup() 2476 input_len = sizeof(kExampleBadECPubKeyDER); in test_X509_PUBKEY_dup() [all …]
|
H A D | evp_extra_test2.c | 396 size_t input_len = ak->size; in test_d2i_AutoPrivateKey_ex() local 403 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &p, input_len, mainctx, in test_d2i_AutoPrivateKey_ex() 405 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey_ex()
|
H A D | evp_test.c | 235 static unsigned char* unescape(const char *input, size_t input_len, in unescape() argument 241 if (input_len == 0) { in unescape() 247 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) in unescape() 250 for (i = 0; i < input_len; i++) { in unescape() 252 if (i == input_len - 1 || *++input != 'n') { in unescape() 1125 size_t input_len; member 1612 size_t input_len; member 1745 expected->input_len) <= 0 in pkey_test_run() 1751 expected->input_len) <= 0) { in pkey_test_run() 1817 kdata->input, kdata->input_len) <= 0) in verify_test_run() [all …]
|
/dports/dns/bind911/bind-9.11.37/lib/isc/tests/ |
H A D | hash_test.c | 80 size_t input_len; member 209 testcase->input_len); in isc_sha1_test() 334 testcase->input_len); in isc_sha224_test() 464 testcase->input_len); in isc_sha256_test() 608 testcase->input_len); in isc_sha384_test() 753 testcase->input_len); in isc_sha512_test() 959 testcase->input_len); in isc_hmacsha1_test() 1119 testcase->input_len); in isc_hmacsha224_test() 1280 testcase->input_len); in isc_hmacsha256_test() 1447 testcase->input_len); in isc_hmacsha384_test() [all …]
|
/dports/dns/bind911/bind-9.11.37/lib/dns/tests/ |
H A D | gost_test.c | 112 size_t input_len; member 225 testcase->input_len); in isc_gost_md()
|
/dports/dns/bind-tools/bind-9.16.27/lib/isc/tests/ |
H A D | crc64_test.c | 36 size_t input_len; member
|
/dports/dns/bind916/bind-9.16.27/lib/isc/tests/ |
H A D | crc64_test.c | 36 size_t input_len; member
|
/dports/devel/glib20/glib-2.70.4/glib/tests/ |
H A D | base64.c | 15 gsize len, decoded_len, max, input_len, block_size; in test_incremental() local 27 input_len = 0; in test_incremental() 28 while (input_len < length) in test_incremental() 30 block_size = MIN (BLOCK_SIZE, length - input_len); in test_incremental() 31 len += g_base64_encode_step (data + input_len, block_size, in test_incremental() 33 input_len += block_size; in test_incremental()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/sql/ |
H A D | item_strfunc.cc | 220 size_t input_len; in val_str_ascii() local 236 input_len= input_string->length(); in val_str_ascii() 241 my_sha512(digest_buf, input_ptr, input_len); in val_str_ascii() 244 my_sha384(digest_buf, input_ptr, input_len); in val_str_ascii() 247 my_sha224(digest_buf, input_ptr, input_len); in val_str_ascii() 253 my_sha256(digest_buf, input_ptr, input_len); in val_str_ascii()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/sql/ |
H A D | item_strfunc.cc | 220 size_t input_len; in val_str_ascii() local 236 input_len= input_string->length(); in val_str_ascii() 241 my_sha512(digest_buf, input_ptr, input_len); in val_str_ascii() 244 my_sha384(digest_buf, input_ptr, input_len); in val_str_ascii() 247 my_sha224(digest_buf, input_ptr, input_len); in val_str_ascii() 253 my_sha256(digest_buf, input_ptr, input_len); in val_str_ascii()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/sql/ |
H A D | item_strfunc.cc | 225 size_t input_len; in val_str_ascii() local 241 input_len= input_string->length(); in val_str_ascii() 246 my_sha512(digest_buf, input_ptr, input_len); in val_str_ascii() 249 my_sha384(digest_buf, input_ptr, input_len); in val_str_ascii() 252 my_sha224(digest_buf, input_ptr, input_len); in val_str_ascii() 258 my_sha256(digest_buf, input_ptr, input_len); in val_str_ascii()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/sql/ |
H A D | item_strfunc.cc | 225 size_t input_len; in val_str_ascii() local 241 input_len= input_string->length(); in val_str_ascii() 246 my_sha512(digest_buf, input_ptr, input_len); in val_str_ascii() 249 my_sha384(digest_buf, input_ptr, input_len); in val_str_ascii() 252 my_sha224(digest_buf, input_ptr, input_len); in val_str_ascii() 258 my_sha256(digest_buf, input_ptr, input_len); in val_str_ascii()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/sql/ |
H A D | item_strfunc.cc | 225 size_t input_len; 241 input_len= input_string->length(); 246 my_sha512(digest_buf, input_ptr, input_len); 249 my_sha384(digest_buf, input_ptr, input_len); 252 my_sha224(digest_buf, input_ptr, input_len); 258 my_sha256(digest_buf, input_ptr, input_len);
|
/dports/databases/mariadb103-client/mariadb-10.3.34/sql/ |
H A D | item_strfunc.cc | 225 size_t input_len; in build() 241 input_len= input_string->length(); in build() 246 my_sha512(digest_buf, input_ptr, input_len); in build() 249 my_sha384(digest_buf, input_ptr, input_len); in build() 252 my_sha224(digest_buf, input_ptr, input_len); in build() 258 my_sha256(digest_buf, input_ptr, input_len); in build()
|
/dports/net-im/prosody/prosody-0.11.13/util-src/ |
H A D | encodings.c | 273 size_t input_len; in icu_stringprep_prep() local 288 input = lua_tolstring(L, 1, &input_len); in icu_stringprep_prep() 290 if(input_len >= 1024) { in icu_stringprep_prep() 295 u_strFromUTF8(unprepped, 1024, &unprepped_len, input, input_len, &err); in icu_stringprep_prep()
|