/openssl/test/ |
H A D | hexstr_test.c | 22 size_t expected_len; member 71 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) in test_hexstr_sep_to_from() 93 || !TEST_mem_eq(buf, len, test->expected, test->expected_len) in test_hexstr_to_from() 121 && TEST_mem_eq(buf, len, test->expected, test->expected_len) in test_hexstr_ex_to_from()
|
H A D | quic_record_test.c | 1946 size_t expected_len; member 2765 int is_trunc = trunc_len < t->expected_len; in test_wire_pkt_hdr_actual() 2834 t->expected_len - t->sample_offset)) in test_wire_pkt_hdr_actual() 2847 if (!TEST_mem_eq(buf, l, t->expected, t->expected_len)) in test_wire_pkt_hdr_actual() 2864 hbuf = OPENSSL_malloc(t->expected_len); in test_wire_pkt_hdr_actual() 2868 memcpy(hbuf, t->expected, t->expected_len); in test_wire_pkt_hdr_actual() 2878 for (i = 0; i < t->expected_len; ++i) { in test_wire_pkt_hdr_actual() 2915 if (!TEST_mem_eq(hbuf, t->expected_len, t->expected, t->expected_len)) in test_wire_pkt_hdr_actual() 2938 t->expected_len))) in test_wire_pkt_hdr_inner() 2942 for (i = 0; i < t->expected_len; ++i) in test_wire_pkt_hdr_inner()
|
H A D | trace_api_test.c | 125 static const size_t expected_len = sizeof(expected) - 1; in test_trace_channel() local 152 if (!TEST_strn2_eq(p_buf, len, expected, expected_len)) in test_trace_channel()
|
H A D | ssl_test.c | 198 size_t expected_len = 0; in check_session_ticket_app_data() local 204 expected_len = strlen(test_ctx->expected_session_ticket_app_data); in check_session_ticket_app_data() 205 if (result_len == 0 && expected_len == 0) in check_session_ticket_app_data()
|
H A D | asn1_encode_test.c | 521 const unsigned char *expected, size_t expected_len, in do_encode() argument 532 if ((size_t)len != expected_len in do_encode() 533 || memcmp(data, expected, expected_len) != 0) { in do_encode()
|
H A D | quic_wire_test.c | 1458 char expected_len; member 1495 if (!TEST_int_eq(pn_len, (int)t->expected_len)) in test_wire_pkt_hdr_pn() 1501 if (!TEST_mem_eq(t->expected_bytes, t->expected_len, buf, pn_len)) in test_wire_pkt_hdr_pn()
|
H A D | evp_extra_test2.c | 1052 const unsigned char *expected, size_t expected_len) in do_check_bn() argument 1061 && TEST_int_gt(len = BN_bn2binpad(bn, buffer, expected_len), 0) in do_check_bn() 1062 && TEST_mem_eq(expected, expected_len, buffer, len); in do_check_bn()
|
H A D | evp_test.c | 319 const void *expected, size_t expected_len, in memory_err_compare() argument 325 r = !TEST_mem_ne(expected, expected_len, got, got_len); in memory_err_compare() 327 r = TEST_mem_eq(expected, expected_len, got, got_len); in memory_err_compare()
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 49 if (out_len != t->expected_len in self_test_digest() 121 if (ct_len != (int)t->base.expected_len in self_test_cipher() 139 t->base.expected, t->base.expected_len) in self_test_cipher() 236 if (t->expected_len > sizeof(out)) in self_test_kdf() 238 if (EVP_KDF_derive(ctx, out, t->expected_len, params) <= 0) in self_test_kdf() 243 if (memcmp(out, t->expected, t->expected_len) != 0) in self_test_kdf() 378 size_t secret_len = t->expected_len; in self_test_ka() 431 if (secret_len != t->expected_len in self_test_ka() 432 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka()
|
H A D | self_test.c | 243 unsigned char *expected, size_t expected_len, in verify_integrity() argument 284 if (expected_len != out_len in verify_integrity()
|
H A D | self_test_data.inc | 49 size_t expected_len; 80 size_t expected_len; 115 size_t expected_len; 146 size_t expected_len;
|
/openssl/doc/man3/ |
H A D | OSSL_SELF_TEST_new.pod | 144 if (out_len != t->expected_len
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1262 size_t expected_len = s->s3.previous_client_finished_len in tls_parse_stoc_renegotiate() local 1268 if (!ossl_assert(expected_len == 0 in tls_parse_stoc_renegotiate() 1270 || !ossl_assert(expected_len == 0 in tls_parse_stoc_renegotiate() 1289 if (ilen != expected_len) { in tls_parse_stoc_renegotiate()
|