Lines Matching refs:input_len
235 static unsigned char* unescape(const char *input, size_t input_len, in unescape() argument
241 if (input_len == 0) { in unescape()
247 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) in unescape()
250 for (i = 0; i < input_len; i++) { in unescape()
252 if (i == input_len - 1 || *++input != 'n') { in unescape()
1123 size_t input_len; member
1230 return parse_bin(value, &mdata->input, &mdata->input_len); in mac_test_parse()
1356 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { in mac_test_run_pkey()
1508 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { in mac_test_run_mac()
1550 expected->input, expected->input_len, in mac_test_run_mac()
1599 size_t input_len; member
1691 return parse_bin(value, &kdata->input, &kdata->input_len); in pkey_test_parse()
1707 expected->input, expected->input_len) <= 0 in pkey_test_run()
1713 expected->input, expected->input_len) <= 0) { in pkey_test_run()
1732 expected->input_len) <= 0 in pkey_test_run()
1738 expected->input_len) <= 0) { in pkey_test_run()
1804 kdata->input, kdata->input_len) <= 0) in verify_test_run()
2136 size_t input_len; member
2185 return parse_bin(value, &edata->input, &edata->input_len); in encode_test_parse()
2207 OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len)))) in encode_test_run()
2212 expected->input, expected->input_len))) in encode_test_run()
2246 expected->input, expected->input_len, in encode_test_run()