/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 79-test_http.t | 18 skip "sockets disabled", 1 if disabled("sock"); 19 skip "OCSP disabled", 1 if disabled("ocsp");
|
H A D | fuzz.pl | 21 skip "No directory $d", 1 unless -d $d;
|
H A D | 80-test_tsa.t | 105 skip "failed", 19 111 skip "failed", 18 116 skip "failed", 17 121 skip "failed", 16 146 skip "failed", 11 158 skip "failed", 10 167 skip "failed", 8 172 skip "failed", 7 221 skip "failure", 2
|
H A D | 20-test_spkac.t | 27 skip "MD5 is not supported by this OpenSSL build", 2
|
H A D | 30-test_prov_config.t | 30 skip "Skipping FIPS test in this build", 1 if $no_fips;
|
H A D | 15-test_out_option.t | 29 skip 'Directories become writable files on OpenVMS', 1 if $^O eq 'VMS'; 62 skip "It's not safe to use perl's idea of the NULL device in an explicitly cross compiled build", 1
|
H A D | 20-test_pkeyutl.t | 25 skip "Skipping tests that require EC, SM2 or SM3", 4 57 skip "Skipping tests that require EC", 4 142 skip "RSA is not supported by this OpenSSL build", 1 162 skip "DSA is not supported by this OpenSSL build", 1 174 skip "ECDSA is not supported by this OpenSSL build", 1 186 skip "EdDSA is not supported by this OpenSSL build", 2
|
/freebsd-current/sys/arm/arm/ |
H A D | in_cksum_machdep.c | 102 in_cksum_skip(struct mbuf *m, int len, int skip) argument 111 len -= skip; 112 for (; skip && m; m = m->m_next) { 113 if (m->m_len > skip) { 114 mlen = m->m_len - skip; 115 addr = mtod(m, caddr_t) + skip; 118 skip -= m->m_len;
|
/freebsd-current/contrib/libarchive/libarchive/ |
H A D | archive_read_open_file.c | 126 off_t skip = (off_t)request; local 128 int64_t skip = request; local 130 long skip = (long)request; local 132 int skip_bits = sizeof(skip) * 8 - 1; 137 * If we can't skip, return 0 as the amount we did step and 146 if (sizeof(request) > sizeof(skip)) { 150 skip = max_skip; 155 if (lseek(fileno(mine->f), skip, SEEK_CUR) < 0) 157 if (_fseeki64(mine->f, skip, SEEK_CUR) != 0) 159 if (fseeko(mine->f, skip, SEEK_CU [all...] |
H A D | archive_read_open_memory.c | 128 memory_read_skip(struct archive *a, void *client_data, int64_t skip) argument 133 if ((int64_t)skip > (int64_t)(mine->end - mine->p)) 134 skip = mine->end - mine->p; 136 skip /= mine->read_size; 137 skip *= mine->read_size; 138 mine->p += skip; 139 return (skip);
|
/freebsd-current/sys/contrib/ck/include/ |
H A D | ck_elide.h | 70 unsigned short skip; member in struct:ck_elide_stat 104 if (st->skip != 0) 109 st->skip = c->skip_busy; 114 st->skip = c->skip_other; 120 st->skip = c->skip_conflict; 130 st->skip = USHRT_MAX; 152 if (CK_CC_UNLIKELY(st->skip != 0)) { \ 153 st->skip--; \ 196 st->skip = 0; \
|
/freebsd-current/tests/examples/ |
H A D | test_examples.py | 21 @pytest.mark.skip(reason="comment me to run the test") 31 @pytest.mark.skip(reason="comment me to run the test") 39 @pytest.mark.skip(reason="comment me to run the test") 52 @pytest.mark.skip(reason="comment me to run the test") 62 @pytest.mark.skip(reason="comment me to run the test") 70 @pytest.mark.skip(reason="comment me to run the test") 88 # @pytest.mark.skip(reason="comment me to run the test") 128 @pytest.mark.skip(reason="comment me to run the test") 134 @pytest.mark.skip(reason="comment me to run the test") 187 @pytest.mark.skip(reaso [all...] |
/freebsd-current/sys/kgssapi/krb5/ |
H A D | kcrypto_aes.c | 138 size_t skip, size_t len, void *ivec, bool encrypt) 146 crp->crp_payload_start = skip; 159 crypto_use_buf(crp, buf, skip + len); 177 size_t skip, size_t len, void *ivec, size_t ivlen) 202 aes_encrypt_1(ks, CRYPTO_BUF_MBUF, inout, skip, len, ivec, 210 aes_encrypt_1(ks, CRYPTO_BUF_MBUF, inout, skip, len, ivec, 212 off = skip + len - 2 * blocklen; 225 aes_encrypt_1(ks, CRYPTO_BUF_MBUF, inout, skip, len - plen, 235 off = skip + len - blocklen - plen; 248 size_t skip, size_ 137 aes_encrypt_1(const struct krb5_key_state *ks, int buftype, void *buf, size_t skip, size_t len, void *ivec, bool encrypt) argument 176 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 247 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 316 aes_checksum(const struct krb5_key_state *ks, int usage, struct mbuf *inout, size_t skip, size_t inlen, size_t outlen) argument [all...] |
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ec2_oct.c | 133 size_t field_len, i, skip; local 199 skip = field_len - BN_num_bytes(x); 200 if (skip > field_len) { 204 while (skip > 0) { 206 skip--; 208 skip = BN_bn2bin(x, buf + i); 209 i += skip; 217 skip = field_len - BN_num_bytes(y); 218 if (skip > field_len) { 222 while (skip > [all...] |
/freebsd-current/sys/netipsec/ |
H A D | xform_ah.c | 264 ah_massage_headers(struct mbuf **m0, int proto, int skip, int alg, int out) argument 288 *m0 = m = m_pullup(m, skip); 305 for (off = sizeof(struct ip); off < skip;) { 307 off + 1 < skip) 319 off = skip; /* End the loop. */ 389 if (off > skip) { 428 if (skip - sizeof(struct ip6_hdr) > 0) { 429 if (m->m_len <= skip) { 431 skip - sizeof(struct ip6_hdr), 445 skip 535 ah_input(struct mbuf *m, struct secasvar *sav, int skip, int protoff) argument 701 int authsize, rplen, ahsize, error, skip, protoff; local 842 ah_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav, u_int idx, int skip, int protoff) argument 1096 int skip, error; local [all...] |
/freebsd-current/contrib/netbsd-tests/usr.bin/cmp/ |
H A D | t_cmp.sh | 47 atf_test_case skip 49 atf_set "descr" "Test that cmp(1) handles skip " \ 66 atf_add_test_case skip
|
/freebsd-current/tools/regression/posixsem/ |
H A D | test.h | 54 void skip(const char *reason);
|
/freebsd-current/sys/powerpc/include/ |
H A D | in_cksum.h | 46 u_short in_cksum_skip(struct mbuf *m, int len, int skip);
|
/freebsd-current/sys/riscv/include/ |
H A D | in_cksum.h | 39 u_short in_cksum_skip(struct mbuf *m, int len, int skip);
|
/freebsd-current/sys/arm64/include/ |
H A D | in_cksum.h | 39 u_short in_cksum_skip(struct mbuf *m, int len, int skip);
|
/freebsd-current/sys/amd64/include/ |
H A D | in_cksum.h | 46 u_short in_cksum_skip(struct mbuf *m, int len, int skip);
|
/freebsd-current/crypto/openssh/regress/ |
H A D | conch-ciphers.sh | 7 skip "conch interop tests not enabled" 11 skip "conch interop tests requires a controlling terminal"
|
/freebsd-current/lib/libc/net/ |
H A D | hesiod.c | 351 int ancount, qdcount, i, j, n, skip, type, class, len; local 381 skip = dn_skipname(p, eom); 382 if (skip < 0 || p + skip + QFIXEDSZ > eom) { 386 p += skip + QFIXEDSZ; 399 skip = dn_skipname(p, eom); 400 if (skip < 0 || p + skip + 10 > eom) 402 type = p[skip + 0] << 8 | p[skip [all...] |
/freebsd-current/sys/i386/i386/ |
H A D | in_cksum_machdep.c | 68 in_cksum_skip(struct mbuf *m, int len, int skip) argument 76 len -= skip; 77 for (; skip && m; m = m->m_next) { 78 if (m->m_len > skip) { 79 mlen = m->m_len - skip; 80 w = (u_short *)(mtod(m, u_char *) + skip); 83 skip -= m->m_len;
|
/freebsd-current/contrib/libarchive/libarchive/test/ |
H A D | read_open_memory.c | 161 * How mean can a skip() routine be? Let's try to find out. 164 memory_read_skip(struct archive *a, void *client_data, int64_t skip) argument 169 /* We can't skip by more than is available. */ 170 if ((off_t)skip > (off_t)(mine->end - mine->p)) 171 skip = mine->end - mine->p; 173 if (skip > 71) 174 skip = 71; 175 mine->p += skip; 176 return (skip);
|