/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_read.c | 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 188 "cipher suite for a resumed connection (0x%04x != " in tls_process_server_hello() 1027 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local 1087 "with the selected cipher suite"); in tls_process_server_key_exchange() 1094 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange() 1095 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange() 1096 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange() 1098 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
|
H A D | tlsv1_client_write.c | 512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 515 if (suite == NULL) in tls_write_client_key_exchange() 518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
/third_party/python/Lib/ |
H A D | doctest.py | 2360 Convert doctest tests for a module to a unittest test suite. 2402 suite = _DocTestSuite() 2403 suite.addTest(SkipDocTestCase(module)) 2404 return suite 2407 suite = _DocTestSuite() 2417 suite.addTest(DocTestCase(test, **options)) 2419 return suite 2461 """A unittest suite for one or more doctest files. 2516 suite = _DocTestSuite() 2525 suite [all...] |
/third_party/googletest/googletest/test/ |
H A D | googletest-param-test-test.cc | 886 while (const testing::TestSuite* suite = ins->GetTestSuite(ts++)) { in TEST() 887 know_suite_names.insert(suite->name()); in TEST() 890 while (const testing::TestInfo* info = suite->GetTestInfo(ti++)) { in TEST() 891 know_test_names.insert(std::string(suite->name()) + "." + info->name()); in TEST() 1159 // Used in TestGenerationTest test suite. in main() 1161 // Used in GeneratorEvaluationTest test suite. Tests that the updated value in main() 1167 // Used in GeneratorEvaluationTest test suite. Tests that value updated in main()
|
/third_party/node/deps/v8/tools/testrunner/ |
H A D | base_runner.py | 419 help="Run without test harness of a given suite") 645 print('>>> Loading test suite: %s' % name) 646 suite = testsuite.TestSuite.Load( 650 if self._is_testsuite_supported(suite, options): 651 tests = suite.load_tests_from_disk(variables) 656 def _is_testsuite_supported(self, suite, options):
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_write.c | 524 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 526 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 527 if (suite == NULL) in tls_write_client_key_exchange() 530 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_wolfssl.c | 1823 const char *suite; in tls_connection_set_cipher_list() local 1827 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 1830 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 1833 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 1836 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 1839 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 1842 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 1849 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list() 1860 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed"); in tls_connection_set_cipher_list()
|
H A D | tls_openssl.c | 1408 * Parse ServerHello to get the selected cipher suite since OpenSSL does in check_server_hello() 1438 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x", in check_server_hello() 1519 * length since OpenSSL does not expose the new cipher suite and DH in tls_msg_cb() 3127 "Cipher suite configuration failed"); in tls_set_conn_flags() 4473 const char *suite; in tls_connection_set_cipher_list() local 4477 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 4480 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 4483 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 4486 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 4489 suite in tls_connection_set_cipher_list() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_wolfssl.c | 1830 const char *suite; in tls_connection_set_cipher_list() local 1834 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 1837 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 1840 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 1843 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 1846 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 1849 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 1856 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list() 1867 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed"); in tls_connection_set_cipher_list()
|
/third_party/ffmpeg/libavformat/ |
H A D | rtpdec.h | 48 void ff_rtp_parse_set_crypto(RTPDemuxContext *s, const char *suite,
|
H A D | rtpdec.c | 627 void ff_rtp_parse_set_crypto(RTPDemuxContext *s, const char *suite, in ff_rtp_parse_set_crypto() argument 630 if (!ff_srtp_set_crypto(&s->srtp, suite, params)) in ff_rtp_parse_set_crypto()
|
/third_party/ffmpeg/tests/fate/ |
H A D | caf.mak | 11 fate-caf-qdm2-remux: CMD = transcode mov $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-B-QDM2.mov caf "-c copy" "-c copy -t 0.2"
|
H A D | adpcm.mak | 71 fate-adpcm-ima_wav-stereo: CMD = md5 -i $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-L-ms11.mov -f s16le -af aresample 83 fate-adpcm_ms-stereo: CMD = md5 -i $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-L-ms02.mov -f s16le
|
/third_party/icu/icu4c/source/python/icutools/databuilder/test/ |
H A D | filtration_test.py | 421 suite = unittest.makeSuite(FiltrationTest) variable
|
/third_party/skia/third_party/externals/icu/source/python/icutools/databuilder/test/ |
H A D | filtration_test.py | 421 suite = unittest.makeSuite(FiltrationTest) variable
|
/third_party/skia/third_party/externals/freetype/builds/unix/ |
H A D | install.mk | 87 $(info There is no validation suite for this package.)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ieee802_1x.c | 376 u32 suite; in add_common_radius_sta_attr_rsn() local 381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 386 suite)) { in add_common_radius_sta_attr_rsn() 391 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn() 398 suite)) { in add_common_radius_sta_attr_rsn() 404 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn() 409 suite)) { in add_common_radius_sta_attr_rsn() 415 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn() 420 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ieee802_1x.c | 373 u32 suite; in add_common_radius_sta_attr_rsn() local 378 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 383 suite)) { in add_common_radius_sta_attr_rsn() 388 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn() 395 suite)) { in add_common_radius_sta_attr_rsn() 401 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn() 406 suite)) { in add_common_radius_sta_attr_rsn() 413 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn() 418 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
|
/third_party/node/deps/v8/tools/testrunner/testproc/ |
H A D | variant_test.py | 60 self.suite = FakeSuite("fake_suite")
|
/third_party/node/deps/v8/tools/unittests/ |
H A D | run_perf_test.py | 193 def _VerifyResults(self, suite, units, traces, file_name=None): 196 'graphs': [suite, trace['name']],
|
/third_party/python/Lib/unittest/test/ |
H A D | test_program.py | 26 suite = loader.discover('unittest.test') 28 self.assertEqual(suite._tests, tests) 77 """Test loader that returns a suite containing FooBar."""
|
/third_party/python/PCbuild/ |
H A D | rt.bat | 2 rem Run Tests. Run the regression test suite.
|
/third_party/mbedtls/library/ |
H A D | ssl_tls12_server.c | 792 * Sets ciphersuite_info only if the suite matches. 1737 const mbedtls_ssl_ciphersuite_t *suite = NULL; in ssl_write_encrypt_then_mac_ext() local 1745 suite = mbedtls_ssl_ciphersuite_from_id( in ssl_write_encrypt_then_mac_ext() 1747 if (suite == NULL) { in ssl_write_encrypt_then_mac_ext() 1753 suite); in ssl_write_encrypt_then_mac_ext() 2347 const mbedtls_ssl_ciphersuite_t *suite = in ssl_write_server_hello() local 2349 if (suite != NULL && mbedtls_ssl_ciphersuite_uses_ec(suite)) { in ssl_write_server_hello() 3140 /* (... because we choose a cipher suite in ssl_prepare_server_key_exchange()
|
/third_party/ffmpeg/tests/ |
H A D | Makefile | 278 rsync $(RSYNC_OPTIONS) rsync://fate-suite.ffmpeg.org/fate-suite/ $(SAMPLES) 283 @echo "use 'make fate-rsync SAMPLES=/path/to/samples' to sync the fate suite"
|
/third_party/libcoap/tests/ |
H A D | test_oscore.c | 1054 CU_pSuite suite[5]; in t_init_oscore_tests() local 1056 suite[0] = CU_add_suite("RFC8613 Appendix C OSCORE tests", NULL, NULL); in t_init_oscore_tests() 1057 if (!suite[0]) { /* signal error */ in t_init_oscore_tests() 1058 fprintf(stderr, "W: cannot add OSCORE test suite (%s)\n", in t_init_oscore_tests() 1065 if (!CU_add_test(suite[0], #n, n)) { \ in t_init_oscore_tests() 1086 return suite[0]; in t_init_oscore_tests()
|