Home
last modified time | relevance | path

Searched refs:suite (Results 126 - 150 of 178) sorted by relevance

12345678

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_read.c180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello()
188 "cipher suite for a resumed connection (0x%04x != " in tls_process_server_hello()
1027 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local
1087 "with the selected cipher suite"); in tls_process_server_key_exchange()
1094 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
1095 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange()
1096 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange()
1098 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
H A Dtlsv1_client_write.c512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
515 if (suite == NULL) in tls_write_client_key_exchange()
518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
/third_party/python/Lib/
H A Ddoctest.py2360 Convert doctest tests for a module to a unittest test suite.
2402 suite = _DocTestSuite()
2403 suite.addTest(SkipDocTestCase(module))
2404 return suite
2407 suite = _DocTestSuite()
2417 suite.addTest(DocTestCase(test, **options))
2419 return suite
2461 """A unittest suite for one or more doctest files.
2516 suite = _DocTestSuite()
2525 suite
[all...]
/third_party/googletest/googletest/test/
H A Dgoogletest-param-test-test.cc886 while (const testing::TestSuite* suite = ins->GetTestSuite(ts++)) { in TEST()
887 know_suite_names.insert(suite->name()); in TEST()
890 while (const testing::TestInfo* info = suite->GetTestInfo(ti++)) { in TEST()
891 know_test_names.insert(std::string(suite->name()) + "." + info->name()); in TEST()
1159 // Used in TestGenerationTest test suite. in main()
1161 // Used in GeneratorEvaluationTest test suite. Tests that the updated value in main()
1167 // Used in GeneratorEvaluationTest test suite. Tests that value updated in main()
/third_party/node/deps/v8/tools/testrunner/
H A Dbase_runner.py419 help="Run without test harness of a given suite")
645 print('>>> Loading test suite: %s' % name)
646 suite = testsuite.TestSuite.Load(
650 if self._is_testsuite_supported(suite, options):
651 tests = suite.load_tests_from_disk(variables)
656 def _is_testsuite_supported(self, suite, options):
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_write.c524 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
526 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
527 if (suite == NULL) in tls_write_client_key_exchange()
530 keyx = suite->key_exchange; in tls_write_client_key_exchange()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_wolfssl.c1823 const char *suite; in tls_connection_set_cipher_list() local
1827 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
1830 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
1833 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
1836 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
1839 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
1842 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
1849 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
1860 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed"); in tls_connection_set_cipher_list()
H A Dtls_openssl.c1408 * Parse ServerHello to get the selected cipher suite since OpenSSL does in check_server_hello()
1438 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x", in check_server_hello()
1519 * length since OpenSSL does not expose the new cipher suite and DH in tls_msg_cb()
3127 "Cipher suite configuration failed"); in tls_set_conn_flags()
4473 const char *suite; in tls_connection_set_cipher_list() local
4477 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
4480 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
4483 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
4486 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
4489 suite in tls_connection_set_cipher_list()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_wolfssl.c1830 const char *suite; in tls_connection_set_cipher_list() local
1834 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
1837 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
1840 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
1843 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
1846 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
1849 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
1856 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
1867 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed"); in tls_connection_set_cipher_list()
/third_party/ffmpeg/libavformat/
H A Drtpdec.h48 void ff_rtp_parse_set_crypto(RTPDemuxContext *s, const char *suite,
H A Drtpdec.c627 void ff_rtp_parse_set_crypto(RTPDemuxContext *s, const char *suite, in ff_rtp_parse_set_crypto() argument
630 if (!ff_srtp_set_crypto(&s->srtp, suite, params)) in ff_rtp_parse_set_crypto()
/third_party/ffmpeg/tests/fate/
H A Dcaf.mak11 fate-caf-qdm2-remux: CMD = transcode mov $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-B-QDM2.mov caf "-c copy" "-c copy -t 0.2"
H A Dadpcm.mak71 fate-adpcm-ima_wav-stereo: CMD = md5 -i $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-L-ms11.mov -f s16le -af aresample
83 fate-adpcm_ms-stereo: CMD = md5 -i $(TARGET_SAMPLES)/qt-surge-suite/surge-2-16-L-ms02.mov -f s16le
/third_party/icu/icu4c/source/python/icutools/databuilder/test/
H A Dfiltration_test.py421 suite = unittest.makeSuite(FiltrationTest) variable
/third_party/skia/third_party/externals/icu/source/python/icutools/databuilder/test/
H A Dfiltration_test.py421 suite = unittest.makeSuite(FiltrationTest) variable
/third_party/skia/third_party/externals/freetype/builds/unix/
H A Dinstall.mk87 $(info There is no validation suite for this package.)
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dieee802_1x.c376 u32 suite; in add_common_radius_sta_attr_rsn() local
381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
386 suite)) { in add_common_radius_sta_attr_rsn()
391 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn()
398 suite)) { in add_common_radius_sta_attr_rsn()
404 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn()
409 suite)) { in add_common_radius_sta_attr_rsn()
415 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn()
420 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dieee802_1x.c373 u32 suite; in add_common_radius_sta_attr_rsn() local
378 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
383 suite)) { in add_common_radius_sta_attr_rsn()
388 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn()
395 suite)) { in add_common_radius_sta_attr_rsn()
401 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn()
406 suite)) { in add_common_radius_sta_attr_rsn()
413 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn()
418 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
/third_party/node/deps/v8/tools/testrunner/testproc/
H A Dvariant_test.py60 self.suite = FakeSuite("fake_suite")
/third_party/node/deps/v8/tools/unittests/
H A Drun_perf_test.py193 def _VerifyResults(self, suite, units, traces, file_name=None):
196 'graphs': [suite, trace['name']],
/third_party/python/Lib/unittest/test/
H A Dtest_program.py26 suite = loader.discover('unittest.test')
28 self.assertEqual(suite._tests, tests)
77 """Test loader that returns a suite containing FooBar."""
/third_party/python/PCbuild/
H A Drt.bat2 rem Run Tests. Run the regression test suite.
/third_party/mbedtls/library/
H A Dssl_tls12_server.c792 * Sets ciphersuite_info only if the suite matches.
1737 const mbedtls_ssl_ciphersuite_t *suite = NULL; in ssl_write_encrypt_then_mac_ext() local
1745 suite = mbedtls_ssl_ciphersuite_from_id( in ssl_write_encrypt_then_mac_ext()
1747 if (suite == NULL) { in ssl_write_encrypt_then_mac_ext()
1753 suite); in ssl_write_encrypt_then_mac_ext()
2347 const mbedtls_ssl_ciphersuite_t *suite = in ssl_write_server_hello() local
2349 if (suite != NULL && mbedtls_ssl_ciphersuite_uses_ec(suite)) { in ssl_write_server_hello()
3140 /* (... because we choose a cipher suite in ssl_prepare_server_key_exchange()
/third_party/ffmpeg/tests/
H A DMakefile278 rsync $(RSYNC_OPTIONS) rsync://fate-suite.ffmpeg.org/fate-suite/ $(SAMPLES)
283 @echo "use 'make fate-rsync SAMPLES=/path/to/samples' to sync the fate suite"
/third_party/libcoap/tests/
H A Dtest_oscore.c1054 CU_pSuite suite[5]; in t_init_oscore_tests() local
1056 suite[0] = CU_add_suite("RFC8613 Appendix C OSCORE tests", NULL, NULL); in t_init_oscore_tests()
1057 if (!suite[0]) { /* signal error */ in t_init_oscore_tests()
1058 fprintf(stderr, "W: cannot add OSCORE test suite (%s)\n", in t_init_oscore_tests()
1065 if (!CU_add_test(suite[0], #n, n)) { \ in t_init_oscore_tests()
1086 return suite[0]; in t_init_oscore_tests()

Completed in 38 milliseconds

12345678