/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_nl80211.c | 3057 u32 suite; in wpa_driver_nl80211_set_key() local 3059 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key() 3060 if (!suite) in wpa_driver_nl80211_set_key() 3065 nla_put_u32(msg, NL80211_ATTR_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key() 3167 u32 suite; in nl_add_key() local 3172 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key() 3173 if (!suite) in nl_add_key() 3185 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key() 4059 u32 suites[10], suite; in wpa_driver_nl80211_set_ap() local 4186 suite in wpa_driver_nl80211_set_ap() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211.c | 3542 u32 suite; in wpa_driver_nl80211_set_key() local 3544 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key() 3545 if (!suite) { in wpa_driver_nl80211_set_key() 3554 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key() 3727 u32 suite; in nl_add_key() local 3732 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key() 3733 if (!suite) in nl_add_key() 3745 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key() 4789 u32 suites[20], suite; in wpa_driver_nl80211_set_ap() local 4919 suite in wpa_driver_nl80211_set_ap() [all...] |
/drivers/peripheral/wlan/test/unittest/client/ |
H A D | hdf_client_test.cpp | 1043 param.suite = 0;
|
/third_party/python/Lib/test/test_asyncio/ |
H A D | test_subprocess.py | 735 and these tests can hang the test suite")
|
/third_party/skia/third_party/externals/angle2/tools/flex-bison/third_party/skeletons/ |
H A D | yacc.c | 33 # Handle BISON_USE_PUSH_FOR_PULL for the test suite. So that push parsing
|
/third_party/protobuf/js/binary/ |
H A D | proto_test.js | 31 // Test suite is written using Jasmine -- see http://jasmine.github.io/ 95 var suite = {};
|
/third_party/protobuf/js/compatibility_tests/v3.0.0/binary/ |
H A D | proto_test.js | 31 // Test suite is written using Jasmine -- see http://jasmine.github.io/ 91 var suite = {};
|
/third_party/protobuf/js/compatibility_tests/v3.1.0/binary/ |
H A D | proto_test.js | 31 // Test suite is written using Jasmine -- see http://jasmine.github.io/ 91 var suite = {};
|
/third_party/python/Lib/unittest/test/ |
H A D | test_case.py | 454 suite = unittest.TestLoader().loadTestsFromTestCase(Foo) 455 suite.run(result)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 1243 * @cipher: The cipher suite 1246 * hash algorithm defined for the Base AKM (see Table 9-151 (AKM suite 1248 * on the pairwise cipher suite provided in the RSNE by the AP in the second 2359 * wpa_cipher_txt - Convert cipher suite to a text string 2360 * @cipher: Cipher suite (WPA_CIPHER_* enum) 2361 * Returns: Pointer to a text string of the cipher suite name 2407 * wpa_key_mgmt_txt - Convert key management suite to a text string 2408 * @key_mgmt: Key management suite (WPA_KEY_MGMT_* enum) 2410 * Returns: Pointer to a text string of the key management suite name 3630 * @cipher: The cipher suite 3635 u32 suite; wpa_pasn_add_rsne() local [all...] |
/kernel/linux/linux-6.6/drivers/gpu/drm/tests/ |
H A D | drm_mm_test.c | 2212 static int drm_mm_suite_init(struct kunit_suite *suite) in drm_mm_suite_init() argument 2217 kunit_info(suite, in drm_mm_suite_init()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/forwarding/ |
H A D | lib.sh | 867 local suite=$1; shift 872 ip -j stats show dev $if_name group offload subgroup $suite |
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/bonding/ |
H A D | net_forwarding_lib.sh | 867 local suite=$1; shift 872 ip -j stats show dev $if_name group offload subgroup $suite |
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/dsa/ |
H A D | lib.sh | 867 local suite=$1; shift 872 ip -j stats show dev $if_name group offload subgroup $suite |
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/team/ |
H A D | net_forwarding_lib.sh | 867 local suite=$1; shift 872 ip -j stats show dev $if_name group offload subgroup $suite |
|
/third_party/node/tools/ |
H A D | test.py | 1355 result.add_option("-s", "--suite", help="A test suite", 1614 repositories += [TestRepository(a) for a in options.suite]
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 2437 const mbedtls_ssl_ciphersuite_t *suite) in mbedtls_ssl_get_mode_from_ciphersuite() 2446 status = mbedtls_ssl_cipher_to_psa((mbedtls_cipher_type_t) suite->cipher, in mbedtls_ssl_get_mode_from_ciphersuite() 2453 mbedtls_cipher_info_from_type((mbedtls_cipher_type_t) suite->cipher); in mbedtls_ssl_get_mode_from_ciphersuite() 2433 mbedtls_ssl_get_mode_from_ciphersuite( int encrypt_then_mac, const mbedtls_ssl_ciphersuite_t *suite) mbedtls_ssl_get_mode_from_ciphersuite() argument
|
/third_party/python/Lib/test/ |
H A D | test_io.py | 3 # Tests of io are scattered over the test suite: 4690 suite = loader.suiteClass() 4692 suite.addTest(loader.loadTestsFromTestCase(test)) 4693 return suite
|
H A D | test_ssl.py | 1171 for suite in ciphers: 1172 name = suite['name']
|
/third_party/mksh/ |
H A D | Build.sh | 2795 $e Run the regression test suite: ./test.sh
|
/third_party/node/deps/openssl/openssl/external/perl/Text-Template-1.56/lib/Text/ |
H A D | Template.pm | 2336 There are not quite enough tests in the test suite.
|
/third_party/openssl/external/perl/Text-Template-1.56/lib/Text/ |
H A D | Template.pm | 2336 There are not quite enough tests in the test suite.
|
/third_party/mbedtls/tests/ |
H A D | ssl-opt.sh | 141 printf " --test-suite\tOnly matching test suites are executed\n" 181 --test-suite) 535 # The test case forces a non-PSK cipher suite. In some cases, a 536 # PSK cipher suite could be substituted, but we're not ready for 923 # Use $TEST_SUITE_NAME as the test suite name if set. 1636 # Use ssl-opt as default test suite name. Also see record_outcome function 5766 # corner case of a static ECDH suite, because the server doesn't check the curve on that 6152 # corner case of a static ECDH suite, because the server doesn't check the curve on that 7522 # server-side certificate/suite selection 7821 # Tests for extendedKeyUsage, part 1: server-side certificate/suite selectio [all...] |
/third_party/node/deps/cares/ |
H A D | configure | 1516 --disable-tests disable building of test suite. Built by default if
|
/third_party/python/ |
H A D | configure | 24030 in the library reference and as expected by the test suite. 26061 # ssl module default cipher suite string
|