| /src/external/apache2/llvm/dist/clang/tools/scan-build-py/tests/ |
| __init__.py | 12 def suite(): function 14 suite = unittest.TestSuite() 15 suite.addTests(loader.loadTestsFromModule(tests.unit)) 16 suite.addTests(loader.loadTestsFromModule(tests.functional.cases)) 17 return suite
|
| /src/external/apache2/llvm/dist/llvm/utils/lit/tests/ |
| unparsed-requirements.py | 9 suite = TestSuite("suite", sys.argv[1], sys.argv[1], config) variable 11 test = Test(suite, ["test.py"], config)
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa_ie.c | 47 u32 suite; local 59 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); 60 if (suite == 0) { 65 RSN_SELECTOR_PUT(pos, suite); 70 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); 71 if (suite == 0 || 78 RSN_SELECTOR_PUT(pos, suite); 136 u32 suite; local 151 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); 152 if (suite == 0) 284 u32 suite; local [all...] |
| /src/external/bsd/kyua-cli/dist/engine/ |
| kyuafile_test.cpp | 57 const engine::kyuafile suite = engine::kyuafile::load( local 59 ATF_REQUIRE_EQ(fs::path("."), suite.source_root()); 60 ATF_REQUIRE_EQ(fs::path("."), suite.build_root()); 61 ATF_REQUIRE_EQ(0, suite.test_programs().size()); 71 "test_suite('one-suite')\n" 82 "atf_test_program{name='1st', test_suite='other-suite'}\n" 89 "atf_test_program{name='5th', test_suite='last-suite'}\n"); 98 const engine::kyuafile suite = engine::kyuafile::load( local 100 ATF_REQUIRE_EQ(fs::path("."), suite.source_root()); 101 ATF_REQUIRE_EQ(fs::path("."), suite.build_root()) 145 const engine::kyuafile suite = engine::kyuafile::load( local 189 const engine::kyuafile suite = engine::kyuafile::load( local 225 const engine::kyuafile suite = engine::kyuafile::load( local 266 const engine::kyuafile suite = engine::kyuafile::load( local [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 33 const struct tls_cipher_suite *suite; local 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 40 suite = tls_get_cipher_suite(cipher_suite); 41 if (suite == NULL) 44 if (suite->hash == TLS_HASH_MD5) { 47 } else if (suite->hash == TLS_HASH_SHA) { 50 } else if (suite->hash == TLS_HASH_SHA256) [all...] |
| tlsv1_common.c | 103 * tls_get_cipher_suite - Get TLS cipher suite 104 * @suite: Cipher suite identifier 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) 111 if (tls_cipher_suites[i].suite == suite) 129 const struct tls_cipher_suite *suite; local 132 suite = tls_get_cipher_suite(cipher); 133 if (suite == NULL) 136 switch (suite->key_exchange) [all...] |
| tlsv1_client_read.c | 180 "cipher suite 0x%04x", cipher_suite); 188 "cipher suite for a resumed connection (0x%04x != " 1028 const struct tls_cipher_suite *suite; local 1088 "with the selected cipher suite"); 1095 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 1096 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || 1097 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { 1099 suite->key_exchange) < 0) {
|
| tlsv1_client_write.c | 512 const struct tls_cipher_suite *suite; local 514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 515 if (suite == NULL) 518 keyx = suite->key_exchange;
|
| tlsv1_server_read.c | 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) 37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && 38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && 39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && 40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && 41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) 267 tlsv1_server_log(conn, "No supported cipher suite available"); 814 const struct tls_cipher_suite *suite; local 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 863 if (suite == NULL [all...] |
| tlsv1_server_write.c | 195 const struct tls_cipher_suite *suite; local 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { 372 const struct tls_cipher_suite *suite; local 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 381 if (suite == NULL) 384 keyx = suite->key_exchange;
|
| tlsv1_common.h | 216 u16 suite; member in struct:tls_cipher_suite 250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
| /src/external/mit/expat/dist/tests/ |
| minicheck.h | 100 typedef struct Suite Suite; 104 Suite *suite; member in struct:SRunner 109 struct Suite { 139 Suite *suite_create(const char *name); 141 void suite_add_tcase(Suite *suite, TCase *tc); 145 SRunner *srunner_create(Suite *suite); [all...] |
| minicheck.c | 42 # undef NDEBUG /* because test suite relies on assert(...) at the moment */ 55 Suite * 57 Suite *suite = (Suite *)calloc(1, sizeof(Suite)); local 58 if (suite != NULL) { 59 suite->name = name; 61 return suite; 74 suite_add_tcase(Suite *suite, TCase *tc) 193 Suite *suite; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_ie.c | 33 u32 suite; local 41 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); 42 if (suite == 0) { 47 RSN_SELECTOR_PUT(pos, suite); 128 u32 suite; local 135 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); 136 if (suite == 0) { 141 RSN_SELECTOR_PUT(pos, suite); 357 /* Management Group Cipher Suite */ 393 /* Management Group Cipher Suite */ 1221 u32 cipher, suite, selector, mask; local [all...] |
| ieee802_1x.c | 441 u32 suite; local 446 suite = wpa_cipher_to_suite(ver, val); 451 suite)) { 456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 463 suite)) { 469 suite = wpa_akm_to_suite(val); 474 suite)) { 475 wpa_printf(MSG_ERROR, "Could not add WLAN-AKM-Suite"); 480 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, 485 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 52 OSSL_HPKE_SUITE suite; /* suite */ member in struct:ossl_hpke_ctx_st 311 * @brief check if a suite is supported locally 312 * @param suite is the suite to check 315 static int hpke_suite_check(OSSL_HPKE_SUITE suite, 325 if ((kem_info_ = ossl_HPKE_KEM_INFO_find_id(suite.kem_id)) == NULL) 327 if ((kdf_info_ = ossl_HPKE_KDF_INFO_find_id(suite.kdf_id)) == NULL) 329 if ((aead_info_ = ossl_HPKE_AEAD_INFO_find_id(suite.aead_id)) == NULL) 343 * @brief randomly pick a suite [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| sae.c | 1751 u32 suite = wpa_akm_to_suite(sae->akmp); local 1756 RSN_SELECTOR_PUT(wpabuf_put(buf, RSN_SELECTOR_LEN), suite); local 1757 wpa_printf(MSG_DEBUG, "SAE: AKM Suite Selector: %08x", suite); 1758 sae->own_akm_suite_selector = suite; 2167 wpa_printf(MSG_DEBUG, "SAE: Received AKM Suite Selector: %08x", 2224 /* Conditional AKM Suite Selector element */ 2234 "SAE: AKM suite selector mismatch: own=%08x peer=%08x",
|
| wpa_common.c | 278 "WPA: EAPOL-Key MIC using HMAC-SHA256 (AKM-defined - Suite B)"); 287 "WPA: EAPOL-Key MIC using HMAC-SHA384 (AKM-defined - Suite B 192-bit)"); 1429 * @cipher: The cipher suite 1432 * hash algorithm defined for the Base AKM (see Table 9-151 (AKM suite 1434 * on the pairwise cipher suite provided in the RSNE by the AP in the second 2628 * rsn_pmkid_suite_b - Calculate PMK identifier for Suite B AKM 2661 * rsn_pmkid_suite_b_192 - Calculate PMK identifier for Suite B AKM 2693 * wpa_cipher_txt - Convert cipher suite to a text string 2694 * @cipher: Cipher suite (WPA_CIPHER_* enum) 2695 * Returns: Pointer to a text string of the cipher suite nam 3827 u32 suite; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| hpke_test.c | 27 OSSL_HPKE_SUITE suite; member in struct:__anon709 118 if (!TEST_true(OSSL_HPKE_keygen(base->suite, pub, &publen, &privE, 123 if (!TEST_ptr(sealctx = OSSL_HPKE_CTX_new(base->mode, base->suite, 133 if (!TEST_true(OSSL_HPKE_keygen(base->suite, 141 if (!TEST_true(OSSL_HPKE_keygen(base->suite, rpub, &rpublen, &privR, 173 if (!TEST_ptr(openctx = OSSL_HPKE_CTX_new(base->mode, base->suite, 872 /* tables of HPKE modes and suite values */ 1027 * Randomly try with/without info, aad, seq. Given mode and suite 1445 /* bad suite calls */ 1524 /* bad suite */ 1744 OSSL_HPKE_SUITE suite = OSSL_HPKE_SUITE_DEFAULT; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_wolfssl.c | 1879 const char *suite; local 1883 suite = "RC4-SHA"; 1886 suite = "AES128-SHA"; 1889 suite = "DHE-RSA-AES128-SHA"; 1892 suite = "ADH-AES128-SHA"; 1895 suite = "DHE-RSA-AES256-SHA"; 1898 suite = "AES256-SHA"; 1905 ret = os_snprintf(pos, end - pos, ":%s", suite); 1916 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed");
|
| crypto_openssl.c | 5356 static bool hpke_set_suite(OSSL_HPKE_SUITE *suite, 5361 os_memset(suite, 0, sizeof(*suite)); 5365 suite->kem_id = OSSL_HPKE_KEM_ID_P256; 5368 suite->kem_id = OSSL_HPKE_KEM_ID_P384; 5371 suite->kem_id = OSSL_HPKE_KEM_ID_P521; 5379 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA256; 5382 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA384; 5385 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA512; 5393 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_128 5421 OSSL_HPKE_SUITE suite; local 5490 OSSL_HPKE_SUITE suite; local [all...] |
| tls_openssl.c | 1495 * Parse ServerHello to get the selected cipher suite since OpenSSL does 1525 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x", 1615 * length since OpenSSL does not expose the new cipher suite and DH 3100 "OpenSSL: Server DH prime length (%d bits) not sufficient for Suite B RSA - reject handshake", 3211 "OpenSSL: Override ciphers for Suite B (no ECDH): %s", 3217 "OpenSSL: Failed to set Suite B ciphers"); 3230 "OpenSSL: Override ciphers for Suite B: %s", 3236 "OpenSSL: Failed to set Suite B ciphers"); 3243 "OpenSSL: Failed to set Suite B groups"); 3250 "OpenSSL: Failed to set Suite B curves") 4856 const char *suite; local [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_nl80211.c | 3519 u32 suite; local 3521 suite = wpa_alg_to_cipher_suite(alg, key_len); 3522 if (!suite) { 3531 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) 3696 u32 suite; local 3701 suite = wpa_alg_to_cipher_suite(alg, key_len); 3702 if (!suite) 3714 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || 5057 u32 suites[20], suite; local 5247 suite = wpa_cipher_to_cipher_suite(params->group_cipher) 13349 u32 suite; local [all...] |