HomeSort by: relevance | last modified time | path
    Searched defs:suite (Results 1 - 23 of 23) sorted by relevancy

  /src/external/apache2/llvm/dist/clang/tools/scan-build-py/tests/
__init__.py 12 def suite(): function
14 suite = unittest.TestSuite()
15 suite.addTests(loader.loadTestsFromModule(tests.unit))
16 suite.addTests(loader.loadTestsFromModule(tests.functional.cases))
17 return suite
  /src/external/apache2/llvm/dist/llvm/utils/lit/tests/
unparsed-requirements.py 9 suite = TestSuite("suite", sys.argv[1], sys.argv[1], config) variable
11 test = Test(suite, ["test.py"], config)
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa_ie.c 47 u32 suite; local
59 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher);
60 if (suite == 0) {
65 RSN_SELECTOR_PUT(pos, suite);
70 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher);
71 if (suite == 0 ||
78 RSN_SELECTOR_PUT(pos, suite);
136 u32 suite; local
151 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher);
152 if (suite == 0)
284 u32 suite; local
    [all...]
  /src/external/bsd/kyua-cli/dist/engine/
kyuafile_test.cpp 57 const engine::kyuafile suite = engine::kyuafile::load( local
59 ATF_REQUIRE_EQ(fs::path("."), suite.source_root());
60 ATF_REQUIRE_EQ(fs::path("."), suite.build_root());
61 ATF_REQUIRE_EQ(0, suite.test_programs().size());
71 "test_suite('one-suite')\n"
82 "atf_test_program{name='1st', test_suite='other-suite'}\n"
89 "atf_test_program{name='5th', test_suite='last-suite'}\n");
98 const engine::kyuafile suite = engine::kyuafile::load( local
100 ATF_REQUIRE_EQ(fs::path("."), suite.source_root());
101 ATF_REQUIRE_EQ(fs::path("."), suite.build_root())
145 const engine::kyuafile suite = engine::kyuafile::load( local
189 const engine::kyuafile suite = engine::kyuafile::load( local
225 const engine::kyuafile suite = engine::kyuafile::load( local
266 const engine::kyuafile suite = engine::kyuafile::load( local
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_record.c 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
33 const struct tls_cipher_suite *suite; local
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
40 suite = tls_get_cipher_suite(cipher_suite);
41 if (suite == NULL)
44 if (suite->hash == TLS_HASH_MD5) {
47 } else if (suite->hash == TLS_HASH_SHA) {
50 } else if (suite->hash == TLS_HASH_SHA256)
    [all...]
tlsv1_common.c 103 * tls_get_cipher_suite - Get TLS cipher suite
104 * @suite: Cipher suite identifier
107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite)
111 if (tls_cipher_suites[i].suite == suite)
129 const struct tls_cipher_suite *suite; local
132 suite = tls_get_cipher_suite(cipher);
133 if (suite == NULL)
136 switch (suite->key_exchange)
    [all...]
tlsv1_client_read.c 180 "cipher suite 0x%04x", cipher_suite);
188 "cipher suite for a resumed connection (0x%04x != "
1028 const struct tls_cipher_suite *suite; local
1088 "with the selected cipher suite");
1095 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
1096 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon ||
1097 suite->key_exchange == TLS_KEY_X_DHE_RSA)) {
1099 suite->key_exchange) < 0) {
tlsv1_client_write.c 512 const struct tls_cipher_suite *suite; local
514 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
515 if (suite == NULL)
518 keyx = suite->key_exchange;
tlsv1_server_read.c 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite)
37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 &&
38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA &&
39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 &&
40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA &&
41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA)
267 tlsv1_server_log(conn, "No supported cipher suite available");
814 const struct tls_cipher_suite *suite; local
862 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
863 if (suite == NULL
    [all...]
tlsv1_server_write.c 195 const struct tls_cipher_suite *suite; local
197 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
372 const struct tls_cipher_suite *suite; local
380 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
381 if (suite == NULL)
384 keyx = suite->key_exchange;
tlsv1_common.h 216 u16 suite; member in struct:tls_cipher_suite
250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
  /src/external/mit/expat/dist/tests/
minicheck.h 100 typedef struct Suite Suite;
104 Suite *suite; member in struct:SRunner
109 struct Suite {
139 Suite *suite_create(const char *name);
141 void suite_add_tcase(Suite *suite, TCase *tc);
145 SRunner *srunner_create(Suite *suite);
    [all...]
minicheck.c 42 # undef NDEBUG /* because test suite relies on assert(...) at the moment */
55 Suite *
57 Suite *suite = (Suite *)calloc(1, sizeof(Suite)); local
58 if (suite != NULL) {
59 suite->name = name;
61 return suite;
74 suite_add_tcase(Suite *suite, TCase *tc)
193 Suite *suite; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_ie.c 33 u32 suite; local
41 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group);
42 if (suite == 0) {
47 RSN_SELECTOR_PUT(pos, suite);
128 u32 suite; local
135 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group);
136 if (suite == 0) {
141 RSN_SELECTOR_PUT(pos, suite);
357 /* Management Group Cipher Suite */
393 /* Management Group Cipher Suite */
1221 u32 cipher, suite, selector, mask; local
    [all...]
ieee802_1x.c 441 u32 suite; local
446 suite = wpa_cipher_to_suite(ver, val);
451 suite)) {
456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) ||
463 suite)) {
469 suite = wpa_akm_to_suite(val);
474 suite)) {
475 wpa_printf(MSG_ERROR, "Could not add WLAN-AKM-Suite");
480 suite = wpa_cipher_to_suite(WPA_PROTO_RSN,
485 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) {
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/hpke/
hpke.c 52 OSSL_HPKE_SUITE suite; /* suite */ member in struct:ossl_hpke_ctx_st
311 * @brief check if a suite is supported locally
312 * @param suite is the suite to check
315 static int hpke_suite_check(OSSL_HPKE_SUITE suite,
325 if ((kem_info_ = ossl_HPKE_KEM_INFO_find_id(suite.kem_id)) == NULL)
327 if ((kdf_info_ = ossl_HPKE_KDF_INFO_find_id(suite.kdf_id)) == NULL)
329 if ((aead_info_ = ossl_HPKE_AEAD_INFO_find_id(suite.aead_id)) == NULL)
343 * @brief randomly pick a suite
    [all...]
  /src/external/bsd/wpa/dist/src/common/
sae.c 1751 u32 suite = wpa_akm_to_suite(sae->akmp); local
1756 RSN_SELECTOR_PUT(wpabuf_put(buf, RSN_SELECTOR_LEN), suite); local
1757 wpa_printf(MSG_DEBUG, "SAE: AKM Suite Selector: %08x", suite);
1758 sae->own_akm_suite_selector = suite;
2167 wpa_printf(MSG_DEBUG, "SAE: Received AKM Suite Selector: %08x",
2224 /* Conditional AKM Suite Selector element */
2234 "SAE: AKM suite selector mismatch: own=%08x peer=%08x",
wpa_common.c 278 "WPA: EAPOL-Key MIC using HMAC-SHA256 (AKM-defined - Suite B)");
287 "WPA: EAPOL-Key MIC using HMAC-SHA384 (AKM-defined - Suite B 192-bit)");
1429 * @cipher: The cipher suite
1432 * hash algorithm defined for the Base AKM (see Table 9-151 (AKM suite
1434 * on the pairwise cipher suite provided in the RSNE by the AP in the second
2628 * rsn_pmkid_suite_b - Calculate PMK identifier for Suite B AKM
2661 * rsn_pmkid_suite_b_192 - Calculate PMK identifier for Suite B AKM
2693 * wpa_cipher_txt - Convert cipher suite to a text string
2694 * @cipher: Cipher suite (WPA_CIPHER_* enum)
2695 * Returns: Pointer to a text string of the cipher suite nam
3827 u32 suite; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
hpke_test.c 27 OSSL_HPKE_SUITE suite; member in struct:__anon709
118 if (!TEST_true(OSSL_HPKE_keygen(base->suite, pub, &publen, &privE,
123 if (!TEST_ptr(sealctx = OSSL_HPKE_CTX_new(base->mode, base->suite,
133 if (!TEST_true(OSSL_HPKE_keygen(base->suite,
141 if (!TEST_true(OSSL_HPKE_keygen(base->suite, rpub, &rpublen, &privR,
173 if (!TEST_ptr(openctx = OSSL_HPKE_CTX_new(base->mode, base->suite,
872 /* tables of HPKE modes and suite values */
1027 * Randomly try with/without info, aad, seq. Given mode and suite
1445 /* bad suite calls */
1524 /* bad suite */
1744 OSSL_HPKE_SUITE suite = OSSL_HPKE_SUITE_DEFAULT; local
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
tls_wolfssl.c 1879 const char *suite; local
1883 suite = "RC4-SHA";
1886 suite = "AES128-SHA";
1889 suite = "DHE-RSA-AES128-SHA";
1892 suite = "ADH-AES128-SHA";
1895 suite = "DHE-RSA-AES256-SHA";
1898 suite = "AES256-SHA";
1905 ret = os_snprintf(pos, end - pos, ":%s", suite);
1916 wpa_printf(MSG_DEBUG, "Cipher suite configuration failed");
crypto_openssl.c 5356 static bool hpke_set_suite(OSSL_HPKE_SUITE *suite,
5361 os_memset(suite, 0, sizeof(*suite));
5365 suite->kem_id = OSSL_HPKE_KEM_ID_P256;
5368 suite->kem_id = OSSL_HPKE_KEM_ID_P384;
5371 suite->kem_id = OSSL_HPKE_KEM_ID_P521;
5379 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA256;
5382 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA384;
5385 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA512;
5393 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_128
5421 OSSL_HPKE_SUITE suite; local
5490 OSSL_HPKE_SUITE suite; local
    [all...]
tls_openssl.c 1495 * Parse ServerHello to get the selected cipher suite since OpenSSL does
1525 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x",
1615 * length since OpenSSL does not expose the new cipher suite and DH
3100 "OpenSSL: Server DH prime length (%d bits) not sufficient for Suite B RSA - reject handshake",
3211 "OpenSSL: Override ciphers for Suite B (no ECDH): %s",
3217 "OpenSSL: Failed to set Suite B ciphers");
3230 "OpenSSL: Override ciphers for Suite B: %s",
3236 "OpenSSL: Failed to set Suite B ciphers");
3243 "OpenSSL: Failed to set Suite B groups");
3250 "OpenSSL: Failed to set Suite B curves")
4856 const char *suite; local
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver_nl80211.c 3519 u32 suite; local
3521 suite = wpa_alg_to_cipher_suite(alg, key_len);
3522 if (!suite) {
3531 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite))
3696 u32 suite; local
3701 suite = wpa_alg_to_cipher_suite(alg, key_len);
3702 if (!suite)
3714 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) ||
5057 u32 suites[20], suite; local
5247 suite = wpa_cipher_to_cipher_suite(params->group_cipher)
13349 u32 suite; local
    [all...]

Completed in 68 milliseconds