/frameworks/base/core/java/android/test/ |
package.html | 3 <p>A framework for writing Android test cases and suites.</p>
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ctypes.py | 11 suites = [unittest.makeSuite(t) for t in testcases] 12 run_unittest(unittest.TestSuite(suites))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ctypes.py | 11 suites = [unittest.makeSuite(t) for t in testcases] 12 run_unittest(unittest.TestSuite(suites))
|
/external/chromium_org/build/android/pylib/gtest/ |
gtest_config.py | 5 """Configuration file for android gtest suites.""" 7 # Add new suites here before upgrading them to the stable list below. 13 # This list determines which suites are run by default, both for local
|
/external/chromium_org/tools/gyp/test/small/ |
gyptest-small.py | 25 # Add new test suites here. 36 # Collect all the suites from the above files. 37 suites = [] variable 45 # Add it to the list of test suites. 46 suites.append(unittest.defaultTestLoader.loadTestsFromModule(module)) 48 all_tests = unittest.TestSuite(suites)
|
/external/chromium_org/third_party/tlslite/tlslite/ |
constants.py | 125 suites = [] 128 suites.append(CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA) 130 suites.append(CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA) 132 suites.append(CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA) 133 return suites 141 suites = [] 144 suites.append(CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA) 146 suites.append(CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA) 148 suites.append(CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA) 149 return suites [all...] |
/external/linux-tools-perf/ |
builtin-bench.c | 64 struct bench_suite *suites; member in struct:bench_subsys 86 printf("# List of available suites for %s...\n\n", 89 for (i = 0; subsystems[subsys_index].suites[i].name; i++) 91 subsystems[subsys_index].suites[i].name, 92 subsystems[subsys_index].suites[i].summary); 146 struct bench_suite *suites = subsys->suites; local 155 for (i = 0; suites[i].fn; i++) { 158 suites[i].name); 160 argv[1] = suites[i].name [all...] |
/external/llvm/utils/lit/ |
TODO | 18 - Allow 'lit' driver to cooperate with test suites to add options (or at least 24 - Consider move to change workflow to always load suites, then resolve command
|
/libcore/dom/src/test/java/org/w3c/domts/ |
DOMTestSuite.java | 30 * Abstract base class for all test suites 38 * This constructor is used for suites that 47 * This constructor is used for suites that make no 59 * test suites in different manners.
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslenum.c | 2 * Table enumerating all implemented cipher suites 23 * The ordering of cipher suites in this table must match the ordering in 26 * If new ECC cipher suites are added, also update the ssl3CipherSuite arrays 102 /* 56-bit DES "domestic" cipher suites */ 127 /* SSL2 cipher suites. */
|
sslproto.h | 73 * These values define the SSL2 suites, and do not colide with the 74 * SSL3 Cipher suites defined below. 84 /* SSL v3 Cipher Suites */ 122 /* New TLS cipher suites */ 224 /* Netscape "experimental" cipher suites. */ 228 /* New non-experimental openly spec'ed versions of those cipher suites. */ 232 /* DTLS-SRTP cipher suites from RFC 5764 */
|
/libcore/luni/src/main/java/javax/net/ssl/ |
SSLParameters.java | 20 * SSL handshake parameters that include protocols, cipher suites, and 32 * The default SSLParameters constructor. Cipher suites and 40 * initial cipher suites array to be provided. Other values 52 * cipher suites and protocols arrays to be provided. Other values 67 * Returns a copy of the cipher suites, or null if none have been 78 * Sets the cipher suites to a copy of the input, or null
|
SSLServerSocketFactory.java | 86 * Returns the names of the cipher suites that are enabled by default. 88 * @return the names of the cipher suites that are enabled by default 93 * Returns the list of supported cipher suites that could be enabled for an 96 * @return the list of supported cipher suites
|
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLServerSocketImpl.java | 131 * This method enables the cipher suites listed by 134 * @param suites the names of all the cipher suites to enable 136 * suites are not supported, or when the array is null. 139 public void setEnabledCipherSuites(String[] suites) { 140 enabledCipherSuites = NativeCrypto.checkEnabledCipherSuites(suites); 189 * Check if any of the enabled cipher suites has a chance to work. 193 /* Loop over all enabled cipher suites. If we find a problem, 233 + "to support the enabled cipher suites.");
|
SSLParametersImpl.java | 36 * about enabled cipher suites and protocols, 66 // cipher suites available for SSL connection 68 // string representations of available cipher suites 207 * @return the names of enabled cipher suites 221 * Sets the set of available cipher suites for use in SSL connection. 222 * @param suites: String[] 225 protected void setEnabledCipherSuites(String[] suites) { 226 if (suites == null) { 227 throw new IllegalArgumentException("suites == null"); 229 CipherSuite[] cipherSuites = new CipherSuite[suites.length] [all...] |
JSSEProvider.java | 34 * Provider implementation supports the following cipher suites: 64 * The real set of available cipher suites depends on set of available 68 * The following cipher algorithms are used by different cipher suites: 86 * The cipher suites with RSA key exchange may also require: 91 * The cipher suites with DH key exchange may also require:
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/plat-mac/lib-scriptpackages/_builtinSuites/ |
__init__.py | 3 suites. This is needed because the events and enums in this suite belong
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 345 u16 *suites; local 363 suites = conn->cipher_suites; 364 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; 365 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; 366 suites[count++] = TLS_RSA_WITH_3DES_EDE_CBC_SHA; 367 suites[count++] = TLS_RSA_WITH_RC4_128_SHA; 368 suites[count++] = TLS_RSA_WITH_RC4_128_MD5; 573 * tlsv1_server_set_cipher_list - Configure acceptable cipher suites 582 u16 *suites; local 584 /* TODO: implement proper configuration of cipher suites */ [all...] |
/external/chromium/net/base/ |
ssl_config_service.h | 38 // Cipher suites which should be explicitly prevented from being used in 40 // cipher suites supported by the underlying SSL implementation will be 42 // - Null encryption cipher suites. 43 // - Weak cipher suites: < 80 bits of security strength. 44 // - FORTEZZA cipher suites (obsolete). 45 // - IDEA cipher suites (RFC 5469 explains why). 46 // - Anonymous cipher suites. 50 // Though cipher suites are sent in TLS as "uint8 CipherSuite[2]", in
|
/cts/suite/cts/deviceTests/browserbench/assets/octane/ |
base.js | 29 // Simple framework for running the benchmark suites and 63 // Suites of benchmarks consist of a name and the set of benchmarks in 71 BenchmarkSuite.suites.push(this); 75 // Keep track of all declared benchmark suites. 76 BenchmarkSuite.suites = []; 106 // Runs all registered benchmark suites and optionally yields between 112 var suites = BenchmarkSuite.suites; 113 var length = suites.length; 121 var suite = suites[index++] [all...] |
/external/chromium_org/v8/benchmarks/ |
base.js | 29 // Simple framework for running the benchmark suites and 62 // Suites of benchmarks consist of a name and the set of benchmarks in 70 BenchmarkSuite.suites.push(this); 74 // Keep track of all declared benchmark suites. 75 BenchmarkSuite.suites = []; 101 // Runs all registered benchmark suites and optionally yields between 107 var suites = BenchmarkSuite.suites; 108 var length = suites.length; 116 var suite = suites[index++] [all...] |
/external/v8/benchmarks/ |
base.js | 29 // Simple framework for running the benchmark suites and 62 // Suites of benchmarks consist of a name and the set of benchmarks in 70 BenchmarkSuite.suites.push(this); 74 // Keep track of all declared benchmark suites. 75 BenchmarkSuite.suites = []; 101 // Runs all registered benchmark suites and optionally yields between 107 var suites = BenchmarkSuite.suites; 108 var length = suites.length; 116 var suite = suites[index++] [all...] |
/external/chromium_org/net/ssl/ |
ssl_config_service.h | 76 // Presorted list of cipher suites which should be explicitly prevented from 79 // By default, all cipher suites supported by the underlying SSL 81 // - Null encryption cipher suites. 82 // - Weak cipher suites: < 80 bits of security strength. 83 // - FORTEZZA cipher suites (obsolete). 84 // - IDEA cipher suites (RFC 5469 explains why). 85 // - Anonymous cipher suites. 86 // - ECDSA cipher suites on platforms that do not support ECDSA signed 92 // Though cipher suites are sent in TLS as "uint8 CipherSuite[2]", in 106 // require_forward_secrecy, if true, causes only (EC)DHE cipher suites to b [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CipherSuiteTest.java | 50 CipherSuite[] suites = CipherSuite.getSupported(); local 51 for (int i = 0; i < suites.length; i++) { 52 assertEquals("incorrect cipher suite returned", suites[i], 53 CipherSuite.getByName(suites[i].getName())); 63 CipherSuite[] suites = CipherSuite.getSupported(); local 64 for (int i = 0; i < suites.length; i++) { 65 byte[] code = suites[i].toBytes(); 66 assertEquals("incorrect cipher suite returned", suites[i], 78 CipherSuite[] suites = CipherSuite.getSupported(); local 79 for (int i = 0; i < suites.length; i++) 107 CipherSuite[] suites = CipherSuite.getSupported(); local 114 CipherSuite[] suites = CipherSuite.getSupported(); local [all...] |
/external/chromium_org/v8/tools/testrunner/network/ |
endpoint.py | 91 suites = [] 96 suites.append(suite) 99 for s in suites: 107 suites = [ s for s in suites if len(s.tests) > 0 ] 108 for s in suites: 112 runner = execution.Runner(suites, progress_indicator, ctx)
|