/freebsd/crypto/krb5/src/tests/ |
H A D | t_policy.py | 8 realm.run([kadminl, 'addpol', '-minlength', '6', '-minclasses', '2', 'pwpol']) 9 realm.run([kadminl, 'addprinc', '-randkey', '-policy', 'pwpol', 'pwuser']) 10 realm.run([kadminl, 'cpw', '-pw', 'sh0rt', 'pwuser'], expected_code=1, 12 realm.run([kadminl, 'cpw', '-pw', 'longenough', 'pwuser'], expected_code=1, 14 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser']) 19 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 21 realm.run([kadminl, 'modpol', '-history', '2', 'pwpol']) 22 realm.run([kadminl, 'cpw', '-pw', 'an0therpw', 'pwuser']) 23 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 25 realm.run([kadminl, 'cpw', '-pw', '3rdpassword', 'pwuser']) [all …]
|
H A D | t_ccache.py | 34 realm.run(['./conccache', realm.ccache + '.contest', 'contest', 38 out = realm.run([klist, '-c', 'KEYRING:process:abcd'], expected_code=1) 46 realm.run([kdestroy]) 47 realm.run([klist], expected_code=1, expected_msg='No credentials cache found') 56 realm.run([klist, '-s'], expected_code=1) 58 realm.run([klist, '-s']) 60 realm.run([klist, '-s'], expected_code=1) 62 realm.run([klist, '-s']) 63 realm.run([kdestroy]) 64 realm.run([klist, '-s'], expected_code=1) [all …]
|
H A D | t_kdb.py | 4 # Run kdbtest against the non-LDAP KDB modules. 6 realm.run(['./kdbtest']) 128 # Run kdbtest against the LDAP module. 138 realm.run([kdb5_ldap_util, 'stashsrvpw', admin_dn], input=input) 139 realm.run(['./kdbtest']) 141 # Run a kdb5_ldap_util command using the test server's admin DN and password. 143 return realm.run([kdb5_ldap_util, '-D', admin_dn, '-w', admin_pw] + args, 203 realm.run([kadminl, 'ank', '-randkey', '-x', 'dn=cn=krb5', 'princ1'], 209 realm.run([kadminl, 'ank', '-randkey', '-x', 'dn=xcn=t1,cn=krb5', 'princ1'], 211 realm.run([kadminl, 'ank', '-randkey', '-x', 'dn=cn=t2,cn=krb5', 'princ1']) [all …]
|
H A D | t_kadmin_acl.py | 17 return realm.run([kadmin, '-c', client] + query, **kwargs) 43 realm.run([kadminl, 'addpol', '-minlife', '1 day', 'minlife']) 96 realm.run([kadminl, 'modprinc', '-policy', 'minlife', 'none']) 100 realm.run([kadminl, 'modprinc', '-clearpolicy', 'none']) 101 realm.run([kadminl, 'delprinc', 'selected']) 102 realm.run([kadminl, 'delprinc', 'unselected']) 106 realm.run([kadminl, 'delpol', 'policy']) 115 realm.run([kadminl, 'delprinc', 'unselected']) 117 realm.run([kadminl, 'delprinc', 'selected']) 119 realm.run([kadminl, 'getprinc', 'unselected'], [all …]
|
H A D | t_authdata.py | 14 out = realm.run(['./adata', realm.host_princ]) 21 out = realm.run(['./adata', realm.host_princ, '-5', 'test1', '?-6', 'test2', 30 realm.run(['./adata', realm.host_princ, '!-1', 'mandatoryforkdc'], 36 realm.run([kadminl, 'ank', '-randkey', '+no_auth_data_required', 'noauth']) 38 out = realm.run(['./adata', 'noauth', '-2', 'test']) 49 out = realm.run(['./adata', 'krbtgt/XREALM', '-3', 'test']) 56 realm.run([kadminl, 'setstr', realm.host_princ, 63 realm.run([kadminl, 'delstr', realm.host_princ, 'pac_privsvr_enctype']) 80 out = realm.run(['./adata', realm.host_princ, '-4', 'test']) 96 realm.run([kadminl, 'modprinc', '+requires_preauth', '-maxrenewlife', '2 days', [all …]
|
H A D | t_dump.py | 6 realm.run([kdb5_util, 'dump'] + opt + [dumpfile]) 13 realm.run([kdb5_util, 'destroy', '-f']) 14 realm.run([kdb5_util, 'load'] + opt + [srcfile]) 15 realm.run([kadminl, 'getprincs'], expected_msg='user@') 16 realm.run([kadminl, 'getprinc', 'nokeys'], 18 realm.run([kadminl, 'getpols'], expected_msg='testpol') 27 realm.run([kadminl, 'addpol', 'fred']) 31 realm.run([kdb5_util, 'dump', dumpfile]) 44 realm.run([kdb5_util, 'destroy', '-f']) 45 realm.run([kdb5_util, 'load', dumpfile]) [all …]
|
H A D | t_keyrollover.py | 13 realm.run([kvno, realm.host_princ]) 16 realm.run([kadminl, 'cpw', '-randkey', '-e', 'aes256-cts', '-keepold', 20 realm.run([kvno, princ1]) 22 realm.run([kadminl, 'purgekeys', realm.krbtgt_princ]) 24 realm.run([kvno, princ2], expected_code=1) 28 realm.run([klist, '-e'], expected_msg=msg) 32 realm.run([kvno, realm.host_princ]) 36 realm.run([klist, '-e'], expected_msg=msg) 42 realm.run([kadminl, 'cpw', '-randkey', '-e', 'des3-cbc-sha1', 44 realm.run([kadminl, 'modprinc', '-kvno', '1', realm.krbtgt_princ]) [all …]
|
/freebsd/contrib/libcbor/.circleci/ |
H A D | config.yml | 6 - run: sudo apt-get update 8 - run: sudo NEEDRESTART_MODE=l apt-get install -y cmake ${TOOLCHAIN_PACKAGES} 9 - run: sudo NEEDRESTART_MODE=l apt-get install -y libcmocka-dev libcjson-dev 12 - run: > 19 - run: make -j 16 VERBOSE=1 22 - run: > 26 - run: make -j 16 VERBOSE=1 29 - run: ctest -VV 43 - run: sudo NEEDRESTART_MODE=l apt-get install -y clang-format doxygen cppcheck 44 - run [all...] |
/freebsd/contrib/ntp/sntp/libevent/test/ |
H A D | regress.gen.h | 14 struct run; 33 int (*run_assign)(struct msg *, int, const struct run*); 34 int (*run_get)(struct msg *, int, struct run* *); 35 struct run* (*run_add)(struct msg *msg); 44 struct run* *run_data; 71 int msg_run_assign(struct msg *, int, const struct run*); 72 int msg_run_get(struct msg *, int, struct run* *); 73 struct run* msg_run_add(struct msg *msg); 129 /* Tag definition for run */ 140 /* Structure declaration for run */ [all …]
|
/freebsd/contrib/libevent/test/ |
H A D | regress.gen.h | 14 struct run; 33 int (*run_assign)(struct msg *, int, const struct run*); 34 int (*run_get)(struct msg *, int, struct run* *); 35 struct run* (*run_add)(struct msg *msg); 44 struct run* *run_data; 71 int msg_run_assign(struct msg *, int, const struct run*); 72 int msg_run_get(struct msg *, int, struct run* *); 73 struct run* msg_run_add(struct msg *msg); 129 /* Tag definition for run */ 140 /* Structure declaration for run */ [all …]
|
/freebsd/crypto/krb5/src/tests/gssapi/ |
H A D | t_gssapi.py | 6 realm.run(['./t_spnego','p:' + realm.host_princ, realm.keytab]) 7 realm.run(['./t_iov', 'p:' + realm.host_princ]) 8 realm.run(['./t_iov', '-s', 'p:' + realm.host_princ]) 9 realm.run(['./t_pcontok', 'p:' + realm.host_princ]) 14 realm.run(['./t_add_cred']) 21 realm.run([kadminl, 'addprinc', '-randkey', 'service1/abraham']) 22 realm.run([kadminl, 'addprinc', '-randkey', 'service1/barack']) 23 realm.run([kadminl, 'addprinc', '-randkey', 'service2/calvin']) 24 realm.run([kadminl, 'addprinc', '-randkey', 'service2/dwight']) 25 realm.run([kadminl, 'addprinc', '-randkey', 'host/-nomatch-']) [all …]
|
H A D | t_client_keytab.py | 17 realm.run(['./t_ccselect', phost], expected_msg=realm.user_princ) 18 realm.run([kdestroy]) 25 realm.run(['./t_ccselect', gssserver], expected_msg=bob) 27 realm.run([kdestroy]) 30 realm.run(['./ccinit', realm.ccache, bob]) 31 realm.run(['./t_ccselect', phost], expected_msg=bob) 36 realm.run(['./t_ccselect', phost, puser], expected_code=1, expected_msg=msg) 37 realm.run([kdestroy]) 40 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 44 realm.run(['./ccrefresh', realm.ccache, '1']) [all …]
|
H A D | t_store_cred.py | 17 realm.run(['./t_store_cred', cc_alice]) 20 realm.run(['./t_store_cred', cc_alice], expected_code=1, 22 realm.run(['./t_store_cred', cc_bob], expected_code=1, 25 realm.run(['./t_store_cred', '-o', cc_bob]) 28 realm.run(['./t_store_cred', '-d', '-o', cc_alice]) 33 realm.run(['./t_store_cred', cc_alice, cc_alternate]) 35 realm.run(['./t_store_cred', cc_bob, cc_alternate], expected_code=1, 40 realm.run(['./t_store_cred', '-i', cc_alice, cc_alternate]) 42 realm.run(['./t_store_cred', '-i', cc_bob, cc_alternate], expected_code=1, 47 realm.run(['./t_store_cred', cc_alice, cc_dir]) [all …]
|
H A D | t_bindings.py | 7 realm.run(['./t_bindings', server, '-', '-'], expected_msg='no') 8 realm.run(['./t_bindings', server, 'a', '-'], expected_msg='no') 9 realm.run(['./t_bindings', server, 'a', 'a'], expected_msg='yes') 10 realm.run(['./t_bindings', server, '-', 'a'], expected_msg='no') 11 realm.run(['./t_bindings', server, 'a', 'x'], 15 realm.run(['./t_bindings', '-s', server, '-', '-'], expected_msg='no') 16 realm.run(['./t_bindings', '-s', server, 'a', '-'], expected_msg='no') 17 realm.run(['./t_bindings', '-s', server, 'a', 'a'], expected_msg='yes') 18 realm.run(['./t_bindings', '-s', server, '-', 'a'], expected_msg='no') 19 realm.run(['./t_bindings', '-s', server, 'a', 'x'], [all …]
|
H A D | t_s4u.py | 25 realm.run([kadminl, 'modprinc', '+needchange', realm.user_princ]) 26 realm.run(['./t_s4u', 'e:user', '-']) 27 realm.run([kadminl, 'modprinc', '-needchange', 29 realm.run(['./t_s4u', 'e:user', '-']) 30 realm.run([kadminl, 'modprinc', '-pwexpire', 'never', realm.user_princ]) 36 output = realm.run(['./t_s4u2proxy_krb5', usercache, storagecache, '-', 43 output = realm.run(['./t_s4u2proxy_krb5', '--spnego', usercache, storagecache, 52 output = realm.run(['./t_s4u2proxy_krb5', usercache, storagecache, pservice1, 60 realm.run(['./t_s4u', puser, pservice2], expected_code=1, 62 realm.run(['./t_s4u', '--spnego', puser, pservice2], expected_code=1, [all …]
|
H A D | t_credstore.py | 15 realm.run(['./t_credstore', '-s', 'p:' + service_cs, 'ccache', storagecache, 21 realm.run(['./t_credstore', '-i', 'p:' + realm.host_princ, 'ccache', scc]) 22 realm.run(['./t_credstore', '-i', 'h:host', 'ccache', scc]) 23 realm.run(['./t_credstore', '-i', 'h:host@' + hostname, 'ccache', scc]) 24 realm.run(['./t_credstore', '-i', 'p:wrong', 'ccache', scc], 26 realm.run(['./t_credstore', '-i', 'h:host@-nomatch-', 'ccache', scc], 28 realm.run(['./t_credstore', '-i', 'h:svc', 'ccache', scc], 38 realm.run(['./t_credstore', '-i', 'h:host', 'ccache', scc]) 39 realm.run(['./t_credstore', '-i', 'h:host@' + hostname, 'ccache', scc]) 40 realm.run(['./t_credstore', '-i', 'h:host@' + canonname, 'ccache', scc]) [all …]
|
/freebsd/contrib/sendmail/libsm/ |
H A D | Makefile.m4 | 17 smcheck(`t-event', `compile-run') 18 smcheck(`t-exc', `compile-run') 19 smcheck(`t-rpool', `compile-run') 20 smcheck(`t-string', `compile-run') 21 smcheck(`t-smstdio', `compile-run') 22 smcheck(`t-fget', `compile-run') 23 smcheck(`t-match', `compile-run') 24 smcheck(`t-strio', `compile-run') 25 smcheck(`t-heap', `compile-run') 26 smcheck(`t-fopen', `compile-run') [all …]
|
/freebsd/crypto/krb5/src/lib/krb5/krb/ |
H A D | t_vfy_increds.py | 29 realm.run(['./t_vfy_increds']) 30 realm.run(['./t_vfy_increds', '-n']) 35 realm.run([kadminl, 'ktadd', realm.host_princ]) 36 realm.run(['./t_vfy_increds']) 37 realm.run(['./t_vfy_increds', '-n']) 42 realm.run([kadminl, 'change_password', '-randkey', realm.host_princ]) 43 realm.run(['./t_vfy_increds'], expected_code=1) 44 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 52 realm.run([kadminl, 'addprinc', '-randkey', 'host/wrong.hostname']) 53 realm.run([kadminl, 'ktadd', 'host/wrong.hostname']) [all …]
|
H A D | t_in_ccache_patypes.py | 29 realm.run([kadminl, 'addprinc', '-pw', 'pass', 'nopreauth']) 30 realm.run([kadminl, 'addprinc', '-pw', 'pass', '+requires_preauth', 'preauth']) 34 realm.run(['./t_in_ccache', 'nopreauth', 'pass']) 38 realm.run(['./t_in_ccache', 'preauth', 'pass']) 42 realm.run(['./t_in_ccache', 'nopreauth', 'pass']) 43 realm.run(['./t_in_ccache', '-I', realm.ccache, 'preauth', 'pass']) 46 realm.run(['./t_in_ccache', 'preauth', 'pass']) 47 realm.run(['./t_in_ccache', '-I', realm.ccache, 'preauth', 'pass']) 52 realm.run(['./t_in_ccache', 'nopreauth', 'pass']) 53 realm.run(['./t_cc_config', '-p', realm.krbtgt_princ, 'pa_type', '2']) [all …]
|
H A D | t_get_etype_info.py | 6 realm.run([kadminl, 'ank', '-pw', 'pw', '+preauth', 'puser']) 7 realm.run([kadminl, 'ank', '-nokey', 'nokey']) 8 realm.run([kadminl, 'ank', '-nokey', '+preauth', 'pnokey']) 9 realm.run([kadminl, 'ank', '-e', 'aes256-cts:special', '-pw', 'pw', 'exp']) 10 realm.run([kadminl, 'ank', '-e', 'aes256-cts:special', '-pw', 'pw', '+preauth', 14 out = realm.run([kdb5_util, 'tabdump', 'keyinfo']) 20 out = realm.run(['./t_get_etype_info', 'notfound'], expected_code=1, 26 realm.run(['./t_get_etype_info', 'user'], 28 realm.run(['./t_get_etype_info', 'puser'], 33 realm.run(['./t_get_etype_info', '-e', 'aes128-cts', 'user'], [all …]
|
/freebsd/sys/contrib/openzfs/tests/ |
H A D | README.md | 35 to sudo(8) to root without a password to run the test. 46 Once the pre-requisites are satisfied simply run the zfs-tests.sh script: 50 Alternately, the zfs-tests.sh script can be run from the source tree to allow 73 configuration from a previous test run. This includes 98 -r RUNFILES Run tests in RUNFILES (default: common.run,linux.run) 100 -t PATH Run single test at PATH relative to test suite 104 -u USER Run single test as USER (default: root) 114 $ /usr/share/zfs/zfs-tests.sh -r my_tests.run 116 Otherwise user can set needed tags to run only specific tests. 121 end of each test, and a results summary is printed at the end of the run. The [all …]
|
/freebsd/sys/contrib/openzfs/.github/workflows/ |
H A D | zfs-qemu.yml | 41 run: | 100 run: .github/workflows/scripts/qemu-1-setup.sh 104 run: .github/workflows/scripts/qemu-2-start.sh ${{ matrix.os }} 108 …run: .github/workflows/scripts/qemu-3-deps.sh ${{ matrix.os }} ${{ github.event.inputs.fedora_kern… 112 run: .github/workflows/scripts/qemu-4-build.sh --poweroff --enable-debug ${{ matrix.os }} 116 run: .github/workflows/scripts/qemu-5-setup.sh 118 - name: Run tests 120 run: .github/workflows/scripts/qemu-6-tests.sh 127 run: .github/workflows/scripts/qemu-7-prepare.sh 139 …run: .github/workflows/scripts/qemu-8-summary.sh '${{ steps.artifact-upload.outputs.artifact-url }… [all …]
|
/freebsd/contrib/ntp/sntp/tests/ |
H A D | Makefile.am | 122 $(srcdir)/run-crypto.c \ 123 $(srcdir)/run-keyFile.c \ 124 $(srcdir)/run-kodDatabase.c \ 125 $(srcdir)/run-kodFile.c \ 126 $(srcdir)/run-networking.c \ 127 $(srcdir)/run-packetHandling.c \ 128 $(srcdir)/run-packetProcessing.c \ 129 $(srcdir)/run-utilities.c \ 134 run-networking.c \ 141 run-packetHandling.c \ [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 80-test_ssl_old.t | 127 ok(run(app([@reqcmd, "-config", $cnf, 133 ok(run(app([@x509cmd, "-CAcreateserial", "-in", $CAreq, "-days", "30", 140 ok(run(app([@x509cmd, "-in", $CAcert, 146 ok(run(app([@reqcmd, "-config", $dummycnf, 152 ok(run(app([@reqcmd, "-config", $dummycnf, 157 ok(run(app([@verifycmd, "-CAfile", $CAcert, $CAcert])), 161 ok(run(app([@reqcmd, "-config", $cnf, "-section", "userreq", 167 ok(run(app([@x509cmd, "-CAcreateserial", "-in", $Ureq, "-days", "30", 172 && run(app([@verifycmd, "-CAfile", $CAcert, $Ucert])), 176 ok(run(app([@x509cmd, [all …]
|
H A D | 25-test_req.t | 47 ok( run(app([@addext_args, "-addext", $val]))); 48 ok( run(app([@addext_args, "-addext", $val1]))); 50 ok(!run(app([@addext_args, "-addext", $val1]))); 51 ok(!run(app([@addext_args, "-addext", $val, "-addext", $val]))); 52 ok(!run(app([@addext_args, "-addext", $val, "-addext", $val2]))); 53 ok(!run(app([@addext_args, "-addext", $val, "-addext", $val3]))); 54 ok(!run(app([@addext_args, "-addext", $val2, "-addext", $val3]))); 55 ok(run(app([@addext_args, "-addext", "SXNetID=1:one, 2:two, 3:three"]))); 56 ok(run(app([@addext_args, "-addext", "subjectAltName=dirName:dirname_sec"]))); 59 ok(!run(ap [all...] |