/freebsd/contrib/netbsd-tests/lib/libbluetooth/ |
H A D | t_sdp_put.c | 49 sdp_data_t test = { buf, buf + sizeof(buf) }; in ATF_TC_BODY() local 57 ATF_REQUIRE(sdp_put_data(&test, &value)); in ATF_TC_BODY() 58 test.end = test.next; in ATF_TC_BODY() 59 test.next = buf; in ATF_TC_BODY() 61 const uint8_t expect[] = { in ATF_TC_BODY() local 67 ATF_REQUIRE_EQ(test.end - test.next, sizeof(expect)); in ATF_TC_BODY() 68 ATF_CHECK(memcmp(expect, test.next, sizeof(expect)) == 0); in ATF_TC_BODY() 82 sdp_data_t test = { buf, buf + sizeof(buf) }; in ATF_TC_BODY() local 89 ATF_REQUIRE_EQ(sdp_put_attr(&test, 0xabcd, &value), false); in ATF_TC_BODY() 91 ATF_REQUIRE(sdp_put_attr(&test, 0x1337, &value)); in ATF_TC_BODY() [all …]
|
H A D | t_sdp_set.c | 53 sdp_data_t test = { data, data + sizeof(data) }; in ATF_TC_BODY() local 56 ATF_CHECK_EQ(sdp_data_type(&test), SDP_DATA_BOOL); in ATF_TC_BODY() 57 ATF_REQUIRE(sdp_set_bool(&test, true)); in ATF_TC_BODY() 58 ATF_CHECK_EQ(test.next[1], 0x01); in ATF_TC_BODY() 59 ATF_REQUIRE(sdp_set_bool(&test, false)); in ATF_TC_BODY() 60 ATF_CHECK_EQ(test.next[1], 0x00); in ATF_TC_BODY() 61 ATF_REQUIRE(sdp_get_data(&test, &discard)); in ATF_TC_BODY() 63 ATF_CHECK_EQ(sdp_data_type(&test), SDP_DATA_NIL); in ATF_TC_BODY() 64 ATF_CHECK_EQ(sdp_set_bool(&test, true), false); /* not bool */ in ATF_TC_BODY() 65 ATF_REQUIRE(sdp_get_data(&test, &discard)); in ATF_TC_BODY() [all …]
|
/freebsd/tools/regression/priv/ |
H A D | priv_cred.c | 49 priv_cred_setup(int asroot, int injail, struct test *test) in priv_cred_setup() argument 56 priv_cred_setuid(int asroot, int injail, struct test *test) in priv_cred_setuid() argument 62 expect("priv_setuid(asroot, injail)", error, 0, 0); in priv_cred_setuid() 64 expect("priv_setuid(asroot, !injail)", error, 0, 0); in priv_cred_setuid() 66 expect("priv_setuid(!asroot, injail)", error, -1, EPERM); in priv_cred_setuid() 68 expect("priv_setuid(!asroot, !injail)", error, -1, EPERM); in priv_cred_setuid() 72 priv_cred_seteuid(int asroot, int injail, struct test *test) in priv_cred_seteuid() argument 78 expect("priv_seteuid(asroot, injail)", error, 0, 0); in priv_cred_seteuid() 80 expect("priv_seteuid(asroot, !injail)", error, 0, 0); in priv_cred_seteuid() 82 expect("priv_seteuid(!asroot, injail)", error, -1, EPERM); in priv_cred_seteuid() [all …]
|
H A D | priv_sched_rtprio.c | 60 priv_sched_rtprio_setup(int asroot, int injail, struct test *test) in priv_sched_rtprio_setup() argument 69 if (test->t_test_func == priv_sched_rtprio_aproc_normal || in priv_sched_rtprio_setup() 70 test->t_test_func == priv_sched_rtprio_aproc_idle || in priv_sched_rtprio_setup() 71 test->t_test_func == priv_sched_rtprio_aproc_realtime) { in priv_sched_rtprio_setup() 75 if (test->t_test_func == priv_sched_rtprio_myproc_normal || in priv_sched_rtprio_setup() 76 test->t_test_func == priv_sched_rtprio_myproc_idle || in priv_sched_rtprio_setup() 77 test->t_test_func == priv_sched_rtprio_myproc_realtime) { in priv_sched_rtprio_setup() 103 priv_sched_rtprio_curproc_normal(int asroot, int injail, struct test *test) in priv_sched_rtprio_curproc_normal() argument 112 expect("priv_sched_rtprio_curproc_normal(asroot, injail)", in priv_sched_rtprio_curproc_normal() 115 expect("priv_sched_rtprio_curproc_normal(asroot, !injail)", in priv_sched_rtprio_curproc_normal() [all …]
|
H A D | priv_vfs_utimes.c | 52 priv_vfs_utimes_froot_setup(int asroot, int injail, struct test *test) in priv_vfs_utimes_froot_setup() argument 62 priv_vfs_utimes_fowner_setup(int asroot, int injail, struct test *test) in priv_vfs_utimes_fowner_setup() argument 72 priv_vfs_utimes_fother_setup(int asroot, int injail, struct test *test) in priv_vfs_utimes_fother_setup() argument 88 priv_vfs_utimes_froot(int asroot, int injail, struct test *test) in priv_vfs_utimes_froot() argument 99 expect("priv_vfs_utimes_froot(root, jail)", error, 0, 0); in priv_vfs_utimes_froot() 101 expect("priv_vfs_utimes_froot(root, !jail)", error, 0, 0); in priv_vfs_utimes_froot() 103 expect("priv_vfs_utimes_froot(!root, jail)", error, -1, in priv_vfs_utimes_froot() 106 expect("priv_vfs_utimes_froot(!root, !jail)", error, -1, in priv_vfs_utimes_froot() 111 priv_vfs_utimes_froot_null(int asroot, int injail, struct test *test) in priv_vfs_utimes_froot_null() argument 117 expect("priv_vfs_utimes_froot_null(root, jail)", error, 0, in priv_vfs_utimes_froot_null() [all …]
|
H A D | priv_vfs_chflags.c | 68 priv_vfs_chflags_froot_setup(int asroot, int injail, struct test *test) in priv_vfs_chflags_froot_setup() argument 79 struct test *test) in priv_vfs_chflags_fowner_setup() argument 90 struct test *test) in priv_vfs_chflags_fother_setup() argument 101 struct test *test) in priv_vfs_chflags_froot_uflags() argument 110 expect("priv_vfs_chflags_froot_uflags(asroot, injail)", in priv_vfs_chflags_froot_uflags() 113 expect("priv_vfs_chflags_froot_uflags(asroot, !injail)", in priv_vfs_chflags_froot_uflags() 116 expect("priv_vfs_chflags_froot_uflags(!asroot, injail)", in priv_vfs_chflags_froot_uflags() 119 expect("priv_vfs_chflags_froot_uflags(!asroot, !injail)", in priv_vfs_chflags_froot_uflags() 125 struct test *test) in priv_vfs_chflags_fowner_uflags() argument 134 expect("priv_vfs_chflags_fowner_uflags(asroot, injail)", in priv_vfs_chflags_fowner_uflags() [all …]
|
H A D | priv_vfs_stickyfile.c | 52 struct test *test) in priv_vfs_stickyfile_dir_fowner_setup() argument 63 struct test *test) in priv_vfs_stickyfile_dir_fother_setup() argument 74 struct test *test) in priv_vfs_stickyfile_file_fowner_setup() argument 85 struct test *test) in priv_vfs_stickyfile_file_fother_setup() argument 95 priv_vfs_stickyfile_dir_fowner(int asroot, int injail, struct test *test) in priv_vfs_stickyfile_dir_fowner() argument 101 expect("priv_vfs_stickyfile_dir_fowner(root, jail)", error, in priv_vfs_stickyfile_dir_fowner() 104 expect("priv_vfs_stickyfile_dir_fowner(root, !jail)", error, in priv_vfs_stickyfile_dir_fowner() 107 expect("priv_vfs_stickyfile_dir_fowner(!root, jail)", error, in priv_vfs_stickyfile_dir_fowner() 110 expect("priv_vfs_stickyfile_dir_fowner(!root, !jail)", error, in priv_vfs_stickyfile_dir_fowner() 115 priv_vfs_stickyfile_dir_fother(int asroot, int injail, struct test *test) in priv_vfs_stickyfile_dir_fother() argument [all …]
|
H A D | priv_acct.c | 63 priv_acct_setup(int asroot, int injail, struct test *test) in priv_acct_setup() argument 83 if (test->t_test_func == priv_acct_enable || in priv_acct_setup() 84 test->t_test_func == priv_acct_noopdisable) { in priv_acct_setup() 89 } else if (test->t_test_func == priv_acct_disable || in priv_acct_setup() 90 test->t_test_func == priv_acct_rotate) { in priv_acct_setup() 100 priv_acct_cleanup(int asroot, int injail, struct test *test) in priv_acct_cleanup() argument 115 priv_acct_enable(int asroot, int injail, struct test *test) in priv_acct_enable() argument 121 expect("priv_acct_enable(root, jail)", error, -1, EPERM); in priv_acct_enable() 123 expect("priv_acct_enable(root, !jail)", error, 0, 0); in priv_acct_enable() 125 expect("priv_acct_enable(!root, jail)", error, -1, EPERM); in priv_acct_enable() [all …]
|
H A D | priv_vfs_chmod.c | 51 priv_vfs_chmod_froot_setup(int asroot, int injail, struct test *test) in priv_vfs_chmod_froot_setup() argument 61 priv_vfs_chmod_fowner_setup(int asroot, int injail, struct test *test) in priv_vfs_chmod_fowner_setup() argument 71 priv_vfs_chmod_fother_setup(int asroot, int injail, struct test *test) in priv_vfs_chmod_fother_setup() argument 81 priv_vfs_chmod_froot(int asroot, int injail, struct test *test) in priv_vfs_chmod_froot() argument 87 expect("priv_vfs_chmod_froot(asroot, injail)", error, 0, 0); in priv_vfs_chmod_froot() 89 expect("priv_vfs_chmod_froot(asroot, !injail)", error, 0, 0); in priv_vfs_chmod_froot() 91 expect("priv_vfs_chmod_froot(!asroot, injail)", error, -1, in priv_vfs_chmod_froot() 94 expect("priv_vfs_chmod_froot(!asroot, !injail)", error, -1, in priv_vfs_chmod_froot() 99 priv_vfs_chmod_fowner(int asroot, int injail, struct test *test) in priv_vfs_chmod_fowner() argument 105 expect("priv_vfs_chmod_fowner(asroot, injail)", error, 0, 0); in priv_vfs_chmod_fowner() [all …]
|
H A D | priv_vfs_chown.c | 59 priv_vfs_chown_uid_setup(int asroot, int injail, struct test *test) in priv_vfs_chown_uid_setup() argument 69 priv_vfs_chown_uid(int asroot, int injail, struct test *test) in priv_vfs_chown_uid() argument 75 expect("priv_vfs_chown_uid(root, jail)", error, 0, 0); in priv_vfs_chown_uid() 77 expect("priv_vfs_chown_uid(root, !jail)", error, 0, 0); in priv_vfs_chown_uid() 79 expect("priv_vfs_chown_uid(!root, jail)", error, -1, EPERM); in priv_vfs_chown_uid() 81 expect("priv_vfs_chown_uid(!root, !jail)", error, -1, EPERM); in priv_vfs_chown_uid() 89 priv_vfs_chown_mygid_setup(int asroot, int injail, struct test *test) in priv_vfs_chown_mygid_setup() argument 103 priv_vfs_chown_mygid(int asroot, int injail, struct test *test) in priv_vfs_chown_mygid() argument 109 expect("priv_vfs_chown_mygid(root, jail)", error, 0, 0); in priv_vfs_chown_mygid() 111 expect("priv_vfs_chown_mygid(root, !jail)", error, 0, 0); in priv_vfs_chown_mygid() [all …]
|
H A D | priv_netinet_ipsec.c | 54 struct test *test, int af) in priv_netinet_ipsec_policy_bypass_setup_af() argument 88 struct test *test) in priv_netinet_ipsec_policy4_bypass_setup() argument 91 return (priv_netinet_ipsec_policy_bypass_setup_af(asroot, injail, test, in priv_netinet_ipsec_policy4_bypass_setup() 98 struct test *test) in priv_netinet_ipsec_policy6_bypass_setup() argument 101 return (priv_netinet_ipsec_policy_bypass_setup_af(asroot, injail, test, in priv_netinet_ipsec_policy6_bypass_setup() 109 struct test *test, int af) in priv_netinet_ipsec_policy_entrust_setup_af() argument 143 struct test *test) in priv_netinet_ipsec_policy4_entrust_setup() argument 146 return (priv_netinet_ipsec_policy_entrust_setup_af(asroot, injail, test, in priv_netinet_ipsec_policy4_entrust_setup() 153 struct test *test) in priv_netinet_ipsec_policy6_entrust_setup() argument 156 return (priv_netinet_ipsec_policy_entrust_setup_af(asroot, injail, test, in priv_netinet_ipsec_policy6_entrust_setup() [all …]
|
H A D | priv_sched_setpriority.c | 56 priv_sched_setpriority_setup(int asroot, int injail, struct test *test) in priv_sched_setpriority_setup() argument 65 if (test->t_test_func == priv_sched_setpriority_aproc) { in priv_sched_setpriority_setup() 69 if (test->t_test_func == priv_sched_setpriority_myproc) in priv_sched_setpriority_setup() 94 priv_sched_setpriority_curproc(int asroot, int injail, struct test *test) in priv_sched_setpriority_curproc() argument 100 expect("priv_sched_setpriority_curproc(asroot, injail)", in priv_sched_setpriority_curproc() 103 expect("priv_sched_setpriority_curproc(asroot, !injail)", in priv_sched_setpriority_curproc() 106 expect("priv_sched_setpriority_curproc(!asroot, injail)", in priv_sched_setpriority_curproc() 109 expect("priv_sched_setpriority_curproc(!asroot, !injail)", in priv_sched_setpriority_curproc() 114 priv_sched_setpriority_myproc(int asroot, int injail, struct test *test) in priv_sched_setpriority_myproc() argument 120 expect("priv_sched_setpriority_myproc(asroot, injail)", in priv_sched_setpriority_myproc() [all …]
|
H A D | priv_proc_setrlimit.c | 55 priv_proc_setrlimit_setup(int asroot, int injail, struct test *test) in priv_proc_setrlimit_setup() argument 84 priv_proc_setrlimit_raisemax(int asroot, int injail, struct test *test) in priv_proc_setrlimit_raisemax() argument 93 expect("priv_proc_setrlimit_raisemax(asroot, injail)", error, in priv_proc_setrlimit_raisemax() 96 expect("priv_proc_setrlimit_raisemax(asroot, !injail)", in priv_proc_setrlimit_raisemax() 99 expect("priv_proc_setrlimit_raisemax(!asroot, injail)", in priv_proc_setrlimit_raisemax() 102 expect("priv_proc_setrlimit_raisemax(!asroot, !injail)", in priv_proc_setrlimit_raisemax() 112 struct test *test) in priv_proc_setrlimit_raisecur_nopriv() argument 121 expect("priv_proc_setrlimit_raiscur_nopriv(asroot, injail)", in priv_proc_setrlimit_raisecur_nopriv() 124 expect("priv_proc_setrlimit_raisecur_nopriv(asroot, !injail)", in priv_proc_setrlimit_raisecur_nopriv() 127 expect("priv_proc_setrlimit_raisecur_nopriv(!asroot, injail)", in priv_proc_setrlimit_raisecur_nopriv() [all …]
|
H A D | priv_vfs_setgid.c | 51 priv_vfs_setgid_fowner_setup(int asroot, int injail, struct test *test) in priv_vfs_setgid_fowner_setup() argument 61 priv_vfs_setgid_fother_setup(int asroot, int injail, struct test *test) in priv_vfs_setgid_fother_setup() argument 72 priv_vfs_setgid_fowner(int asroot, int injail, struct test *test) in priv_vfs_setgid_fowner() argument 78 expect("priv_vfs_setgid_fowner(asroot, injail)", error, 0, in priv_vfs_setgid_fowner() 81 expect("priv_vfs_setgid_fowner(asroot, !injail)", error, 0, in priv_vfs_setgid_fowner() 84 expect("priv_vfs_setgid_fowner(!asroot, injail)", error, 0, in priv_vfs_setgid_fowner() 87 expect("priv_vfs_setgid_fowner(!asroot, !injail)", error, 0, in priv_vfs_setgid_fowner() 92 priv_vfs_setgid_fother(int asroot, int injail, struct test *test) in priv_vfs_setgid_fother() argument 98 expect("priv_vfs_setgid_fother(asroot, injail)", error, 0, in priv_vfs_setgid_fother() 101 expect("priv_vfs_setgid_fother(asroot, !injail)", error, 0, in priv_vfs_setgid_fother() [all …]
|
H A D | priv_audit_getaudit.c | 45 priv_audit_getaudit_setup(int asroot, int injail, struct test *test) in priv_audit_getaudit_setup() argument 56 priv_audit_getaudit(int asroot, int injail, struct test *test) in priv_audit_getaudit() argument 63 expect("priv_audit_getaudit(asroot, injail)", error, -1, in priv_audit_getaudit() 66 expect("priv_audit_getaudit(asroot, !injail)", error, 0, 0); in priv_audit_getaudit() 68 expect("priv_audit_getaudit(!asroot, injail)", error, -1, in priv_audit_getaudit() 71 expect("priv_audit_getaudit(!asroot, !injail)", error, -1, in priv_audit_getaudit() 76 priv_audit_getaudit_addr(int asroot, int injail, struct test *test) in priv_audit_getaudit_addr() argument 83 expect("priv_audit_getaudit_addr(asroot, injail)", error, -1, in priv_audit_getaudit_addr() 86 expect("priv_audit_getaudit_addr(asroot, !injail)", error, 0, in priv_audit_getaudit_addr() 89 expect("priv_audit_getaudit_addr(!asroot, injail)", error, in priv_audit_getaudit_addr() [all …]
|
H A D | priv_audit_setaudit.c | 49 priv_audit_setaudit_setup(int asroot, int injail, struct test *test) in priv_audit_setaudit_setup() argument 65 priv_audit_setaudit(int asroot, int injail, struct test *test) in priv_audit_setaudit() argument 71 expect("priv_audit_setaudit(asroot, injail)", error, -1, in priv_audit_setaudit() 74 expect("priv_audit_setaudit(asroot, !injail)", error, 0, 0); in priv_audit_setaudit() 76 expect("priv_audit_setaudit(!asroot, injail)", error, -1, in priv_audit_setaudit() 79 expect("priv_audit_setaudit(!asroot, !injail)", error, -1, in priv_audit_setaudit() 84 priv_audit_setaudit_addr(int asroot, int injail, struct test *test) in priv_audit_setaudit_addr() argument 90 expect("priv_audit_setaudit_addr(asroot, injail)", error, -1, in priv_audit_setaudit_addr() 93 expect("priv_audit_setaudit_addr(asroot, !injail)", error, 0, in priv_audit_setaudit_addr() 96 expect("priv_audit_setaudit_addr(!asroot, injail)", error, in priv_audit_setaudit_addr() [all …]
|
H A D | priv_msgbuf.c | 54 priv_msgbuf_privonly_setup(int asroot, int injail, struct test *test) in priv_msgbuf_privonly_setup() argument 79 priv_msgbuf_privonly(int asroot, int injail, struct test *test) in priv_msgbuf_privonly() argument 86 expect("priv_msgbuf_privonly(asroot, injail)", error, -1, in priv_msgbuf_privonly() 89 expect("priv_msgbuf_privonly(asroot, !injail)", error, 0, 0); in priv_msgbuf_privonly() 91 expect("priv_msgbuf_privonly(!asroot, injail)", error, -1, in priv_msgbuf_privonly() 94 expect("priv_msgbuf_privonly(!asroot, !injail)", error, -1, in priv_msgbuf_privonly() 99 priv_msgbuf_unprivok_setup(int asroot, int injail, struct test *test) in priv_msgbuf_unprivok_setup() argument 124 priv_msgbuf_unprivok(int asroot, int injail, struct test *test) in priv_msgbuf_unprivok() argument 131 expect("priv_msgbuf_unprivok(asroot, injail)", error, 0, 0); in priv_msgbuf_unprivok() 133 expect("priv_msgbuf_unprivok(asroot, !injail)", error, 0, 0); in priv_msgbuf_unprivok() [all …]
|
H A D | priv_sysctl_write.c | 57 priv_sysctl_write_setup(int asroot, int injail, struct test *test) in priv_sysctl_write_setup() argument 84 priv_sysctl_write(int asroot, int injail, struct test *test) in priv_sysctl_write() argument 91 expect("priv_sysctl_write(asroot, injail)", error, -1, in priv_sysctl_write() 94 expect("priv_sysctl_write(asroot, !injail)", error, 0, 0); in priv_sysctl_write() 96 expect("priv_sysctl_write(!asroot, injail)", error, -1, in priv_sysctl_write() 99 expect("priv_sysctl_write(!asroot, !injail)", error, -1, in priv_sysctl_write() 104 priv_sysctl_writejail(int asroot, int injail, struct test *test) in priv_sysctl_writejail() argument 111 expect("priv_sysctl_writejail(asroot, injail)", error, 0, 0); in priv_sysctl_writejail() 113 expect("priv_sysctl_writejail(asroot, !injail)", error, 0, 0); in priv_sysctl_writejail() 115 expect("priv_sysctl_writejail(!asroot, injail)", error, -1, in priv_sysctl_writejail() [all …]
|
H A D | priv_vfs_chroot.c | 45 priv_vfs_chroot_setup(int asroot, int injail, struct test *test) in priv_vfs_chroot_setup() argument 52 priv_vfs_chroot(int asroot, int injail, struct test *test) in priv_vfs_chroot() argument 58 expect("priv_vfs_chroot(asroot, injail)", error, 0, 0); in priv_vfs_chroot() 60 expect("priv_vfs_chroot(asroot, !injail)", error, 0, 0); in priv_vfs_chroot() 62 expect("priv_vfs_chroot(!asroot, injail)", error, -1, EPERM); in priv_vfs_chroot() 64 expect("priv_vfs_chroot(!asroot, !injail)", error, -1, EPERM); in priv_vfs_chroot() 68 priv_vfs_chroot_cleanup(int asroot, int injail, struct test *test) in priv_vfs_chroot_cleanup() argument
|
H A D | priv_vm_madv_protect.c | 45 priv_vm_madv_protect_setup(int asroot, int injail, struct test *test) in priv_vm_madv_protect_setup() argument 52 priv_vm_madv_protect(int asroot, int injail, struct test *test) in priv_vm_madv_protect() argument 58 expect("priv_vm_madv_protect(asroot, injail)", error, -1, in priv_vm_madv_protect() 61 expect("priv_vm_madv_protect(asroot, !injail", error, 0, 0); in priv_vm_madv_protect() 63 expect("priv_vm_madv_protect(!asroot, injail", error, -1, in priv_vm_madv_protect() 66 expect("priv_vm_madv_protect(!asroot, !injail", error, -1, in priv_vm_madv_protect() 71 priv_vm_madv_protect_cleanup(int asroot, int injail, struct test *test) in priv_vm_madv_protect_cleanup() argument
|
H A D | priv_vm_mlock.c | 45 priv_vm_mlock_setup(int asroot, int injail, struct test *test) in priv_vm_mlock_setup() argument 52 priv_vm_mlock(int asroot, int injail, struct test *test) in priv_vm_mlock() argument 58 expect("priv_vm_mlock(asroot, injail)", error, -1, EPERM); in priv_vm_mlock() 60 expect("priv_vm_mlock(asroot, !injail", error, 0, 0); in priv_vm_mlock() 62 expect("priv_vm_mlock(!asroot, injail", error, -1, EPERM); in priv_vm_mlock() 64 expect("priv_vm_mlock(!asroot, !injail", error, -1, EPERM); in priv_vm_mlock() 68 priv_vm_mlock_cleanup(int asroot, int injail, struct test *test) in priv_vm_mlock_cleanup() argument
|
H A D | priv_vm_munlock.c | 45 priv_vm_munlock_setup(int asroot, int injail, struct test *test) in priv_vm_munlock_setup() argument 52 priv_vm_munlock(int asroot, int injail, struct test *test) in priv_vm_munlock() argument 58 expect("priv_vm_munlock(asroot, injail)", error, -1, EPERM); in priv_vm_munlock() 60 expect("priv_vm_munlock(asroot, !injail", error, 0, 0); in priv_vm_munlock() 62 expect("priv_vm_munlock(!asroot, injail", error, -1, EPERM); in priv_vm_munlock() 64 expect("priv_vm_munlock(!asroot, !injail", error, -1, EPERM); in priv_vm_munlock() 69 priv_vm_munlock_cleanup(int asroot, int injail, struct test *test) in priv_vm_munlock_cleanup() argument
|
H A D | priv_audit_control.c | 49 priv_audit_control_setup(int asroot, int injail, struct test *test) in priv_audit_control_setup() argument 60 priv_audit_control(int asroot, int injail, struct test *test) in priv_audit_control() argument 67 expect("priv_audit_control(asroot, injail)", error, -1, in priv_audit_control() 70 expect("priv_audit_control(asroot, !injail)", error, 0, 0); in priv_audit_control() 72 expect("priv_audit_control(!asroot, injail)", error, -1, in priv_audit_control() 75 expect("priv_audit_control(!asroot, !injail)", error, -1, in priv_audit_control() 80 priv_audit_control_cleanup(int asroot, int injail, struct test *test) in priv_audit_control_cleanup() argument
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_gendhparam.t | 21 expect => [ 'BEGIN X9.42 DH PARAMETERS', 'gindex:', 'pcounter:', 'SEED:' ], 27 expect => [ 'ERROR' ], 33 expect => [ 'BEGIN X9.42 DH PARAMETERS', 'gindex:', 'pcounter:', 'SEED:' ], 39 expect => [ 'BEGIN X9.42 DH PARAMETERS', 'h:', 'pcounter:', 'SEED:' ], 46 expect => [ "BEGIN X9.42 DH PARAMETERS" ], 52 expect => [ "ERROR" ], 57 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 63 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 69 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:' ], 76 expect => [ 'BEGIN DH PARAMETERS', 'GROUP:'], [all …]
|
/freebsd/tools/regression/netinet/ipdivert/ |
H A D | ipdivert.c | 50 ok(const char *test) in ok() argument 53 fprintf(stderr, "%s: OK\n", test); in ok() 57 fail(const char *test, const char *note) in fail() argument 60 fprintf(stderr, "%s - %s: FAIL (%s)\n", test, note, strerror(errno)); in fail() 65 failx(const char *test, const char *note) in failx() argument 68 fprintf(stderr, "%s - %s: FAIL\n", test, note); in failx() 73 ipdivert_create(const char *test) in ipdivert_create() argument 79 fail(test, "socket"); in ipdivert_create() 84 ipdivert_close(const char *test, int s) in ipdivert_close() argument 88 fail(test, "close"); in ipdivert_close() [all …]
|