Home
last modified time | relevance | path

Searched +full:enable +full:- +full:integration +full:- +full:tests (Results 1 – 25 of 310) sorted by relevance

12345678910>>...13

/external/tpm2-tss/
DREADME.md1 …x Build Status](https://travis-ci.org/tpm2-software/tpm2-tss.svg?branch=master)](https://travis-ci…
2 …projects/status/2rdmyn1ndkiavngn?svg=true)](https://ci.appveyor.com/project/tpm2-software/tpm2-tss)
3 …tus](https://api.cirrus-ci.com/github/tpm2-software/tpm2-tss.svg?branch=master)](https://cirrus-ci…
4 … Scan](https://img.shields.io/coverity/scan/3997.svg)](https://scan.coverity.com/projects/tpm2-tss)
5 …us](https://codecov.io/gh/tpm2-software/tpm2-tss/branch/master/graph/badge.svg)](https://codecov.i…
7 …shields.io/lgtm/alerts/g/tpm2-software/tpm2-tss.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/proj…
8 …elds.io/lgtm/grade/cpp/g/tpm2-software/tpm2-tss.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/proj…
9 …mentation Status](https://readthedocs.org/projects/tpm2-tss/badge/?version=latest)](https://tpm2-t…
10 …//oss-fuzz-build-logs.storage.googleapis.com/badges/tpm2-tss.svg)](https://bugs.chromium.org/p/oss
11 …es.gitter.im/tpm2-software/community.svg)](https://gitter.im/tpm2-software/community?utm_source=ba…
[all …]
Dconfigure.ac1 # SPDX-License-Identifier: BSD-2-Clause
2 # Copyright (c) 2015 - 2020 Intel Corporation
3 # Copyright (c) 2018 - 2020 Fraunhofer SIT sponsored by Infineon Technologies AG
6 AC_INIT([tpm2-tss],
8 [https://github.com/tpm2-software/tpm2-tss/issues],
10 [https://github.com/tpm2-software/tpm2-tss])
13 subdir-objects])
14 m4_ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])]) #Backward compatible setting of "silent-rules"
18 …le lib/tss2-sys.pc lib/tss2-esys.pc lib/tss2-mu.pc lib/tss2-tcti-device.pc lib/tss2-tcti-mssim.pc …
25 AX_IS_RELEASE(dash-version)
[all …]
/external/tpm2-tss/.ci/
Ddocker.run2 # SPDX-License-Identifier: BSD-3-Clause
4 set -e
6 source $TRAVIS_BUILD_DIR/.ci/docker-prelude.sh
10 if [ -d build ]; then
11 rm -rf build
14 if [ -d ./build-no-tests ]; then
15 rm -rf build-no-tests
18 # Do not run tests when building on coverity_scan branch
20 echo "Coverity scan branch detected, not running build nor tests...exiting!"
24 if [ -z "$WITH_CRYPTO" ]; then
[all …]
/external/sdk-platform-java/showcase/
DREADME.md1 # Showcase Integration Testing
3 [GAPIC Showcase](https://github.com/googleapis/gapic-showcase) is an API that demonstrates Generated
5 design guide](https://cloud.google.com/apis/design/). `gapic-generator-java` generates a client for
6 the Showcase API which can communicate with a local Showcase server to perform integration tests.
20 $ go install github.com/googleapis/gapic-showcase/cmd/gapic-showcase@v"$GAPIC_SHOWCASE_VERSION"
22 $ gapic-showcase --help
23 > Root command of gapic-showcase
26 > gapic-showcase [command]
29 > completion Emits bash a completion for gapic-showcase
36 > sequence Sub-command for Service: Sequence
[all …]
/external/crosvm/tools/
Drun_tests3 # Use of this source code is governed by a BSD-style license that can be
45 Utility structure to join user-provided filter expressions with additional filters
47 See https://nexte.st/book/filter-expressions.html
69 yield "--filter-expr"
79 "--workspace",
80 "--no-default-features" if no_default_features else None,
81 f"--features={features}" if features else None,
98 console.print("Transfering integration tests package...")
119 console.print("Running tests that require root privileges. Refreshing sudo now.")
122 for device in ["/dev/kvm", "/dev/vhost-vsock"]:
[all …]
/external/crosvm/docs/book/src/building_crosvm/
Dlinux.md4 see [Integration](../integration/index.md)
19 git submodule update --init
22 It is recommended to enable automatic recursive operations to keep the submodules in sync with the
34 ./tools/install-deps
38 [Using the development container](#using-the-development-container).
43 [Podman](https://podman.io/getting-started/installation) or
44 [Docker](https://docs.docker.com/get-docker/) installed, it can be started with:
60 you wish to start fresh, use the `--clean` flag.
67 If you want to enable [additional features](../running_crosvm/features.md), use the `--features`
68 flag. (e.g. `cargo build --features=gdb`)
[all …]
/external/libwebm/
DREADME.libwebm21 To control what types of projects are generated the -G parameter is added to
23 generator. Running cmake with the --help argument will list the available
28 $ cmake path/to/libwebm -G Xcode
33 $ cmake path/to/libwebm -G "Visual Studio 12"
35 To generate 64-bit Windows Visual Studio 2013 projects:
51 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=release
54 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=relwithdebinfo
57 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=debug
60 Tests
62 To enable libwebm tests add -DENABLE_TESTS=ON CMake generation command line. For
[all …]
/external/sdk-platform-java/.github/workflows/
Dci.yaml4 - main
11 runs-on: ubuntu-22.04
16 - uses: actions/checkout@v3
17 - uses: actions/setup-java@v3
19 java-version: ${{ matrix.java }}
22 - run: java -version
23 - name: Unit Tests
25 mvn test --batch-mode --no-transfer-progress -Dcheckstyle.skip \
26 -Dfmt.skip -DenableTestCoverage
27 - run: bazelisk version
[all …]
/external/crosvm/swap/src/
Dlib.rs2 // Use of this source code is governed by a BSD-style license that can be
5 //! crate for the vmm-swap feature.
10 if #[cfg(all(unix, feature = "enable"))] {
16 // this is public only for integration tests.
21 // this is public only for integration tests.
23 // this is public only for integration tests.
36 /// Current state of vmm-swap.
43 /// vmm-swap is ready. userfaultfd is disabled until vmm-swap is enabled.
51 /// swap-out is in progress.
55 /// swap-in is in progress.
[all …]
/external/tpm2-tss/doc/
Dfuzzing.md3 Fuzz tests use [libFuzzer](http://llvm.org/docs/LibFuzzer.html) to test the SAPI
6 Building fuzz tests can be enabled using the `--with-fuzzing=` option. For which
9 - [libfuzzer](#libfuzzer)
10 - [ossfuzz](#oss-fuzz)
14 libFuzzer tests can be built natively or using the docker `fuzzing` target.
18 Build the fuzz tests by setting `--with-fuzzing=libfuzzer` and statically
28 --enable-debug \
29 --with-fuzzing=libfuzzer \
30 --enable-tcti-fuzzing \
31 --enable-tcti-device=no \
[all …]
/external/jazzer-api/docs/
Djunit-integration.md1 # JUnit Integration Implementation
3 Jazzer's JUnit integration starts from
5 annotation's javadoc, our integration runs in one of two modes: fuzzing and regression. Fuzzing mod…
6 inputs to feed into the tests to find new issues and regression mode will run the tests against pre…
7 fuzzing is done. The main entrypoints for the actual integration code are found in two of the annot…
12 non-empty value) and in regression mode (when `JAZZER_FUZZ` is not set) separately.
21 be run due to global state in libfuzzer that would mean multiple tests would interfere with each ot…
47 libfuzzer are saved in `.cifuzz-corpus`.
55 This checks if the given test should be run at all. In regression mode, all tests are run so this w…
64 3. If a `.cifuzz-corpus` directory exists, relevant entries from that are added as well
[all …]
/external/skia/modules/pathkit/
Dkarma.conf.js1 const isDocker = require('is-docker')();
8 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter
14 { pattern: 'tests/*.json', included:false, served:true},
15 'tests/testReporter.js',
17 'tests/pathkitinit.js',
18 'tests/*.spec.js'
27 // available reporters: https://npmjs.org/browse/keyword/karma-reporter
33 // enable / disable colors in the output (reporters and logs)
40 // enable / disable watching file and executing tests whenever any file changes
49 // Continuous Integration mode
[all …]
Dkarma.bench.conf.js1 const isDocker = require('is-docker')();
8 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter
13 { pattern: 'npm-wasm/bin/pathkit.wasm', included:false, served:true},
15 'npm-wasm/bin/pathkit.js',
16 'tests/pathkitinit.js',
21 '/pathkit/': '/base/npm-wasm/bin/'
26 // available reporters: https://npmjs.org/browse/keyword/karma-reporter
32 // enable / disable colors in the output (reporters and logs)
39 // enable / disable watching file and executing tests whenever any file changes
48 // Continuous Integration mode
[all …]
/external/skia/modules/canvaskit/
Dkarma.conf.js1 // This is the legacy (non-Bazel) test setup.
2 const isDocker = require('is-docker')();
9 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter
15 { pattern: 'tests/assets/*', included:false, served:true},
17 'tests/legacy_init.js',
18 'tests/util.js',
19 'tests/legacy_test_reporter.js',
20 'tests/*_test.js'
24 '/assets/': '/base/tests/assets/',
30 // available reporters: https://npmjs.org/browse/keyword/karma-reporter
[all …]
/external/sdk-platform-java/gapic-generator-java/
DDEVELOPMENT.md5 ### Unit Tests
7 To run the unit tests in `gapic-generator-java` submodule, first build all
8 modules with `mvn -pl '!gapic-generator-java' install -DskipTests` at the root
10 then `cd` into `gapic-generator-java` submodule for the following commands:
12 - Run all unit tests:
15 # In gapic-generator-java submodule
19 - Run a single or multiple unit tests:
22 # In gapic-generator-java submodule
23 mvn test -Dtest=JavaCodeGeneratorTest
25 …mvn test "-Dtest=Basic*, !%regex[.*.Unstable.*], !%regex[.*.MyTest.class#one.*|two.*], %regex[#fas…
[all …]
/external/tensorflow/tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu/
Dbuild_tf_windows.sh8 # http://www.apache.org/licenses/LICENSE-2.0
22 # - JDK8, and JAVA_HOME set.
23 # - Microsoft Visual Studio 2015 Community Edition
24 # - Msys2
25 # - Anaconda3
29 set -x
30 set -e
32 # This script is under <repo_root>/tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu/
35 cd ${script_dir%%tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu}.
47 rm -f "${TMP_BAZELRC}"
[all …]
/external/cronet/build/rust/tests/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
10 group("tests") {
38 # TODO(https://crbug.com/1329611): Enable the additional target below
54 # This tests integration with a 3p library that downstream projects
70 # TODO(https://crbug.com/1329611): Enable the additional target below
88 # are incompatible with shared library compilation in non-component builds
113 # Generates a script that will run all the native Rust unit tests, in order
/external/mbedtls/
DCONTRIBUTING.md7 -----------------------------------
10 - [Sign-off](#license-and-copyright): all commits must be signed off.
11 - [Tests](#tests): please ensure the PR includes adequate tests.
12 - [Changelog](#documentation): if needed, please provide a changelog entry.
13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t…
16 ----------------
17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati…
18 - The code should be written in a clean and readable style, and must follow [our coding standards](…
19 - The code should be written in a portable generic way, that will benefit the whole community, and …
20 - The code should be secure, and will be reviewed from a security point of view as well.
[all …]
/external/openthread/third_party/mbedtls/repo/
DCONTRIBUTING.md7 -----------------------------------
10 - [Sign-off](#license-and-copyright): all commits must be signed off.
11 - [Tests](#tests): please ensure the PR includes adequate tests.
12 - [Changelog](#documentation): if needed, please provide a changelog entry.
13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t…
16 ----------------
17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati…
18 - The code should be written in a clean and readable style, and must follow [our coding standards](…
19 - The code should be written in a portable generic way, that will benefit the whole community, and …
20 - The code should be secure, and will be reviewed from a security point of view as well.
[all …]
/external/angle/build/rust/tests/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
10 group("tests") {
26 "//build/rust/tests/bindgen_static_fns_test",
27 "//build/rust/tests/bindgen_test",
28 "//build/rust/tests/test_aliased_deps",
29 "//build/rust/tests/test_aliased_deps:test_aliased_deps_exe",
30 "//build/rust/tests/test_bin_crate",
31 "//build/rust/tests/test_rlib_crate:target1",
32 "//build/rust/tests/test_rlib_crate:target2",
33 "//build/rust/tests/test_rlib_crate:test_rlib_crate_associated_bin",
[all …]
/external/deqp-deps/amber/
DREADME.md3 Amber is a multi-API shader test framework.
16 * Shaders can be expressed in binary form (as hex), in SPIR-V assembly, or in a
26 ## Writing Amber Tests
28 see in the [tests/cases](tests/cases) folder.
103 ./tools/git-sync-deps
104 mkdir -p out/Debug
106 cmake -GNinja ../..
114 `-DAMBER_ENABLE_SHARED_CRT`.
123 `tools/build-amber-sample.sh`.
130 * Run `./tools/build-amber-sample.sh [build output directory path]`.
[all …]
/external/pigweed/pw_fuzzer/
Ddocs.rst1 .. _module-pw_fuzzer:
6 .. pigweed-module::
13 .. code-block:: cpp
18 ----------
20 ----------
21 You've written some code. You've written unit tests for that code. The unit
22 tests pass. But could there be bugs in inputs or code paths the unit tests do
25 However, fuzzing requires some complex interactions between compiler-added
30 See :ref:`module-pw_fuzzer-concepts` to learn more about the different
31 components of a fuzzer and how they work together to discover hard-to-find bugs.
[all …]
/external/google-cloud-java/
DCONTRIBUTING.md10 Here are some guidelines for hacking on google-cloud-java.
13 --------------------
14 * `google-cloud-java` (`/pom.xml`)
17 * `google-cloud-pom-parent`
18 * Serves as the parent POM for the `gapic-libraries-bom` and module mini BOMs.
20 * `google-cloud-jar-parent`
22 * The only POM where non-annotated versions should be managed using `dependencyManagement`.
26 * `gapic-libraries-bom`
27 * A BOM for all non-preview libraries in the monorepo.
28 * `java-*`
[all …]
/external/cronet/third_party/icu/source/data/
Dcldr-icu-readme.txt3 # Copyright (C) 2010-2014, International Business Machines Corporation and others.
10 # - CLDR (the source of most of the data, and some Java tools)
11 # - The complete ICU source tree, including:
12 # tools - includes the LdmlConverter build tool and associated config files
13 # icu4c - the target for converted CLDR data, and source for ICU4J data;
14 # includes tests for the converted data
15 # icu4j - the target for updated data jars; includes tests for the converted
18 # For an official CLDR data integration into ICU, these should be clean, freshly
19 # checked-out. For released CLDR sources, an alternative to checking out sources
30 # plus the xml-apis.jar from the Apache xalan package
[all …]
/external/oss-fuzz/infra/cifuzz/
Daffected_fuzz_targets_test.py7 # http://www.apache.org/licenses/LICENSE-2.0
14 """Tests for affected_fuzz_targets.py"""
28 # pylint: disable=protected-access
30 # NOTE: This integration test relies on
31 # https://github.com/google/oss-fuzz/tree/master/projects/example project.
37 'test_data', 'build-out')
41 """Tests remove_unaffected_fuzzers."""
48 # Tests a specific affected fuzzers is kept.
51 # Tests specific affected fuzzer is kept.
54 # Tests all fuzzers are kept if none are deemed affected.
[all …]

12345678910>>...13