Searched +full:enable +full:- +full:integration +full:- +full:tests (Results 1 – 25 of 310) sorted by relevance
12345678910>>...13
| /external/tpm2-tss/ |
| D | README.md | 1 …x Build Status](https://travis-ci.org/tpm2-software/tpm2-tss.svg?branch=master)](https://travis-ci… 2 …projects/status/2rdmyn1ndkiavngn?svg=true)](https://ci.appveyor.com/project/tpm2-software/tpm2-tss) 3 …tus](https://api.cirrus-ci.com/github/tpm2-software/tpm2-tss.svg?branch=master)](https://cirrus-ci… 4 … Scan](https://img.shields.io/coverity/scan/3997.svg)](https://scan.coverity.com/projects/tpm2-tss) 5 …us](https://codecov.io/gh/tpm2-software/tpm2-tss/branch/master/graph/badge.svg)](https://codecov.i… 7 …shields.io/lgtm/alerts/g/tpm2-software/tpm2-tss.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/proj… 8 …elds.io/lgtm/grade/cpp/g/tpm2-software/tpm2-tss.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/proj… 9 …mentation Status](https://readthedocs.org/projects/tpm2-tss/badge/?version=latest)](https://tpm2-t… 10 …//oss-fuzz-build-logs.storage.googleapis.com/badges/tpm2-tss.svg)](https://bugs.chromium.org/p/oss… 11 …es.gitter.im/tpm2-software/community.svg)](https://gitter.im/tpm2-software/community?utm_source=ba… [all …]
|
| D | configure.ac | 1 # SPDX-License-Identifier: BSD-2-Clause 2 # Copyright (c) 2015 - 2020 Intel Corporation 3 # Copyright (c) 2018 - 2020 Fraunhofer SIT sponsored by Infineon Technologies AG 6 AC_INIT([tpm2-tss], 8 [https://github.com/tpm2-software/tpm2-tss/issues], 10 [https://github.com/tpm2-software/tpm2-tss]) 13 subdir-objects]) 14 m4_ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])]) #Backward compatible setting of "silent-rules" 18 …le lib/tss2-sys.pc lib/tss2-esys.pc lib/tss2-mu.pc lib/tss2-tcti-device.pc lib/tss2-tcti-mssim.pc … 25 AX_IS_RELEASE(dash-version) [all …]
|
| /external/tpm2-tss/.ci/ |
| D | docker.run | 2 # SPDX-License-Identifier: BSD-3-Clause 4 set -e 6 source $TRAVIS_BUILD_DIR/.ci/docker-prelude.sh 10 if [ -d build ]; then 11 rm -rf build 14 if [ -d ./build-no-tests ]; then 15 rm -rf build-no-tests 18 # Do not run tests when building on coverity_scan branch 20 echo "Coverity scan branch detected, not running build nor tests...exiting!" 24 if [ -z "$WITH_CRYPTO" ]; then [all …]
|
| /external/sdk-platform-java/showcase/ |
| D | README.md | 1 # Showcase Integration Testing 3 [GAPIC Showcase](https://github.com/googleapis/gapic-showcase) is an API that demonstrates Generated 5 design guide](https://cloud.google.com/apis/design/). `gapic-generator-java` generates a client for 6 the Showcase API which can communicate with a local Showcase server to perform integration tests. 20 $ go install github.com/googleapis/gapic-showcase/cmd/gapic-showcase@v"$GAPIC_SHOWCASE_VERSION" 22 $ gapic-showcase --help 23 > Root command of gapic-showcase 26 > gapic-showcase [command] 29 > completion Emits bash a completion for gapic-showcase 36 > sequence Sub-command for Service: Sequence [all …]
|
| /external/crosvm/tools/ |
| D | run_tests | 3 # Use of this source code is governed by a BSD-style license that can be 45 Utility structure to join user-provided filter expressions with additional filters 47 See https://nexte.st/book/filter-expressions.html 69 yield "--filter-expr" 79 "--workspace", 80 "--no-default-features" if no_default_features else None, 81 f"--features={features}" if features else None, 98 console.print("Transfering integration tests package...") 119 console.print("Running tests that require root privileges. Refreshing sudo now.") 122 for device in ["/dev/kvm", "/dev/vhost-vsock"]: [all …]
|
| /external/crosvm/docs/book/src/building_crosvm/ |
| D | linux.md | 4 see [Integration](../integration/index.md) 19 git submodule update --init 22 It is recommended to enable automatic recursive operations to keep the submodules in sync with the 34 ./tools/install-deps 38 [Using the development container](#using-the-development-container). 43 [Podman](https://podman.io/getting-started/installation) or 44 [Docker](https://docs.docker.com/get-docker/) installed, it can be started with: 60 you wish to start fresh, use the `--clean` flag. 67 If you want to enable [additional features](../running_crosvm/features.md), use the `--features` 68 flag. (e.g. `cargo build --features=gdb`) [all …]
|
| /external/libwebm/ |
| D | README.libwebm | 21 To control what types of projects are generated the -G parameter is added to 23 generator. Running cmake with the --help argument will list the available 28 $ cmake path/to/libwebm -G Xcode 33 $ cmake path/to/libwebm -G "Visual Studio 12" 35 To generate 64-bit Windows Visual Studio 2013 projects: 51 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=release 54 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=relwithdebinfo 57 $ cmake path/to/libwebm -DCMAKE_BUILD_TYPE=debug 60 Tests 62 To enable libwebm tests add -DENABLE_TESTS=ON CMake generation command line. For [all …]
|
| /external/sdk-platform-java/.github/workflows/ |
| D | ci.yaml | 4 - main 11 runs-on: ubuntu-22.04 16 - uses: actions/checkout@v3 17 - uses: actions/setup-java@v3 19 java-version: ${{ matrix.java }} 22 - run: java -version 23 - name: Unit Tests 25 mvn test --batch-mode --no-transfer-progress -Dcheckstyle.skip \ 26 -Dfmt.skip -DenableTestCoverage 27 - run: bazelisk version [all …]
|
| /external/crosvm/swap/src/ |
| D | lib.rs | 2 // Use of this source code is governed by a BSD-style license that can be 5 //! crate for the vmm-swap feature. 10 if #[cfg(all(unix, feature = "enable"))] { 16 // this is public only for integration tests. 21 // this is public only for integration tests. 23 // this is public only for integration tests. 36 /// Current state of vmm-swap. 43 /// vmm-swap is ready. userfaultfd is disabled until vmm-swap is enabled. 51 /// swap-out is in progress. 55 /// swap-in is in progress. [all …]
|
| /external/tpm2-tss/doc/ |
| D | fuzzing.md | 3 Fuzz tests use [libFuzzer](http://llvm.org/docs/LibFuzzer.html) to test the SAPI 6 Building fuzz tests can be enabled using the `--with-fuzzing=` option. For which 9 - [libfuzzer](#libfuzzer) 10 - [ossfuzz](#oss-fuzz) 14 libFuzzer tests can be built natively or using the docker `fuzzing` target. 18 Build the fuzz tests by setting `--with-fuzzing=libfuzzer` and statically 28 --enable-debug \ 29 --with-fuzzing=libfuzzer \ 30 --enable-tcti-fuzzing \ 31 --enable-tcti-device=no \ [all …]
|
| /external/jazzer-api/docs/ |
| D | junit-integration.md | 1 # JUnit Integration Implementation 3 Jazzer's JUnit integration starts from 5 annotation's javadoc, our integration runs in one of two modes: fuzzing and regression. Fuzzing mod… 6 inputs to feed into the tests to find new issues and regression mode will run the tests against pre… 7 fuzzing is done. The main entrypoints for the actual integration code are found in two of the annot… 12 non-empty value) and in regression mode (when `JAZZER_FUZZ` is not set) separately. 21 be run due to global state in libfuzzer that would mean multiple tests would interfere with each ot… 47 libfuzzer are saved in `.cifuzz-corpus`. 55 This checks if the given test should be run at all. In regression mode, all tests are run so this w… 64 3. If a `.cifuzz-corpus` directory exists, relevant entries from that are added as well [all …]
|
| /external/skia/modules/pathkit/ |
| D | karma.conf.js | 1 const isDocker = require('is-docker')(); 8 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter 14 { pattern: 'tests/*.json', included:false, served:true}, 15 'tests/testReporter.js', 17 'tests/pathkitinit.js', 18 'tests/*.spec.js' 27 // available reporters: https://npmjs.org/browse/keyword/karma-reporter 33 // enable / disable colors in the output (reporters and logs) 40 // enable / disable watching file and executing tests whenever any file changes 49 // Continuous Integration mode [all …]
|
| D | karma.bench.conf.js | 1 const isDocker = require('is-docker')(); 8 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter 13 { pattern: 'npm-wasm/bin/pathkit.wasm', included:false, served:true}, 15 'npm-wasm/bin/pathkit.js', 16 'tests/pathkitinit.js', 21 '/pathkit/': '/base/npm-wasm/bin/' 26 // available reporters: https://npmjs.org/browse/keyword/karma-reporter 32 // enable / disable colors in the output (reporters and logs) 39 // enable / disable watching file and executing tests whenever any file changes 48 // Continuous Integration mode [all …]
|
| /external/skia/modules/canvaskit/ |
| D | karma.conf.js | 1 // This is the legacy (non-Bazel) test setup. 2 const isDocker = require('is-docker')(); 9 // available frameworks: https://npmjs.org/browse/keyword/karma-adapter 15 { pattern: 'tests/assets/*', included:false, served:true}, 17 'tests/legacy_init.js', 18 'tests/util.js', 19 'tests/legacy_test_reporter.js', 20 'tests/*_test.js' 24 '/assets/': '/base/tests/assets/', 30 // available reporters: https://npmjs.org/browse/keyword/karma-reporter [all …]
|
| /external/sdk-platform-java/gapic-generator-java/ |
| D | DEVELOPMENT.md | 5 ### Unit Tests 7 To run the unit tests in `gapic-generator-java` submodule, first build all 8 modules with `mvn -pl '!gapic-generator-java' install -DskipTests` at the root 10 then `cd` into `gapic-generator-java` submodule for the following commands: 12 - Run all unit tests: 15 # In gapic-generator-java submodule 19 - Run a single or multiple unit tests: 22 # In gapic-generator-java submodule 23 mvn test -Dtest=JavaCodeGeneratorTest 25 …mvn test "-Dtest=Basic*, !%regex[.*.Unstable.*], !%regex[.*.MyTest.class#one.*|two.*], %regex[#fas… [all …]
|
| /external/tensorflow/tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu/ |
| D | build_tf_windows.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 22 # - JDK8, and JAVA_HOME set. 23 # - Microsoft Visual Studio 2015 Community Edition 24 # - Msys2 25 # - Anaconda3 29 set -x 30 set -e 32 # This script is under <repo_root>/tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu/ 35 cd ${script_dir%%tensorflow/tools/ci_build/windows/integration/gpu_pip_on_cpu}. 47 rm -f "${TMP_BAZELRC}" [all …]
|
| /external/cronet/build/rust/tests/ |
| D | BUILD.gn | 2 # Use of this source code is governed by a BSD-style license that can be 10 group("tests") { 38 # TODO(https://crbug.com/1329611): Enable the additional target below 54 # This tests integration with a 3p library that downstream projects 70 # TODO(https://crbug.com/1329611): Enable the additional target below 88 # are incompatible with shared library compilation in non-component builds 113 # Generates a script that will run all the native Rust unit tests, in order
|
| /external/mbedtls/ |
| D | CONTRIBUTING.md | 7 ----------------------------------- 10 - [Sign-off](#license-and-copyright): all commits must be signed off. 11 - [Tests](#tests): please ensure the PR includes adequate tests. 12 - [Changelog](#documentation): if needed, please provide a changelog entry. 13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t… 16 ---------------- 17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati… 18 - The code should be written in a clean and readable style, and must follow [our coding standards](… 19 - The code should be written in a portable generic way, that will benefit the whole community, and … 20 - The code should be secure, and will be reviewed from a security point of view as well. [all …]
|
| /external/openthread/third_party/mbedtls/repo/ |
| D | CONTRIBUTING.md | 7 ----------------------------------- 10 - [Sign-off](#license-and-copyright): all commits must be signed off. 11 - [Tests](#tests): please ensure the PR includes adequate tests. 12 - [Changelog](#documentation): if needed, please provide a changelog entry. 13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t… 16 ---------------- 17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati… 18 - The code should be written in a clean and readable style, and must follow [our coding standards](… 19 - The code should be written in a portable generic way, that will benefit the whole community, and … 20 - The code should be secure, and will be reviewed from a security point of view as well. [all …]
|
| /external/angle/build/rust/tests/ |
| D | BUILD.gn | 2 # Use of this source code is governed by a BSD-style license that can be 10 group("tests") { 26 "//build/rust/tests/bindgen_static_fns_test", 27 "//build/rust/tests/bindgen_test", 28 "//build/rust/tests/test_aliased_deps", 29 "//build/rust/tests/test_aliased_deps:test_aliased_deps_exe", 30 "//build/rust/tests/test_bin_crate", 31 "//build/rust/tests/test_rlib_crate:target1", 32 "//build/rust/tests/test_rlib_crate:target2", 33 "//build/rust/tests/test_rlib_crate:test_rlib_crate_associated_bin", [all …]
|
| /external/deqp-deps/amber/ |
| D | README.md | 3 Amber is a multi-API shader test framework. 16 * Shaders can be expressed in binary form (as hex), in SPIR-V assembly, or in a 26 ## Writing Amber Tests 28 see in the [tests/cases](tests/cases) folder. 103 ./tools/git-sync-deps 104 mkdir -p out/Debug 106 cmake -GNinja ../.. 114 `-DAMBER_ENABLE_SHARED_CRT`. 123 `tools/build-amber-sample.sh`. 130 * Run `./tools/build-amber-sample.sh [build output directory path]`. [all …]
|
| /external/pigweed/pw_fuzzer/ |
| D | docs.rst | 1 .. _module-pw_fuzzer: 6 .. pigweed-module:: 13 .. code-block:: cpp 18 ---------- 20 ---------- 21 You've written some code. You've written unit tests for that code. The unit 22 tests pass. But could there be bugs in inputs or code paths the unit tests do 25 However, fuzzing requires some complex interactions between compiler-added 30 See :ref:`module-pw_fuzzer-concepts` to learn more about the different 31 components of a fuzzer and how they work together to discover hard-to-find bugs. [all …]
|
| /external/google-cloud-java/ |
| D | CONTRIBUTING.md | 10 Here are some guidelines for hacking on google-cloud-java. 13 -------------------- 14 * `google-cloud-java` (`/pom.xml`) 17 * `google-cloud-pom-parent` 18 * Serves as the parent POM for the `gapic-libraries-bom` and module mini BOMs. 20 * `google-cloud-jar-parent` 22 * The only POM where non-annotated versions should be managed using `dependencyManagement`. 26 * `gapic-libraries-bom` 27 * A BOM for all non-preview libraries in the monorepo. 28 * `java-*` [all …]
|
| /external/cronet/third_party/icu/source/data/ |
| D | cldr-icu-readme.txt | 3 # Copyright (C) 2010-2014, International Business Machines Corporation and others. 10 # - CLDR (the source of most of the data, and some Java tools) 11 # - The complete ICU source tree, including: 12 # tools - includes the LdmlConverter build tool and associated config files 13 # icu4c - the target for converted CLDR data, and source for ICU4J data; 14 # includes tests for the converted data 15 # icu4j - the target for updated data jars; includes tests for the converted 18 # For an official CLDR data integration into ICU, these should be clean, freshly 19 # checked-out. For released CLDR sources, an alternative to checking out sources 30 # plus the xml-apis.jar from the Apache xalan package [all …]
|
| /external/oss-fuzz/infra/cifuzz/ |
| D | affected_fuzz_targets_test.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 14 """Tests for affected_fuzz_targets.py""" 28 # pylint: disable=protected-access 30 # NOTE: This integration test relies on 31 # https://github.com/google/oss-fuzz/tree/master/projects/example project. 37 'test_data', 'build-out') 41 """Tests remove_unaffected_fuzzers.""" 48 # Tests a specific affected fuzzers is kept. 51 # Tests specific affected fuzzer is kept. 54 # Tests all fuzzers are kept if none are deemed affected. [all …]
|
12345678910>>...13