/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/plugin/x/tests/driver/common/ |
H A D | message_matcher.cc | 84 return expected_msg.GetReflection()->GetBool(expected_msg, field) == in match_field_value() 88 return expected_msg.GetReflection()->GetDouble(expected_msg, field) == in match_field_value() 92 return expected_msg.GetReflection()->GetFloat(expected_msg, field) == in match_field_value() 101 return expected_msg.GetReflection()->GetInt32(expected_msg, field) == in match_field_value() 105 return expected_msg.GetReflection()->GetInt64(expected_msg, field) == in match_field_value() 110 expected_msg.GetReflection()->GetMessage(expected_msg, field), in match_field_value() 114 return expected_msg.GetReflection()->GetString(expected_msg, field) == in match_field_value() 139 return expected_msg.GetReflection()->GetRepeatedDouble(expected_msg, in match_field_value() 171 return expected_msg.GetReflection()->GetRepeatedString(expected_msg, in match_field_value() 176 return expected_msg.GetReflection()->GetRepeatedUInt32(expected_msg, in match_field_value() [all …]
|
/dports/security/krb5/krb5-1.19.2/src/tests/ |
H A D | t_kadmin_acl.py | 92 expected_msg=msg) 94 expected_code=1, expected_msg=msg) 99 expected_msg=msg) 120 expected_msg='REQUIRES_PRE_AUTH') 153 expected_msg='Principal: selected@KRBTEST.COM') 159 expected_msg='Principal: none@KRBTEST.COM') 198 expected_msg='REQUIRES_PRE_AUTH') 261 expected_msg='Operation requires') 323 expected_code=1, expected_msg=msg) 327 expected_code=1, expected_msg=msg) [all …]
|
H A D | t_policy.py | 11 expected_msg='Password is too short') 20 expected_msg='Cannot reuse password') 24 expected_msg='Cannot reuse password') 45 expected_msg='Password is too short') 47 expected_msg='Cannot reuse password') 51 expected_msg='Password is too short') 57 expected_msg='Policy does not exist') 72 expected_msg=msg) 74 expected_msg=msg) 102 expected_msg='Cannot reuse password') [all …]
|
H A D | t_kdb.py | 240 expected_msg='DN is out of the realm subtree') 337 expected_msg='require_auth: otp radius') 347 expected_msg='require_auth: radius pkinit') 372 expected_msg='Principal: canon@KRBTEST.COM\n') 374 expected_msg='Principal: canon@KRBTEST.COM\n') 376 expected_msg='Principal: canon@KRBTEST.COM\n') 496 expected_msg='Number of keys: 0') 502 expected_msg='Number of keys: 4') 505 expected_msg='Number of keys: 0') 529 expected_msg='Password expiration date: ') [all …]
|
H A D | t_preauth.py | 12 realm.kinit(realm.user_princ, password('user'), expected_msg='testval') 14 expected_msg='no key') 29 expected_msg='testval', expected_trace=msgs) 87 expected_msg='Preauthentication failed', expected_trace=msgs) 105 expected_msg='2rt: secondtrip', expected_trace=msgs) 127 expected_msg='2rt: secondtrip', expected_trace=msgs) 144 expected_msg='Pre-authentication failed: induced 2rt fail', 170 expected_msg='2rt: secondtrip', expected_trace=msgs) 190 expected_msg='Preauthentication failed', expected_trace=msgs) 209 expected_msg='tryagain: testagain', expected_trace=msgs) [all …]
|
H A D | t_authdata.py | 30 expected_code=1, expected_msg='KDC policy rejects request') 106 realm.run(['./adata', realm.host_princ], expected_msg='+97: [indcl]') 111 realm.run(['./adata', realm.host_princ], expected_msg='+97: [indcl]') 117 realm.run(['./adata', 'krbtgt/FOREIGN'], expected_msg='+97: [indcl]') 124 expected_msg='+97: [indcl, indcl2, indcl3]') 164 expected_msg='KDC policy rejects request') 232 expected_msg=' -2: self_ad') 246 expected_msg=' -2: proxy_ad') 259 realm.run(['./adata', 'service/1'], expected_msg='+97: [dbincr3]') 272 expected_msg='-456: db-authdata-test') [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/tests/ |
H A D | t_kadmin_acl.py | 92 expected_msg=msg) 94 expected_code=1, expected_msg=msg) 99 expected_msg=msg) 120 expected_msg='REQUIRES_PRE_AUTH') 153 expected_msg='Principal: selected@KRBTEST.COM') 159 expected_msg='Principal: none@KRBTEST.COM') 198 expected_msg='REQUIRES_PRE_AUTH') 261 expected_msg='Operation requires') 323 expected_code=1, expected_msg=msg) 327 expected_code=1, expected_msg=msg) [all …]
|
H A D | t_policy.py | 11 expected_msg='Password is too short') 20 expected_msg='Cannot reuse password') 24 expected_msg='Cannot reuse password') 45 expected_msg='Password is too short') 47 expected_msg='Cannot reuse password') 51 expected_msg='Password is too short') 57 expected_msg='Policy does not exist') 72 expected_msg=msg) 74 expected_msg=msg) 102 expected_msg='Cannot reuse password') [all …]
|
H A D | t_kdb.py | 240 expected_msg='DN is out of the realm subtree') 337 expected_msg='require_auth: otp radius') 347 expected_msg='require_auth: radius pkinit') 372 expected_msg='Principal: canon@KRBTEST.COM\n') 374 expected_msg='Principal: canon@KRBTEST.COM\n') 376 expected_msg='Principal: canon@KRBTEST.COM\n') 496 expected_msg='Number of keys: 0') 502 expected_msg='Number of keys: 4') 505 expected_msg='Number of keys: 0') 529 expected_msg='Password expiration date: ') [all …]
|
H A D | t_preauth.py | 12 realm.kinit(realm.user_princ, password('user'), expected_msg='testval') 14 expected_msg='no key') 29 expected_msg='testval', expected_trace=msgs) 87 expected_msg='Preauthentication failed', expected_trace=msgs) 105 expected_msg='2rt: secondtrip', expected_trace=msgs) 127 expected_msg='2rt: secondtrip', expected_trace=msgs) 144 expected_msg='Pre-authentication failed: induced 2rt fail', 170 expected_msg='2rt: secondtrip', expected_trace=msgs) 190 expected_msg='Preauthentication failed', expected_trace=msgs) 209 expected_msg='tryagain: testagain', expected_trace=msgs) [all …]
|
H A D | t_authdata.py | 30 expected_code=1, expected_msg='KDC policy rejects request') 106 realm.run(['./adata', realm.host_princ], expected_msg='+97: [indcl]') 111 realm.run(['./adata', realm.host_princ], expected_msg='+97: [indcl]') 117 realm.run(['./adata', 'krbtgt/FOREIGN'], expected_msg='+97: [indcl]') 124 expected_msg='+97: [indcl, indcl2, indcl3]') 164 expected_msg='KDC policy rejects request') 232 expected_msg=' -2: self_ad') 246 expected_msg=' -2: proxy_ad') 259 realm.run(['./adata', 'service/1'], expected_msg='+97: [dbincr3]') 272 expected_msg='-456: db-authdata-test') [all …]
|
/dports/security/krb5/krb5-1.19.2/src/tests/gssapi/ |
H A D | t_bindings.py | 7 realm.run(['./t_bindings', server, '-', '-'], expected_msg='no') 8 realm.run(['./t_bindings', server, 'a', '-'], expected_msg='no') 9 realm.run(['./t_bindings', server, 'a', 'a'], expected_msg='yes') 10 realm.run(['./t_bindings', server, '-', 'a'], expected_msg='no') 12 expected_code=1, expected_msg='Incorrect channel bindings') 15 realm.run(['./t_bindings', '-s', server, '-', '-'], expected_msg='no') 16 realm.run(['./t_bindings', '-s', server, 'a', '-'], expected_msg='no') 17 realm.run(['./t_bindings', '-s', server, 'a', 'a'], expected_msg='yes') 18 realm.run(['./t_bindings', '-s', server, '-', 'a'], expected_msg='no') 20 expected_code=1, expected_msg='Incorrect channel bindings') [all …]
|
H A D | t_gssapi.py | 34 expected_msg='service1/abraham') 38 expected_msg=' not found in keytab') 44 expected_msg='service1/abraham') 46 expected_msg=' not found in keytab') 48 expected_msg='service2/calvin') 53 expected_msg='service1/abraham') 62 expected_msg=' not found in keytab') 90 expected_msg=' not found in keytab') 130 realm.run(['./t_inq_cred'], expected_msg=realm.user_princ) 131 realm.run(['./t_inq_cred', '-k'], expected_msg=realm.user_princ) [all …]
|
H A D | t_client_keytab.py | 25 realm.run(['./t_ccselect', gssserver], expected_msg=bob) 31 realm.run(['./t_ccselect', phost], expected_msg=bob) 40 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 45 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 59 expected_msg='Credential cache is empty') 94 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 99 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 109 realm.run([klist], expected_msg=msg) 125 expected_msg=realm.user_princ) 133 realm.run(['./t_ccselect', phost], expected_msg='bob') [all …]
|
/dports/net/py-python-designateclient/python-designateclient-4.4.0/designateclient/tests/ |
H A D | test_exceptions.py | 31 expected_msg = 'something wrong' 32 self.response_dict['message'] = expected_msg 34 self.assertEqual(expected_msg, remote_err.message) 37 expected_msg = "u'nodot.com' is not a 'domainname'" 40 "message": expected_msg, 48 self.assertEqual(expected_msg, remote_err.message) 51 expected_msg = 'invalid_object' 54 self.response_dict['type'] = expected_msg 56 self.assertEqual(expected_msg, remote_err.message) 59 expected_msg = 'invalid_object' [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/lib/krb5/krb/ |
H A D | t_get_etype_info.py | 21 expected_msg='Client not found in Kerberos database') 27 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMuser\n') 29 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMpuser\n') 34 expected_msg='etype: aes128-cts\nsalt: KRBTEST.COMuser\n') 36 expected_msg='etype: aes128-cts\nsalt: KRBTEST.COMpuser\n') 41 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMuser\n') 43 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMpuser\n') 47 expected_msg='KDC has no support for encryption type') 48 realm.run(['./t_get_etype_info', 'pnokey'], expected_msg='no etype-info') 52 expected_msg='etype: aes256-cts\nsalt: ' + exp_salt + '\n') [all …]
|
/dports/security/krb5/krb5-1.19.2/src/lib/krb5/krb/ |
H A D | t_get_etype_info.py | 21 expected_msg='Client not found in Kerberos database') 27 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMuser\n') 29 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMpuser\n') 34 expected_msg='etype: aes128-cts\nsalt: KRBTEST.COMuser\n') 36 expected_msg='etype: aes128-cts\nsalt: KRBTEST.COMpuser\n') 41 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMuser\n') 43 expected_msg='etype: aes256-cts\nsalt: KRBTEST.COMpuser\n') 47 expected_msg='KDC has no support for encryption type') 48 realm.run(['./t_get_etype_info', 'pnokey'], expected_msg='no etype-info') 52 expected_msg='etype: aes256-cts\nsalt: ' + exp_salt + '\n') [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/tests/gssapi/ |
H A D | t_gssapi.py | 33 expected_msg='service1/abraham') 37 expected_msg=' not found in keytab') 43 expected_msg='service1/abraham') 45 expected_msg=' not found in keytab') 47 expected_msg='service2/calvin') 58 expected_msg=' not found in keytab') 65 expected_msg=' not found in keytab') 126 realm.run(['./t_inq_cred'], expected_msg=realm.user_princ) 127 realm.run(['./t_inq_cred', '-k'], expected_msg=realm.user_princ) 128 realm.run(['./t_inq_cred', '-s'], expected_msg=realm.user_princ) [all …]
|
H A D | t_client_keytab.py | 25 realm.run(['./t_ccselect', gssserver], expected_msg=bob) 31 realm.run(['./t_ccselect', phost], expected_msg=bob) 40 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 45 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 59 expected_msg='Credential cache is empty') 94 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 99 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 107 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) 109 realm.run([klist], expected_msg=msg) 113 realm.run(['./t_ccselect', phost, pbob], expected_msg=bob) [all …]
|
/dports/comms/uhd/uhd-90ce6062b6b5df2eddeee723777be85108e4e7c7/host/tests/ |
H A D | error_c_test.cpp | 63 expected_msg = \ 65 uhd::cpp_exception_type cpp_exception_type##_foo(expected_msg); \ 69 expected_msg = str(boost::format("%s: %s") \ 71 % expected_msg); \ 72 BOOST_CHECK_EQUAL(handle.last_error, expected_msg); \ 73 BOOST_CHECK_EQUAL(get_c_global_error_string(), expected_msg); 77 expected_msg = "This is a uhd::usb_error."; \ 78 uhd::usb_error usb_error_foo(1, expected_msg); \ 81 expected_msg = str(boost::format("%s: %s") % pretty_exception_names.get("usb_error") \ 84 BOOST_CHECK_EQUAL(get_c_global_error_string(), expected_msg); [all …]
|
/dports/sysutils/flowgger/flowgger-0.2.10/src/flowgger/encoder/ |
H A D | rfc3164_encoder.rs | 88 …let expected_msg = r#"Aug 6 11:15:24 testhostname appname 69 42 [origin@123 software="te\st sc\"r… 101 full_msg: Some(expected_msg.to_string()), 107 assert_eq!(String::from_utf8_lossy(&res), expected_msg); 112 …let expected_msg = r#"<23>Aug 6 11:15:24 testhostname appname 69 42 [origin@123 software="te\st s… 125 full_msg: Some(expected_msg.to_string()), in removeDevice() 131 assert_eq!(String::from_utf8_lossy(&res), expected_msg); 152 full_msg: Some(expected_msg.to_string()), in resyncDeviceConnections() 158 assert_eq!(String::from_utf8_lossy(&res), expected_msg); in resyncDeviceConnections() 170 …let expected_msg = r#"<23>Aug 6 11:15:24 testhostname appname[69]: 42 [someid a="b" c="123456"] s… 183 full_msg: Some(expected_msg.to_string()), [all …]
|
/dports/net-p2p/bitcoin/bitcoin-22.0/test/functional/ |
H A D | feature_filelock.py | 28 …expected_msg = "Error: Cannot obtain a lock on data directory {0}. {1} is probably already running… 29 …r(extra_args=['-datadir={}'.format(self.nodes[0].datadir), '-noserver'], expected_msg=expected_msg) 38 …expected_msg = "Error: SQLiteDatabase: Unable to obtain an exclusive lock on the database, is it b… 40 expected_msg = "Error: Error initializing wallet database environment" 41 …{}'.format(wallet_dir), '-wallet=' + wallet_name, '-noserver'], expected_msg=expected_msg, match=E…
|
/dports/net-p2p/bitcoin-daemon/bitcoin-22.0/test/functional/ |
H A D | feature_filelock.py | 28 …expected_msg = "Error: Cannot obtain a lock on data directory {0}. {1} is probably already running… 29 …r(extra_args=['-datadir={}'.format(self.nodes[0].datadir), '-noserver'], expected_msg=expected_msg) 38 …expected_msg = "Error: SQLiteDatabase: Unable to obtain an exclusive lock on the database, is it b… 40 expected_msg = "Error: Error initializing wallet database environment" 41 …{}'.format(wallet_dir), '-wallet=' + wallet_name, '-noserver'], expected_msg=expected_msg, match=E…
|
/dports/net-p2p/bitcoin-utils/bitcoin-22.0/test/functional/ |
H A D | feature_filelock.py | 28 …expected_msg = "Error: Cannot obtain a lock on data directory {0}. {1} is probably already running… 29 …r(extra_args=['-datadir={}'.format(self.nodes[0].datadir), '-noserver'], expected_msg=expected_msg) 38 …expected_msg = "Error: SQLiteDatabase: Unable to obtain an exclusive lock on the database, is it b… 40 expected_msg = "Error: Error initializing wallet database environment" 41 …{}'.format(wallet_dir), '-wallet=' + wallet_name, '-noserver'], expected_msg=expected_msg, match=E…
|
/dports/databases/percona57-pam-for-mysql/boost_1_59_0/libs/program_options/test/ |
H A D | exception_txt_test.cpp | 165 const char* expected_msg[5] = { in test_invalid_option_value_exception_msg() local 175 expected_msg); in test_invalid_option_value_exception_msg() 199 const char* expected_msg[5] = { in test_missing_value_exception_msg() local 234 const char* expected_msg[5] = { in test_ambiguous_option_exception_msg() local 242 expected_msg); in test_ambiguous_option_exception_msg() 263 const char* expected_msg[5] = { in test_multiple_occurrences_exception_msg() local 292 const char* expected_msg[5] = { in test_unknown_option_exception_msg() local 331 expected_msg); in test_invalid_bool_value_exception_msg() 372 expected_msg); in test_multiple_values_not_allowed_exception_msg() 411 expected_msg); in test_at_least_one_value_required_exception_msg() [all …]
|