代码搜索:Testing

找到约 10,000 项符合「Testing」的源代码

代码结果 10,000
www.eeworm.com/read/438718/1822927

py test_sha.py

# Testing sha module (NIST's Secure Hash Algorithm) import sha # use the three examples from Federal Information Processing Standards # Publication 180-1, Secure Hash Standard, 1995 April 17 # http
www.eeworm.com/read/438718/1823062

py test_ima.py

#! /usr/bin/env python """Test script for the imageop module. This has the side effect of partially testing the imgfile module as well. Roger E. Masse """ from test_support import verbose, un
www.eeworm.com/read/432395/1893814

svn-base dwsync.xml.svn-base

www.eeworm.com/read/432395/1894003

svn-base dwsync.xml.svn-base

www.eeworm.com/read/431110/1911427

west

# note: forward key does not match reverse key (tricky, but helps testing) #west: 127.95.7.1: rsa { # RSA 1024 bits # for signatures only, UNSAFE FOR ENCRYPTION #pubkey=0sAQOOyFBeFFr9CWXgn1aOEvTr9
www.eeworm.com/read/431110/1911670

sh eastinit.sh

: ==== start ==== route delete -net 192.0.1.0 netmask 255.255.255.0 route delete -net default route add -net default gw 192.1.2.254 named ipsec setup start /testing/pluto/bin/wait-until-pluto-start
www.eeworm.com/read/431110/1911697

sh eastinit.sh

: ==== start ==== route delete -net 192.0.1.0 netmask 255.255.255.0 route delete -net default route add -net default gw 192.1.2.45 ipsec setup start /testing/pluto/bin/wait-until-pluto-started ipse
www.eeworm.com/read/431110/1911698

sh westinit.sh

: ==== start ==== route delete -net 192.0.2.0 netmask 255.255.255.0 route delete -net default route add -net default gw 192.1.2.23 ipsec setup start /testing/pluto/bin/wait-until-pluto-started # ip
www.eeworm.com/read/431110/1911836

sh westinit.sh

: ==== start ==== TESTNAME=dpd-05 source /testing/pluto/bin/westlocal.sh iptables -F INPUT iptables -F OUTPUT ipsec setup start sleep 5 ipsec auto --add west-east
www.eeworm.com/read/431110/1912921

sh eastinit.sh

ipsec setup start /testing/pluto/bin/wait-until-policy-loaded # this should get added to the conn, ultimately ipsec whack --label "\"SAwest-east\" leftrsasigkey" --keyid "@west" --pubkeyrsa "0sAQNz