/mbedtls-3.5.0/tests/scripts/ |
D | check_names.py | 169 def __init__(self, pattern, match): argument 171 self.match = match 178 .format(self.match.filename, self.match.line_no, self.match.name) 185 self.match.filename, 186 self.match.line_no, 187 self.match.name, 190 ) + "\n" + str(self.match) 201 def __init__(self, match): argument 202 self.match = match 208 .format(self.match.filename, self.match.line_no, self.match.name) [all …]
|
D | generate_test_code.py | 381 if not re.match(CONDITION_REGEX, dependency, re.I): 410 match = re.search(DEPENDENCY_REGEX, line.strip()) 411 if match: 413 dependencies = parse_dependencies(match.group('dependencies')) 437 match = re.search(BEGIN_CASE_REGEX, line) 438 dep_str = match.group('depends_on') 440 match = re.search(DEPENDENCY_REGEX, dep_str) 441 if match: 442 dependencies += parse_dependencies(match.group('dependencies')) 587 match = re.match(TEST_FUNCTION_VALIDATION_REGEX, [all …]
|
D | test_psa_compliance.py | 102 match = test_re.match(line) 103 if match is not None: 104 groupdict = match.groupdict()
|
D | list_internal_identifiers.py | 52 identifiers = ["{}\n".format(match.name) for match in result]
|
D | depends.py | 341 if exclude and re.match(exclude, description): 363 if exclude and re.match(exclude, description): 382 m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line) 391 if re.match(regexp, symbol)]
|
D | check_files.py | 87 re.match(self.path_exemptions, self.normalize_path(filepath)): 205 m = re.match(self._shebang_re, first_line) 304 return not self.GOOD_CHARACTERS_RE.match(text)
|
D | check_test_cases.py | 107 m = re.match(br'\s*run_test\s+"((?:[^\\"]|\\.)*)"', line)
|
D | test_psa_constant_names.py | 92 if ALG_TRUNCATED_TO_SELF_RE.match(expr):
|
D | generate_psa_tests.py | 543 m = cls.RSA_OAEP_RE.match(alg.string) 555 m = cls.BRAINPOOL_RE.match(key_type.string) 852 if re.match(pattern, keyword):
|
/mbedtls-3.5.0/scripts/ |
D | generate_ssl_debug_helpers.py | 41 def replacer(match): argument 42 if match.lastgroup == 'comment': 44 return match.group() 95 for match in pattern.finditer(source): 97 directive = match.groupdict()['directive'].strip() 98 param = match.groupdict()['param'] 99 start, end = match.span() 162 for match in enum_pattern.finditer(source_code, start, end): 164 span=match.span(), 165 group=match.groupdict())
|
D | generate_errors.pl | 118 foreach my $match (@matches) 120 my ($error_name, $error_code, $description) = @$match;
|
D | min_requirements.py | 65 m = re.match(r'-r\s+', line)
|
D | assemble_changelog.py | 226 if not self._only_url_re.match(line) and \ 229 if self._has_url_re.match(line) else ""
|
D | config.py | 404 m = re.match(self._config_line_regexp, line)
|
/mbedtls-3.5.0/scripts/mbedtls_dev/ |
D | crypto_knowledge.py | 101 m = re.match(r'(\w+)\s*\((.*)\)\Z', self.name) 111 assert re.match(r'PSA_KEY_TYPE_\w+\Z', self.name) 118 m = re.match(r'PSA_KEY_TYPE_(\w+)', self.name) 311 m = re.match(r'PSA_ALG_(?:' 326 m = re.match(r'PSA_ALG_(?:DETERMINISTIC_)?(\w+)', expr) 331 m = re.match(r'PSA_ALG_KEY_AGREEMENT\s*\(\s*PSA_ALG_(\w+)', expr) 336 if re.match(r'ED[0-9]+PH\Z', head): 384 if re.match(r'.*[0-9]\Z', prefix): 424 m = re.match(r'PSA_ALG_KEY_AGREEMENT\(\w+,\s*(.*)\)\Z', self.expression) 429 if re.match(r'(?:0[Xx])?0+\s*\Z', kdf_alg): [all …]
|
D | macro_collector.py | 269 if re.match(r'MAC(?:_|\Z)', name): 271 elif re.match(r'KDF(?:_|\Z)', name): 299 m = re.match(self._define_directive_re, line) 306 if re.match(self._deprecated_definition_re, expansion): 478 m = re.match(self._header_line_re, line) 548 m = re.match(self._test_case_line_re, line)
|
D | psa_storage.py | 78 if re.match(r'([0-9]+|0x[0-9a-f]+)\Z', self.string, re.I):
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 53 option, so the current PSA Crypto API is a good match for that. (Not 149 presents, all values must match except possibly for the salt length, where the 168 match a limitation of the PSA API. 315 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise.
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_constant_time.function | 40 * that will match; after that it will differ.
|
D | test_suite_psa_crypto_op_fail.function | 26 * match the strict expectations of the test case generator. In the long
|
D | test_suite_asn1write.data | 364 Store named data: first match
|
D | test_suite_asn1parse.data | 607 Find named data: first match
|
D | test_suite_bignum_random.function | 420 /* Build a reside that might not match the modulus, to test that
|
/mbedtls-3.5.0/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 50 The code of most PSA APIs is expected to match precisely the above layout. However, it is likely th…
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 444 ### Signature functions now require the hash length to match the expected value 475 in order to match the new signature.
|