Home
last modified time | relevance | path

Searched refs:match (Results 1 – 25 of 34) sorted by relevance

12

/mbedtls-3.6.0/tests/scripts/
Dcheck_names.py157 def __init__(self, pattern, match): argument
159 self.match = match
166 .format(self.match.filename, self.match.line_no, self.match.name)
173 self.match.filename,
174 self.match.line_no,
175 self.match.name,
178 ) + "\n" + str(self.match)
189 def __init__(self, match): argument
190 self.match = match
196 .format(self.match.filename, self.match.line_no, self.match.name)
[all …]
Dgenerate_test_code.py401 if not re.match(CONDITION_REGEX, dependency, re.I):
430 match = re.search(DEPENDENCY_REGEX, line.strip())
431 if match:
433 dependencies = parse_dependencies(match.group('dependencies'))
457 match = re.search(BEGIN_CASE_REGEX, line)
458 dep_str = match.group('depends_on')
460 match = re.search(DEPENDENCY_REGEX, dep_str)
461 if match:
462 dependencies += parse_dependencies(match.group('dependencies'))
635 match = re.match(TEST_FUNCTION_VALIDATION_REGEX,
[all …]
Daudit-validity-dates.py36 match = re.match(r'^[0-9]+', cryptography.__version__)
37 if match is None or int(match.group(0)) < 35:
328 match = re.search(r'\A\w+(.*:)?\"', line)
329 if match:
358 match = re.match(r'"(?P<data>[0-9a-fA-F]+)"', test_arg)
359 if not match:
361 if not X509Parser.check_hex_string(match.group('data')):
363 audit_data = self.parse_bytes(bytes.fromhex(match.group('data')))
Dtest_psa_compliance.py124 match = test_re.match(line)
125 if match is not None:
126 groupdict = match.groupdict()
Dlist_internal_identifiers.py40 identifiers = ["{}\n".format(match.name) for match in result]
Ddepends.py330 if exclude and re.match(exclude, description):
352 if exclude and re.match(exclude, description):
371 m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line)
380 if re.match(regexp, symbol)]
Dcheck_files.py75 re.match(self.path_exemptions, self.normalize_path(filepath)):
193 m = re.match(self._shebang_re, first_line)
292 return not self.GOOD_CHARACTERS_RE.match(text)
Dgenerate_psa_tests.py465 m = cls.RSA_OAEP_RE.match(alg.string)
477 m = cls.BRAINPOOL_RE.match(key_type.string)
776 if re.match(pattern, keyword):
Dtest_psa_constant_names.py80 if ALG_TRUNCATED_TO_SELF_RE.match(expr):
Dcheck_test_cases.py96 m = re.match(br'\s*run_test\s+"((?:[^\\"]|\\.)*)"', line)
/mbedtls-3.6.0/scripts/
Dgenerate_ssl_debug_helpers.py29 def replacer(match): argument
30 if match.lastgroup == 'comment':
32 return match.group()
83 for match in pattern.finditer(source):
85 directive = match.groupdict()['directive'].strip()
86 param = match.groupdict()['param']
87 start, end = match.span()
150 for match in enum_pattern.finditer(source_code, start, end):
152 span=match.span(),
153 group=match.groupdict())
Dgenerate_errors.pl106 foreach my $match (@matches)
108 my ($error_name, $error_code, $description) = @$match;
Dmin_requirements.py53 m = re.match(r'-r\s+', line)
Dassemble_changelog.py214 if not self._only_url_re.match(line) and \
217 if self._has_url_re.match(line) else ""
Dcode_size_compare.py515 if re.match(r'\s*\(TOTALS\)', data[5]):
543 m = re.match(r'\w+' + self.mod_total_suffix, line)
763 if re.match(r'size', self.size_common_info.measure_cmd.strip()):
Dconfig.py401 m = re.match(self._config_line_regexp, line)
/mbedtls-3.6.0/scripts/mbedtls_dev/
Dcrypto_knowledge.py90 m = re.match(r'(\w+)\s*\((.*)\)\Z', self.name)
100 assert re.match(r'PSA_KEY_TYPE_\w+\Z', self.name)
107 m = re.match(r'PSA_KEY_TYPE_(\w+)', self.name)
308 m = re.match(r'PSA_ALG_(?:'
323 m = re.match(r'PSA_ALG_(?:DETERMINISTIC_)?(\w+)', expr)
328 m = re.match(r'PSA_ALG_KEY_AGREEMENT\s*\(\s*PSA_ALG_(\w+)', expr)
333 if re.match(r'ED[0-9]+PH\Z', head):
381 if re.match(r'.*[0-9]\Z', prefix):
421 m = re.match(r'PSA_ALG_KEY_AGREEMENT\(\w+,\s*(.*)\)\Z', self.expression)
426 if re.match(r'(?:0[Xx])?0+\s*\Z', kdf_alg):
[all …]
Dmacro_collector.py258 if re.match(r'MAC(?:_|\Z)', name):
260 elif re.match(r'KDF(?:_|\Z)', name):
288 m = re.match(self._define_directive_re, line)
295 if re.match(self._deprecated_definition_re, expansion):
467 m = re.match(self._header_line_re, line)
537 m = re.match(self._test_case_line_re, line)
Dpsa_storage.py71 if re.match(r'([0-9]+|0x[0-9a-f]+)\Z', self.string, re.I):
/mbedtls-3.6.0/docs/architecture/psa-migration/
Dpsa-limitations.md57 option, so the current PSA Crypto API is a good match for that. (Not
157 presents, all values must match except possibly for the salt length, where the
176 match a limitation of the PSA API.
323 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise.
/mbedtls-3.6.0/tests/suites/
Dtest_suite_constant_time.function251 * that will match; after that it will differ.
293 * \p diff Index of byte that differs (if out of range, the arrays will match).
Dtest_suite_psa_crypto_op_fail.function26 * match the strict expectations of the test case generator. In the long
Dtest_suite_asn1write.data364 Store named data: first match
Dtest_suite_asn1parse.data607 Find named data: first match
Dtest_suite_bignum_random.function420 /* Build a reside that might not match the modulus, to test that

12