/mbedtls-3.6.0/tests/scripts/ |
D | check_names.py | 157 def __init__(self, pattern, match): argument 159 self.match = match 166 .format(self.match.filename, self.match.line_no, self.match.name) 173 self.match.filename, 174 self.match.line_no, 175 self.match.name, 178 ) + "\n" + str(self.match) 189 def __init__(self, match): argument 190 self.match = match 196 .format(self.match.filename, self.match.line_no, self.match.name) [all …]
|
D | generate_test_code.py | 401 if not re.match(CONDITION_REGEX, dependency, re.I): 430 match = re.search(DEPENDENCY_REGEX, line.strip()) 431 if match: 433 dependencies = parse_dependencies(match.group('dependencies')) 457 match = re.search(BEGIN_CASE_REGEX, line) 458 dep_str = match.group('depends_on') 460 match = re.search(DEPENDENCY_REGEX, dep_str) 461 if match: 462 dependencies += parse_dependencies(match.group('dependencies')) 635 match = re.match(TEST_FUNCTION_VALIDATION_REGEX, [all …]
|
D | audit-validity-dates.py | 36 match = re.match(r'^[0-9]+', cryptography.__version__) 37 if match is None or int(match.group(0)) < 35: 328 match = re.search(r'\A\w+(.*:)?\"', line) 329 if match: 358 match = re.match(r'"(?P<data>[0-9a-fA-F]+)"', test_arg) 359 if not match: 361 if not X509Parser.check_hex_string(match.group('data')): 363 audit_data = self.parse_bytes(bytes.fromhex(match.group('data')))
|
D | test_psa_compliance.py | 124 match = test_re.match(line) 125 if match is not None: 126 groupdict = match.groupdict()
|
D | list_internal_identifiers.py | 40 identifiers = ["{}\n".format(match.name) for match in result]
|
D | depends.py | 330 if exclude and re.match(exclude, description): 352 if exclude and re.match(exclude, description): 371 m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line) 380 if re.match(regexp, symbol)]
|
D | check_files.py | 75 re.match(self.path_exemptions, self.normalize_path(filepath)): 193 m = re.match(self._shebang_re, first_line) 292 return not self.GOOD_CHARACTERS_RE.match(text)
|
D | generate_psa_tests.py | 465 m = cls.RSA_OAEP_RE.match(alg.string) 477 m = cls.BRAINPOOL_RE.match(key_type.string) 776 if re.match(pattern, keyword):
|
D | test_psa_constant_names.py | 80 if ALG_TRUNCATED_TO_SELF_RE.match(expr):
|
D | check_test_cases.py | 96 m = re.match(br'\s*run_test\s+"((?:[^\\"]|\\.)*)"', line)
|
/mbedtls-3.6.0/scripts/ |
D | generate_ssl_debug_helpers.py | 29 def replacer(match): argument 30 if match.lastgroup == 'comment': 32 return match.group() 83 for match in pattern.finditer(source): 85 directive = match.groupdict()['directive'].strip() 86 param = match.groupdict()['param'] 87 start, end = match.span() 150 for match in enum_pattern.finditer(source_code, start, end): 152 span=match.span(), 153 group=match.groupdict())
|
D | generate_errors.pl | 106 foreach my $match (@matches) 108 my ($error_name, $error_code, $description) = @$match;
|
D | min_requirements.py | 53 m = re.match(r'-r\s+', line)
|
D | assemble_changelog.py | 214 if not self._only_url_re.match(line) and \ 217 if self._has_url_re.match(line) else ""
|
D | code_size_compare.py | 515 if re.match(r'\s*\(TOTALS\)', data[5]): 543 m = re.match(r'\w+' + self.mod_total_suffix, line) 763 if re.match(r'size', self.size_common_info.measure_cmd.strip()):
|
D | config.py | 401 m = re.match(self._config_line_regexp, line)
|
/mbedtls-3.6.0/scripts/mbedtls_dev/ |
D | crypto_knowledge.py | 90 m = re.match(r'(\w+)\s*\((.*)\)\Z', self.name) 100 assert re.match(r'PSA_KEY_TYPE_\w+\Z', self.name) 107 m = re.match(r'PSA_KEY_TYPE_(\w+)', self.name) 308 m = re.match(r'PSA_ALG_(?:' 323 m = re.match(r'PSA_ALG_(?:DETERMINISTIC_)?(\w+)', expr) 328 m = re.match(r'PSA_ALG_KEY_AGREEMENT\s*\(\s*PSA_ALG_(\w+)', expr) 333 if re.match(r'ED[0-9]+PH\Z', head): 381 if re.match(r'.*[0-9]\Z', prefix): 421 m = re.match(r'PSA_ALG_KEY_AGREEMENT\(\w+,\s*(.*)\)\Z', self.expression) 426 if re.match(r'(?:0[Xx])?0+\s*\Z', kdf_alg): [all …]
|
D | macro_collector.py | 258 if re.match(r'MAC(?:_|\Z)', name): 260 elif re.match(r'KDF(?:_|\Z)', name): 288 m = re.match(self._define_directive_re, line) 295 if re.match(self._deprecated_definition_re, expansion): 467 m = re.match(self._header_line_re, line) 537 m = re.match(self._test_case_line_re, line)
|
D | psa_storage.py | 71 if re.match(r'([0-9]+|0x[0-9a-f]+)\Z', self.string, re.I):
|
/mbedtls-3.6.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 57 option, so the current PSA Crypto API is a good match for that. (Not 157 presents, all values must match except possibly for the salt length, where the 176 match a limitation of the PSA API. 323 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise.
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_constant_time.function | 251 * that will match; after that it will differ. 293 * \p diff Index of byte that differs (if out of range, the arrays will match).
|
D | test_suite_psa_crypto_op_fail.function | 26 * match the strict expectations of the test case generator. In the long
|
D | test_suite_asn1write.data | 364 Store named data: first match
|
D | test_suite_asn1parse.data | 607 Find named data: first match
|
D | test_suite_bignum_random.function | 420 /* Build a reside that might not match the modulus, to test that
|