Home
last modified time | relevance | path

Searched refs:format (Results 1 – 25 of 80) sorted by relevance

1234

/mbedtls-latest/tests/scripts/
Dgenerate_tls13_compat_tests.py146 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)]
151 ret += ["-sigalgs {signature_algorithms}".format(
157 ret += ["-groups {named_groups}".format(named_groups=named_groups)]
193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
204 '-CAfile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)]
294 ret += ['--priority={priority_string}'.format(
307 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
322 '--x509cafile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)]
345 ret += ["force_ciphersuite={ciphers}".format(ciphers=ciphers)]
348 ret += ['sig_algs={sig_algs}'.format(
[all …]
Dcheck_names.py81 gutter = format(self.line_no, "4d")
85 " {0} |\n".format(" " * len(gutter)) +
86 " {0} | {1}".format(gutter, self.line) +
87 " {0} | {1}\n".format(" " * len(gutter), underline)
140 return "{0}".format(self.symbol_name)
146 .format(self.symbol_name))
166 .format(self.match.filename, self.match.line_no, self.match.name)
172 .format(
196 .format(self.match.filename, self.match.line_no, self.match.name)
204 .format(self.match.filename, self.match.line_no, self.match.name)
[all …]
Drun_demos.py26 print('#### {} ####'.format(demo))
31 print('{}: FAIL'.format(demo))
33 print('{}: {}'.format(demo, 'PASS' if success else 'FAIL'))
37 print('{}/{} demos passed'.format(successes, len(demos)))
Daudit-validity-dates.py39 + "({} is too old)".format(cryptography.__version__))
89 raise ValueError("Unsupported file_type: {}".format(self.data_type))
130 wrapper.__name__ = "{}.parser[{}]".format(type(self).__name__, tag)
299 result.locations.append("{}#{}".format(filename, idx))
306 result.locations.append("{}".format(filename))
366 audit_data.locations.append("{}:{}:#{}".format(filename,
376 print("{}\t{:20}\t{:20}\t{:3}\t{}".format(
449 logger.info("Total: {} objects found!".format(len(audit_results)))
Dgenerate_server9_bad_saltlen.py60 kwargs['ca_password'] = r'-passin "pass:{ca_password}"'.format(
66 kwargs['openssl_extfile'] = '-extfile {openssl_extfile}'.format(
71 cmd = OPENSSL_RSA_PSS_CERT_COMMAND.format(**kwargs)
75 cmd = OPENSSL_RSA_PSS_DGST_COMMAND.format(**kwargs)
Dtest_psa_constant_names.py53 caller='test_psa_constant_names.py for {} values'.format(type_word),
129 sys.stdout.write('{} {}\t{}\n'.format(type_word, value, output))
150 .format(error.type, error.expression,
152 out.write('{} test cases'.format(self.count))
154 out.write(', {} FAIL\n'.format(len(self.errors)))
Dset_psa_test_dependencies.py202 .format(test_case_number, file_name))
205 .format(test_case_number, file_name))
227 .format(test_case_number, file_name))
276 .format(file_name))
Dtest_psa_compliance.py76 extra_includes = (';{}/drivers/builtin/include'.format(root_dir)
86 '-DPSA_CRYPTO_LIB_FILENAME={}/{}'.format(root_dir,
88 ('-DPSA_INCLUDE_PATHS={}/include' + extra_includes).format(root_dir)
Dpsa_collect_statuses.py68 sys.stdout.write('{} {}\n'.format(function, name))
112 help='Log file location (default: {})'.format(
117 help='Path to psa_constant_names (default: {})'.format(
Dcheck_test_cases.py47 format(file_name, line_number, *args))
53 .format(file_name, line_number, *args))
237 .format(sys.argv[0], results.errors, results.warnings))
Ddepends.py128 log_line('Symbol {} was not found in {}'.format(option, conf.filename), color=colors.red)
208 log_line('*** [{}] Error {}'.format(' '.join(command), ret))
491 log_line('{} passed'.format(' '.join(successes)), color=colors.bold_green)
493 log_line('{} FAILED'.format(' '.join(failures)), color=colors.bold_red)
/mbedtls-latest/scripts/
Dcode_size_compare.py84 return '{git_rev}-{arch}-{config}-{compiler}'.format(**self.__dict__)
104 .format(measure_tool=self.measure_cmd.strip().split(' ')[0])
218 .format(src=TFM_MEDIUM_CONFIG_H, dest=CONFIG_H))
220 .format(src=TFM_MEDIUM_CRYPTO_CONFIG_H,
246 self.make_cmd.append('CFLAGS=\'{}\''.format(self.infer_make_cflags()))
248 self.make_cmd.append('CC={}'.format(self.compiler))
253 .format(self.arch,
314 .format(self.git_rev))
339 .format(self.git_rev))
369 .format(self.git_rev,
[all …]
Dgenerate_ssl_debug_helpers.py68 start_line = '#{} {}'.format(d, p)
70 end_line = '#endif /* {} */'.format(p)
72 end_line = '#endif /* defined({}) */'.format(p)
74 end_line = '#endif /* !defined({}) */'.format(p)
110 param = "!( {} )".format(pair_param)
173 return 'Enum({},{})'.format(self._name, self._span)
203 .format(member=member, space=' '*8)
216 body = body.format(translation_table='\n'.join(translation_table),
251 return 'SigAlgs({})'.format(self._definitions[0].span())
265 ' case {}:\n return "{}";'.format(name, return_val))
[all …]
Dabi_check.py156 raise Exception("{} not installed, aborting".format(command))
164 "Checking out git worktree for revision {} from {}".format(
177 self.log.debug("Checking out git worktree for revision {}".format(
193 self.log.debug("Commit is {}".format(version.commit))
254 return "{} ({})".format(version.revision, version.commit)
262 self.report_dir, "{}-{}-{}.dump".format(
440 self.report_dir, "{}-{}-{}.html".format(
455 "Compatibility issues found for {}".format(mbed_module)
464 "for details see {}".format(mbed_module, output_path)
468 "No compatibility issues for {}".format(mbed_module)
[all …]
Dassemble_changelog.py36 message = '{}:{}: {}'.format(filename, line_number,
37 message.format(*args, **kwargs))
44 super().__init__('{}: {}'.format(line_offset, error_message))
48 message = ('Lost content from {}: "{}"'.format(filename, line))
53 message = ('Changelog filenames do not end with .txt: {}'.format(", ".join(filenames)))
138 top_version_title = cls._unreleased_version_text.format(name) + '\n\n'
206 categories = self.format.split_categories(text)
240 self.format = changelog_format
244 self.trailer) = self.format.extract_top_version(whole_file)
269 out.write(self.format.format_category(title, body))
/mbedtls-latest/library/
Dplatform.c89 const char *format, ...) in platform_snprintf_uninit() argument
93 ((void) format); in platform_snprintf_uninit()
101 const char *format,
105 const char *format, in mbedtls_platform_set_snprintf() argument
144 const char *format, va_list arg) in platform_vsnprintf_uninit() argument
148 ((void) format); in platform_vsnprintf_uninit()
157 const char *format,
161 const char *format, in mbedtls_platform_set_vsnprintf() argument
174 static int platform_printf_uninit(const char *format, ...) in platform_printf_uninit() argument
176 ((void) format); in platform_printf_uninit()
[all …]
Dmps_trace.c43 void mbedtls_mps_trace_print_msg(int id, int line, const char *format, ...) in mbedtls_mps_trace_print_msg() argument
48 va_start(argp, format); in mbedtls_mps_trace_print_msg()
49 ret = mbedtls_vsnprintf(str, MPS_TRACE_BUF_SIZE, format, argp); in mbedtls_mps_trace_print_msg()
/mbedtls-latest/tests/suites/
Dtest_suite_platform_printf.function3 /* The printf test functions take a format argument from the test data
5 * - For some tests, it makes sense to vary the format.
7 * that parses the format at runtime, and not a compiler optimization.
28 void printf_int(char *format, /* any format expecting one int argument, e.g. "%d" */
36 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, x));
47 void printf_long_max(const char *format, /* "%lx" or longer type */
61 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, value));
73 void printf_char2(char *format, /* "%c%c" */
81 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, arg1, arg2));
Dtest_suite_ecjpake.data37 ECJPAKE round one: KKP1: unknown first point format
52 ECJPAKE round one: KKP1: unknown second point format
85 ECJPAKE round one: KKP2: unknown first point format
100 ECJPAKE round one: KKP2: unknown second point format
151 ECJPAKE round two client: unknown first point format
166 ECJPAKE round two client: unknown second point format
205 ECJPAKE round two server: unknown first point format
220 ECJPAKE round two server: unknown second point format
Dtest_suite_lms.data34 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message1.hex(), sig1.hex(), public_key.serialize(…
48 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message2.hex(), sig2.hex(), public_key.serialize(…
74 # * <Save signature in binary format>
98 # * <Save message in binary format>
103 # * Save message and signature in binary format
126 # * <Save message in binary format>
133 # * Save message and signature in binary format
160 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), public_key.get_pubkey()…
186 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), public_key.get_pubkey()…
/mbedtls-latest/docs/architecture/
Dmbed-crypto-storage-specification.md28 * [Persistent transparent keys](#key-file-format-for-0.1.0) designated by a [slot number](#key-name…
29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only.
39 …s on the storage backend. The content of the file is described [below](#key-file-format-for-0.1.0).
49 ### Key file format for 0.1.0
64 ### Nonvolatile random seed file format for 0.1.0
68 The file format is just the seed as a byte string with no metadata or encoding of any kind.
75 * Files 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is…
76 …O_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0).
86 * `sprintf(CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_%lu", key_id)` [content](#key-file-format-for…
105 * [Persistent transparent keys](#key-file-format-for-1.0.0) designated by a [key identifier and own…
[all …]
/mbedtls-latest/include/mbedtls/
Dplatform.h176 extern int (*mbedtls_fprintf)(FILE *stream, const char *format, ...);
202 extern int (*mbedtls_printf)(const char *format, ...);
238 extern int (*mbedtls_snprintf)(char *s, size_t n, const char *format, ...);
249 const char *format, ...));
276 extern int (*mbedtls_vsnprintf)(char *s, size_t n, const char *format, va_list arg);
286 const char *format, va_list arg));
/mbedtls-latest/docs/architecture/testing/
Dpsa-storage-format-testing.md1 # Mbed TLS PSA keystore format stability testing strategy
15 The goal of storage format stability testing is: as a user of Mbed TLS, I want to store a key under…
23 …y is deterministic. Therefore we can ensure the stability of the storage format by creating test c…
33 ### Keeping up with storage format evolution
39 …old keys (which should only be done by retiring a version of the storage format), then we should k…
56format version. When the storage format changes, if backward compatibility is desired, old test da…
64 ### General key format
66 Objective: test the format of the key file: which field goes where and how big it is.
/mbedtls-latest/
D.pylintrc50 # * logging-format-interpolation: Pylint warns about things like
51 # ``log.info('...'.format(...))``. It insists on ``log.info('...', ...)``.
55 # Ubuntu 18.04) only recognize old-style format strings using '%',
67 disable=locally-disabled,locally-enabled,logging-format-interpolation,no-else-return,unnecessary-pa…
/mbedtls-latest/programs/pkey/
Dgen_key.c118 int format; /* the output format to use */ member
131 if (opt.format == FORMAT_PEM) { in write_private_key()
284 opt.format = DFL_FORMAT; in main()
304 opt.format = FORMAT_PEM; in main()
306 opt.format = FORMAT_DER; in main()

1234