Home
last modified time | relevance | path

Searched refs:match (Results 1 – 25 of 31) sorted by relevance

12

/mbedtls-latest/tests/scripts/
Dcheck_names.py157 def __init__(self, pattern, match): argument
159 self.match = match
166 .format(self.match.filename, self.match.line_no, self.match.name)
173 self.match.filename,
174 self.match.line_no,
175 self.match.name,
178 ) + "\n" + str(self.match)
189 def __init__(self, match): argument
190 self.match = match
196 .format(self.match.filename, self.match.line_no, self.match.name)
[all …]
Daudit-validity-dates.py36 match = re.match(r'^[0-9]+', cryptography.__version__)
37 if match is None or int(match.group(0)) < 35:
328 match = re.search(r'\A\w+(.*:)?\"', line)
329 if match:
358 match = re.match(r'"(?P<data>[0-9a-fA-F]+)"', test_arg)
359 if not match:
361 if not X509Parser.check_hex_string(match.group('data')):
363 audit_data = self.parse_bytes(bytes.fromhex(match.group('data')))
Dtest_psa_compliance.py108 match = test_re.match(line)
109 if match is not None:
110 groupdict = match.groupdict()
Dcheck_files.py76 re.match(self.path_exemptions, self.normalize_path(filepath)):
179 m = re.match(self._shebang_re, first_line)
278 return not self.GOOD_CHARACTERS_RE.match(text)
425 m = self.COPYRIGHT_RE.match(line)
430 m = self.SPDX_RE.match(line)
442 m = self.LICENSE_MENTION_RE.match(line)
Dlist_internal_identifiers.py40 identifiers = ["{}\n".format(match.name) for match in result]
Ddepends.py333 if exclude and re.match(exclude, description):
355 if exclude and re.match(exclude, description):
374 m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line)
383 if re.match(regexp, symbol)]
Dtest_psa_constant_names.py80 if ALG_TRUNCATED_TO_SELF_RE.match(expr):
/mbedtls-latest/scripts/
Dgenerate_ssl_debug_helpers.py31 def replacer(match): argument
32 if match.lastgroup == 'comment':
34 return match.group()
85 for match in pattern.finditer(source):
87 directive = match.groupdict()['directive'].strip()
88 param = match.groupdict()['param']
89 start, end = match.span()
152 for match in enum_pattern.finditer(source_code, start, end):
154 span=match.span(),
155 group=match.groupdict())
Dgenerate_errors.pl106 foreach my $match (@matches)
108 my ($error_name, $error_code, $description) = @$match;
Dassemble_changelog.py135 name = re.match(cls._name_re, top_version_title).group(1)
221 if not self._only_url_re.match(line) and \
224 if self._has_url_re.match(line) else ""
Dcode_size_compare.py516 if re.match(r'\s*\(TOTALS\)', data[5]):
544 m = re.match(r'\w+' + self.mod_total_suffix, line)
764 if re.match(r'size', self.size_common_info.measure_cmd.strip()):
Dmin_requirements.py55 m = re.match(r'-r\s+', line)
Dconfig.py426 m = re.match(self._config_line_regexp, line)
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md57 option, so the current PSA Crypto API is a good match for that. (Not
157 presents, all values must match except possibly for the salt length, where the
176 match a limitation of the PSA API.
323 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise.
/mbedtls-latest/tests/suites/
Dtest_suite_constant_time.function251 * that will match; after that it will differ.
293 * \p diff Index of byte that differs (if out of range, the arrays will match).
Dtest_suite_psa_crypto_op_fail.function26 * match the strict expectations of the test case generator. In the long
Dtest_suite_asn1write.data364 Store named data: first match
Dtest_suite_asn1parse.data607 Find named data: first match
Dtest_suite_bignum_random.function420 /* Build a reside that might not match the modulus, to test that
Dtest_suite_pkparse.data1201 OneAsymmetricKey X25519, doesn't match masking requirements #1
1210 OneAsymmetricKey X25519, doesn't match masking requirements #2
1218 OneAsymmetricKey X448, doesn't match masking requirements #3
Dtest_suite_pk.function1830 * - verify that public keys of opaque and non-opaque contexts match;
1924 /* Check that the public keys of opaque and non-opaque PK contexts match. */
Dtest_suite_ecp.data1516 # to make the limbs match with each other and make the function mbedtls_mpi_mod_residue_setup() hap…
/mbedtls-latest/docs/architecture/
Dpsa-crypto-implementation-structure.md50 The code of most PSA APIs is expected to match precisely the above layout. However, it is likely th…
Dpsa-storage-resilience.md295 …d to artificially construct a representative sample of system states that match the invariant. Tra…
/mbedtls-latest/docs/
D3.0-migration-guide.md444 ### Signature functions now require the hash length to match the expected value
475 in order to match the new signature.

12