Home
last modified time | relevance | path

Searched refs:r (Results 1 – 25 of 144) sorted by relevance

123456

/openthread-3.5.0/tests/toranj/cli/
Dtest-024-mle-adv-imax-change.py79 r = routers[num] variable
81 r.join(leader)
82 verify(r.get_state() == 'router')
92 r = routers[2] variable
93 r.join(leader)
94 verify(r.get_state() == 'router')
121 r = routers[num] variable
123 r.join(leader)
124 verify(r.get_state() == 'router')
133 r = routers[8] variable
[all …]
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/Examples/
DMain_RTT_MenuApp.c30 int r; in main() local
40 r = SEGGER_RTT_WaitKey(); in main()
41 } while ((r != '1') && (r != '2')); in main()
42 if (r == '1') { in main()
53 r = SEGGER_RTT_HasKey(); in main()
54 if (r) { in main()
DMain_RTT_InputEchoApp.c26 static char r; variable
37 r = SEGGER_RTT_WaitKey(); in main()
38 SEGGER_RTT_Write(0, &r, 1); in main()
39 r++; in main()
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/RTT/
DSEGGER_RTT.c484 unsigned r; in _GetAvailWriteSpace() local
492 r = pRing->SizeOfBuffer - 1u - WrOff + RdOff; in _GetAvailWriteSpace()
494 r = RdOff - WrOff - 1u; in _GetAvailWriteSpace()
496 return r; in _GetAvailWriteSpace()
1195 int r; in SEGGER_RTT_GetKey() local
1197 r = (int)SEGGER_RTT_Read(0u, &c, 1u); in SEGGER_RTT_GetKey()
1198 if (r == 1) { in SEGGER_RTT_GetKey()
1199 r = (int)(unsigned char)c; in SEGGER_RTT_GetKey()
1201 r = -1; in SEGGER_RTT_GetKey()
1203 return r; in SEGGER_RTT_GetKey()
[all …]
/openthread-3.5.0/third_party/mbedtls/repo/library/
Decdsa.c102 mbedtls_mpi r; /* r value */ member
118 mbedtls_mpi_init( &ctx->r ); in ecdsa_restart_sig_init()
131 mbedtls_mpi_free( &ctx->r ); in ecdsa_restart_sig_free()
253 mbedtls_mpi *r, mbedtls_mpi *s, in ecdsa_sign_restartable() argument
264 mbedtls_mpi *pk = &k, *pr = r; in ecdsa_sign_restartable()
286 pr = &rs_ctx->sig->r; in ecdsa_sign_restartable()
374 mbedtls_mpi_copy( r, pr ); in ecdsa_sign_restartable()
403 int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, in mbedtls_ecdsa_sign() argument
408 ECDSA_VALIDATE_RET( r != NULL ); in mbedtls_ecdsa_sign()
415 return( ecdsa_sign_restartable( grp, r, s, d, buf, blen, in mbedtls_ecdsa_sign()
[all …]
Daria.c74 uint32_t r; in aria_p1() local
75 __asm( "rev16 %0, %1" : "=l" (r) : "l" (x) ); in aria_p1()
76 return( r ); in aria_p1()
83 uint32_t r; in aria_p1() local
85 return( r ); in aria_p1()
125 uint32_t r; in aria_p3() local
126 __asm( "rev %0, %1" : "=l" (r) : "l" (x) ); in aria_p3()
127 return( r ); in aria_p3()
134 uint32_t r; in aria_p3() local
136 return( r ); in aria_p3()
[all …]
Dpsa_crypto_ecp.c346 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_sign_hash() local
357 mbedtls_mpi_init( &r ); in mbedtls_psa_ecdsa_sign_hash()
373 &ecp->grp, &r, &s, in mbedtls_psa_ecdsa_sign_hash()
386 MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ecp->grp, &r, &s, &ecp->d, in mbedtls_psa_ecdsa_sign_hash()
392 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &r, in mbedtls_psa_ecdsa_sign_hash()
399 mbedtls_mpi_free( &r ); in mbedtls_psa_ecdsa_sign_hash()
420 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_verify_hash() local
433 mbedtls_mpi_init( &r ); in mbedtls_psa_ecdsa_verify_hash()
442 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, in mbedtls_psa_ecdsa_verify_hash()
458 &ecp->Q, &r, &s ); in mbedtls_psa_ecdsa_verify_hash()
[all …]
/openthread-3.5.0/third_party/mbedtls/repo/tests/scripts/
Dcheck_names.py61 MACRO_PATTERN = r"^(MBEDTLS|PSA)_[0-9A-Z_]*[0-9A-Z]$"
63 IDENTIFIER_PATTERN = r"^(mbedtls|psa)_[0-9a-z_]*[0-9a-z]$"
347 macro_regex = re.compile(r"# *define +(?P<macro>\w+)")
384 mbed_regex = re.compile(r"\bMBED.+?_[A-Z0-9_]*")
385 exclusions = re.compile(r"// *no-check-names|#error")
434 re.search(r"^(typedef +)?enum +{", line)):
437 re.search(r"^(typedef +)?enum", line)):
440 re.search(r"^{", line)):
443 re.search(r"^}", line)):
446 not re.search(r"^ *#", line)):
[all …]
Dgenerate_psa_tests.py52 return re.sub(r'_FAMILY_(.*)', r'_\1_' + str(bits), dep)
78 used.update(re.findall(r'PSA_(?:ALG|ECC_FAMILY|KEY_TYPE)_\w+', expr))
90 for symbol in re.findall(r'\bPSA_WANT_\w+\b', line))
145 short_key_type = re.sub(r'PSA_(KEY_TYPE|ECC_FAMILY)_', r'', key_type)
243 short_key_type = re.sub(r'PSA_(KEY_TYPE|ECC_FAMILY)_', r'', key_type)
418 short = re.sub(r'PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION',
419 r'', short)
420 short = re.sub(r'PSA_KEY_[A-Z]+_', r'', short)
453 short = re.sub(r'\bPSA_KEY_USAGE_', r'', usage)
511 short_expression = re.sub(r'\bPSA_(?:KEY_TYPE|ECC_FAMILY)_',
[all …]
Dgenerate_test_code.py168 BEGIN_HEADER_REGEX = r'/\*\s*BEGIN_HEADER\s*\*/'
169 END_HEADER_REGEX = r'/\*\s*END_HEADER\s*\*/'
171 BEGIN_SUITE_HELPERS_REGEX = r'/\*\s*BEGIN_SUITE_HELPERS\s*\*/'
172 END_SUITE_HELPERS_REGEX = r'/\*\s*END_SUITE_HELPERS\s*\*/'
174 BEGIN_DEP_REGEX = r'BEGIN_DEPENDENCIES'
175 END_DEP_REGEX = r'END_DEPENDENCIES'
177 BEGIN_CASE_REGEX = r'/\*\s*BEGIN_CASE\s*(?P<depends_on>.*?)\s*\*/'
178 END_CASE_REGEX = r'/\*\s*END_CASE\s*\*/'
180 DEPENDENCY_REGEX = r'depends_on:(?P<dependencies>.*)'
181 C_IDENTIFIER_REGEX = r'!?[a-z_][a-z0-9_]*'
[all …]
Dcheck_files.py115 r'docs/.*\.pdf\Z',
116 r'programs/fuzz/corpuses/[^.]+\Z',
117 r'tests/data_files/[^.]+\Z',
118 r'tests/data_files/.*\.(crt|csr|db|der|key|pubkey)\Z',
119 r'tests/data_files/.*\.req\.[^/]+\Z',
120 r'tests/data_files/.*malformed[^/]+\Z',
121 r'tests/data_files/format_pkcs12\.fmt\Z',
/openthread-3.5.0/tests/scripts/thread-cert/
Dtest_diag.py63 r'sending 0x14 packet\(s\), length 0x64\r\nstatus 0x00\r\n',
67 r'sending 0x14 packet\(s\), length 0x64\r\nstatus 0x00\r\n',
79 r'received packets: 0\r\nsent packets: ([1-9]\d*)\r\n'
82 r'stop diagnostics mode\r\nstatus 0x00\r\n',
87 r'Error 7: InvalidArgs\r\n',
Drequirements.txt8 # via -r requirements.in
14 # via -r requirements.in
20 # via -r requirements.in
22 # via -r requirements.in
Dnode.py536 for entry in re.findall(r'"((?:[^\\]|\\.)*?)"', line):
910 self._expect(r"[^\n]+\n")
926 return self._expect_results(r'\S+')
1000 states = [r'disabled', r'petitioning', r'active']
1044 states = [r'Disabled', r'Enabled']
1060 return int(self._expect_result(r'\d+'))
1078 modes = [r'unicast', r'anycast']
1088 return int(self._expect_result(r'\d+'))
1383 states = [r'Disabled', r'Enabled']
1458 states = [r'Disabled', r'Primary', r'Secondary']
[all …]
/openthread-3.5.0/third_party/mbedtls/repo/scripts/mbedtls_dev/
Dmacro_collector.py154 _argument_split_re = re.compile(r' *, *')
265 if re.match(r'MAC(?:_|\Z)', name):
267 elif re.match(r'KDF(?:_|\Z)', name):
269 elif re.search(r'0x020000[0-9A-Fa-f]{2}', expansion):
271 elif re.search(r'0x03[0-9A-Fa-f]{6}', expansion):
273 elif re.search(r'0x05[0-9A-Fa-f]{6}', expansion):
275 elif re.search(r'0x09[0-9A-Fa-f]{2}0000', expansion):
277 elif re.search(r'0x08[0-9A-Fa-f]{6}', expansion):
284 _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' +
285 r'(?:\s+|\((\w+)\)\s*)' +
[all …]
Dasymmetric_key_data.py38 private = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_KEY_PAIR\1', typ, 1)
39 public = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_PUBLIC_KEY\1', typ, 1)
Dcrypto_knowledge.py48 m = re.match(r'(\w+)\s*\((.*)\)\Z', self.name)
58 assert re.match(r'PSA_KEY_TYPE_\w+\Z', self.name)
65 self.private_type = re.sub(r'_PUBLIC_KEY\Z', r'_KEY_PAIR', self.name)
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/Syscalls/
DSEGGER_RTT_Syscalls_GCC.c87 int _write_r(struct _reent *r, int file, const void *ptr, int len);
122 int _write_r(struct _reent *r, int file, const void *ptr, int len) { in _write_r() argument
124 (void) r; /* Not used, avoid warning */ in _write_r()
/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ecdsa.function212 mbedtls_mpi d, r, s;
218 mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s );
227 TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, buf, sizeof( buf ),
230 TEST_ASSERT( mbedtls_ecdsa_verify( &grp, buf, sizeof( buf ), &Q, &r, &s ) == 0 );
235 mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s );
244 mbedtls_mpi d, r, s;
250 mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s );
262 TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, buf, sizeof( buf ),
265 TEST_ASSERT( mbedtls_ecdsa_verify( &grp, buf, sizeof( buf ), &Q, &r, &s ) == 0 );
270 mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s );
[all …]
Dtest_suite_ecjpake.data58 ECJPAKE round one: KKP1: zero-length r
61 ECJPAKE round one: KKP1: no data for r
64 ECJPAKE round one: KKP1: corrupted r
106 ECJPAKE round one: KKP2: zero-length r
109 ECJPAKE round one: KKP2: no data for r
112 ECJPAKE round one: KKP2: corrupted r
172 ECJPAKE round two client: zero-length r
175 ECJPAKE round two client: no data for r
178 ECJPAKE round two client: corrupted r
226 ECJPAKE round two server: zero-length r
[all …]
/openthread-3.5.0/third_party/mbedtls/repo/scripts/
Dmin_requirements.py47 req = re.sub(r'>=|~=', r'==', req)
61 line = re.sub(r'(\A|\s+)#.*', r'', line)
64 m = re.match(r'-r\s+', line)
Dconfig.py363 _define_line_regexp = (r'(?P<indentation>\s*)' +
364 r'(?P<commented_out>(//\s*)?)' +
365 r'(?P<define>#\s*define\s+)' +
366 r'(?P<name>\w+)' +
367 r'(?P<arguments>(?:\((?:\w|\s|,)*\))?)' +
368 r'(?P<separator>\s*)' +
369 r'(?P<value>.*)')
370 _section_line_regexp = (r'\s*/?\*+\s*[\\@]name\s+SECTION:\s*' +
371 r'(?P<section>.*)[ */]*')
372 _config_line_regexp = re.compile(r'|'.join([_define_line_regexp,
/openthread-3.5.0/third_party/mbedtls/repo/programs/x509/
Dcert_req.c161 char *p, *q, *r; in main() local
232 if( ( r = strchr( q, ',' ) ) != NULL ) in main()
233 *r++ = '\0'; in main()
252 q = r; in main()
268 if( ( r = strchr( q, ',' ) ) != NULL ) in main()
269 *r++ = '\0'; in main()
288 q = r; in main()
/openthread-3.5.0/third_party/mbedtls/repo/include/mbedtls/
Decdsa.h172 int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
231 int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r,
277 int mbedtls_ecdsa_sign_det_ext( mbedtls_ecp_group *grp, mbedtls_mpi *r,
319 const mbedtls_ecp_point *Q, const mbedtls_mpi *r,
/openthread-3.5.0/tests/scripts/thread-cert/pktverify/
Dcoap.py75 r = 0
77 t, tvs, r = self._parse_next_tlv(payload, r)

123456