/openthread-3.5.0/tests/toranj/cli/ |
D | test-024-mle-adv-imax-change.py | 79 r = routers[num] variable 81 r.join(leader) 82 verify(r.get_state() == 'router') 92 r = routers[2] variable 93 r.join(leader) 94 verify(r.get_state() == 'router') 121 r = routers[num] variable 123 r.join(leader) 124 verify(r.get_state() == 'router') 133 r = routers[8] variable [all …]
|
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/Examples/ |
D | Main_RTT_MenuApp.c | 30 int r; in main() local 40 r = SEGGER_RTT_WaitKey(); in main() 41 } while ((r != '1') && (r != '2')); in main() 42 if (r == '1') { in main() 53 r = SEGGER_RTT_HasKey(); in main() 54 if (r) { in main()
|
D | Main_RTT_InputEchoApp.c | 26 static char r; variable 37 r = SEGGER_RTT_WaitKey(); in main() 38 SEGGER_RTT_Write(0, &r, 1); in main() 39 r++; in main()
|
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/RTT/ |
D | SEGGER_RTT.c | 484 unsigned r; in _GetAvailWriteSpace() local 492 r = pRing->SizeOfBuffer - 1u - WrOff + RdOff; in _GetAvailWriteSpace() 494 r = RdOff - WrOff - 1u; in _GetAvailWriteSpace() 496 return r; in _GetAvailWriteSpace() 1195 int r; in SEGGER_RTT_GetKey() local 1197 r = (int)SEGGER_RTT_Read(0u, &c, 1u); in SEGGER_RTT_GetKey() 1198 if (r == 1) { in SEGGER_RTT_GetKey() 1199 r = (int)(unsigned char)c; in SEGGER_RTT_GetKey() 1201 r = -1; in SEGGER_RTT_GetKey() 1203 return r; in SEGGER_RTT_GetKey() [all …]
|
/openthread-3.5.0/third_party/mbedtls/repo/library/ |
D | ecdsa.c | 102 mbedtls_mpi r; /* r value */ member 118 mbedtls_mpi_init( &ctx->r ); in ecdsa_restart_sig_init() 131 mbedtls_mpi_free( &ctx->r ); in ecdsa_restart_sig_free() 253 mbedtls_mpi *r, mbedtls_mpi *s, in ecdsa_sign_restartable() argument 264 mbedtls_mpi *pk = &k, *pr = r; in ecdsa_sign_restartable() 286 pr = &rs_ctx->sig->r; in ecdsa_sign_restartable() 374 mbedtls_mpi_copy( r, pr ); in ecdsa_sign_restartable() 403 int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, in mbedtls_ecdsa_sign() argument 408 ECDSA_VALIDATE_RET( r != NULL ); in mbedtls_ecdsa_sign() 415 return( ecdsa_sign_restartable( grp, r, s, d, buf, blen, in mbedtls_ecdsa_sign() [all …]
|
D | aria.c | 74 uint32_t r; in aria_p1() local 75 __asm( "rev16 %0, %1" : "=l" (r) : "l" (x) ); in aria_p1() 76 return( r ); in aria_p1() 83 uint32_t r; in aria_p1() local 85 return( r ); in aria_p1() 125 uint32_t r; in aria_p3() local 126 __asm( "rev %0, %1" : "=l" (r) : "l" (x) ); in aria_p3() 127 return( r ); in aria_p3() 134 uint32_t r; in aria_p3() local 136 return( r ); in aria_p3() [all …]
|
D | psa_crypto_ecp.c | 346 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_sign_hash() local 357 mbedtls_mpi_init( &r ); in mbedtls_psa_ecdsa_sign_hash() 373 &ecp->grp, &r, &s, in mbedtls_psa_ecdsa_sign_hash() 386 MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ecp->grp, &r, &s, &ecp->d, in mbedtls_psa_ecdsa_sign_hash() 392 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &r, in mbedtls_psa_ecdsa_sign_hash() 399 mbedtls_mpi_free( &r ); in mbedtls_psa_ecdsa_sign_hash() 420 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_verify_hash() local 433 mbedtls_mpi_init( &r ); in mbedtls_psa_ecdsa_verify_hash() 442 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, in mbedtls_psa_ecdsa_verify_hash() 458 &ecp->Q, &r, &s ); in mbedtls_psa_ecdsa_verify_hash() [all …]
|
/openthread-3.5.0/third_party/mbedtls/repo/tests/scripts/ |
D | check_names.py | 61 MACRO_PATTERN = r"^(MBEDTLS|PSA)_[0-9A-Z_]*[0-9A-Z]$" 63 IDENTIFIER_PATTERN = r"^(mbedtls|psa)_[0-9a-z_]*[0-9a-z]$" 347 macro_regex = re.compile(r"# *define +(?P<macro>\w+)") 384 mbed_regex = re.compile(r"\bMBED.+?_[A-Z0-9_]*") 385 exclusions = re.compile(r"// *no-check-names|#error") 434 re.search(r"^(typedef +)?enum +{", line)): 437 re.search(r"^(typedef +)?enum", line)): 440 re.search(r"^{", line)): 443 re.search(r"^}", line)): 446 not re.search(r"^ *#", line)): [all …]
|
D | generate_psa_tests.py | 52 return re.sub(r'_FAMILY_(.*)', r'_\1_' + str(bits), dep) 78 used.update(re.findall(r'PSA_(?:ALG|ECC_FAMILY|KEY_TYPE)_\w+', expr)) 90 for symbol in re.findall(r'\bPSA_WANT_\w+\b', line)) 145 short_key_type = re.sub(r'PSA_(KEY_TYPE|ECC_FAMILY)_', r'', key_type) 243 short_key_type = re.sub(r'PSA_(KEY_TYPE|ECC_FAMILY)_', r'', key_type) 418 short = re.sub(r'PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION', 419 r'', short) 420 short = re.sub(r'PSA_KEY_[A-Z]+_', r'', short) 453 short = re.sub(r'\bPSA_KEY_USAGE_', r'', usage) 511 short_expression = re.sub(r'\bPSA_(?:KEY_TYPE|ECC_FAMILY)_', [all …]
|
D | generate_test_code.py | 168 BEGIN_HEADER_REGEX = r'/\*\s*BEGIN_HEADER\s*\*/' 169 END_HEADER_REGEX = r'/\*\s*END_HEADER\s*\*/' 171 BEGIN_SUITE_HELPERS_REGEX = r'/\*\s*BEGIN_SUITE_HELPERS\s*\*/' 172 END_SUITE_HELPERS_REGEX = r'/\*\s*END_SUITE_HELPERS\s*\*/' 174 BEGIN_DEP_REGEX = r'BEGIN_DEPENDENCIES' 175 END_DEP_REGEX = r'END_DEPENDENCIES' 177 BEGIN_CASE_REGEX = r'/\*\s*BEGIN_CASE\s*(?P<depends_on>.*?)\s*\*/' 178 END_CASE_REGEX = r'/\*\s*END_CASE\s*\*/' 180 DEPENDENCY_REGEX = r'depends_on:(?P<dependencies>.*)' 181 C_IDENTIFIER_REGEX = r'!?[a-z_][a-z0-9_]*' [all …]
|
D | check_files.py | 115 r'docs/.*\.pdf\Z', 116 r'programs/fuzz/corpuses/[^.]+\Z', 117 r'tests/data_files/[^.]+\Z', 118 r'tests/data_files/.*\.(crt|csr|db|der|key|pubkey)\Z', 119 r'tests/data_files/.*\.req\.[^/]+\Z', 120 r'tests/data_files/.*malformed[^/]+\Z', 121 r'tests/data_files/format_pkcs12\.fmt\Z',
|
/openthread-3.5.0/tests/scripts/thread-cert/ |
D | test_diag.py | 63 r'sending 0x14 packet\(s\), length 0x64\r\nstatus 0x00\r\n', 67 r'sending 0x14 packet\(s\), length 0x64\r\nstatus 0x00\r\n', 79 r'received packets: 0\r\nsent packets: ([1-9]\d*)\r\n' 82 r'stop diagnostics mode\r\nstatus 0x00\r\n', 87 r'Error 7: InvalidArgs\r\n',
|
D | requirements.txt | 8 # via -r requirements.in 14 # via -r requirements.in 20 # via -r requirements.in 22 # via -r requirements.in
|
D | node.py | 536 for entry in re.findall(r'"((?:[^\\]|\\.)*?)"', line): 910 self._expect(r"[^\n]+\n") 926 return self._expect_results(r'\S+') 1000 states = [r'disabled', r'petitioning', r'active'] 1044 states = [r'Disabled', r'Enabled'] 1060 return int(self._expect_result(r'\d+')) 1078 modes = [r'unicast', r'anycast'] 1088 return int(self._expect_result(r'\d+')) 1383 states = [r'Disabled', r'Enabled'] 1458 states = [r'Disabled', r'Primary', r'Secondary'] [all …]
|
/openthread-3.5.0/third_party/mbedtls/repo/scripts/mbedtls_dev/ |
D | macro_collector.py | 154 _argument_split_re = re.compile(r' *, *') 265 if re.match(r'MAC(?:_|\Z)', name): 267 elif re.match(r'KDF(?:_|\Z)', name): 269 elif re.search(r'0x020000[0-9A-Fa-f]{2}', expansion): 271 elif re.search(r'0x03[0-9A-Fa-f]{6}', expansion): 273 elif re.search(r'0x05[0-9A-Fa-f]{6}', expansion): 275 elif re.search(r'0x09[0-9A-Fa-f]{2}0000', expansion): 277 elif re.search(r'0x08[0-9A-Fa-f]{6}', expansion): 284 _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' + 285 r'(?:\s+|\((\w+)\)\s*)' + [all …]
|
D | asymmetric_key_data.py | 38 private = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_KEY_PAIR\1', typ, 1) 39 public = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_PUBLIC_KEY\1', typ, 1)
|
D | crypto_knowledge.py | 48 m = re.match(r'(\w+)\s*\((.*)\)\Z', self.name) 58 assert re.match(r'PSA_KEY_TYPE_\w+\Z', self.name) 65 self.private_type = re.sub(r'_PUBLIC_KEY\Z', r'_KEY_PAIR', self.name)
|
/openthread-3.5.0/third_party/jlink/SEGGER_RTT_V640/Syscalls/ |
D | SEGGER_RTT_Syscalls_GCC.c | 87 int _write_r(struct _reent *r, int file, const void *ptr, int len); 122 int _write_r(struct _reent *r, int file, const void *ptr, int len) { in _write_r() argument 124 (void) r; /* Not used, avoid warning */ in _write_r()
|
/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ecdsa.function | 212 mbedtls_mpi d, r, s; 218 mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s ); 227 TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, buf, sizeof( buf ), 230 TEST_ASSERT( mbedtls_ecdsa_verify( &grp, buf, sizeof( buf ), &Q, &r, &s ) == 0 ); 235 mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s ); 244 mbedtls_mpi d, r, s; 250 mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s ); 262 TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, buf, sizeof( buf ), 265 TEST_ASSERT( mbedtls_ecdsa_verify( &grp, buf, sizeof( buf ), &Q, &r, &s ) == 0 ); 270 mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s ); [all …]
|
D | test_suite_ecjpake.data | 58 ECJPAKE round one: KKP1: zero-length r 61 ECJPAKE round one: KKP1: no data for r 64 ECJPAKE round one: KKP1: corrupted r 106 ECJPAKE round one: KKP2: zero-length r 109 ECJPAKE round one: KKP2: no data for r 112 ECJPAKE round one: KKP2: corrupted r 172 ECJPAKE round two client: zero-length r 175 ECJPAKE round two client: no data for r 178 ECJPAKE round two client: corrupted r 226 ECJPAKE round two server: zero-length r [all …]
|
/openthread-3.5.0/third_party/mbedtls/repo/scripts/ |
D | min_requirements.py | 47 req = re.sub(r'>=|~=', r'==', req) 61 line = re.sub(r'(\A|\s+)#.*', r'', line) 64 m = re.match(r'-r\s+', line)
|
D | config.py | 363 _define_line_regexp = (r'(?P<indentation>\s*)' + 364 r'(?P<commented_out>(//\s*)?)' + 365 r'(?P<define>#\s*define\s+)' + 366 r'(?P<name>\w+)' + 367 r'(?P<arguments>(?:\((?:\w|\s|,)*\))?)' + 368 r'(?P<separator>\s*)' + 369 r'(?P<value>.*)') 370 _section_line_regexp = (r'\s*/?\*+\s*[\\@]name\s+SECTION:\s*' + 371 r'(?P<section>.*)[ */]*') 372 _config_line_regexp = re.compile(r'|'.join([_define_line_regexp,
|
/openthread-3.5.0/third_party/mbedtls/repo/programs/x509/ |
D | cert_req.c | 161 char *p, *q, *r; in main() local 232 if( ( r = strchr( q, ',' ) ) != NULL ) in main() 233 *r++ = '\0'; in main() 252 q = r; in main() 268 if( ( r = strchr( q, ',' ) ) != NULL ) in main() 269 *r++ = '\0'; in main() 288 q = r; in main()
|
/openthread-3.5.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ecdsa.h | 172 int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, 231 int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, 277 int mbedtls_ecdsa_sign_det_ext( mbedtls_ecp_group *grp, mbedtls_mpi *r, 319 const mbedtls_ecp_point *Q, const mbedtls_mpi *r,
|
/openthread-3.5.0/tests/scripts/thread-cert/pktverify/ |
D | coap.py | 75 r = 0 77 t, tvs, r = self._parse_next_tlv(payload, r)
|