Searched refs:pattern (Results 1 – 21 of 21) sorted by relevance
/mbedtls/scripts/ |
A D | generate_ssl_debug_helpers.py | 26 pattern = re.compile(string_pattern + r'|' + comment_pattern, 33 return pattern.sub(replacer, string) 53 pattern = re.compile(r"^[ \t]*#[ \t]*" + 83 for match in pattern.finditer(source):
|
/mbedtls/tests/scripts/ |
A D | check_names.py | 157 def __init__(self, pattern, match): argument 158 self.pattern = pattern 176 self.pattern 311 for pattern in exclude_wildcards: 312 if fnmatch.fnmatch(path, pattern):
|
A D | test_config_script.py | 37 pattern = output_file_name(directory, '*', extension) 38 filenames = glob.glob(pattern)
|
A D | generate_psa_tests.py | 775 for pattern, replace in keyword_translation.items(): 776 if re.match(pattern, keyword):
|
A D | generate_test_code.py | 1111 template.pattern = placeholder_pattern
|
A D | all.sh | 236 for pattern in $COMMAND_LINE_COMPONENTS; do 250 COMPONENT can be the name of a component or a shell wildcard pattern.
|
/mbedtls/tests/suites/ |
A D | test_suite_psa_crypto_memory.function | 14 /* Helper to fill a buffer with a data pattern. The pattern is not
|
A D | test_suite_ssl.function | 2759 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake"; 3098 srv_pattern.pattern = cli_pattern.pattern = "cache did not store session"; 3765 server_pattern.pattern = 3772 server_pattern.pattern = 3790 server_pattern.pattern = 3798 server_pattern.pattern = 4789 char pattern[128]; 4835 server_pattern.pattern = pattern; 4843 ret = mbedtls_snprintf(pattern, sizeof(pattern), 4856 pattern, sizeof(pattern), [all …]
|
A D | test_suite_lmots.function | 232 /* Fill with recognisable pattern */
|
A D | test_suite_pkcs1_v15.function | 180 /* A randomly generated pattern. */
|
A D | test_suite_pkparse.data | 1203 # Full inverse of the expected x25519 pattern: 1212 # Full inverse of the expected x448 pattern:
|
A D | test_suite_pk.function | 2670 /* Test #3: sign/verify with the following pattern:
|
/mbedtls/tests/include/test/ |
A D | ssl_helpers.h | 86 const char *pattern; member
|
/mbedtls/tests/data_files/ |
A D | Readme-x509.txt | 40 - name or pattern
|
/mbedtls/tests/ |
A D | CMakeLists.txt | 152 # "foo" as a skip pattern skips "test_suite_foo" and "test_suite_foo.bar"
|
/mbedtls/docs/architecture/ |
A D | alternative-implementations.md | 91 Note that there are variations on the naming pattern. For example, some configurable functions are …
|
A D | psa-storage-resilience.md | 127 …ollow this pattern, with `t` being the file containing the transaction list that the recovery cons… 129 Note that this pattern requires the state of `id` to be modified only once. In particular, if a key…
|
/mbedtls/docs/architecture/psa-thread-safety/ |
A D | psa-thread-safety.md | 200 We have defined a set of macros in `library/psa_crypto_core.h` to capture the common pattern of (un… 219 One-shot operations follow a standard pattern when using an existing key: 225 …p" function where the key is passed in, these functions follow the above pattern. The key is copie…
|
/mbedtls/tests/src/test_helpers/ |
A D | ssl_helpers.c | 36 NULL != p->pattern && in mbedtls_test_ssl_log_analyzer() 37 NULL != strstr(str, p->pattern)) { in mbedtls_test_ssl_log_analyzer()
|
/mbedtls/docs/ |
A D | psa-transition.md | 182 The availability of cryptographic mechanisms in the PSA API is based on a systematic pattern:
|
/mbedtls/ |
A D | ChangeLog | 1161 pattern for PSA_WANT_xxx symbols. Previously you had to specify 4789 usage pattern
|
Completed in 88 milliseconds