Home
last modified time | relevance | path

Searched refs:pattern (Results 1 – 21 of 21) sorted by relevance

/mbedtls/scripts/
A Dgenerate_ssl_debug_helpers.py26 pattern = re.compile(string_pattern + r'|' + comment_pattern,
33 return pattern.sub(replacer, string)
53 pattern = re.compile(r"^[ \t]*#[ \t]*" +
83 for match in pattern.finditer(source):
/mbedtls/tests/scripts/
A Dcheck_names.py157 def __init__(self, pattern, match): argument
158 self.pattern = pattern
176 self.pattern
311 for pattern in exclude_wildcards:
312 if fnmatch.fnmatch(path, pattern):
A Dtest_config_script.py37 pattern = output_file_name(directory, '*', extension)
38 filenames = glob.glob(pattern)
A Dgenerate_psa_tests.py775 for pattern, replace in keyword_translation.items():
776 if re.match(pattern, keyword):
A Dgenerate_test_code.py1111 template.pattern = placeholder_pattern
A Dall.sh236 for pattern in $COMMAND_LINE_COMPONENTS; do
250 COMPONENT can be the name of a component or a shell wildcard pattern.
/mbedtls/tests/suites/
A Dtest_suite_psa_crypto_memory.function14 /* Helper to fill a buffer with a data pattern. The pattern is not
A Dtest_suite_ssl.function2759 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake";
3098 srv_pattern.pattern = cli_pattern.pattern = "cache did not store session";
3765 server_pattern.pattern =
3772 server_pattern.pattern =
3790 server_pattern.pattern =
3798 server_pattern.pattern =
4789 char pattern[128];
4835 server_pattern.pattern = pattern;
4843 ret = mbedtls_snprintf(pattern, sizeof(pattern),
4856 pattern, sizeof(pattern),
[all …]
A Dtest_suite_lmots.function232 /* Fill with recognisable pattern */
A Dtest_suite_pkcs1_v15.function180 /* A randomly generated pattern. */
A Dtest_suite_pkparse.data1203 # Full inverse of the expected x25519 pattern:
1212 # Full inverse of the expected x448 pattern:
A Dtest_suite_pk.function2670 /* Test #3: sign/verify with the following pattern:
/mbedtls/tests/include/test/
A Dssl_helpers.h86 const char *pattern; member
/mbedtls/tests/data_files/
A DReadme-x509.txt40 - name or pattern
/mbedtls/tests/
A DCMakeLists.txt152 # "foo" as a skip pattern skips "test_suite_foo" and "test_suite_foo.bar"
/mbedtls/docs/architecture/
A Dalternative-implementations.md91 Note that there are variations on the naming pattern. For example, some configurable functions are …
A Dpsa-storage-resilience.md127 …ollow this pattern, with `t` being the file containing the transaction list that the recovery cons…
129 Note that this pattern requires the state of `id` to be modified only once. In particular, if a key…
/mbedtls/docs/architecture/psa-thread-safety/
A Dpsa-thread-safety.md200 We have defined a set of macros in `library/psa_crypto_core.h` to capture the common pattern of (un…
219 One-shot operations follow a standard pattern when using an existing key:
225 …p" function where the key is passed in, these functions follow the above pattern. The key is copie…
/mbedtls/tests/src/test_helpers/
A Dssl_helpers.c36 NULL != p->pattern && in mbedtls_test_ssl_log_analyzer()
37 NULL != strstr(str, p->pattern)) { in mbedtls_test_ssl_log_analyzer()
/mbedtls/docs/
A Dpsa-transition.md182 The availability of cryptographic mechanisms in the PSA API is based on a systematic pattern:
/mbedtls/
A DChangeLog1161 pattern for PSA_WANT_xxx symbols. Previously you had to specify
4789 usage pattern

Completed in 88 milliseconds