/mbedtls-development/programs/psa/ |
A D | psa_constant_names.c | 287 int main(int argc, char *argv[]) in main() argument 290 !strcmp(argv[1], "help") || in main() 291 !strcmp(argv[1], "--help")) in main() 293 usage(argv[0]); in main() 297 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main() 301 argv + 2); in main() 302 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main() 305 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main() 308 } else if (!strcmp(argv[1], "group") || !strcmp(argv[1], "dh_group")) { in main() 311 } else if (!strcmp(argv[1], "type") || !strcmp(argv[1], "key_type")) { in main() [all …]
|
A D | key_ladder_demo.c | 611 int main( int argc, char *argv[] ) in main() argument 623 strcmp( argv[1], "help" ) == 0 || in main() 624 strcmp( argv[1], "-help" ) == 0 || in main() 625 strcmp( argv[1], "--help" ) == 0 ) in main() 633 char *q = strchr( argv[i], '=' ); in main() 641 if( strcmp( argv[i], "input" ) == 0 ) in main() 643 else if( strcmp( argv[i], "label" ) == 0 ) in main() 665 if( strcmp( argv[1], "generate" ) == 0 ) in main() 667 else if( strcmp( argv[1], "save" ) == 0 ) in main() 669 else if( strcmp( argv[1], "unwrap" ) == 0 ) in main() [all …]
|
/mbedtls-development/programs/aes/ |
A D | crypt_and_hash.c | 80 int main( int argc, char *argv[] ) in main() argument 148 mode = atoi( argv[1] ); in main() 156 if( strcmp( argv[2], argv[3] ) == 0 ) in main() 162 if( ( fin = fopen( argv[2], "rb" ) ) == NULL ) in main() 205 if( ( fkey = fopen( argv[6], "rb" ) ) != NULL ) in main() 212 if( memcmp( argv[6], "hex:", 4 ) == 0 ) in main() 214 p = &argv[6][4]; in main() 226 keylen = strlen( argv[6] ); in main() 231 memcpy( key, argv[6], keylen ); in main() 278 p = argv[2]; in main() [all …]
|
/mbedtls-development/programs/pkey/ |
A D | rsa_verify_pss.c | 57 int main( int argc, char *argv[] ) in main() argument 81 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 84 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 86 mbedtls_printf( " failed\n ! Could not read key from '%s'\n", argv[1] ); in main() 108 mbedtls_snprintf( filename, 512, "%s.sig", argv[2] ); in main() 129 argv[2], hash ) ) != 0 ) in main() 131 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main()
|
A D | pk_encrypt.c | 59 int main( int argc, char *argv[] ) in main() argument 99 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 102 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 108 if( strlen( argv[2] ) > 100 ) in main() 114 memcpy( input, argv[2], strlen( argv[2] ) ); in main() 122 if( ( ret = mbedtls_pk_encrypt( &pk, input, strlen( argv[2] ), in main()
|
A D | pk_sign.c | 57 int main( int argc, char *argv[] ) in main() argument 97 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 100 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main() 103 mbedtls_printf( " failed\n ! Could not parse '%s'\n", argv[1] ); in main() 116 argv[2], hash ) ) != 0 ) in main() 118 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main() 133 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[2] ); in main()
|
A D | rsa_sign_pss.c | 58 int main( int argc, char *argv[] ) in main() argument 98 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 101 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main() 104 mbedtls_printf( " failed\n ! Could not read key from '%s'\n", argv[1] ); in main() 132 argv[2], hash ) ) != 0 ) in main() 134 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main() 149 mbedtls_snprintf( filename, 512, "%s.sig", argv[2] ); in main()
|
A D | pk_verify.c | 54 int main( int argc, char *argv[] ) in main() argument 78 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 81 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 90 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[2] ); in main() 111 argv[2], hash ) ) != 0 ) in main() 113 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main()
|
A D | rsa_encrypt.c | 57 int main( int argc, char *argv[] ) in main() argument 127 if( strlen( argv[1] ) > 100 ) in main() 133 memcpy( input, argv[1], strlen( argv[1] ) ); in main() 142 &ctr_drbg, strlen( argv[1] ), input, buf ); in main()
|
A D | rsa_sign.c | 54 int main( int argc, char *argv[] ) in main() argument 139 argv[1], hash ) ) != 0 ) in main() 141 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[1] ); in main() 155 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[1] ); in main() 159 mbedtls_printf( " failed\n ! Could not create %s\n\n", argv[1] ); in main()
|
A D | rsa_verify.c | 53 int main( int argc, char *argv[] ) in main() argument 103 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[1] ); in main() 133 argv[1], hash ) ) != 0 ) in main() 135 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[1] ); in main()
|
A D | pk_decrypt.c | 58 int main( int argc, char *argv[] ) in main() argument 71 ((void) argv); in main() 102 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 105 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main()
|
/mbedtls-development/programs/ |
A D | wince_main.c | 28 char **argv; in _tmain() local 31 argv = ( char ** ) calloc( argc, sizeof( char * ) ); in _tmain() 36 argv[i] = ( char * ) calloc( len, sizeof( char ) ); in _tmain() 37 wcstombs( argv[i], targv[i], len ); in _tmain() 40 return main( argc, argv ); in _tmain()
|
/mbedtls-development/programs/random/ |
A D | gen_entropy.c | 49 int main( int argc, char *argv[] ) in main() argument 59 mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] ); in main() 63 if( ( f = fopen( argv[1], "wb+" ) ) == NULL ) in main() 65 mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] ); in main() 84 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
A D | gen_random_ctr_drbg.c | 52 int main( int argc, char *argv[] ) in main() argument 65 mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] ); in main() 69 if( ( f = fopen( argv[1], "wb+" ) ) == NULL ) in main() 71 mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] ); in main() 116 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
/mbedtls-development/programs/x509/ |
A D | load_roots.c | 134 int main( int argc, char *argv[] ) in main() argument 153 char *p = argv[i]; in main() 164 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' ) in main() 165 argv[i][j] |= 0x20; in main() 184 opt.filenames = (const char**) argv + i; in main()
|
A D | cert_app.c | 144 int main( int argc, char *argv[] ) in main() argument 197 p = argv[i]; in main() 204 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' ) in main() 205 argv[i][j] |= 0x20; in main()
|
/mbedtls-development/programs/util/ |
A D | strerror.c | 50 int main( int argc, char *argv[] ) in main() argument 53 char *end = argv[1]; in main() 61 val = strtol( argv[1], &end, 10 ); in main() 64 val = strtol( argv[1], &end, 16 ); in main()
|
/mbedtls-development/programs/test/ |
A D | query_compile_time_config.c | 41 int main( int argc, char *argv[] ) in main() argument 45 mbedtls_printf( USAGE, argv[0] ); in main() 49 return( query_config( argv[1] ) ); in main()
|
A D | benchmark.c | 547 int main( int argc, char *argv[] ) in main() argument 578 if( strcmp( argv[i], "md5" ) == 0 ) in main() 582 else if( strcmp( argv[i], "sha1" ) == 0 ) in main() 584 else if( strcmp( argv[i], "sha256" ) == 0 ) in main() 588 else if( strcmp( argv[i], "des3" ) == 0 ) in main() 590 else if( strcmp( argv[i], "des" ) == 0 ) in main() 606 else if( strcmp( argv[i], "aria" ) == 0 ) in main() 618 else if( strcmp( argv[i], "rsa" ) == 0 ) in main() 620 else if( strcmp( argv[i], "dhm" ) == 0 ) in main() 622 else if( strcmp( argv[i], "ecdsa" ) == 0 ) in main() [all …]
|
A D | zeroize.c | 55 int main( int argc, char** argv ) in main() argument 71 fp = fopen( argv[1], "r" ); in main() 74 mbedtls_printf( "Could not open file '%s'\n", argv[1] ); in main()
|
/mbedtls-development/programs/hash/ |
A D | generic_sum.c | 170 int main( int argc, char *argv[] ) in main() argument 206 md_info = mbedtls_md_info_from_string( argv[1] ); in main() 209 mbedtls_fprintf( stderr, "Message Digest '%s' not found\n", argv[1] ); in main() 219 if( argc == 4 && strcmp( "-c", argv[2] ) == 0 ) in main() 221 ret |= generic_check( md_info, argv[3] ); in main() 226 ret |= generic_print( md_info, argv[i] ); in main()
|
/mbedtls-development/programs/ssl/ |
A D | ssl_context_info.c | 190 void parse_arguments( int argc, char *argv[] ) in parse_arguments() argument 202 if( strcmp( argv[i], "-d" ) == 0 ) in parse_arguments() 206 else if( strcmp( argv[i], "-h" ) == 0 ) in parse_arguments() 210 else if( strcmp( argv[i], "-v" ) == 0 ) in parse_arguments() 214 else if( strcmp( argv[i], "-f" ) == 0 ) in parse_arguments() 222 if( ( b64_file = fopen( argv[i], "r" ) ) == NULL ) in parse_arguments() 224 printf_err( "Cannot find file \"%s\"\n", argv[i] ); in parse_arguments() 228 else if( strcmp( argv[i], "--keep-peer-cert=0" ) == 0 ) in parse_arguments() 232 else if( strcmp( argv[i], "--dtls-protocol=0" ) == 0 ) in parse_arguments() 1010 int main( int argc, char *argv[] ) in main() argument [all …]
|
/mbedtls-development/scripts/ |
A D | ecp_comb_table.py | 219 All possible curves: """ % sys.argv[0]) 241 if len(sys.argv) <= 1: 244 for curve in sys.argv[1:]:
|
/mbedtls-development/programs/fuzz/ |
A D | onefile.c | 12 int main(int argc, char** argv) in main() argument 22 fp = fopen(argv[1], "rb"); in main()
|