| /lib/mbedtls/external/mbedtls/programs/test/ |
| A D | query_config.c | 120 if( strcmp( "MBEDTLS_HAVE_ASM", config ) == 0 ) in query_config() 144 if( strcmp( "MBEDTLS_HAVE_SSE2", config ) == 0 ) in query_config() 304 if( strcmp( "MBEDTLS_AES_ALT", config ) == 0 ) in query_config() 328 if( strcmp( "MBEDTLS_CCM_ALT", config ) == 0 ) in query_config() 360 if( strcmp( "MBEDTLS_DES_ALT", config ) == 0 ) in query_config() 368 if( strcmp( "MBEDTLS_DHM_ALT", config ) == 0 ) in query_config() 384 if( strcmp( "MBEDTLS_GCM_ALT", config ) == 0 ) in query_config() 400 if( strcmp( "MBEDTLS_MD5_ALT", config ) == 0 ) in query_config() 1088 if( strcmp( "MBEDTLS_FS_IO", config ) == 0 ) in query_config() 1832 if( strcmp( "MBEDTLS_MD_C", config ) == 0 ) in query_config() [all …]
|
| A D | udp_proxy.c | 200 if (strcmp(p, "server_addr") == 0) { in get_options() 213 } else if (strcmp(p, "delay") == 0) { in get_options() 230 if (strcmp(p, "delay_cli") == 0) { in get_options() 253 } else if (strcmp(p, "drop") == 0) { in get_options() 258 } else if (strcmp(p, "pack") == 0) { in get_options() 265 } else if (strcmp(p, "mtu") == 0) { in get_options() 270 } else if (strcmp(p, "bad_ad") == 0) { in get_options() 277 else if (strcmp(p, "bad_cid") == 0) { in get_options() 296 } else if (strcmp(p, "seed") == 0) { in get_options() 545 strcmp(p->type, "CID") == 0 && in send_packet() [all …]
|
| A D | benchmark.c | 544 if (strcmp(argv[i], "md5") == 0) { in main() 548 } else if (strcmp(argv[i], "sha1") == 0) { in main() 550 } else if (strcmp(argv[i], "sha256") == 0) { in main() 552 } else if (strcmp(argv[i], "sha512") == 0) { in main() 562 } else if (strcmp(argv[i], "des3") == 0) { in main() 564 } else if (strcmp(argv[i], "des") == 0) { in main() 586 } else if (strcmp(argv[i], "aria") == 0) { in main() 598 } else if (strcmp(argv[i], "rsa") == 0) { in main() 600 } else if (strcmp(argv[i], "dhm") == 0) { in main() 602 } else if (strcmp(argv[i], "ecdsa") == 0) { in main() [all …]
|
| A D | query_compile_time_config.c | 31 if (argc < 2 || strcmp(argv[1], "-h") == 0) { in main() 36 if (strcmp(argv[1], "-l") == 0) { in main() 41 if (strcmp(argv[1], "-all") == 0) { in main() 50 if (strcmp(argv[1], "-any") == 0) { in main()
|
| A D | selftest.c | 502 if (strcmp(*argp, "--quiet") == 0 || in main() 503 strcmp(*argp, "-q") == 0) { in main() 505 } else if (strcmp(*argp, "--exclude") == 0 || in main() 506 strcmp(*argp, "-x") == 0) { in main() 527 if (!strcmp(*argp, test->name)) { in main() 546 if (!strcmp(*excluded, test->name)) { in main()
|
| /lib/mbedtls/external/mbedtls/programs/x509/ |
| A D | cert_req.c | 199 if (strcmp(p, "filename") == 0) { in main() 201 } else if (strcmp(p, "password") == 0) { in main() 203 } else if (strcmp(p, "output_file") == 0) { in main() 205 } else if (strcmp(p, "debug_level") == 0) { in main() 212 } else if (strcmp(p, "san") == 0) { in main() 258 if (strcmp(q, "RFC822") == 0) { in main() 260 } else if (strcmp(q, "URI") == 0) { in main() 264 } else if (strcmp(q, "IP") == 0) { in main() 275 } else if (strcmp(q, "DN") == 0) { in main() 309 } else if (strcmp(p, "md") == 0) { in main() [all …]
|
| A D | cert_write.c | 382 if (strcmp(p, "request_file") == 0) { in main() 404 } else if (strcmp(p, "serial") == 0) { in main() 439 } else if (strcmp(p, "md") == 0) { in main() 447 } else if (strcmp(p, "version") == 0) { in main() 454 } else if (strcmp(p, "selfsign") == 0) { in main() 460 } else if (strcmp(p, "is_ca") == 0) { in main() 533 } else if (strcmp(p, "san") == 0) { in main() 579 if (strcmp(q, "RFC822") == 0) { in main() 657 } else if (strcmp(p, "format") == 0) { in main() 658 if (strcmp(q, "der") == 0) { in main() [all …]
|
| A D | cert_app.c | 191 if (strcmp(p, "mode") == 0) { in main() 192 if (strcmp(q, "file") == 0) { in main() 194 } else if (strcmp(q, "ssl") == 0) { in main() 199 } else if (strcmp(p, "filename") == 0) { in main() 201 } else if (strcmp(p, "ca_file") == 0) { in main() 203 } else if (strcmp(p, "crl_file") == 0) { in main() 205 } else if (strcmp(p, "ca_path") == 0) { in main() 207 } else if (strcmp(p, "server_name") == 0) { in main() 209 } else if (strcmp(p, "server_port") == 0) { in main() 211 } else if (strcmp(p, "debug_level") == 0) { in main() [all …]
|
| A D | load_roots.c | 109 if (strcmp(p, "--") == 0) { in main() 123 if (strcmp(p, "iterations") == 0) { in main() 125 } else if (strcmp(p, "prime") == 0) { in main()
|
| /lib/mbedtls/external/mbedtls/programs/ssl/ |
| A D | ssl_test_lib.c | 196 strcmp(*alg1, "rsa-sign-pss") != 0 && in key_opaque_alg_parse() 200 strcmp(*alg1, "rsa-decrypt") != 0 && in key_opaque_alg_parse() 201 strcmp(*alg1, "ecdsa-sign") != 0 && in key_opaque_alg_parse() 202 strcmp(*alg1, "ecdh") != 0) { in key_opaque_alg_parse() 207 strcmp(*alg2, "rsa-sign-pss") != 0 && in key_opaque_alg_parse() 211 strcmp(*alg2, "rsa-decrypt") != 0 && in key_opaque_alg_parse() 212 strcmp(*alg2, "ecdsa-sign") != 0 && in key_opaque_alg_parse() 213 strcmp(*alg2, "ecdh") != 0 && in key_opaque_alg_parse() 214 strcmp(*alg2, "none") != 0) { in key_opaque_alg_parse() 228 if (strcmp(alg1, "none") != 0) { in key_opaque_set_alg_usage() [all …]
|
| A D | ssl_client2.c | 1018 if (strcmp(p, "help") == 0) { in main() 1067 if (strcmp(q, "1") == 0) { in main() 1120 else if (strcmp(p, "cid") == 0) { in main() 1136 else if (strcmp(p, "psk") == 0) { in main() 1243 else if (strcmp(p, "etm") == 0) { in main() 1267 if (strcmp(q, "psk") == 0) { in main() 1288 if (strcmp(q, "tls12") == 0 || in main() 1301 if (strcmp(q, "tls12") == 0 || in main() 1320 if (strcmp(q, "tls12") == 0) { in main() 1338 if (strcmp(q, "none") == 0) { in main() [all …]
|
| A D | ssl_server2.c | 720 if (strcmp(s, "none") == 0) { in get_auth_mode() 723 if (strcmp(s, "optional") == 0) { in get_auth_mode() 726 if (strcmp(s, "required") == 0) { in get_auth_mode() 832 if (strcmp(ca_file, "-") != 0) { in sni_parse() 845 if (strcmp(crl_file, "-") != 0) { in sni_parse() 858 if (strcmp(auth_str, "-") != 0) { in sni_parse() 1474 if (strcmp(buf, "AES-128-CCM")) { in parse_cipher() 1806 if (strcmp(p, "help") == 0) { in main() 1853 if (strcmp(q, "1") == 0) { in main() 2044 if (strcmp(q, "psk") == 0) { in main() [all …]
|
| A D | ssl_mail_client.c | 405 if (strcmp(p, "server_name") == 0) { in main() 407 } else if (strcmp(p, "server_port") == 0) { in main() 409 } else if (strcmp(p, "debug_level") == 0) { in main() 419 } else if (strcmp(p, "mode") == 0) { in main() 424 } else if (strcmp(p, "user_name") == 0) { in main() 426 } else if (strcmp(p, "user_pwd") == 0) { in main() 428 } else if (strcmp(p, "mail_from") == 0) { in main() 430 } else if (strcmp(p, "mail_to") == 0) { in main() 432 } else if (strcmp(p, "ca_file") == 0) { in main() 434 } else if (strcmp(p, "crt_file") == 0) { in main() [all …]
|
| /lib/mbedtls/ |
| A D | public_key.c | 26 if (strcmp(pkey->pkey_algo, "rsa")) { in public_key_verify_signature() 39 if (strcmp(sig->encoding, "pkcs1")) { in public_key_verify_signature() 45 if (!strcmp(sig->hash_algo, "sha1")) in public_key_verify_signature() 47 else if (!strcmp(sig->hash_algo, "sha224")) in public_key_verify_signature() 49 else if (!strcmp(sig->hash_algo, "sha256")) in public_key_verify_signature() 51 else if (!strcmp(sig->hash_algo, "sha384")) in public_key_verify_signature() 53 else if (!strcmp(sig->hash_algo, "sha512")) in public_key_verify_signature()
|
| /lib/mbedtls/external/mbedtls/programs/psa/ |
| A D | psa_constant_names.c | 280 !strcmp(argv[1], "help") || in main() 281 !strcmp(argv[1], "--help")) { in main() 286 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main() 291 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main() 294 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main() 297 } else if (!strcmp(argv[1], "group") || !strcmp(argv[1], "dh_group")) { in main() 300 } else if (!strcmp(argv[1], "type") || !strcmp(argv[1], "key_type")) { in main() 303 } else if (!strcmp(argv[1], "usage") || !strcmp(argv[1], "key_usage")) { in main()
|
| A D | key_ladder_demo.c | 619 strcmp(argv[1], "help") == 0 || in main() 620 strcmp(argv[1], "-help") == 0 || in main() 621 strcmp(argv[1], "--help") == 0) { in main() 634 if (strcmp(argv[i], "input") == 0) { in main() 636 } else if (strcmp(argv[i], "label") == 0) { in main() 644 } else if (strcmp(argv[i], "master") == 0) { in main() 646 } else if (strcmp(argv[i], "output") == 0) { in main() 654 if (strcmp(argv[1], "generate") == 0) { in main() 656 } else if (strcmp(argv[1], "save") == 0) { in main() 658 } else if (strcmp(argv[1], "unwrap") == 0) { in main() [all …]
|
| A D | aead_demo.c | 127 if (strcmp(info, "aes128-gcm") == 0) { in aead_prepare() 131 } else if (strcmp(info, "aes256-gcm") == 0) { in aead_prepare() 135 } else if (strcmp(info, "aes128-gcm_8") == 0) { in aead_prepare() 139 } else if (strcmp(info, "chachapoly") == 0) { in aead_prepare()
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_version.function | 31 TEST_ASSERT(strcmp(build_str, MBEDTLS_VERSION_STRING) == 0); 32 TEST_ASSERT(strcmp(build_str_full, MBEDTLS_VERSION_STRING_FULL) == 0); 33 TEST_ASSERT(strcmp(version_str, MBEDTLS_VERSION_STRING) == 0); 61 TEST_ASSERT(strcmp(build_str, version_str) == 0); 62 TEST_ASSERT(strcmp(build_str_full, get_str_full) == 0); 63 TEST_ASSERT(strcmp(version_str, get_str) == 0);
|
| A D | test_suite_x509parse.function | 518 TEST_EQUAL(strcmp(buf, result_str), 0); 543 TEST_EQUAL(strcmp(buf, result_str), 0); 568 TEST_EQUAL(strcmp(buf, result_str), 0); 611 TEST_EQUAL(strcmp(buf, result_str), 0); 632 TEST_EQUAL(strcmp(buf, result_str), 0); 720 if (strcmp(profile_str, "") == 0) { 763 if (strcmp(crl_file, "") == 0) { 803 if (strcmp(name, "NULL") == 0) { 839 if (strcmp(name, "NULL") == 0) { 905 if (strcmp(entity, "subject") == 0) { [all …]
|
| A D | test_suite_debug.function | 84 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); 120 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); 156 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); 195 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); 236 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
|
| /lib/lwip/lwip/contrib/examples/httpd/cgi_example/ |
| A D | cgi_example.c | 94 if (!strcmp(pcParam[0], "foo")) { in cgi_handler_basic() 95 if (!strcmp(pcValue[0], "bar")) { in cgi_handler_basic() 96 if (!strcmp(pcParam[1], "test")) { in cgi_handler_basic() 97 if (!strcmp(pcValue[1], "123")) { in cgi_handler_basic()
|
| /lib/mbedtls/external/mbedtls/programs/pkey/ |
| A D | key_app_writer.c | 305 if (strcmp(p, "mode") == 0) { in main() 306 if (strcmp(q, "private") == 0) { in main() 308 } else if (strcmp(q, "public") == 0) { in main() 313 } else if (strcmp(p, "output_mode") == 0) { in main() 314 if (strcmp(q, "private") == 0) { in main() 316 } else if (strcmp(q, "public") == 0) { in main() 321 } else if (strcmp(p, "output_format") == 0) { in main() 323 if (strcmp(q, "pem") == 0) { in main() 327 if (strcmp(q, "der") == 0) { in main() 332 } else if (strcmp(p, "filename") == 0) { in main() [all …]
|
| A D | gen_key.c | 294 if (strcmp(p, "type") == 0) { in main() 295 if (strcmp(q, "rsa") == 0) { in main() 297 } else if (strcmp(q, "ec") == 0) { in main() 302 } else if (strcmp(p, "format") == 0) { in main() 303 if (strcmp(q, "pem") == 0) { in main() 305 } else if (strcmp(q, "der") == 0) { in main() 310 } else if (strcmp(p, "rsa_keysize") == 0) { in main() 318 else if (strcmp(p, "ec_curve") == 0) { in main() 325 else if (strcmp(p, "filename") == 0) { in main() 327 } else if (strcmp(p, "use_dev_random") == 0) { in main()
|
| A D | key_app.c | 186 if (strcmp(p, "mode") == 0) { in main() 187 if (strcmp(q, "private") == 0) { in main() 189 } else if (strcmp(q, "public") == 0) { in main() 194 } else if (strcmp(p, "filename") == 0) { in main() 196 } else if (strcmp(p, "password") == 0) { in main() 198 } else if (strcmp(p, "password_file") == 0) { in main()
|
| /lib/mbedtls/external/mbedtls/programs/cipher/ |
| A D | cipher_aead_demo.c | 122 if (strcmp(info, "aes128-gcm") == 0) { in aead_prepare() 125 } else if (strcmp(info, "aes256-gcm") == 0) { in aead_prepare() 128 } else if (strcmp(info, "aes128-gcm_8") == 0) { in aead_prepare() 131 } else if (strcmp(info, "chachapoly") == 0) { in aead_prepare()
|