/mbedtls-3.4.0/programs/psa/ |
D | psa_constant_names.c | 287 int main(int argc, char *argv[]) in main() argument 290 !strcmp(argv[1], "help") || in main() 291 !strcmp(argv[1], "--help")) in main() 293 usage(argv[0]); in main() 297 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main() 301 argv + 2); in main() 302 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main() 304 argv + 2); in main() 305 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main() 307 argv + 2); in main() [all …]
|
D | key_ladder_demo.c | 624 int main( int argc, char *argv[] ) in main() argument 636 strcmp( argv[1], "help" ) == 0 || in main() 637 strcmp( argv[1], "-help" ) == 0 || in main() 638 strcmp( argv[1], "--help" ) == 0 ) in main() 646 char *q = strchr( argv[i], '=' ); in main() 649 printf( "Missing argument to option %s\n", argv[i] ); in main() 654 if( strcmp( argv[i], "input" ) == 0 ) in main() 656 else if( strcmp( argv[i], "label" ) == 0 ) in main() 667 else if( strcmp( argv[i], "master" ) == 0 ) in main() 669 else if( strcmp( argv[i], "output" ) == 0 ) in main() [all …]
|
/mbedtls-3.4.0/programs/test/ |
D | query_compile_time_config.c | 39 int main( int argc, char *argv[] ) in main() argument 43 if ( argc == 1 || strcmp( argv[1], "-h" ) == 0 ) in main() 45 mbedtls_printf( USAGE, argv[0] ); in main() 49 if( strcmp( argv[1], "-l" ) == 0 ) in main() 55 if( strcmp( argv[1], "-all" ) == 0 ) in main() 59 if( query_config( argv[i] ) != 0 ) in main() 65 if( strcmp( argv[1], "-any" ) == 0 ) in main() 69 if( query_config( argv[i] ) == 0 ) in main() 77 if( query_config( argv[i] ) != 0 ) in main()
|
D | benchmark.c | 524 int main( int argc, char *argv[] ) in main() argument 555 if( strcmp( argv[i], "md5" ) == 0 ) in main() 557 else if( strcmp( argv[i], "ripemd160" ) == 0 ) in main() 559 else if( strcmp( argv[i], "sha1" ) == 0 ) in main() 561 else if( strcmp( argv[i], "sha256" ) == 0 ) in main() 563 else if( strcmp( argv[i], "sha512" ) == 0 ) in main() 565 else if( strcmp( argv[i], "des3" ) == 0 ) in main() 567 else if( strcmp( argv[i], "des" ) == 0 ) in main() 569 else if( strcmp( argv[i], "aes_cbc" ) == 0 ) in main() 571 else if( strcmp( argv[i], "aes_xts" ) == 0 ) in main() [all …]
|
D | zeroize.c | 47 int main( int argc, char** argv ) in main() argument 63 fp = fopen( argv[1], "r" ); in main() 66 mbedtls_printf( "Could not open file '%s'\n", argv[1] ); in main()
|
/mbedtls-3.4.0/programs/aes/ |
D | crypt_and_hash.c | 70 int main( int argc, char *argv[] ) in main() argument 133 mode = atoi( argv[1] ); in main() 141 if( strcmp( argv[2], argv[3] ) == 0 ) in main() 147 if( ( fin = fopen( argv[2], "rb" ) ) == NULL ) in main() 149 mbedtls_fprintf( stderr, "fopen(%s,rb) failed\n", argv[2] ); in main() 153 if( ( fout = fopen( argv[3], "wb+" ) ) == NULL ) in main() 155 mbedtls_fprintf( stderr, "fopen(%s,wb+) failed\n", argv[3] ); in main() 166 cipher_info = mbedtls_cipher_info_from_string( argv[4] ); in main() 169 mbedtls_fprintf( stderr, "Cipher '%s' not found\n", argv[4] ); in main() 178 md_info = mbedtls_md_info_from_string( argv[5] ); in main() [all …]
|
/mbedtls-3.4.0/programs/pkey/ |
D | rsa_verify_pss.c | 47 int main( int argc, char *argv[] ) in main() argument 71 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 74 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 76 mbedtls_printf( " failed\n ! Could not read key from '%s'\n", argv[1] ); in main() 98 mbedtls_snprintf( filename, 512, "%s.sig", argv[2] ); in main() 119 argv[2], hash ) ) != 0 ) in main() 121 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main()
|
D | pk_encrypt.c | 49 int main( int argc, char *argv[] ) in main() argument 89 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 92 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 98 if( strlen( argv[2] ) > 100 ) in main() 104 memcpy( input, argv[2], strlen( argv[2] ) ); in main() 112 if( ( ret = mbedtls_pk_encrypt( &pk, input, strlen( argv[2] ), in main()
|
D | rsa_sign_pss.c | 48 int main( int argc, char *argv[] ) in main() argument 88 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 91 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main() 94 mbedtls_printf( " failed\n ! Could not read key from '%s'\n", argv[1] ); in main() 122 argv[2], hash ) ) != 0 ) in main() 124 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main() 139 mbedtls_snprintf( filename, 512, "%s.sig", argv[2] ); in main()
|
D | pk_sign.c | 47 int main( int argc, char *argv[] ) in main() argument 87 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 90 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main() 93 mbedtls_printf( " failed\n ! Could not parse '%s'\n", argv[1] ); in main() 106 argv[2], hash ) ) != 0 ) in main() 108 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main() 123 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[2] ); in main()
|
D | pk_verify.c | 44 int main( int argc, char *argv[] ) in main() argument 68 mbedtls_printf( "\n . Reading public key from '%s'", argv[1] ); in main() 71 if( ( ret = mbedtls_pk_parse_public_keyfile( &pk, argv[1] ) ) != 0 ) in main() 80 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[2] ); in main() 101 argv[2], hash ) ) != 0 ) in main() 103 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[2] ); in main()
|
D | rsa_encrypt.c | 47 int main( int argc, char *argv[] ) in main() argument 117 if( strlen( argv[1] ) > 100 ) in main() 123 memcpy( input, argv[1], strlen( argv[1] ) ); in main() 132 &ctr_drbg, strlen( argv[1] ), input, buf ); in main()
|
D | rsa_sign.c | 43 int main( int argc, char *argv[] ) in main() argument 128 argv[1], hash ) ) != 0 ) in main() 130 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[1] ); in main() 144 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[1] ); in main() 148 mbedtls_printf( " failed\n ! Could not create %s\n\n", argv[1] ); in main()
|
D | rsa_verify.c | 43 int main( int argc, char *argv[] ) in main() argument 93 mbedtls_snprintf( filename, sizeof(filename), "%s.sig", argv[1] ); in main() 123 argv[1], hash ) ) != 0 ) in main() 125 mbedtls_printf( " failed\n ! Could not open or read %s\n\n", argv[1] ); in main()
|
D | pk_decrypt.c | 49 int main( int argc, char *argv[] ) in main() argument 62 ((void) argv); in main() 93 mbedtls_printf( "\n . Reading private key from '%s'", argv[1] ); in main() 96 if( ( ret = mbedtls_pk_parse_keyfile( &pk, argv[1], "", in main()
|
/mbedtls-3.4.0/programs/ |
D | wince_main.c | 28 char **argv; in _tmain() local 31 argv = ( char ** ) calloc( argc, sizeof( char * ) ); in _tmain() 36 argv[i] = ( char * ) calloc( len, sizeof( char ) ); in _tmain() 37 wcstombs( argv[i], targv[i], len ); in _tmain() 40 return main( argc, argv ); in _tmain()
|
/mbedtls-3.4.0/programs/random/ |
D | gen_entropy.c | 39 int main( int argc, char *argv[] ) in main() argument 49 mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] ); in main() 53 if( ( f = fopen( argv[1], "wb+" ) ) == NULL ) in main() 55 mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] ); in main() 74 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
D | gen_random_ctr_drbg.c | 42 int main( int argc, char *argv[] ) in main() argument 55 mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] ); in main() 59 if( ( f = fopen( argv[1], "wb+" ) ) == NULL ) in main() 61 mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] ); in main() 106 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
/mbedtls-3.4.0/programs/x509/ |
D | load_roots.c | 122 int main( int argc, char *argv[] ) in main() argument 141 char *p = argv[i]; in main() 152 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' ) in main() 153 argv[i][j] |= 0x20; in main() 172 opt.filenames = (const char**) argv + i; in main()
|
D | cert_app.c | 132 int main( int argc, char *argv[] ) in main() argument 185 p = argv[i]; in main() 192 if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' ) in main() 193 argv[i][j] |= 0x20; in main()
|
/mbedtls-3.4.0/programs/util/ |
D | strerror.c | 43 int main( int argc, char *argv[] ) in main() argument 46 char *end = argv[1]; in main() 54 val = strtol( argv[1], &end, 10 ); in main() 57 val = strtol( argv[1], &end, 16 ); in main()
|
/mbedtls-3.4.0/programs/hash/ |
D | generic_sum.c | 160 int main( int argc, char *argv[] ) in main() argument 191 md_info = mbedtls_md_info_from_string( argv[1] ); in main() 194 mbedtls_fprintf( stderr, "Message Digest '%s' not found\n", argv[1] ); in main() 204 if( argc == 4 && strcmp( "-c", argv[2] ) == 0 ) in main() 206 ret |= generic_check( md_info, argv[3] ); in main() 211 ret |= generic_print( md_info, argv[i] ); in main()
|
/mbedtls-3.4.0/programs/ssl/ |
D | ssl_context_info.c | 194 void parse_arguments( int argc, char *argv[] ) in parse_arguments() argument 206 if( strcmp( argv[i], "-d" ) == 0 ) in parse_arguments() 210 else if( strcmp( argv[i], "-h" ) == 0 ) in parse_arguments() 214 else if( strcmp( argv[i], "-v" ) == 0 ) in parse_arguments() 218 else if( strcmp( argv[i], "-f" ) == 0 ) in parse_arguments() 232 if( ( b64_file = fopen( argv[i], "r" )) == NULL ) in parse_arguments() 234 printf_err( "Cannot find file \"%s\"\n", argv[i] ); in parse_arguments() 238 else if( strcmp( argv[i], "--keep-peer-cert=0" ) == 0 ) in parse_arguments() 242 else if( strcmp( argv[i], "--dtls-protocol=0" ) == 0 ) in parse_arguments() 1029 int main( int argc, char *argv[] ) in main() argument [all …]
|
/mbedtls-3.4.0/scripts/ |
D | ecp_comb_table.py | 219 All possible curves: """ % sys.argv[0]) 241 if len(sys.argv) <= 1: 244 for curve in sys.argv[1:]:
|
/mbedtls-3.4.0/programs/fuzz/ |
D | onefile.c | 12 int main(int argc, char** argv) in main() argument 22 fp = fopen(argv[1], "rb"); in main()
|