/mbedtls-3.6.0/programs/psa/ |
D | psa_constant_names.c | 277 int main(int argc, char *argv[]) in main() argument 280 !strcmp(argv[1], "help") || in main() 281 !strcmp(argv[1], "--help")) { in main() 282 usage(argv[0]); in main() 286 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main() 290 argv + 2); in main() 291 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main() 293 argv + 2); in main() 294 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main() 296 argv + 2); in main() [all …]
|
D | key_ladder_demo.c | 607 int main(int argc, char *argv[]) in main() argument 619 strcmp(argv[1], "help") == 0 || in main() 620 strcmp(argv[1], "-help") == 0 || in main() 621 strcmp(argv[1], "--help") == 0) { in main() 627 char *q = strchr(argv[i], '='); in main() 629 printf("Missing argument to option %s\n", argv[i]); in main() 634 if (strcmp(argv[i], "input") == 0) { in main() 636 } else if (strcmp(argv[i], "label") == 0) { in main() 644 } else if (strcmp(argv[i], "master") == 0) { in main() 646 } else if (strcmp(argv[i], "output") == 0) { in main() [all …]
|
/mbedtls-3.6.0/programs/test/ |
D | query_compile_time_config.c | 27 int main(int argc, char *argv[]) in main() argument 31 if (argc < 2 || strcmp(argv[1], "-h") == 0) { in main() 32 mbedtls_printf(USAGE, argv[0]); in main() 36 if (strcmp(argv[1], "-l") == 0) { in main() 41 if (strcmp(argv[1], "-all") == 0) { in main() 43 if (query_config(argv[i]) != 0) { in main() 50 if (strcmp(argv[1], "-any") == 0) { in main() 52 if (query_config(argv[i]) == 0) { in main() 60 if (query_config(argv[i]) != 0) { in main()
|
D | benchmark.c | 510 int main(int argc, char *argv[]) in main() argument 537 if (strcmp(argv[i], "md5") == 0) { in main() 539 } else if (strcmp(argv[i], "ripemd160") == 0) { in main() 541 } else if (strcmp(argv[i], "sha1") == 0) { in main() 543 } else if (strcmp(argv[i], "sha256") == 0) { in main() 545 } else if (strcmp(argv[i], "sha512") == 0) { in main() 547 } else if (strcmp(argv[i], "sha3_224") == 0) { in main() 549 } else if (strcmp(argv[i], "sha3_256") == 0) { in main() 551 } else if (strcmp(argv[i], "sha3_384") == 0) { in main() 553 } else if (strcmp(argv[i], "sha3_512") == 0) { in main() [all …]
|
D | zeroize.c | 35 int main(int argc, char **argv) in main() argument 50 fp = fopen(argv[1], "r"); in main() 52 mbedtls_printf("Could not open file '%s'\n", argv[1]); in main()
|
/mbedtls-3.6.0/programs/fuzz/ |
D | onefile.c | 12 int main(int argc, char **argv) in main() argument 17 const char *argv0 = argv[0] == NULL ? "PROGRAM_NAME" : argv[0]; in main() 24 fp = fopen(argv[1], "rb"); in main() 27 perror(argv[1]); in main() 32 perror(argv[1]); in main() 39 perror(argv[1]); in main() 45 perror(argv[1]); in main() 52 perror(argv[1]); in main() 58 perror(argv[1]); in main()
|
/mbedtls-3.6.0/programs/aes/ |
D | crypt_and_hash.c | 58 int main(int argc, char *argv[]) in main() argument 121 mode = atoi(argv[1]); in main() 128 if (strcmp(argv[2], argv[3]) == 0) { in main() 133 if ((fin = fopen(argv[2], "rb")) == NULL) { in main() 134 mbedtls_fprintf(stderr, "fopen(%s,rb) failed\n", argv[2]); in main() 138 if ((fout = fopen(argv[3], "wb+")) == NULL) { in main() 139 mbedtls_fprintf(stderr, "fopen(%s,wb+) failed\n", argv[3]); in main() 150 cipher_info = mbedtls_cipher_info_from_string(argv[4]); in main() 152 mbedtls_fprintf(stderr, "Cipher '%s' not found\n", argv[4]); in main() 160 md_info = mbedtls_md_info_from_string(argv[5]); in main() [all …]
|
/mbedtls-3.6.0/programs/pkey/ |
D | rsa_verify_pss.c | 36 int main(int argc, char *argv[]) in main() argument 68 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 71 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 72 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main() 92 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main() 112 argv[2], hash)) != 0) { in main() 113 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
|
D | pk_encrypt.c | 37 int main(int argc, char *argv[]) in main() argument 84 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 87 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 93 if (strlen(argv[2]) > 100) { in main() 98 memcpy(input, argv[2], strlen(argv[2])); in main() 106 if ((ret = mbedtls_pk_encrypt(&pk, input, strlen(argv[2]), in main()
|
D | pk_sign.c | 36 int main(int argc, char *argv[]) in main() argument 84 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 87 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main() 89 mbedtls_printf(" failed\n ! Could not parse '%s'\n", argv[1]); in main() 102 argv[2], hash)) != 0) { in main() 103 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main() 117 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main()
|
D | rsa_sign_pss.c | 37 int main(int argc, char *argv[]) in main() argument 84 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 87 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main() 89 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main() 115 argv[2], hash)) != 0) { in main() 116 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main() 130 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main()
|
D | pk_verify.c | 33 int main(int argc, char *argv[]) in main() argument 65 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 68 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 77 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main() 97 argv[2], hash)) != 0) { in main() 98 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
|
D | rsa_encrypt.c | 35 int main(int argc, char *argv[]) in main() argument 100 if (strlen(argv[1]) > 100) { in main() 105 memcpy(input, argv[1], strlen(argv[1])); in main() 114 &ctr_drbg, strlen(argv[1]), input, buf); in main()
|
D | rsa_sign.c | 32 int main(int argc, char *argv[]) in main() argument 112 argv[1], hash)) != 0) { in main() 113 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main() 127 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main() 130 mbedtls_printf(" failed\n ! Could not create %s\n\n", argv[1]); in main()
|
D | rsa_verify.c | 32 int main(int argc, char *argv[]) in main() argument 79 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main() 108 argv[1], hash)) != 0) { in main() 109 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main()
|
D | pk_decrypt.c | 37 int main(int argc, char *argv[]) in main() argument 50 ((void) argv); in main() 88 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 91 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main()
|
/mbedtls-3.6.0/programs/ |
D | wince_main.c | 16 char **argv; in _tmain() local 19 argv = (char **) calloc(argc, sizeof(char *)); in _tmain() 24 argv[i] = (char *) calloc(len, sizeof(char)); in _tmain() 25 wcstombs(argv[i], targv[i], len); in _tmain() 28 return main(argc, argv); in _tmain()
|
/mbedtls-3.6.0/programs/random/ |
D | gen_entropy.c | 27 int main(int argc, char *argv[]) in main() argument 36 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main() 40 if ((f = fopen(argv[1], "wb+")) == NULL) { in main() 41 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main() 60 argv[1], in main()
|
D | gen_random_ctr_drbg.c | 30 int main(int argc, char *argv[]) in main() argument 42 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main() 46 if ((f = fopen(argv[1], "wb+")) == NULL) { in main() 47 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main() 91 argv[1], in main()
|
/mbedtls-3.6.0/programs/x509/ |
D | load_roots.c | 80 int main(int argc, char *argv[]) in main() argument 106 char *p = argv[i]; in main() 118 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main() 119 argv[i][j] |= 0x20; in main() 134 opt.filenames = (const char **) argv + i; in main()
|
D | cert_app.c | 118 int main(int argc, char *argv[]) in main() argument 179 p = argv[i]; in main() 186 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main() 187 argv[i][j] |= 0x20; in main()
|
/mbedtls-3.6.0/programs/util/ |
D | strerror.c | 31 int main(int argc, char *argv[]) in main() argument 34 char *end = argv[1]; in main() 41 val = strtol(argv[1], &end, 10); in main() 43 val = strtol(argv[1], &end, 16); in main()
|
/mbedtls-3.6.0/programs/hash/ |
D | generic_sum.c | 151 int main(int argc, char *argv[]) in main() argument 180 md_info = mbedtls_md_info_from_string(argv[1]); in main() 182 mbedtls_fprintf(stderr, "Message Digest '%s' not found\n", argv[1]); in main() 191 if (argc == 4 && strcmp("-c", argv[2]) == 0) { in main() 192 ret |= generic_check(md_info, argv[3]); in main() 197 ret |= generic_print(md_info, argv[i]); in main()
|
/mbedtls-3.6.0/programs/ssl/ |
D | ssl_context_info.c | 181 void parse_arguments(int argc, char *argv[]) in parse_arguments() argument 191 if (strcmp(argv[i], "-d") == 0) { in parse_arguments() 193 } else if (strcmp(argv[i], "-h") == 0) { in parse_arguments() 195 } else if (strcmp(argv[i], "-v") == 0) { in parse_arguments() 197 } else if (strcmp(argv[i], "-f") == 0) { in parse_arguments() 208 if ((b64_file = fopen(argv[i], "r")) == NULL) { in parse_arguments() 209 printf_err("Cannot find file \"%s\"\n", argv[i]); in parse_arguments() 212 } else if (strcmp(argv[i], "--keep-peer-cert=0") == 0) { in parse_arguments() 214 } else if (strcmp(argv[i], "--dtls-protocol=0") == 0) { in parse_arguments() 914 int main(int argc, char *argv[]) in main() argument [all …]
|
/mbedtls-3.6.0/scripts/ |
D | ecp_comb_table.py | 207 All possible curves: """ % sys.argv[0]) 229 if len(sys.argv) <= 1: 232 for curve in sys.argv[1:]:
|