Home
last modified time | relevance | path

Searched refs:argv (Results 1 – 25 of 55) sorted by relevance

123

/mbedtls-latest/programs/psa/
Dpsa_constant_names.c277 int main(int argc, char *argv[]) in main() argument
280 !strcmp(argv[1], "help") || in main()
281 !strcmp(argv[1], "--help")) { in main()
282 usage(argv[0]); in main()
286 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main()
290 argv + 2); in main()
291 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main()
293 argv + 2); in main()
294 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main()
296 argv + 2); in main()
[all …]
Dkey_ladder_demo.c607 int main(int argc, char *argv[]) in main() argument
619 strcmp(argv[1], "help") == 0 || in main()
620 strcmp(argv[1], "-help") == 0 || in main()
621 strcmp(argv[1], "--help") == 0) { in main()
627 char *q = strchr(argv[i], '='); in main()
629 printf("Missing argument to option %s\n", argv[i]); in main()
634 if (strcmp(argv[i], "input") == 0) { in main()
636 } else if (strcmp(argv[i], "label") == 0) { in main()
644 } else if (strcmp(argv[i], "master") == 0) { in main()
646 } else if (strcmp(argv[i], "output") == 0) { in main()
[all …]
/mbedtls-latest/programs/aes/
Dcrypt_and_hash.c58 int main(int argc, char *argv[]) in main() argument
125 mode = atoi(argv[1]); in main()
132 if (strcmp(argv[2], argv[3]) == 0) { in main()
137 if ((fin = fopen(argv[2], "rb")) == NULL) { in main()
138 mbedtls_fprintf(stderr, "fopen(%s,rb) failed\n", argv[2]); in main()
142 if ((fout = fopen(argv[3], "wb+")) == NULL) { in main()
143 mbedtls_fprintf(stderr, "fopen(%s,wb+) failed\n", argv[3]); in main()
154 cipher_info = mbedtls_cipher_info_from_string(argv[4]); in main()
156 mbedtls_fprintf(stderr, "Cipher '%s' not found\n", argv[4]); in main()
164 md_info = mbedtls_md_info_from_string(argv[5]); in main()
[all …]
/mbedtls-latest/programs/fuzz/
Donefile.c11 int main(int argc, char **argv) in main() argument
16 const char *argv0 = argv[0] == NULL ? "PROGRAM_NAME" : argv[0]; in main()
23 fp = fopen(argv[1], "rb"); in main()
26 perror(argv[1]); in main()
31 perror(argv[1]); in main()
38 perror(argv[1]); in main()
44 perror(argv[1]); in main()
51 perror(argv[1]); in main()
57 perror(argv[1]); in main()
/mbedtls-latest/programs/test/
Dquery_compile_time_config.c27 int main(int argc, char *argv[]) in main() argument
31 if (argc < 2 || strcmp(argv[1], "-h") == 0) { in main()
32 mbedtls_printf(USAGE, argv[0]); in main()
36 if (strcmp(argv[1], "-l") == 0) { in main()
41 if (strcmp(argv[1], "-all") == 0) { in main()
43 if (query_config(argv[i]) != 0) { in main()
50 if (strcmp(argv[1], "-any") == 0) { in main()
52 if (query_config(argv[i]) == 0) { in main()
60 if (query_config(argv[i]) != 0) { in main()
Dbenchmark.c517 int main(int argc, char *argv[]) in main() argument
544 if (strcmp(argv[i], "md5") == 0) { in main()
546 } else if (strcmp(argv[i], "ripemd160") == 0) { in main()
548 } else if (strcmp(argv[i], "sha1") == 0) { in main()
550 } else if (strcmp(argv[i], "sha256") == 0) { in main()
552 } else if (strcmp(argv[i], "sha512") == 0) { in main()
554 } else if (strcmp(argv[i], "sha3_224") == 0) { in main()
556 } else if (strcmp(argv[i], "sha3_256") == 0) { in main()
558 } else if (strcmp(argv[i], "sha3_384") == 0) { in main()
560 } else if (strcmp(argv[i], "sha3_512") == 0) { in main()
[all …]
Dmetatest.c435 int main(int argc, char *argv[]) in main() argument
437 const char *argv0 = argc > 0 ? argv[0] : "metatest"; in main()
444 const char *command = argv[1]; in main()
449 if (strcmp(argv[1], "help") == 0) { in main()
453 if (strcmp(argv[1], "list") == 0) { in main()
465 if (strcmp(argv[1], p->name) == 0) { in main()
466 mbedtls_printf("Running metatest %s...\n", argv[1]); in main()
467 p->entry_point(argv[1]); in main()
474 argv[1], result); in main()
Dzeroize.c35 int main(int argc, char **argv) in main() argument
50 fp = fopen(argv[1], "r"); in main()
52 mbedtls_printf("Could not open file '%s'\n", argv[1]); in main()
/mbedtls-latest/programs/pkey/
Drsa_verify_pss.c36 int main(int argc, char *argv[]) in main() argument
68 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main()
71 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main()
72 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main()
92 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main()
112 argv[2], hash)) != 0) { in main()
113 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
Dpk_encrypt.c37 int main(int argc, char *argv[]) in main() argument
84 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main()
87 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main()
93 if (strlen(argv[2]) > 100) { in main()
98 memcpy(input, argv[2], strlen(argv[2])); in main()
106 if ((ret = mbedtls_pk_encrypt(&pk, input, strlen(argv[2]), in main()
Dpk_sign.c36 int main(int argc, char *argv[]) in main() argument
84 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main()
87 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main()
89 mbedtls_printf(" failed\n ! Could not parse '%s'\n", argv[1]); in main()
102 argv[2], hash)) != 0) { in main()
103 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
117 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main()
Drsa_sign_pss.c37 int main(int argc, char *argv[]) in main() argument
84 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main()
87 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main()
89 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main()
115 argv[2], hash)) != 0) { in main()
116 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
130 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main()
Dpk_verify.c33 int main(int argc, char *argv[]) in main() argument
65 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main()
68 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main()
77 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main()
97 argv[2], hash)) != 0) { in main()
98 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
Drsa_encrypt.c35 int main(int argc, char *argv[]) in main() argument
100 if (strlen(argv[1]) > 100) { in main()
105 memcpy(input, argv[1], strlen(argv[1])); in main()
114 &ctr_drbg, strlen(argv[1]), input, buf); in main()
Drsa_sign.c32 int main(int argc, char *argv[]) in main() argument
112 argv[1], hash)) != 0) { in main()
113 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main()
127 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main()
130 mbedtls_printf(" failed\n ! Could not create %s\n\n", argv[1]); in main()
Drsa_verify.c32 int main(int argc, char *argv[]) in main() argument
80 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main()
109 argv[1], hash)) != 0) { in main()
110 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main()
Dpk_decrypt.c37 int main(int argc, char *argv[]) in main() argument
50 ((void) argv); in main()
88 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main()
91 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main()
/mbedtls-latest/programs/
Dwince_main.c16 char **argv; in _tmain() local
19 argv = (char **) calloc(argc, sizeof(char *)); in _tmain()
24 argv[i] = (char *) calloc(len, sizeof(char)); in _tmain()
25 wcstombs(argv[i], targv[i], len); in _tmain()
28 return main(argc, argv); in _tmain()
/mbedtls-latest/programs/x509/
Dload_roots.c80 int main(int argc, char *argv[]) in main() argument
106 char *p = argv[i]; in main()
118 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main()
119 argv[i][j] |= 0x20; in main()
134 opt.filenames = (const char **) argv + i; in main()
Dcert_app.c118 int main(int argc, char *argv[]) in main() argument
179 p = argv[i]; in main()
186 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main()
187 argv[i][j] |= 0x20; in main()
/mbedtls-latest/programs/random/
Dgen_entropy.c27 int main(int argc, char *argv[]) in main() argument
36 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main()
40 if ((f = fopen(argv[1], "wb+")) == NULL) { in main()
41 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main()
60 argv[1], in main()
Dgen_random_ctr_drbg.c30 int main(int argc, char *argv[]) in main() argument
42 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main()
46 if ((f = fopen(argv[1], "wb+")) == NULL) { in main()
47 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main()
91 argv[1], in main()
/mbedtls-latest/programs/hash/
Dgeneric_sum.c151 int main(int argc, char *argv[]) in main() argument
180 md_info = mbedtls_md_info_from_string(argv[1]); in main()
182 mbedtls_fprintf(stderr, "Message Digest '%s' not found\n", argv[1]); in main()
191 if (argc == 4 && strcmp("-c", argv[2]) == 0) { in main()
192 ret |= generic_check(md_info, argv[3]); in main()
197 ret |= generic_print(md_info, argv[i]); in main()
/mbedtls-latest/programs/util/
Dstrerror.c31 int main(int argc, char *argv[]) in main() argument
34 char *end = argv[1]; in main()
41 val = strtol(argv[1], &end, 10); in main()
43 val = strtol(argv[1], &end, 16); in main()
/mbedtls-latest/programs/ssl/
Dssl_context_info.c179 static void parse_arguments(int argc, char *argv[]) in parse_arguments() argument
189 if (strcmp(argv[i], "-d") == 0) { in parse_arguments()
191 } else if (strcmp(argv[i], "-h") == 0) { in parse_arguments()
193 } else if (strcmp(argv[i], "-v") == 0) { in parse_arguments()
195 } else if (strcmp(argv[i], "-f") == 0) { in parse_arguments()
206 if ((b64_file = fopen(argv[i], "r")) == NULL) { in parse_arguments()
207 printf_err("Cannot find file \"%s\"\n", argv[i]); in parse_arguments()
210 } else if (strcmp(argv[i], "--keep-peer-cert=0") == 0) { in parse_arguments()
212 } else if (strcmp(argv[i], "--dtls-protocol=0") == 0) { in parse_arguments()
917 int main(int argc, char *argv[]) in main() argument
[all …]

123