blob: 9acadedaa329b9af6d050b45d3f734a592ea074b [file] [log] [blame]
#
# Copyright 2019 NXP
# SPDX-License-Identifier: Apache-2.0
#
"""
Generate few random numbers from the attached secure element.
"""
import argparse
from openssl_util import *
example_text = '''
Example invocation::
python %s --connection_data 127.0.0.1:8050
''' % (__file__,)
def parse_in_args():
parser = argparse.ArgumentParser(
description=__doc__,
epilog=example_text,
formatter_class=argparse.RawTextHelpFormatter)
parser.add_argument(
'--connection_data',
default="none",
help='Parameter to connect to SE => eg. ``COM3``, ``127.0.0.1:8050``, ``none``. Default: ``none``')
args = parser.parse_args()
if args.connection_data.find(':') >= 0:
port_data = args.connection_data.split(':')
jrcp_host_name = port_data[0]
jrcp_port = port_data[1]
os.environ['JRCP_HOSTNAME'] = jrcp_host_name
os.environ['JRCP_PORT'] = jrcp_port
os.environ['EX_SSS_BOOT_SSS_PORT'] = args.connection_data
log.info("JRCP_HOSTNAME: %s" % jrcp_host_name)
log.info("JRCP_PORT: %s" % jrcp_port)
log.info("EX_SSS_BOOT_SSS_PORT: %s" % args.connection_data)
def main():
parse_in_args()
run("%s rand -engine %s -hex 8" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 16" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 32" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 64" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 128" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 256" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 384" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 512" % (openssl, openssl_engine))
run("%s rand -engine %s -hex 748" % (openssl, openssl_engine))
log.info("##############################################################")
log.info("# #")
log.info("# Program completed successfully #")
log.info("# #")
log.info("##############################################################")
if __name__ == '__main__':
logging.basicConfig(level=logging.DEBUG)
main()