| /NetX-Duo-v6.2.1/nx_secure/src/ |
| D | nx_secure_tls_session_iv_size_get.c | 76 UINT algorithm; in _nx_secure_tls_session_iv_size_get() local 93 algorithm = session_cipher_method -> nx_crypto_algorithm; in _nx_secure_tls_session_iv_size_get() 97 if (NX_SECURE_AEAD_CIPHER_CHECK(algorithm)) in _nx_secure_tls_session_iv_size_get() 99 algorithm = NX_CRYPTO_ENCRYPTION_AES_GCM_16; in _nx_secure_tls_session_iv_size_get() 104 switch (algorithm) in _nx_secure_tls_session_iv_size_get()
|
| /NetX-Duo-v6.2.1/crypto_libraries/src/ |
| D | nx_crypto_hmac.c | 149 hmac_metadata -> crypto_initialize(hmac_metadata -> context, hmac_metadata -> algorithm); in _nx_crypto_hmac_initialize() 153 …etadata -> crypto_digest_calculate(hmac_metadata -> context, temp_key, hmac_metadata -> algorithm); in _nx_crypto_hmac_initialize() 160 hmac_metadata -> crypto_initialize(hmac_metadata -> context, hmac_metadata -> algorithm); in _nx_crypto_hmac_initialize() 304 …metadata -> crypto_digest_calculate(hmac_metadata -> context, icv_ptr, hmac_metadata -> algorithm); in _nx_crypto_hmac_digest_calculate() 306 hmac_metadata -> crypto_initialize(hmac_metadata -> context, hmac_metadata -> algorithm); in _nx_crypto_hmac_digest_calculate() 312 …metadata -> crypto_digest_calculate(hmac_metadata -> context, icv_ptr, hmac_metadata -> algorithm); in _nx_crypto_hmac_digest_calculate() 380 … UINT algorithm, UINT block_size, UINT output_length, in _nx_crypto_hmac_metadata_set() argument 387 hmac_metadata -> algorithm = algorithm; in _nx_crypto_hmac_metadata_set() 436 UINT _nx_crypto_hmac_hash_initialize(VOID *context, UINT algorithm) in _nx_crypto_hmac_hash_initialize() argument 443 NX_CRYPTO_PARAMETER_NOT_USED(algorithm); in _nx_crypto_hmac_hash_initialize() [all …]
|
| D | nx_crypto_sha5.c | 117 NX_CRYPTO_KEEP UINT _nx_crypto_sha512_initialize(NX_CRYPTO_SHA512 *context, UINT algorithm) in _nx_crypto_sha512_initialize() argument 129 if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_512) || in _nx_crypto_sha512_initialize() 130 (algorithm == NX_CRYPTO_HASH_SHA512)) in _nx_crypto_sha512_initialize() 143 else if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_512_224) || in _nx_crypto_sha512_initialize() 144 (algorithm == NX_CRYPTO_HASH_SHA512_224)) in _nx_crypto_sha512_initialize() 157 else if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_512_256) || in _nx_crypto_sha512_initialize() 158 (algorithm == NX_CRYPTO_HASH_SHA512_256)) in _nx_crypto_sha512_initialize() 364 …P UINT _nx_crypto_sha512_digest_calculate(NX_CRYPTO_SHA512 *context, UCHAR *digest, UINT algorithm) in _nx_crypto_sha512_digest_calculate() argument 403 if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_512) || in _nx_crypto_sha512_digest_calculate() 404 (algorithm == NX_CRYPTO_HASH_SHA512)) in _nx_crypto_sha512_digest_calculate() [all …]
|
| D | nx_crypto_sha1.c | 117 NX_CRYPTO_KEEP UINT _nx_crypto_sha1_initialize(NX_CRYPTO_SHA1 *context, UINT algorithm) in _nx_crypto_sha1_initialize() argument 119 NX_CRYPTO_PARAMETER_NOT_USED(algorithm); in _nx_crypto_sha1_initialize() 320 …P UINT _nx_crypto_sha1_digest_calculate(NX_CRYPTO_SHA1 *context, UCHAR digest[20], UINT algorithm) in _nx_crypto_sha1_digest_calculate() argument 327 NX_CRYPTO_PARAMETER_NOT_USED(algorithm); in _nx_crypto_sha1_digest_calculate()
|
| D | nx_crypto_sha2.c | 97 NX_CRYPTO_KEEP UINT _nx_crypto_sha256_initialize(NX_CRYPTO_SHA256 *context, UINT algorithm ) in _nx_crypto_sha256_initialize() argument 109 if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_256) || in _nx_crypto_sha256_initialize() 110 (algorithm == NX_CRYPTO_HASH_SHA256)) in _nx_crypto_sha256_initialize() 318 …P UINT _nx_crypto_sha256_digest_calculate(NX_CRYPTO_SHA256 *context, UCHAR *digest, UINT algorithm) in _nx_crypto_sha256_digest_calculate() argument 372 if ((algorithm == NX_CRYPTO_AUTHENTICATION_HMAC_SHA2_256) || in _nx_crypto_sha256_digest_calculate() 373 (algorithm == NX_CRYPTO_HASH_SHA256)) in _nx_crypto_sha256_digest_calculate()
|
| D | nx_crypto_md5.c | 137 NX_CRYPTO_KEEP UINT _nx_crypto_md5_initialize(NX_CRYPTO_MD5 *context, UINT algorithm) in _nx_crypto_md5_initialize() argument 139 NX_CRYPTO_PARAMETER_NOT_USED(algorithm); in _nx_crypto_md5_initialize() 338 …EEP UINT _nx_crypto_md5_digest_calculate(NX_CRYPTO_MD5 *context, UCHAR digest[16], UINT algorithm) in _nx_crypto_md5_digest_calculate() argument 345 NX_CRYPTO_PARAMETER_NOT_USED(algorithm); in _nx_crypto_md5_digest_calculate()
|
| /NetX-Duo-v6.2.1/crypto_libraries/inc/ |
| D | nx_crypto_hmac.h | 73 UINT algorithm; member 96 UINT algorithm, UINT block_size, UINT output_length, 101 UINT _nx_crypto_hmac_hash_initialize(VOID *context, UINT algorithm); 103 UINT _nx_crypto_hmac_hash_digest_calculate(VOID *context, UCHAR *digest, UINT algorithm);
|
| D | nx_crypto_md5.h | 117 UINT _nx_crypto_md5_initialize(NX_CRYPTO_MD5 *context, UINT algorithm); 119 UINT _nx_crypto_md5_digest_calculate(NX_CRYPTO_MD5 * context, UCHAR digest[16], UINT algorithm);
|
| D | nx_crypto_sha2.h | 92 UINT _nx_crypto_sha256_initialize(NX_CRYPTO_SHA256 *context, UINT algorithm); 94 UINT _nx_crypto_sha256_digest_calculate(NX_CRYPTO_SHA256 *context, UCHAR *digest, UINT algorithm);
|
| D | nx_crypto_sha1.h | 123 UINT _nx_crypto_sha1_initialize(NX_CRYPTO_SHA1 *context, UINT algorithm); 125 UINT _nx_crypto_sha1_digest_calculate(NX_CRYPTO_SHA1 * context, UCHAR digest[20], UINT algorithm);
|
| D | nx_crypto_sha5.h | 104 UINT _nx_crypto_sha512_initialize(NX_CRYPTO_SHA512 *context, UINT algorithm); 106 UINT _nx_crypto_sha512_digest_calculate(NX_CRYPTO_SHA512 *context, UCHAR *digest, UINT algorithm);
|
| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_aes_ccm_test.c | 90 if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_8) in thread_0_entry() 94 else if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_12) in thread_0_entry() 98 else if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_16) in thread_0_entry() 104 test_crypto_method_aes_ccm.nx_crypto_algorithm = aes_ccm_data[i].algorithm; in thread_0_entry() 200 if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_8) in thread_0_entry() 204 else if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_12) in thread_0_entry() 208 else if (aes_ccm_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CCM_16) in thread_0_entry() 214 test_crypto_method_aes_ccm.nx_crypto_algorithm = aes_ccm_data[i].algorithm; in thread_0_entry()
|
| D | nx_secure_aes_test.c | 93 if (aes_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CBC) in thread_0_entry() 103 test_crypto_method_aes.nx_crypto_algorithm = aes_data[i].algorithm; in thread_0_entry() 157 if (aes_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CBC) in thread_0_entry() 171 test_crypto_method_aes.nx_crypto_algorithm = aes_data[i].algorithm; in thread_0_entry()
|
| D | nx_secure_aes_additional_test_data.c | 9 UINT algorithm; member
|
| D | nx_secure_aes_additional_test.c | 157 if (aes_data[i].algorithm == NX_CRYPTO_ENCRYPTION_AES_CBC) in thread_0_entry() 167 test_crypto_method_aes.nx_crypto_algorithm = aes_data[i].algorithm; in thread_0_entry() 189 … test_crypto_method_aes.nx_crypto_block_size_in_bytes) && ( aes_data[i].algorithm == NX_CRYPTO_ENC… in thread_0_entry() 208 … test_crypto_method_aes.nx_crypto_block_size_in_bytes) && ( aes_data[i].algorithm == NX_CRYPTO_ENC… in thread_0_entry()
|
| D | nx_secure_aes_ccm_test_data.c | 14 UINT algorithm; member
|
| D | nx_secure_aes_test_data.c | 14 UINT algorithm; member
|
| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/hash_clone/ |
| D | nx_crypto_clone_cleanup_test.h | 44 UINT _nx_crypto_clone_cleanup_test_initialize(NX_CRYPTO_CLONE_CLEANUP_TEST *context, UINT algorithm… 46 …leanup_test_digest_calculate(NX_CRYPTO_CLONE_CLEANUP_TEST *context, UCHAR *digest, UINT algorithm);
|
| D | nx_crypto_clone_cleanup_test.c | 10 …T _nx_crypto_clone_cleanup_test_initialize(NX_CRYPTO_CLONE_CLEANUP_TEST *context, UINT algorithm ) in _nx_crypto_clone_cleanup_test_initialize() argument 24 … = _nx_crypto_sha256_initialize((NX_CRYPTO_SHA256 *)context -> nx_crypto_hash_metadata, algorithm); in _nx_crypto_clone_cleanup_test_initialize() 64 …cleanup_test_digest_calculate(NX_CRYPTO_CLONE_CLEANUP_TEST *context, UCHAR *digest, UINT algorithm) in _nx_crypto_clone_cleanup_test_digest_calculate() argument 72 …sha256_digest_calculate((NX_CRYPTO_SHA256 *)context -> nx_crypto_hash_metadata, digest, algorithm); in _nx_crypto_clone_cleanup_test_digest_calculate()
|
| /NetX-Duo-v6.2.1/docs/ |
| D | revision_history.txt | 1072 Files are added or modified to support NewReno algorithm: 1582 … nx_tcp_socket_receive.c Modified the logic for SWS avoidance algorithm. 1592 … Modified the logic for SWS avoidance algorithm. 2580 nxd_ipv6_find_max_prefix_length.c Optimized the search algorithm 2583 …heck router entry valid before updating its timer value optimized the router table search algorithm 2695 … Added check for suitable next hop; no packet transmitted if not found by routing algorithm */ 2711 nxd_ipv6_find_max_prefix_length.c Optimized the prefix match algorithm 3846 algorithm desired. 4064 nx_crypto_const.h Set algorithm IDs to unique values. 5079 … Optimized the algorithm for calculating random time.
|