| /NetX-Duo-v6.2.1/crypto_libraries/src/ |
| D | nx_crypto_sha2.c | 441 ULONG a, b, c, d, e, f, g, h; in _nx_crypto_sha256_process_buffer() local 454 g = context -> nx_sha256_states[6]; in _nx_crypto_sha256_process_buffer() 463 temp1 = h + LARGE_SIGMA_1(e) + CH_FUNC(e, f, g) + _sha2_round_constants[t] + w[t]; in _nx_crypto_sha256_process_buffer() 469 temp1 = g + LARGE_SIGMA_1(d) + CH_FUNC(d, e, f) + _sha2_round_constants[t + 1] + w[t + 1]; in _nx_crypto_sha256_process_buffer() 472 g = temp1 + temp2; in _nx_crypto_sha256_process_buffer() 476 temp2 = LARGE_SIGMA_0(g) + MAJ_FUNC(g, h, a); in _nx_crypto_sha256_process_buffer() 482 temp2 = LARGE_SIGMA_0(f) + MAJ_FUNC(f, g, h); in _nx_crypto_sha256_process_buffer() 488 temp2 = LARGE_SIGMA_0(e) + MAJ_FUNC(e, f, g); in _nx_crypto_sha256_process_buffer() 496 g = g + temp1; in _nx_crypto_sha256_process_buffer() 500 temp1 = b + LARGE_SIGMA_1(g) + CH_FUNC(g, h, a) + _sha2_round_constants[t + 6] + w[t + 6]; in _nx_crypto_sha256_process_buffer() [all …]
|
| D | nx_crypto_ecjpake.c | 779 NX_CRYPTO_EC_POINT *g, in _nx_crypto_ecjpake_schnorr_zkp_hash() argument 826 size = g -> nx_crypto_ec_point_x.nx_crypto_huge_buffer_size + in _nx_crypto_ecjpake_schnorr_zkp_hash() 827 g -> nx_crypto_ec_point_y.nx_crypto_huge_buffer_size + 1; in _nx_crypto_ecjpake_schnorr_zkp_hash() 828 _nx_crypto_ec_point_extract_uncompressed(curve, g, (UCHAR *)scratch, size, &size); in _nx_crypto_ecjpake_schnorr_zkp_hash() 1108 NX_CRYPTO_EC_POINT *g, in _nx_crypto_ecjpake_schnorr_zkp_generate() argument 1125 _nx_crypto_ec_key_pair_generation_extra(curve, g, &temp1, v, scratch); in _nx_crypto_ecjpake_schnorr_zkp_generate() 1130 g, in _nx_crypto_ecjpake_schnorr_zkp_generate() 1211 NX_CRYPTO_EC_POINT *g, in _nx_crypto_ecjpake_schnorr_zkp_verify() argument 1229 g -> nx_crypto_ec_point_x.nx_crypto_huge_buffer_size); in _nx_crypto_ecjpake_schnorr_zkp_verify() 1234 g, in _nx_crypto_ecjpake_schnorr_zkp_verify() [all …]
|
| D | nx_crypto_sha5.c | 505 ULONG64 a, b, c, d, e, f, g, h; in _nx_crypto_sha512_process_buffer() local 541 g = context -> nx_sha512_states[6]; in _nx_crypto_sha512_process_buffer() 547 temp1 = h + LARGE_SIGMA_1(e) + CH_FUNC(e, f, g) + _sha5_round_constants[t] + w[t]; in _nx_crypto_sha512_process_buffer() 549 h = g; in _nx_crypto_sha512_process_buffer() 550 g = f; in _nx_crypto_sha512_process_buffer() 566 context -> nx_sha512_states[6] += g; in _nx_crypto_sha512_process_buffer() 571 e = 0; f = 0; g = 0; h = 0; in _nx_crypto_sha512_process_buffer()
|
| D | nx_crypto_ec.c | 2867 NX_CRYPTO_EC_POINT *g, in _nx_crypto_ec_fp_projective_multiple() argument 2881 if ((curve -> nx_crypto_ec_fixed_points) && (&curve -> nx_crypto_ec_g == g)) in _nx_crypto_ec_fp_projective_multiple() 2888 g -> nx_crypto_ec_point_x.nx_crypto_huge_buffer_size); in _nx_crypto_ec_fp_projective_multiple() 2890 g -> nx_crypto_ec_point_x.nx_crypto_huge_buffer_size); in _nx_crypto_ec_fp_projective_multiple() 2893 NX_CRYPTO_HUGE_NUMBER_COPY(&negative_g.nx_crypto_ec_point_x, &g -> nx_crypto_ec_point_x); in _nx_crypto_ec_fp_projective_multiple() 2896 &g -> nx_crypto_ec_point_y, scratch); in _nx_crypto_ec_fp_projective_multiple() 2926 _nx_crypto_ec_fp_projective_add(curve, &projective_point, g, scratch); in _nx_crypto_ec_fp_projective_multiple() 3005 NX_CRYPTO_EC_POINT *g; in _nx_crypto_ec_fp_fixed_multiple() local 3021 g = &curve -> nx_crypto_ec_g; in _nx_crypto_ec_fp_fixed_multiple() 3024 g -> nx_crypto_ec_point_x.nx_crypto_huge_buffer_size << 1); in _nx_crypto_ec_fp_fixed_multiple() [all …]
|
| /NetX-Duo-v6.2.1/test/cmake/azure_iot/configs/ |
| D | linux.cmake | 5 set(CMAKE_CXX_COMPILER g++) 15 set(LINUX_FLAGS "-g -pthread") 22 SET(CMAKE_C_FLAGS_DEBUG "-Og -g -ggdb3" CACHE INTERNAL "c debug compiler flags") 23 SET(CMAKE_CXX_FLAGS_DEBUG "-Og -g -ggdb3" CACHE INTERNAL "cxx debug compiler flags") 24 SET(CMAKE_ASM_FLAGS_DEBUG "-g -ggdb3" CACHE INTERNAL "asm debug compiler flags")
|
| /NetX-Duo-v6.2.1/cmake/ |
| D | arm-none-eabi.cmake | 3 set(CMAKE_CXX_COMPILER arm-none-eabi-g++) 23 SET(CMAKE_C_FLAGS_DEBUG "-Og -g -ggdb3" CACHE INTERNAL "c debug compiler flags") 24 SET(CMAKE_CXX_FLAGS_DEBUG "-Og -g -ggdb3" CACHE INTERNAL "cxx debug compiler flags") 25 SET(CMAKE_ASM_FLAGS_DEBUG "-g -ggdb3" CACHE INTERNAL "asm debug compiler flags")
|
| /NetX-Duo-v6.2.1/crypto_libraries/inc/ |
| D | nx_crypto_ecjpake.h | 140 NX_CRYPTO_EC_POINT *g, 151 NX_CRYPTO_EC_POINT *g, 163 NX_CRYPTO_EC_POINT *g, 177 NX_CRYPTO_EC_POINT *g,
|
| D | nx_crypto_ec.h | 148 NX_CRYPTO_EC_POINT *g, 532 NX_CRYPTO_EC_POINT *g, 568 NX_CRYPTO_EC_POINT *g, 666 NX_CRYPTO_EC_POINT *g,
|
| /NetX-Duo-v6.2.1/scripts/ |
| D | install_mqtt.sh | 8 g++ \
|
| D | install_secure.sh | 10 g++ \
|
| D | install.sh | 14 g++ \
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/mqtt_test/test_scripts/CA/ca/ |
| D | ca.crt | 15 g/ffYpV0Md0b/euChMtd+HHDeDDpuC/nWdLrmAPQFwOIxGtsFFyVGMC/QpX+I7ML
|
| /NetX-Duo-v6.2.1/addons/azure_iot/samples/ |
| D | README.md | 89 device cert (`openssl x509 -in cert.pem -fingerprint -noout | sed 's/://g' `) : 97 …(unsigned char) (\w+)/\1 sample_device_cert_ptr/g; s/(unsigned int) (\w+)_len/\1 sample_device_cer… 98 …har) (\w+)/\1 sample_device_private_key_ptr/g; s/(unsigned int) (\w+)_len/\1 sample_device_private…
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/ |
| D | nx_secure_ecc_server_curves_entry.c | 17 #define TEST_CASE_INIT(g, c, s, t) {g, sizeof(g) / sizeof(USHORT),\ argument
|
| D | nx_secure_ecc_curves_test_client_entry.c | 21 #define TEST_CASE_INIT(g, c, s, t) {g, sizeof(g) / sizeof(USHORT),\ argument
|
| /NetX-Duo-v6.2.1/.github/ISSUE_TEMPLATE/ |
| D | bug_report.md | 29 What impact does this issue have on your progress (e.g., annoyance, showstopper)
|
| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_dtls_ecc_curves_test.c | 21 #define TEST_CASE_INIT(g, c, s, t) {g, sizeof(g) / sizeof(USHORT),\ argument
|
| D | nx_secure_tls_ecc_curves_test.c | 22 #define TEST_CASE_INIT(g, c, s, t) {g, sizeof(g) / sizeof(USHORT),\ argument
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/ecc_certificates/ |
| D | ECRevoked2.crt | 50 9QDJDLM3mFns8wnjAiBOYWWXCH/uxB2GMZW8bkT+AnA1qnAooz+L2KVLHOve+g==
|
| D | ECTestServer6.crt | 63 X1pWE8+g+DvuMBNLF0eaqjFPGnTlv9B/0dAQok2BAgMBAAGjgcUwgcIwawYDVR0j
|
| /NetX-Duo-v6.2.1/ |
| D | README.md | 29 ├── utility # Test cases and utilities (e.g. iperf) 37 …or GA) will be tagged to mark the commit and push it into the Github releases tab, e.g. `v6.2-rel`.
|
| /NetX-Duo-v6.2.1/common/inc/ |
| D | nx_api.h | 493 …INE_INSERT(i, a, b, c, d, f, g, h) _nx_trace_event_insert((ULONG)i, (ULONG)a, (ULONG)b, (ULONG… argument 506 #define NX_TRACE_IN_LINE_INSERT(i, a, b, c, d, f, g, h)
|
| /NetX-Duo-v6.2.1/docs/ |
| D | revision_history.txt | 2545 …acket_send.c Added check for non null packet interface or next hop (e.g. gateway) 3583 by a remote host is valid for a particular operation (e.g. identifying a 5012 e.g. http://abc.def.com/index.htm. 5238 … assume 2 bytes (e.g. _nx_snmp_utility_community_get, _nx_snmp_utility_object_id_get, 5309 … Added logic to handle duplicate WRITE or READ requests e.g. the 5511 … packets with junk data from the datagram (e.g. ppp crc computation and the 0x7e marker). 5611 … Client copy of network parameters (e.g. network mask, gateway) if the DHCP Client is clearing the 5654 … BSD will consume the packet or let NetX Duo continue processing the packet e.g. hand off to TCP,
|