| /NetX-Duo-v6.2.1/crypto_libraries/src/ |
| D | nx_crypto_method_self_test_hmac_sha.c | 257 UINT key_length; in _nx_crypto_method_self_test_hmac_sha() local 275 key_length = (sizeof(key_1_96) << 3); in _nx_crypto_method_self_test_hmac_sha() 283 key_length = (sizeof(key_1_160) << 3); in _nx_crypto_method_self_test_hmac_sha() 290 key_length = (sizeof(key_224) << 3); in _nx_crypto_method_self_test_hmac_sha() 299 key_length = (sizeof(key_256) << 3); in _nx_crypto_method_self_test_hmac_sha() 307 key_length = (sizeof(key_384) << 3); in _nx_crypto_method_self_test_hmac_sha() 315 key_length = (sizeof(key_512) <<3); in _nx_crypto_method_self_test_hmac_sha() 323 key_length = (sizeof(key_512_224) <<3); in _nx_crypto_method_self_test_hmac_sha() 331 key_length = (sizeof(key_512_256) <<3); in _nx_crypto_method_self_test_hmac_sha() 341 key_length, in _nx_crypto_method_self_test_hmac_sha() [all …]
|
| D | nx_crypto_hmac.c | 76 UCHAR *key_ptr, UINT key_length, in _nx_crypto_hmac() argument 81 _nx_crypto_hmac_initialize(hmac_metadata, key_ptr, key_length); in _nx_crypto_hmac() 140 …EEP UINT _nx_crypto_hmac_initialize(NX_CRYPTO_HMAC *hmac_metadata, UCHAR *key_ptr, UINT key_length) in _nx_crypto_hmac_initialize() argument 146 if (key_length > hmac_metadata -> block_size) in _nx_crypto_hmac_initialize() 151 hmac_metadata -> crypto_update(hmac_metadata -> context, key_ptr, key_length); in _nx_crypto_hmac_initialize() 157 key_length = hmac_metadata -> output_length; in _nx_crypto_hmac_initialize() 175 …NX_CRYPTO_MEMCPY(hmac_metadata -> k_ipad, key_ptr, key_length); /* Use case of memcpy is verified.… in _nx_crypto_hmac_initialize() 177 …NX_CRYPTO_MEMCPY(hmac_metadata -> k_opad, key_ptr, key_length); /* Use case of memcpy is verified.… in _nx_crypto_hmac_initialize()
|
| /NetX-Duo-v6.2.1/nx_secure/src/ |
| D | nx_secure_crypto_method_self_test_hmac_sha.c | 185 UINT key_length; in _nx_secure_crypto_method_self_test_hmac_sha() local 203 key_length = (sizeof(key_1_96) << 3); in _nx_secure_crypto_method_self_test_hmac_sha() 211 key_length = (sizeof(key_1_160) << 3); in _nx_secure_crypto_method_self_test_hmac_sha() 219 key_length = (sizeof(key_256) << 3); in _nx_secure_crypto_method_self_test_hmac_sha() 227 key_length = (sizeof(key_384) << 3); in _nx_secure_crypto_method_self_test_hmac_sha() 235 key_length = (sizeof(key_512) <<3); in _nx_secure_crypto_method_self_test_hmac_sha() 245 key_length, in _nx_secure_crypto_method_self_test_hmac_sha() 269 key_length, in _nx_secure_crypto_method_self_test_hmac_sha() 299 key_length, in _nx_secure_crypto_method_self_test_hmac_sha()
|
| D | nx_secure_module_hash_compute.c | 86 UCHAR *key, UINT key_length, in nx_secure_module_hash_compute() argument 108 (key_length << 3), in nx_secure_module_hash_compute() 129 (key_length << 3), in nx_secure_module_hash_compute() 163 NX_PARAMETER_NOT_USED(key_length); in nx_secure_module_hash_compute()
|
| D | nx_secure_tls_send_serverhello_extensions.c | 555 UINT key_length; in _nx_secure_tls_send_serverhello_key_share_extension() local 688 key_length = ecdhe_data->nx_secure_tls_ecdhe_public_key_length; in _nx_secure_tls_send_serverhello_key_share_extension() 691 entry_length = 2 + 2 + key_length; in _nx_secure_tls_send_serverhello_key_share_extension() 693 if (available_size < (offset + 4u + key_length)) in _nx_secure_tls_send_serverhello_key_share_extension() 706 packet_buffer[offset] = (UCHAR)((key_length & 0xFF00) >> 8);; in _nx_secure_tls_send_serverhello_key_share_extension() 707 packet_buffer[offset + 1] = (UCHAR)(key_length & 0x00FF); in _nx_secure_tls_send_serverhello_key_share_extension() 711 …packet_buffer[offset], &ecdhe_data->nx_secure_tls_ecdhe_public_key[0], key_length); /* Use case of… in _nx_secure_tls_send_serverhello_key_share_extension() 712 offset += (key_length); in _nx_secure_tls_send_serverhello_key_share_extension()
|
| D | nx_secure_process_server_key_exchange.c | 124 UINT key_length; in _nx_secure_process_server_key_exchange() local 274 key_length = current_buffer[0]; in _nx_secure_process_server_key_exchange() 277 current_buffer += key_length + 1; in _nx_secure_process_server_key_exchange() 289 if ((UINT)key_length + 6 > message_length) in _nx_secure_process_server_key_exchange() 307 if ((UINT)key_length + 8 > message_length) in _nx_secure_process_server_key_exchange() 444 (ULONG)(4 + key_length), in _nx_secure_process_server_key_exchange() 592 (ULONG)(4 + key_length), in _nx_secure_process_server_key_exchange() 652 if ((UINT)signature_length + key_length + 6 > message_length) in _nx_secure_process_server_key_exchange() 660 if ((UINT)signature_length + key_length + 8 > message_length) in _nx_secure_process_server_key_exchange() 934 key, key_length, NX_NULL, in _nx_secure_process_server_key_exchange()
|
| D | nx_secure_x509_certificate_initialize.c | 170 certificate -> nx_secure_x509_private_key.user_key.key_length = priv_len; in _nx_secure_x509_certificate_initialize() 189 certificate -> nx_secure_x509_private_key.user_key.key_length = priv_len; in _nx_secure_x509_certificate_initialize()
|
| D | nx_secure_tls_send_clienthello_extensions.c | 704 UINT key_length; in _nx_secure_tls_send_clienthello_key_share_extension() local 781 key_length = ecdhe_data->nx_secure_tls_ecdhe_public_key_length; in _nx_secure_tls_send_clienthello_key_share_extension() 783 if (available_size < (*packet_offset + 10u + key_length)) in _nx_secure_tls_send_clienthello_key_share_extension() 808 entry_length = 2 + 2 + key_length; in _nx_secure_tls_send_clienthello_key_share_extension() 816 packet_buffer[offset] = (UCHAR)((key_length & 0xFF00) >> 8);; in _nx_secure_tls_send_clienthello_key_share_extension() 817 packet_buffer[offset + 1] = (UCHAR)(key_length & 0x00FF); in _nx_secure_tls_send_clienthello_key_share_extension() 821 …ecure_tls_ecc_key_data[entry_index].nx_secure_tls_ecdhe_public_key[0], key_length); /* Use case of… in _nx_secure_tls_send_clienthello_key_share_extension() 822 offset += (key_length); in _nx_secure_tls_send_clienthello_key_share_extension()
|
| D | nx_secure_tls_process_serverhello_extensions.c | 821 USHORT key_length; in _nx_secure_tls_proc_serverhello_keyshare_extension() local 889 key_length = (USHORT)((packet_buffer[offset] << 8) + packet_buffer[offset + 1]); in _nx_secure_tls_proc_serverhello_keyshare_extension() 890 if (offset + key_length > *extension_length) in _nx_secure_tls_proc_serverhello_keyshare_extension() 972 pubkey, key_length, NX_NULL, in _nx_secure_tls_proc_serverhello_keyshare_extension()
|
| D | nx_secure_tls_process_clienthello_extensions.c | 788 USHORT key_length; in _nx_secure_tls_proc_clienthello_keyshare_extension() local 851 key_length = (USHORT)((packet_buffer[offset] << 8) + packet_buffer[offset + 1]); in _nx_secure_tls_proc_clienthello_keyshare_extension() 854 if (offset + key_length > extension_length) in _nx_secure_tls_proc_clienthello_keyshare_extension() 882 offset = (USHORT)(offset + key_length); in _nx_secure_tls_proc_clienthello_keyshare_extension() 965 pubkey, key_length, NX_NULL, in _nx_secure_tls_proc_clienthello_keyshare_extension()
|
| D | nx_secure_tls_send_certificate_verify.c | 652 … (NX_CRYPTO_KEY_SIZE)(local_certificate -> nx_secure_x509_private_key.user_key.key_length), in _nx_secure_tls_send_certificate_verify() 799 …c_private_key_length = (USHORT)local_certificate -> nx_secure_x509_private_key.user_key.key_length; in _nx_secure_tls_send_certificate_verify()
|
| D | nx_secure_process_client_key_exchange.c | 414 … (NX_CRYPTO_KEY_SIZE)(local_certificate -> nx_secure_x509_private_key.user_key.key_length), in _nx_secure_process_client_key_exchange()
|
| /NetX-Duo-v6.2.1/crypto_libraries/inc/ |
| D | nx_crypto_hmac.h | 85 UCHAR *key_ptr, UINT key_length, 88 UINT _nx_crypto_hmac_initialize(NX_CRYPTO_HMAC *crypto_matadata, UCHAR *key_ptr, UINT key_length);
|
| /NetX-Duo-v6.2.1/nx_secure/inc/ |
| D | nx_secure_tls_api.h | 174 UCHAR *key, UINT key_length,
|
| D | nx_secure_x509.h | 800 ULONG key_length; member
|
| D | nx_secure_tls.h | 1660 UCHAR *key, UINT key_length,
|