/NetX-Duo-v6.3.0/crypto_libraries/src/ |
D | nx_crypto_cbc.c | 171 …NX_CRYPTO_MEMCPY(cbc_metadata -> nx_crypto_cbc_last_block, last_cipher, block_size); /* Use case o… in _nx_crypto_cbc_encrypt() 260 NX_CRYPTO_MEMCPY(save_input, &input[i], block_size); /* Use case of memcpy is verified. */ in _nx_crypto_cbc_decrypt() 268 NX_CRYPTO_MEMCPY(last_cipher, save_input, block_size); /* Use case of memcpy is verified. */ in _nx_crypto_cbc_decrypt() 333 …NX_CRYPTO_MEMCPY(cbc_metadata -> nx_crypto_cbc_last_block, iv, iv_len); /* Use case of memcpy is v… in _nx_crypto_cbc_encrypt_init()
|
D | nx_crypto_ccm.c | 154 NX_CRYPTO_MEMCPY(last_cipher, iv, block_size); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_cbc_pad() 163 NX_CRYPTO_MEMCPY(output, input + i, length - i); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_cbc_pad() 177 NX_CRYPTO_MEMCPY(output, last_cipher, block_size); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_cbc_pad() 219 NX_CRYPTO_MEMCPY(B + 1, Nonce, (UINT)15 - L); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_authentication_init() 232 NX_CRYPTO_MEMCPY(B + 2, a_data, (UINT)temp_len); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_authentication_init() 336 NX_CRYPTO_MEMCPY(A + 1, Nonce, (UINT)(15 - L)); /* Use case of memcpy is verified. */ in _nx_crypto_ccm_encrypt_init() 515 …NX_CRYPTO_MEMCPY(icv, ccm_metadata -> nx_crypto_ccm_X, ccm_metadata -> nx_crypto_ccm_icv_length); … in _nx_crypto_ccm_encrypt_calculate() 596 …NX_CRYPTO_MEMCPY(temp, ccm_metadata -> nx_crypto_ccm_A, block_size); /* Use case of memcpy is veri… in _nx_crypto_ccm_decrypt_calculate()
|
D | nx_crypto_drbg.c | 225 …NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_key, temp, key_len); /* Use case of memcpy is verified… in _nx_crypto_drbg_update() 226 …NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_v, &temp[key_len], NX_CRYPTO_DRBG_BLOCK_LENGTH_AES); /… in _nx_crypto_drbg_update() 314 NX_CRYPTO_MEMCPY(df_input, nonce, nonce_len); /* Use case of memcpy is verified. */ in _nx_crypto_drbg_instantiate() 316 …NX_CRYPTO_MEMCPY(df_input, personalization_string, personalization_string_len); /* Use case of mem… in _nx_crypto_drbg_instantiate() 330 …NX_CRYPTO_MEMCPY(seed_material, personalization_string, personalization_string_len); /* Use case o… in _nx_crypto_drbg_instantiate() 451 …NX_CRYPTO_MEMCPY(df_input, additional_input, additional_input_len); /* Use case of memcpy is verif… in _nx_crypto_drbg_reseed() 464 …NX_CRYPTO_MEMCPY(seed_material, additional_input, additional_input_len); /* Use case of memcpy is … in _nx_crypto_drbg_reseed() 582 …NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_buffer + NX_CRYPTO_DRBG_DF_INPUT_OFFSET, additional_in… in _nx_crypto_drbg_generate() 603 …NX_CRYPTO_MEMCPY(addition, additional_input, additional_input_len); /* Use case of memcpy is verif… in _nx_crypto_drbg_generate() 670 …NX_CRYPTO_MEMCPY(&output[temp_len], temp, output_length_in_byte - temp_len); /* Use case of memcpy… in _nx_crypto_drbg_generate() [all …]
|
D | nx_crypto_ctr.c | 240 NX_CRYPTO_MEMCPY(&output[i], aes_output, length - i); /* Use case of memcpy is verified. */ in _nx_crypto_ctr_encrypt() 311 NX_CRYPTO_MEMCPY(&control_block[4], iv, 8); /* Use case of memcpy is verified. */ in _nx_crypto_ctr_encrypt_init() 312 NX_CRYPTO_MEMCPY(&control_block[0], nonce, 4); /* Use case of memcpy is verified. */ in _nx_crypto_ctr_encrypt_init()
|
D | nx_crypto_method_self_test_drbg.c | 198 …NX_CRYPTO_MEMCPY(entropy, entropy_input_aes128, entropy_input_len_aes128); /* Use case of memcpy i… in drbg_test_get_entropy_pr() 203 …NX_CRYPTO_MEMCPY(entropy, entropy_input_pr_0_aes128, entropy_input_len_aes128); /* Use case of mem… in drbg_test_get_entropy_pr() 208 …NX_CRYPTO_MEMCPY(entropy, entropy_input_pr_1_aes128, entropy_input_len_aes128); /* Use case of mem… in drbg_test_get_entropy_pr() 279 …NX_CRYPTO_MEMCPY(entropy, entropy_input_npr_aes128, entropy_input_len_npr_aes128); /* Use case of … in drbg_test_get_entropy_npr() 284 …NX_CRYPTO_MEMCPY(entropy, entropy_input_reseed_npr_aes128, entropy_input_len_npr_aes128); /* Use c… in drbg_test_get_entropy_npr()
|
D | nx_crypto_gcm.c | 211 NX_CRYPTO_MEMCPY(v, y, NX_CRYPTO_GCM_BLOCK_SIZE); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_multi() 315 NX_CRYPTO_MEMCPY(tmp_block, input, input_length); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_ghash_update() 402 NX_CRYPTO_MEMCPY(output, aes_output, length); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_gctr() 488 NX_CRYPTO_MEMCPY(j0, iv, iv_len); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_encrypt_init() 513 NX_CRYPTO_MEMCPY(counter, j0, NX_CRYPTO_GCM_BLOCK_SIZE); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_encrypt_init() 686 NX_CRYPTO_MEMCPY(output, s, icv_len); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_encrypt_calculate()
|
D | nx_crypto_tls_prf_sha256.c | 285 …NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is v… in _nx_crypto_method_prf_sha_256_operation() 286 …NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /… in _nx_crypto_method_prf_sha_256_operation()
|
D | nx_crypto_tls_prf_sha384.c | 285 …NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is v… in _nx_crypto_method_prf_sha384_operation() 286 …NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /… in _nx_crypto_method_prf_sha384_operation()
|
D | nx_crypto_tls_prf_sha512.c | 285 …NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is v… in _nx_crypto_method_prf_sha512_operation() 286 …NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /… in _nx_crypto_method_prf_sha512_operation()
|
D | nx_crypto_phash.c | 132 NX_CRYPTO_MEMCPY(temp_A, seed, seed_len); /* Use case of memcpy is verified. */ in _nx_crypto_phash() 183 NX_CRYPTO_MEMCPY(&temp_A[A_len], seed, seed_len); /* Use case of memcpy is verified. */ in _nx_crypto_phash()
|
D | nx_crypto_hkdf.c | 327 …NX_CRYPTO_MEMCPY(hkdf->nx_crypto_hkdf_prk, key, (key_size_in_bits >> 3)); /* Use case of memcpy is… in _nx_crypto_method_hkdf_operation() 363 …NX_CRYPTO_MEMCPY(output, hkdf->nx_crypto_hkdf_prk, hkdf->nx_crypto_hkdf_prk_size); /* Use case of … in _nx_crypto_method_hkdf_operation() 680 NX_CRYPTO_MEMCPY(&temp_T[T_len], info, info_len); /* Use case of memcpy is verified. */ in _nx_crypto_hkdf_expand() 750 NX_CRYPTO_MEMCPY(&output[offset], temp_T, output_len); /* Use case of memcpy is verified. */ in _nx_crypto_hkdf_expand()
|
D | nx_crypto_tls_prf_1.c | 286 …NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is v… in _nx_crypto_method_prf_1_operation() 287 …NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /… in _nx_crypto_method_prf_1_operation()
|
D | nx_crypto_xcbc_mac.c | 218 NX_CRYPTO_MEMCPY(pad, input, input_length_in_byte); /* Use case of memcpy is verified. */ in _nx_crypto_xcbc_mac() 228 NX_CRYPTO_MEMCPY(output, E, icv_len); /* Use case of memcpy is verified. */ in _nx_crypto_xcbc_mac()
|
D | nx_crypto_hmac.c | 176 …NX_CRYPTO_MEMCPY(hmac_metadata -> k_ipad, key_ptr, key_length); /* Use case of memcpy is verified.… in _nx_crypto_hmac_initialize() 178 …NX_CRYPTO_MEMCPY(hmac_metadata -> k_opad, key_ptr, key_length); /* Use case of memcpy is verified.… in _nx_crypto_hmac_initialize() 315 …NX_CRYPTO_MEMCPY(digest_ptr, icv_ptr, (digest_length > hmac_metadata -> output_length ? hmac_meta… in _nx_crypto_hmac_digest_calculate()
|
D | nx_crypto_ecdh.c | 893 …NX_CRYPTO_MEMCPY(ecdh_ptr -> nx_crypto_ecdh_private_key_buffer, local_private_key_ptr, local_priva… in _nx_crypto_ecdh_key_pair_import_x25519_448() 963 …NX_CRYPTO_MEMCPY(local_private_key_ptr, ecdh_ptr -> nx_crypto_ecdh_private_key_buffer, clen); /* U… in _nx_crypto_ecdh_private_key_export_x25519_448() 1172 …NX_CRYPTO_MEMCPY(public_key.nx_crypto_ec_point_x.nx_crypto_huge_number_data, remote_public_key, re… in _nx_crypto_ecdh_compute_secret_x25519_448()
|
D | nx_crypto_sha1.c | 237 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha1_buffer[current_bytes]), (void *)input_ptr, needed_fi… in _nx_crypto_sha1_update() 268 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha1_buffer[current_bytes]), (void *)input_ptr, input_len… in _nx_crypto_sha1_update()
|
D | nx_crypto_sha5.c | 282 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha512_buffer[current_bytes]), (void *)input_ptr, (UINT)n… in _nx_crypto_sha512_update() 312 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha512_buffer[current_bytes]), (void *)input_ptr, input_l… in _nx_crypto_sha512_update()
|
D | nx_crypto_md5.c | 255 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_md5_buffer[current_bytes]), (void *)input_ptr, needed_fil… in _nx_crypto_md5_update() 286 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_md5_buffer[current_bytes]), (void *)input_ptr, input_leng… in _nx_crypto_md5_update()
|
D | nx_crypto_sha2.c | 234 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha256_buffer[current_bytes]), (void *)input_ptr, needed_… in _nx_crypto_sha256_update() 264 …NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha256_buffer[current_bytes]), (void *)input_ptr, input_l… in _nx_crypto_sha256_update()
|
D | nx_crypto_pkcs1_v1.5.c | 431 …NX_CRYPTO_MEMCPY(working_ptr, der_encoding, der_encoding_length); /* Use case of memcpy is verifie… in _nx_crypto_pkcs1_v1_5_encode()
|
D | nx_crypto_ecjpake.c | 1582 NX_CRYPTO_MEMCPY(key_encryption_key, buffer, 16); /* Use case of memcpy is verified. */ in _nx_crypto_ecjpake_key_encryption_key_generate()
|
/NetX-Duo-v6.3.0/crypto_libraries/inc/ |
D | nx_crypto.h | 135 #ifndef NX_CRYPTO_MEMCPY 136 #define NX_CRYPTO_MEMCPY _nx_crypto_memcpy_ptr macro
|
D | nx_crypto_huge_number.h | 161 …NX_CRYPTO_MEMCPY((dst) -> nx_crypto_huge_number_data, …
|
/NetX-Duo-v6.3.0/nx_secure/src/ |
D | nx_secure_tls_ecc_generate_keys.c | 772 …NX_CRYPTO_MEMCPY(&_nx_secure_padded_signature[signature_offset], der_encoding, der_encoding_length… in _nx_secure_tls_ecc_generate_keys() 775 …NX_CRYPTO_MEMCPY(&_nx_secure_padded_signature[signature_offset], hash, hash_length); /* Use case o… in _nx_secure_tls_ecc_generate_keys()
|
D | nx_secure_tls_1_3_generate_keys.c | 1434 …NX_CRYPTO_MEMCPY(&_nx_secure_tls_hkdf_temp_output[data_len], "tls13 ", 6); /* Use case of memcpy i… in _nx_secure_tls_hkdf_expand_label() 1436 …NX_CRYPTO_MEMCPY(&_nx_secure_tls_hkdf_temp_output[data_len], label, label_len); /* Use case of mem… in _nx_secure_tls_hkdf_expand_label() 1444 …NX_CRYPTO_MEMCPY(&_nx_secure_tls_hkdf_temp_output[data_len], context, context_len); /* Use case of… in _nx_secure_tls_hkdf_expand_label()
|