Home
last modified time | relevance | path

Searched refs:v (Results 1 – 12 of 12) sorted by relevance

/NetX-Duo-v6.4.1/crypto_libraries/src/
Dnx_crypto_ecjpake.c174 NX_CRYPTO_EC_POINT v; in _nx_crypto_ecjpake_hello_generate() local
181 NX_CRYPTO_EC_POINT_INITIALIZE(&v, NX_CRYPTO_EC_POINT_AFFINE, scratch, buffer_size); in _nx_crypto_ecjpake_hello_generate()
195 &v, in _nx_crypto_ecjpake_hello_generate()
215 &v, in _nx_crypto_ecjpake_hello_generate()
247 &v, in _nx_crypto_ecjpake_hello_generate()
267 &v, in _nx_crypto_ecjpake_hello_generate()
342 NX_CRYPTO_EC_POINT v; in _nx_crypto_ecjpake_hello_process() local
349 NX_CRYPTO_EC_POINT_INITIALIZE(&v, NX_CRYPTO_EC_POINT_AFFINE, scratch, buffer_size); in _nx_crypto_ecjpake_hello_process()
363 status = _nx_crypto_ec_point_setup(&v, &input[total_length + 1], (UINT)input[total_length]); in _nx_crypto_ecjpake_hello_process()
382 &v, in _nx_crypto_ecjpake_hello_process()
[all …]
Dnx_crypto_gcm.c205 UCHAR v[NX_CRYPTO_GCM_BLOCK_SIZE]; in _nx_crypto_gcm_multi() local
210 NX_CRYPTO_MEMCPY(v, y, NX_CRYPTO_GCM_BLOCK_SIZE); /* Use case of memcpy is verified. */ in _nx_crypto_gcm_multi()
219 _nx_crypto_gcm_xor(output, v, output); in _nx_crypto_gcm_multi()
224 lsb = v[j]; in _nx_crypto_gcm_multi()
229 v[j] = (UCHAR)((v[j] >> 1) | (v[j - 1] << 7)); in _nx_crypto_gcm_multi()
231 v[0] = v[0] >> 1; in _nx_crypto_gcm_multi()
236 v[0] = v[0] ^ 0xe1; in _nx_crypto_gcm_multi()
Dnx_crypto_initialize.c145 char v; in _nx_crypto_self_test_memset() local
148 v = (char)(value & 0xFF); in _nx_crypto_self_test_memset()
151 to[i] = v; in _nx_crypto_self_test_memset()
Dnx_crypto_huge_number.c2164 NX_CRYPTO_HUGE_NUMBER u, v, A, C; in _nx_crypto_huge_number_inverse_modulus_prime() local
2178 NX_CRYPTO_HUGE_NUMBER_INITIALIZE(&v, scratch, buffer_size); in _nx_crypto_huge_number_inverse_modulus_prime()
2183 NX_CRYPTO_HUGE_NUMBER_COPY(&v, p); in _nx_crypto_huge_number_inverse_modulus_prime()
2203 while (NX_CRYPTO_HUGE_NUMBER_IS_EVEN(&v)) in _nx_crypto_huge_number_inverse_modulus_prime()
2205 _nx_crypto_huge_number_shift_right(&v, 1); in _nx_crypto_huge_number_inverse_modulus_prime()
2217 if (_nx_crypto_huge_number_compare(&u, &v) != NX_CRYPTO_HUGE_NUMBER_LESS) in _nx_crypto_huge_number_inverse_modulus_prime()
2219 _nx_crypto_huge_number_subtract(&u, &v); in _nx_crypto_huge_number_inverse_modulus_prime()
2224 _nx_crypto_huge_number_subtract(&v, &u); in _nx_crypto_huge_number_inverse_modulus_prime()
2301 NX_CRYPTO_HUGE_NUMBER u, v, A, B, C, D; in _nx_crypto_huge_number_inverse_modulus() local
2330 NX_CRYPTO_HUGE_NUMBER_INITIALIZE(&v, scratch, buffer_size); in _nx_crypto_huge_number_inverse_modulus()
[all …]
Dnx_crypto_aes.c1513 UINT *v; in _nx_crypto_aes_decrypt() local
1532 v = aes_ptr -> nx_crypto_aes_key_schedule; in _nx_crypto_aes_decrypt()
1568 _nx_crypto_aes_add_round_key(aes_ptr, &v[num_rounds * 4]); in _nx_crypto_aes_decrypt()
/NetX-Duo-v6.4.1/crypto_libraries/inc/
Dnx_crypto_huge_number.h96 #define HN_ULONG_TO_UBASE(v) v argument
107 #define HN_ULONG_TO_UBASE(v) (v) & HN_MASK, (v) >> HN_SHIFT
Dnx_crypto_ecjpake.h141 NX_CRYPTO_EC_POINT *v,
152 NX_CRYPTO_EC_POINT *v,
164 NX_CRYPTO_EC_POINT *v,
/NetX-Duo-v6.4.1/test/regression/ptp_test/
Dnetx_ptp_utility.h16 #define ASSERT_SUCCESS(v) ASSERT_TRUE((v) == 0) argument
/NetX-Duo-v6.4.1/test/regression/interoperability_test/certificates/
Dtest_server.key27 GttK1g6wBlGpkCxacaGpwD+v
/NetX-Duo-v6.4.1/test/regression/interoperability_test/nx_secure_test/
Dnx_secure_ecc_1_0_1_1_server_entry.c18 #define CIPHERSUITE_INIT(p, s, c, v) {p, sizeof(p) / sizeof(UINT), s, c, v} argument
Dnx_secure_ecc_echo_client_entry.c23 #define CIPHERSUITE_INIT(p, s, c, v) {p, sizeof(p) / sizeof(UINT), s, c, v} argument
/NetX-Duo-v6.4.1/test/regression/bsd_test/
Dnetx_bsd_tcp_multiple_accept_test.c11 #define notify(v) argument