| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_aes_test.c | 90 memcpy(key, aes_data[i].key, aes_data[i].key_len); in thread_0_entry() 91 memcpy(key + (aes_data[i].key_len >> 2), aes_data[i].iv, 4); in thread_0_entry() 107 (aes_data[i].key_len << 3), in thread_0_entry() 116 (aes_data[i].key_len << 3), in thread_0_entry() 133 (aes_data[i].key_len << 3), in thread_0_entry() 154 memcpy(key, aes_data[i].key, aes_data[i].key_len); in thread_0_entry() 155 memcpy(key + (aes_data[i].key_len >> 2), aes_data[i].iv, 4); in thread_0_entry() 166 nonce = (UCHAR *)key + aes_data[i].key_len; in thread_0_entry() 181 (aes_data[i].key_len << 3), in thread_0_entry() 190 (aes_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_aes_ccm_test.c | 86 memcpy(key, aes_ccm_data[i].key, aes_ccm_data[i].key_len); in thread_0_entry() 108 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 123 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 137 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 161 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 175 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 196 memcpy(key, aes_ccm_data[i].key, aes_ccm_data[i].key_len); in thread_0_entry() 226 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 238 (aes_ccm_data[i].key_len << 3), in thread_0_entry() 253 (aes_ccm_data[i].key_len << 3), in thread_0_entry() [all …]
|
| D | nx_secure_hmac_sha512_test.c | 70 (hmac_sha512_data[i].key_len << 3), in thread_0_entry() 89 (hmac_sha512_data[i].key_len << 3), in thread_0_entry() 135 (hmac_sha512_data[i].key_len << 3), in thread_0_entry() 151 … (hmac_sha512_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_hmac_md5_test.c | 70 (hmac_md5_data[i].key_len << 3), in thread_0_entry() 89 (hmac_md5_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_hmac_sha224_test.c | 70 (hmac_sha224_data[i].key_len << 3), in thread_0_entry() 89 (hmac_sha224_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_aes_additional_test.c | 154 memcpy(key, aes_data[i].key, aes_data[i].key_len); in thread_0_entry() 155 memcpy(key + (aes_data[i].key_len >> 2), aes_data[i].iv, 4); in thread_0_entry() 171 (aes_data[i].key_len << 3), in thread_0_entry() 180 (aes_data[i].key_len << 3), in thread_0_entry() 199 (aes_data[i].key_len << 3), in thread_0_entry() 226 (aes_data[i].key_len << 3), in thread_0_entry() 243 (aes_data[i].key_len << 3), in thread_0_entry() 288 (aes_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_aes_additional_test_data.c | 11 UINT key_len; member
|
| D | nx_secure_hmac_sha384_test.c | 70 (hmac_sha384_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_hmac_sha256_test.c | 71 (hmac_sha256_data[i].key_len << 3), in thread_0_entry() 90 (hmac_sha256_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_tls_client_ca_select_test.c | 67 UINT key_len; member 249 test_cert -> key_len, in server_tls_setup()
|
| D | nx_secure_hmac_sha1_test.c | 98 (hmac_sha1_data[i].key_len << 3), in thread_0_entry() 117 (hmac_sha1_data[i].key_len << 3), in thread_0_entry()
|
| D | nx_secure_aes_ccm_test_data.c | 16 UINT key_len; member
|
| D | nx_secure_aes_test_data.c | 16 UINT key_len; member
|
| D | nx_secure_hmac_sha224_test_data.c | 15 UINT key_len; member
|
| D | nx_secure_hmac_sha256_test_data.c | 15 UINT key_len; member
|
| D | nx_secure_hmac_md5_test_data.c | 15 UINT key_len; member
|
| D | nx_secure_hmac_sha1_test_data.c | 15 UINT key_len; member
|
| D | nx_secure_hmac_sha384_test_data.c | 15 UINT key_len; member
|
| D | nx_secure_hmac_sha512_test_data.c | 15 UINT key_len; member
|
| /NetX-Duo-v6.2.1/crypto_libraries/src/ |
| D | nx_crypto_ecdh.c | 871 UINT key_len; in _nx_crypto_ecdh_key_pair_import_x25519_448() local 876 key_len = (curve -> nx_crypto_ec_bits + 7) >> 3; in _nx_crypto_ecdh_key_pair_import_x25519_448() 878 if (local_private_key_len != key_len) in _nx_crypto_ecdh_key_pair_import_x25519_448() 883 if (local_public_key_len > key_len) in _nx_crypto_ecdh_key_pair_import_x25519_448() 889 ecdh_ptr -> nx_crypto_ecdh_key_size = key_len; in _nx_crypto_ecdh_key_pair_import_x25519_448() 1030 UINT key_len; in _nx_crypto_ecdh_setup_x25519_448() local 1035 key_len = (curve -> nx_crypto_ec_bits + 7) >> 3; in _nx_crypto_ecdh_setup_x25519_448() 1036 if (local_public_key_len < key_len) in _nx_crypto_ecdh_setup_x25519_448() 1044 ecdh_ptr -> nx_crypto_ecdh_key_size = key_len; in _nx_crypto_ecdh_setup_x25519_448() 1047 NX_CRYPTO_HUGE_NUMBER_INITIALIZE(&public_key.nx_crypto_ec_point_x, scratch_buf_ptr, key_len); in _nx_crypto_ecdh_setup_x25519_448() [all …]
|
| D | nx_crypto_drbg.c | 147 UINT key_len; in _nx_crypto_drbg_update() local 222 key_len = crypto_method -> nx_crypto_key_size_in_bits >> 3; in _nx_crypto_drbg_update() 224 …NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_key, temp, key_len); /* Use case of memcpy is verified… in _nx_crypto_drbg_update() 225 …NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_v, &temp[key_len], NX_CRYPTO_DRBG_BLOCK_LENGTH_AES); /… in _nx_crypto_drbg_update()
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/ |
| D | signature_algorithm_test_nx_secure_echo_client_entry.c | 30 UINT key_len; member 193 cert -> key_len, in client_tls_setup()
|
| /NetX-Duo-v6.2.1/addons/azure_iot/ |
| D | nx_azure_iot_hub_client.h | 143 ULONG expiry_time_secs, const UCHAR *key, UINT key_len,
|
| D | nx_azure_iot_hub_client.c | 85 … ULONG expiry_time_secs, const UCHAR *key, UINT key_len, 3125 … ULONG expiry_time_secs, const UCHAR *key, UINT key_len, in nx_azure_iot_hub_client_sas_token_get() argument 3155 … key, key_len, az_span_ptr(span), (UINT)az_span_size(span), in nx_azure_iot_hub_client_sas_token_get()
|