netxduo
_nx_crypto_memcpy_ptr
is only used within netxduo.
Symbol previews are coming soon...
Symbols
loading...
Files
loading (1/7)...
Summary
Syntax
Examples
References
Call Tree
Data Use
Class Tree
Override Tree
Implementations
Instances
Lifecycle
SourceVu
STM32 Libraries and Samples
netxduo
_nx_crypto_memcpy_ptr
_nx_crypto_memcpy_ptr
Syntax
Show:
Summary
Declaration
Definition
from
nx_crypto.h:142
extern
VOID
*
(
*
volatile
_nx_crypto_memcpy_ptr
)
(
void
*
dest
,
const
void
*
src
,
size_t
size
)
;
Implemented in
nx_crypto.h:139
Examples
References
from
examples
Code
Location
Referrer
VOID
*
(
*
volatile
_nx_crypto_memcpy_ptr
)
(
void
*
dest
,
const
void
*
src
,
size_t
size
)
=
memcpy
;
nx_crypto.h:139
extern
VOID
*
(
*
volatile
_nx_crypto_memcpy_ptr
)
(
void
*
dest
,
const
void
*
src
,
size_t
size
)
;
nx_crypto.h:142
VOID
*
(
*
volatile
_nx_crypto_memcpy_ptr
)
(
void
*
dest
,
const
void
*
src
,
size_t
size
)
=
memcpy
;
nx_crypto.h:139
NX_CRYPTO_MEMCPY
(
cbc_metadata
->
nx_crypto_cbc_last_block
,
last_cipher
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_cbc.c:171
_nx_crypto_cbc_encrypt()
NX_CRYPTO_MEMCPY
(
save_input
,
&
input
[
i
]
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_cbc.c:260
_nx_crypto_cbc_decrypt()
NX_CRYPTO_MEMCPY
(
last_cipher
,
save_input
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_cbc.c:268
_nx_crypto_cbc_decrypt()
NX_CRYPTO_MEMCPY
(
cbc_metadata
->
nx_crypto_cbc_last_block
,
iv
,
iv_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_cbc.c:333
_nx_crypto_cbc_encrypt_init()
NX_CRYPTO_MEMCPY
(
last_cipher
,
iv
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:154
_nx_crypto_ccm_cbc_pad()
NX_CRYPTO_MEMCPY
(
output
,
input
+
i
,
length
-
i
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:163
_nx_crypto_ccm_cbc_pad()
NX_CRYPTO_MEMCPY
(
output
,
last_cipher
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:177
_nx_crypto_ccm_cbc_pad()
NX_CRYPTO_MEMCPY
(
B
+
1
,
Nonce
,
(
UINT
)
15
-
L
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:219
_nx_crypto_ccm_authentication_init()
NX_CRYPTO_MEMCPY
(
B
+
2
,
a_data
,
(
UINT
)
temp_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:232
_nx_crypto_ccm_authentication_init()
NX_CRYPTO_MEMCPY
(
A
+
1
,
Nonce
,
(
UINT
)
(
15
-
L
)
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:336
_nx_crypto_ccm_encrypt_init()
NX_CRYPTO_MEMCPY
(
icv
,
ccm_metadata
->
nx_crypto_ccm_X
,
ccm_metadata
->
nx_crypto_ccm_icv_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:515
_nx_crypto_ccm_encrypt_calculate()
NX_CRYPTO_MEMCPY
(
temp
,
ccm_metadata
->
nx_crypto_ccm_A
,
block_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_ccm.c:596
_nx_crypto_ccm_decrypt_calculate()
NX_CRYPTO_MEMCPY
(
&
output
[
i
]
,
aes_output
,
length
-
i
)
;
/* Use case of memcpy is verified. */
nx_crypto_ctr.c:240
_nx_crypto_ctr_encrypt()
NX_CRYPTO_MEMCPY
(
&
control_block
[
4
]
,
iv
,
8
)
;
/* Use case of memcpy is verified. */
nx_crypto_ctr.c:311
_nx_crypto_ctr_encrypt_init()
NX_CRYPTO_MEMCPY
(
&
control_block
[
0
]
,
nonce
,
4
)
;
/* Use case of memcpy is verified. */
nx_crypto_ctr.c:312
_nx_crypto_ctr_encrypt_init()
NX_CRYPTO_MEMCPY
(
drbg_ptr
->
nx_crypto_drbg_key
,
temp
,
key_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:225
_nx_crypto_drbg_update()
NX_CRYPTO_MEMCPY
(
drbg_ptr
->
nx_crypto_drbg_v
,
&
temp
[
key_len
]
,
NX_CRYPTO_DRBG_BLOCK_LENGTH_AES
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:226
_nx_crypto_drbg_update()
NX_CRYPTO_MEMCPY
(
df_input
,
nonce
,
nonce_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:314
_nx_crypto_drbg_instantiate()
NX_CRYPTO_MEMCPY
(
df_input
,
personalization_string
,
personalization_string_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:316
_nx_crypto_drbg_instantiate()
NX_CRYPTO_MEMCPY
(
seed_material
,
personalization_string
,
personalization_string_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:330
_nx_crypto_drbg_instantiate()
NX_CRYPTO_MEMCPY
(
df_input
,
additional_input
,
additional_input_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:451
_nx_crypto_drbg_reseed()
NX_CRYPTO_MEMCPY
(
seed_material
,
additional_input
,
additional_input_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:464
_nx_crypto_drbg_reseed()
NX_CRYPTO_MEMCPY
(
drbg_ptr
->
nx_crypto_drbg_buffer
+
NX_CRYPTO_DRBG_DF_INPUT_OFFSET
,
additional_input
,
additional_input_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:582
_nx_crypto_drbg_generate()
NX_CRYPTO_MEMCPY
(
addition
,
additional_input
,
additional_input_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:603
_nx_crypto_drbg_generate()
NX_CRYPTO_MEMCPY
(
&
output
[
temp_len
]
,
temp
,
output_length_in_byte
-
temp_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:670
_nx_crypto_drbg_generate()
NX_CRYPTO_MEMCPY
(
&
temp
[
temp_len
]
,
bcc_chain
,
NX_CRYPTO_DRBG_BLOCK_LENGTH
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:829
_nx_crypto_drbg_block_cipher_df()
NX_CRYPTO_MEMCPY
(
&
output
[
temp_len
]
,
bcc_chain
,
output_len
-
temp_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_drbg.c:895
_nx_crypto_drbg_block_cipher_df()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
point
->
nx_crypto_ec_point_x
,
&
temp2
)
;
nx_crypto_ec.c:1115
_nx_crypto_ec_point_fp_projective_to_affine()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
point
->
nx_crypto_ec_point_y
,
&
temp1
)
;
nx_crypto_ec.c:1121
_nx_crypto_ec_point_fp_projective_to_affine()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_x
,
nx_crypto_ec.c:2275
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_y
,
nx_crypto_ec.c:2277
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_z
,
&
temp3
)
;
nx_crypto_ec.c:2318
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp3
,
&
temp2
)
;
nx_crypto_ec.c:2327
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_x
,
&
temp5
)
;
nx_crypto_ec.c:2332
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_y
,
&
temp3
)
;
nx_crypto_ec.c:2344
_nx_crypto_ec_fp_projective_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp4
,
&
projective_point
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2449
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp5
,
&
projective_point
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2450
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_z
,
&
temp5
)
;
nx_crypto_ec.c:2460
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp5
,
&
temp1
)
;
nx_crypto_ec.c:2466
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_x
,
&
temp3
)
;
nx_crypto_ec.c:2469
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
projective_point
->
nx_crypto_ec_point_y
,
&
temp3
)
;
nx_crypto_ec.c:2479
_nx_crypto_ec_fp_projective_double()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
left
->
nx_crypto_ec_point_x
,
nx_crypto_ec.c:2552
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
left
->
nx_crypto_ec_point_y
,
nx_crypto_ec.c:2554
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp3
,
&
left
->
nx_crypto_ec_point_y
)
;
nx_crypto_ec.c:2579
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
,
&
right
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2593
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
,
&
right
->
nx_crypto_ec_point_y
)
;
nx_crypto_ec.c:2596
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp2
,
&
left
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2605
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
left
->
nx_crypto_ec_point_x
,
&
temp1
)
;
nx_crypto_ec.c:2606
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
left
->
nx_crypto_ec_point_y
,
&
temp1
)
;
nx_crypto_ec.c:2612
_nx_crypto_ec_fp_affine_add()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
point
.
nx_crypto_ec_point_x
,
&
right
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2672
_nx_crypto_ec_fp_affine_subtract()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
point
.
nx_crypto_ec_point_y
,
&
curve
->
nx_crypto_ec_field
.
fp
)
;
nx_crypto_ec.c:2673
_nx_crypto_ec_fp_affine_subtract()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
negative_g
.
nx_crypto_ec_point_x
,
&
g
->
nx_crypto_ec_point_x
)
;
nx_crypto_ec.c:2894
_nx_crypto_ec_fp_projective_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
negative_g
.
nx_crypto_ec_point_y
,
&
curve
->
nx_crypto_ec_field
.
fp
)
;
nx_crypto_ec.c:2895
_nx_crypto_ec_fp_projective_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
r
->
nx_crypto_ec_point_x
,
nx_crypto_ec.c:2938
_nx_crypto_ec_fp_projective_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
r
->
nx_crypto_ec_point_y
,
nx_crypto_ec.c:2940
_nx_crypto_ec_fp_projective_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
expanded_d
,
d
)
;
nx_crypto_ec.c:3029
_nx_crypto_ec_fp_fixed_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
r
->
nx_crypto_ec_point_x
,
nx_crypto_ec.c:3082
_nx_crypto_ec_fp_fixed_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
r
->
nx_crypto_ec_point_y
,
nx_crypto_ec.c:3084
_nx_crypto_ec_fp_fixed_multiple()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
modulus
,
&
curve
->
nx_crypto_ec_n
)
;
nx_crypto_ec.c:3178
_nx_crypto_ec_key_pair_generation_extra()
NX_CRYPTO_HUGE_NUMBER_COPY
(
private_key
,
&
random_number
)
;
nx_crypto_ec.c:3184
_nx_crypto_ec_key_pair_generation_extra()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
-
1
]
.
nx_crypto_ec_point_x
,
nx_crypto_ec.c:3429
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
-
1
]
.
nx_crypto_ec_point_y
,
nx_crypto_ec.c:3431
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
+
j
-
1
]
.
nx_crypto_ec_point_x
,
nx_crypto_ec.c:3437
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
+
j
-
1
]
.
nx_crypto_ec_point_y
,
nx_crypto_ec.c:3439
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
+
j
]
.
nx_crypto_ec_point_x
,
nx_crypto_ec.c:3473
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
array
[
offset
+
j
]
.
nx_crypto_ec_point_y
,
nx_crypto_ec.c:3475
_nx_crypto_ec_precomputation()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
k
,
&
temp
)
;
nx_crypto_ecdsa.c:172
_nx_crypto_ecdsa_sign()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
ga
.
nx_crypto_ec_point_x
,
nx_crypto_ecjpake.c:664
_nx_crypto_ecjpake_key_exchange_process()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
ga
.
nx_crypto_ec_point_y
,
nx_crypto_ecjpake.c:666
_nx_crypto_ecjpake_key_exchange_process()
NX_CRYPTO_HUGE_NUMBER_COPY
(
r
,
&
temp1
)
;
nx_crypto_ecjpake.c:1147
_nx_crypto_ecjpake_schnorr_zkp_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
g
->
nx_crypto_ec_point_x
,
&
x1
->
nx_crypto_ec_point_x
)
;
nx_crypto_ecjpake.c:1329
_nx_crypto_ecjpake_public_key_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
g
->
nx_crypto_ec_point_y
,
&
x1
->
nx_crypto_ec_point_y
)
;
nx_crypto_ecjpake.c:1330
_nx_crypto_ecjpake_public_key_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
private_key
,
&
temp1
)
;
nx_crypto_ecjpake.c:1339
_nx_crypto_ecjpake_public_key_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
.
nx_crypto_ec_point_x
,
&
x4
->
nx_crypto_ec_point_x
)
;
nx_crypto_ecjpake.c:1425
_nx_crypto_ecjpake_pre_master_secret_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
.
nx_crypto_ec_point_y
,
&
x4
->
nx_crypto_ec_point_y
)
;
nx_crypto_ecjpake.c:1426
_nx_crypto_ecjpake_pre_master_secret_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp2
.
nx_crypto_ec_point_x
,
&
public_key
->
nx_crypto_ec_point_x
)
;
nx_crypto_ecjpake.c:1429
_nx_crypto_ecjpake_pre_master_secret_generate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp2
.
nx_crypto_ec_point_y
,
&
public_key
->
nx_crypto_ec_point_y
)
;
nx_crypto_ecjpake.c:1430
_nx_crypto_ecjpake_pre_master_secret_generate()
NX_CRYPTO_MEMCPY
(
key_encryption_key
,
buffer
,
16
)
;
/* Use case of memcpy is verified. */
nx_crypto_ecjpake.c:1582
_nx_crypto_ecjpake_key_encryption_key_generate()
NX_CRYPTO_MEMCPY
(
v
,
y
,
NX_CRYPTO_GCM_BLOCK_SIZE
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:211
_nx_crypto_gcm_multi()
NX_CRYPTO_MEMCPY
(
tmp_block
,
input
,
input_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:315
_nx_crypto_gcm_ghash_update()
NX_CRYPTO_MEMCPY
(
output
,
aes_output
,
length
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:402
_nx_crypto_gcm_gctr()
NX_CRYPTO_MEMCPY
(
j0
,
iv
,
iv_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:488
_nx_crypto_gcm_encrypt_init()
NX_CRYPTO_MEMCPY
(
counter
,
j0
,
NX_CRYPTO_GCM_BLOCK_SIZE
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:513
_nx_crypto_gcm_encrypt_init()
NX_CRYPTO_MEMCPY
(
output
,
s
,
icv_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_gcm.c:686
_nx_crypto_gcm_encrypt_calculate()
NX_CRYPTO_MEMCPY
(
hkdf
->
nx_crypto_hkdf_prk
,
key
,
(
key_size_in_bits
>
>
3
)
)
;
/* Use case of memcpy is verified. */
nx_crypto_hkdf.c:323
_nx_crypto_method_hkdf_operation()
NX_CRYPTO_MEMCPY
(
output
,
hkdf
->
nx_crypto_hkdf_prk
,
hkdf
->
nx_crypto_hkdf_prk_size
)
;
/* Use case of memcpy is verified. */
nx_crypto_hkdf.c:359
_nx_crypto_method_hkdf_operation()
NX_CRYPTO_MEMCPY
(
&
temp_T
[
T_len
]
,
info
,
info_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_hkdf.c:676
_nx_crypto_hkdf_expand()
NX_CRYPTO_MEMCPY
(
&
output
[
offset
]
,
temp_T
,
output_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_hkdf.c:746
_nx_crypto_hkdf_expand()
NX_CRYPTO_MEMCPY
(
hmac_metadata
->
k_ipad
,
key_ptr
,
key_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_hmac.c:176
_nx_crypto_hmac_initialize()
NX_CRYPTO_MEMCPY
(
hmac_metadata
->
k_opad
,
key_ptr
,
key_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_hmac.c:178
_nx_crypto_hmac_initialize()
NX_CRYPTO_MEMCPY
(
digest_ptr
,
icv_ptr
,
(
digest_length
>
hmac_metadata
->
output_length
?
hmac_metadata
->
output_length
:
digest_length
)
)
;
/* Use case of memcpy is verified. */
nx_crypto_hmac.c:315
_nx_crypto_hmac_digest_calculate()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
u
,
a
)
;
nx_crypto_huge_number.c:2180
_nx_crypto_huge_number_inverse_modulus_prime()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
v
,
p
)
;
nx_crypto_huge_number.c:2181
_nx_crypto_huge_number_inverse_modulus_prime()
NX_CRYPTO_HUGE_NUMBER_COPY
(
r
,
&
C
)
;
nx_crypto_huge_number.c:2228
_nx_crypto_huge_number_inverse_modulus_prime()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
u
,
m
)
;
nx_crypto_huge_number.c:2334
_nx_crypto_huge_number_inverse_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
v
,
a
)
;
nx_crypto_huge_number.c:2335
_nx_crypto_huge_number_inverse_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
r
,
&
D
)
;
nx_crypto_huge_number.c:2394
_nx_crypto_huge_number_inverse_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
result
,
&
temp
)
;
nx_crypto_huge_number.c:2672
_nx_crypto_huge_number_mont_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
result
,
&
temp
)
;
nx_crypto_huge_number.c:2718
_nx_crypto_huge_number_mont_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
ep
,
e
)
;
nx_crypto_huge_number.c:2842
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
,
p
)
;
nx_crypto_huge_number.c:2843
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
xp
,
x
)
;
nx_crypto_huge_number.c:2849
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
eq
,
e
)
;
nx_crypto_huge_number.c:2866
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
&
temp1
,
q
)
;
nx_crypto_huge_number.c:2867
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
xq
,
x
)
;
nx_crypto_huge_number.c:2873
_nx_crypto_huge_number_crt_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
result
,
&
temp
)
;
nx_crypto_huge_number_extended.c:283
_nx_crypto_huge_number_power_modulus()
NX_CRYPTO_HUGE_NUMBER_COPY
(
number
,
&
temp
)
;
nx_crypto_huge_number_extended.c:295
_nx_crypto_huge_number_power_modulus()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_md5_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
needed_fill_bytes
)
;
/* Use case of memcpy is verified. */
nx_crypto_md5.c:255
_nx_crypto_md5_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_md5_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
input_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_md5.c:286
_nx_crypto_md5_update()
NX_CRYPTO_MEMCPY
(
temp_A
,
seed
,
seed_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_phash.c:132
_nx_crypto_phash()
NX_CRYPTO_MEMCPY
(
&
temp_A
[
A_len
]
,
seed
,
seed_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_phash.c:183
_nx_crypto_phash()
NX_CRYPTO_MEMCPY
(
working_ptr
,
der_encoding
,
der_encoding_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_pkcs1_v1.5.c:428
_nx_crypto_pkcs1_v1_5_encode()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha1_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
needed_fill_bytes
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha1.c:237
_nx_crypto_sha1_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha1_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
input_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha1.c:268
_nx_crypto_sha1_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha256_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
needed_fill_bytes
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha2.c:234
_nx_crypto_sha256_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha256_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
input_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha2.c:264
_nx_crypto_sha256_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha512_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
(
UINT
)
needed_fill_bytes
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha5.c:282
_nx_crypto_sha512_update()
NX_CRYPTO_MEMCPY
(
(
void
*
)
&
(
context
->
nx_sha512_buffer
[
current_bytes
]
)
,
(
void
*
)
input_ptr
,
input_length
)
;
/* Use case of memcpy is verified. */
nx_crypto_sha5.c:312
_nx_crypto_sha512_update()
NX_CRYPTO_MEMCPY
(
phash
->
nx_crypto_phash_seed
,
key
,
key_size_in_bits
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_1.c:282
_nx_crypto_method_prf_1_operation()
NX_CRYPTO_MEMCPY
(
&
phash
->
nx_crypto_phash_seed
[
key_size_in_bits
]
,
input
,
input_length_in_byte
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_1.c:283
_nx_crypto_method_prf_1_operation()
NX_CRYPTO_MEMCPY
(
phash
->
nx_crypto_phash_seed
,
key
,
key_size_in_bits
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha256.c:281
_nx_crypto_method_prf_sha_256_operation()
NX_CRYPTO_MEMCPY
(
&
phash
->
nx_crypto_phash_seed
[
key_size_in_bits
]
,
input
,
input_length_in_byte
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha256.c:282
_nx_crypto_method_prf_sha_256_operation()
NX_CRYPTO_MEMCPY
(
phash
->
nx_crypto_phash_seed
,
key
,
key_size_in_bits
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha384.c:281
_nx_crypto_method_prf_sha384_operation()
NX_CRYPTO_MEMCPY
(
&
phash
->
nx_crypto_phash_seed
[
key_size_in_bits
]
,
input
,
input_length_in_byte
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha384.c:282
_nx_crypto_method_prf_sha384_operation()
NX_CRYPTO_MEMCPY
(
phash
->
nx_crypto_phash_seed
,
key
,
key_size_in_bits
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha512.c:281
_nx_crypto_method_prf_sha512_operation()
NX_CRYPTO_MEMCPY
(
&
phash
->
nx_crypto_phash_seed
[
key_size_in_bits
]
,
input
,
input_length_in_byte
)
;
/* Use case of memcpy is verified. */
nx_crypto_tls_prf_sha512.c:282
_nx_crypto_method_prf_sha512_operation()
NX_CRYPTO_MEMCPY
(
pad
,
input
,
input_length_in_byte
)
;
/* Use case of memcpy is verified. */
nx_crypto_xcbc_mac.c:218
_nx_crypto_xcbc_mac()
NX_CRYPTO_MEMCPY
(
output
,
E
,
icv_len
)
;
/* Use case of memcpy is verified. */
nx_crypto_xcbc_mac.c:228
_nx_crypto_xcbc_mac()
NX_CRYPTO_MEMCPY
(
&
_nx_secure_padded_signature
[
signature_offset
]
,
der_encoding
,
der_encoding_length
)
;
/* Use case of memcpy is verified. */
nx_secure_tls_ecc_generate_keys.c:733
_nx_secure_tls_ecc_generate_keys()
NX_CRYPTO_MEMCPY
(
&
_nx_secure_padded_signature
[
signature_offset
]
,
hash
,
hash_length
)
;
/* Use case of memcpy is verified. */
nx_secure_tls_ecc_generate_keys.c:736
_nx_secure_tls_ecc_generate_keys()
Call Tree
from
examples
_nx_crypto_memcpy_ptr
is called by 56 functions:
_nx_crypto_cbc_encrypt()
_nx_crypto_cbc_decrypt()
_nx_crypto_cbc_encrypt_init()
_nx_crypto_ccm_cbc_pad()
_nx_crypto_ccm_authentication_init()
_nx_crypto_ccm_encrypt_init()
_nx_crypto_ccm_encrypt_calculate()
_nx_crypto_ccm_decrypt_calculate()
_nx_crypto_ctr_encrypt()
_nx_crypto_ctr_encrypt_init()
_nx_crypto_drbg_update()
_nx_crypto_drbg_instantiate()
_nx_crypto_drbg_reseed()
_nx_crypto_drbg_generate()
_nx_crypto_drbg_block_cipher_df()
_nx_crypto_ec_point_fp_projective_to_affine()
_nx_crypto_ec_fp_projective_add()
_nx_crypto_ec_fp_projective_double()
_nx_crypto_ec_fp_affine_add()
_nx_crypto_ec_fp_affine_subtract()
_nx_crypto_ec_fp_projective_multiple()
_nx_crypto_ec_fp_fixed_multiple()
_nx_crypto_ec_key_pair_generation_extra()
_nx_crypto_ec_precomputation()
_nx_crypto_ecdsa_sign()
_nx_crypto_ecjpake_key_exchange_process()
_nx_crypto_ecjpake_schnorr_zkp_generate()
_nx_crypto_ecjpake_public_key_generate()
_nx_crypto_ecjpake_pre_master_secret_generate()
_nx_crypto_ecjpake_key_encryption_key_generate()
_nx_crypto_gcm_multi()
_nx_crypto_gcm_ghash_update()
_nx_crypto_gcm_gctr()
_nx_crypto_gcm_encrypt_init()
_nx_crypto_gcm_encrypt_calculate()
_nx_crypto_method_hkdf_operation()
_nx_crypto_hkdf_expand()
_nx_crypto_hmac_initialize()
_nx_crypto_hmac_digest_calculate()
_nx_crypto_huge_number_inverse_modulus_prime()
_nx_crypto_huge_number_inverse_modulus()
_nx_crypto_huge_number_mont_power_modulus()
_nx_crypto_huge_number_crt_power_modulus()
_nx_crypto_huge_number_power_modulus()
_nx_crypto_md5_update()
_nx_crypto_phash()
_nx_crypto_pkcs1_v1_5_encode()
_nx_crypto_sha1_update()
_nx_crypto_sha256_update()
_nx_crypto_sha512_update()
_nx_crypto_method_prf_1_operation()
_nx_crypto_method_prf_sha_256_operation()
_nx_crypto_method_prf_sha384_operation()
_nx_crypto_method_prf_sha512_operation()
_nx_crypto_xcbc_mac()
_nx_secure_tls_ecc_generate_keys()
All items filtered out
_nx_crypto_memcpy_ptr
All items filtered out
Data Use
from
examples
All items filtered out
All items filtered out
Class Tree
from
examples
All items filtered out
All items filtered out
Override Tree
from
examples
All items filtered out
All items filtered out
Implementations
from
examples
All items filtered out
All items filtered out
Instances
from
examples
Lifecycle
from
examples
All items filtered out
All items filtered out