from nx_crypto.h:146
#define NX_CRYPTO_MEMCPY _nx_crypto_memcpy_ptr
Location | Text |
---|---|
nx_crypto.h:146 | #define NX_CRYPTO_MEMCPY _nx_crypto_memcpy_ptr |
nx_crypto_cbc.c:171 | NX_CRYPTO_MEMCPY(cbc_metadata -> nx_crypto_cbc_last_block, last_cipher, block_size); /* Use case of memcpy is verified. */ |
nx_crypto_cbc.c:260 | |
nx_crypto_cbc.c:268 | |
nx_crypto_cbc.c:333 | NX_CRYPTO_MEMCPY(cbc_metadata -> nx_crypto_cbc_last_block, iv, iv_len); /* Use case of memcpy is verified. */ |
nx_crypto_ccm.c:154 | |
nx_crypto_ccm.c:163 | |
nx_crypto_ccm.c:177 | |
nx_crypto_ccm.c:219 | |
nx_crypto_ccm.c:232 | |
nx_crypto_ccm.c:336 | |
nx_crypto_ccm.c:515 | NX_CRYPTO_MEMCPY(icv, ccm_metadata -> nx_crypto_ccm_X, ccm_metadata -> nx_crypto_ccm_icv_length); /* Use case of memcpy is verified. */ |
nx_crypto_ccm.c:596 | NX_CRYPTO_MEMCPY(temp, ccm_metadata -> nx_crypto_ccm_A, block_size); /* Use case of memcpy is verified. */ |
nx_crypto_ctr.c:240 | |
nx_crypto_ctr.c:311 | |
nx_crypto_ctr.c:312 | |
nx_crypto_drbg.c:225 | NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_key, temp, key_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:226 | NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_v, &temp[key_len], NX_CRYPTO_DRBG_BLOCK_LENGTH_AES); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:314 | |
nx_crypto_drbg.c:316 | NX_CRYPTO_MEMCPY(df_input, personalization_string, personalization_string_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:330 | NX_CRYPTO_MEMCPY(seed_material, personalization_string, personalization_string_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:451 | NX_CRYPTO_MEMCPY(df_input, additional_input, additional_input_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:464 | NX_CRYPTO_MEMCPY(seed_material, additional_input, additional_input_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:582 | NX_CRYPTO_MEMCPY(drbg_ptr -> nx_crypto_drbg_buffer + NX_CRYPTO_DRBG_DF_INPUT_OFFSET, additional_input, additional_input_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:603 | NX_CRYPTO_MEMCPY(addition, additional_input, additional_input_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:670 | NX_CRYPTO_MEMCPY(&output[temp_len], temp, output_length_in_byte - temp_len); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:829 | NX_CRYPTO_MEMCPY(&temp[temp_len], bcc_chain, NX_CRYPTO_DRBG_BLOCK_LENGTH); /* Use case of memcpy is verified. */ |
nx_crypto_drbg.c:895 | NX_CRYPTO_MEMCPY(&output[temp_len], bcc_chain, output_len - temp_len); /* Use case of memcpy is verified. */ |
nx_crypto_ecjpake.c:1582 | |
nx_crypto_gcm.c:211 | |
nx_crypto_gcm.c:315 | |
nx_crypto_gcm.c:402 | |
nx_crypto_gcm.c:488 | |
nx_crypto_gcm.c:513 | |
nx_crypto_gcm.c:686 | |
nx_crypto_hkdf.c:323 | NX_CRYPTO_MEMCPY(hkdf->nx_crypto_hkdf_prk, key, (key_size_in_bits >> 3)); /* Use case of memcpy is verified. */ |
nx_crypto_hkdf.c:359 | NX_CRYPTO_MEMCPY(output, hkdf->nx_crypto_hkdf_prk, hkdf->nx_crypto_hkdf_prk_size); /* Use case of memcpy is verified. */ |
nx_crypto_hkdf.c:676 | NX_CRYPTO_MEMCPY(&temp_T[T_len], info, info_len); /* Use case of memcpy is verified. */ |
nx_crypto_hkdf.c:746 | |
nx_crypto_hmac.c:176 | NX_CRYPTO_MEMCPY(hmac_metadata -> k_ipad, key_ptr, key_length); /* Use case of memcpy is verified. */ |
nx_crypto_hmac.c:178 | NX_CRYPTO_MEMCPY(hmac_metadata -> k_opad, key_ptr, key_length); /* Use case of memcpy is verified. */ |
nx_crypto_hmac.c:315 | NX_CRYPTO_MEMCPY(digest_ptr, icv_ptr, (digest_length > hmac_metadata -> output_length ? hmac_metadata -> output_length : digest_length)); /* Use case of memcpy is verified. */ |
nx_crypto_huge_number.h:161 | |
nx_crypto_md5.c:255 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_md5_buffer[current_bytes]), (void *)input_ptr, needed_fill_bytes); /* Use case of memcpy is verified. */ |
nx_crypto_md5.c:286 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_md5_buffer[current_bytes]), (void *)input_ptr, input_length); /* Use case of memcpy is verified. */ |
nx_crypto_phash.c:132 | NX_CRYPTO_MEMCPY(temp_A, seed, seed_len); /* Use case of memcpy is verified. */ |
nx_crypto_phash.c:183 | NX_CRYPTO_MEMCPY(&temp_A[A_len], seed, seed_len); /* Use case of memcpy is verified. */ |
nx_crypto_pkcs1_v1.5.c:428 | NX_CRYPTO_MEMCPY(working_ptr, der_encoding, der_encoding_length); /* Use case of memcpy is verified. */ |
nx_crypto_sha1.c:237 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha1_buffer[current_bytes]), (void *)input_ptr, needed_fill_bytes); /* Use case of memcpy is verified. */ |
nx_crypto_sha1.c:268 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha1_buffer[current_bytes]), (void *)input_ptr, input_length); /* Use case of memcpy is verified. */ |
nx_crypto_sha2.c:234 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha256_buffer[current_bytes]), (void *)input_ptr, needed_fill_bytes); /* Use case of memcpy is verified. */ |
nx_crypto_sha2.c:264 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha256_buffer[current_bytes]), (void *)input_ptr, input_length); /* Use case of memcpy is verified. */ |
nx_crypto_sha5.c:282 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha512_buffer[current_bytes]), (void *)input_ptr, (UINT)needed_fill_bytes); /* Use case of memcpy is verified. */ |
nx_crypto_sha5.c:312 | NX_CRYPTO_MEMCPY((void *)&(context -> nx_sha512_buffer[current_bytes]), (void *)input_ptr, input_length); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_1.c:282 | NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_1.c:283 | NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha256.c:281 | NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha256.c:282 | NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha384.c:281 | NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha384.c:282 | NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha512.c:281 | NX_CRYPTO_MEMCPY(phash -> nx_crypto_phash_seed, key, key_size_in_bits); /* Use case of memcpy is verified. */ |
nx_crypto_tls_prf_sha512.c:282 | NX_CRYPTO_MEMCPY(&phash -> nx_crypto_phash_seed[key_size_in_bits], input, input_length_in_byte); /* Use case of memcpy is verified. */ |
nx_crypto_xcbc_mac.c:218 | |
nx_crypto_xcbc_mac.c:228 | |
nx_secure_tls_ecc_generate_keys.c:733 | NX_CRYPTO_MEMCPY(&_nx_secure_padded_signature[signature_offset], der_encoding, der_encoding_length); /* Use case of memcpy is verified. */ |
nx_secure_tls_ecc_generate_keys.c:736 | NX_CRYPTO_MEMCPY(&_nx_secure_padded_signature[signature_offset], hash, hash_length); /* Use case of memcpy is verified. */ |