| /NetX-Duo-v6.2.1/test/cmake/mqtt/ |
| D | CMakeLists.txt | 30 set(SECURE -DNX_SECURE_ENABLE) variable 37 set(secure_build_coverage ${SECURE}) 38 set(require_secure_build ${SECURE} ${REQUIRE_TLS}) 42 set(cloud_secure_build_coverage ${SECURE} ${CLOUD}) 43 set(cloud_require_secure_build ${SECURE} ${REQUIRE_TLS} ${CLOUD}) 46 set(websocket_secure_build ${WEBSOCKET} ${SECURE} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT)
|
| /NetX-Duo-v6.2.1/test/cmake/mqtt_interoperability/ |
| D | CMakeLists.txt | 30 set(SECURE -DNX_SECURE_ENABLE) variable 37 set(secure_build_coverage ${SECURE}) 38 set(require_secure_build ${SECURE} ${REQUIRE_TLS}) 42 set(cloud_secure_build_coverage ${SECURE} ${CLOUD}) 43 set(cloud_require_secure_build ${SECURE} ${REQUIRE_TLS} ${CLOUD}) 46 set(websocket_secure_build ${WEBSOCKET} ${SECURE} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT)
|
| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_x509_list_test.c | 42 printf("NetX Secure Test: X509 list Test ..................................."); in thread_0_entry() 104 cert_name.nx_secure_x509_org_unit = (const UCHAR*)"NetX Secure"; in TEST() 105 cert_name.nx_secure_x509_org_unit_length= strlen("NetX Secure"); in TEST() 135 cert_name_ca.nx_secure_x509_common_name = (const UCHAR*)"NetX Secure Test CA"; in TEST() 136 cert_name_ca.nx_secure_x509_common_name_length = strlen("NetX Secure Test CA"); in TEST()
|
| D | nx_secure_tls_session_start_test.c | 243 const CHAR *dns_tld = "certificate_with_policies"; //"NX Secure Device Certificate"; in certificate_verification_callback() 303 "<b>Hello NetX Secure User!</b>\r\n"\ 305 "served up using NetX Secure!\r\n"\ 365 printf("NetX Secure Test: TLS session start Test.............................."); in sync_thread_entry() 726 printf("NetX Secure Test: TLS Packet Chain Test..............................N/A\n"); in test_application_define()
|
| D | nx_secure_x509_store_test.c | 43 printf("NetX Secure Test: X509 store test...................................."); in thread_0_entry() 124 cert_name.nx_secure_x509_org_unit = (const UCHAR*)"NetX Secure"; in TEST() 125 cert_name.nx_secure_x509_org_unit_length= strlen("NetX Secure"); in TEST()
|
| D | nx_secure_tls_process_changecipherspec_test.c | 27 printf("NetX Secure Test: TLS Process Change Cipher Spec Test...................."); in test_application_define() 61 printf("NetX Secure Test: TLS Process Change Cipher Spec Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_shutdown_test.c | 43 printf("NetX Secure Test: TLS Shutdown Test...................."); in ntest_0_entry() 66 printf("NetX Secure Test: TLS Shutdown Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_send_certificate_test.c | 26 printf("NetX Secure Test: TLS Send Certificate Test...................."); in test_application_define() 75 printf("NetX Secure Test: TLS Send Certificate Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_process_certificate_request_test.c | 38 printf("NetX Secure Test: TLS Process Certificate Request Test...................."); in test_application_define() 76 printf("NetX Secure Test: TLS Process Certificate Request Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_process_finished_test.c | 33 printf("NetX Secure Test: TLS Process Finished Test...................."); in test_application_define() 75 printf("NetX Secure Test: TLS Process Finished Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_session_delete_test.c | 48 printf("NetX Secure Test: TLS Session Delete Test...................."); in ntest_0_entry() 89 printf("NetX Secure Test: TLS Session Delete Test....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_client_handshake_test.c | 263 "<b>Hello NetX Secure User!</b>\r\n"\ 265 "served up using NetX Secure!\r\n"\ 317 printf("NetX Secure Test: TLS Client Handshake Test.........................."); in ntest_0_entry() 491 printf("NetX Secure Test: TLS Client Handshake Test..........................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_coverage_2_test.c | 262 "<b>Hello NetX Secure User!</b>\r\n"\ 264 "served up using NetX Secure!\r\n"\ 316 printf("NetX Secure Test: TLS Coverage 2 Test................................"); in ntest_0_entry() 490 printf("NetX Secure Test: TLS Coverage 2 Test................................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_server_ciphersuite_priority_test.c | 409 const CHAR *dns_tld = "certificate_with_policies"; //"NX Secure Device Certificate"; in certificate_verification_callback() 480 "<b>Hello NetX Secure User!</b>\r\n"\ 482 "served up using NetX Secure!\r\n"\ 546 printf("NetX Secure Test: TLS Server Ciphersuite Priority Test..............."); in ntest_0_entry() 1246 printf("NetX Secure Test: TLS Two Way Client/Server Test.....................N/A\n"); in test_application_define()
|
| D | nx_secure_tls_send_record_coverage_test.c | 113 printf("NetX Secure Test: TLS Send Record Coverage Test ......."); in ntest_0_entry() 179 printf("NetX Secure Test: TLS Send Record Coverage Test .......N/A\n"); in test_application_define()
|
| /NetX-Duo-v6.2.1/nx_secure/inc/ |
| D | nx_secure_user_sample.h | 15 /** NetX Secure Component */ 36 /* This file contains user defines for configuring NetX Secure in */ 38 /* application and NetX Secure library are built with */ 67 /* Define various build options for the NetX Secure port. The application should either make chang… 299 /* NX_SECURE_TLS_DISABLE_SECURE_RENEGOTIATION disables secure session renegotiation extension (RFC … 306 upon failure to receive the secure renegotiation extension during the initial handshake.
|
| D | nx_secure_tls.h | 15 /** NetX Secure Component */ 223 /* Configuration macro: disable secure session renegotiation extension (RFC 5746). 227 secure renegotiation extension during the initial handshake. 286 …_ERROR 0x133 /* An error occurred in processing or sending the Secure Renegotiation Indi… 427 /* The number of TLS versions actually recognized by the NetX Secure TLS stack. */ 568 #define TLS_EMPTY_RENEGOTIATION_INFO_SCSV 0x00FF /* Secure renegotiation extension… 1231 /* This flag indicates whether the remote host supports secure renegotiation 1237 the data in the extension is verified during secure renegotiation. */
|
| /NetX-Duo-v6.2.1/nx_secure/ports/ |
| D | nx_secure_port.h | 15 /** NetX Secure Component */ 52 /* Determine if the optional NetX Secure user define file should be used. */ 67 /* Define the version ID of NetX Secure. This may be utilized by the application. */ 71 … "Copyright (c) 2024 Microsoft Corporation. * NetX Secure Generic Version G6.4.1 *";
|
| /NetX-Duo-v6.2.1/.github/workflows/ |
| D | regression_test.yml | 146 Secure: 159 result_affix: Secure 216 …needs: [NetXDuo, Web, MQTT, NetXDuo64, NetXDuo_Fast, Azure_IoT, Secure, Crypto, Secure_Interoperab… 220 …deploy_list: "NetXDuo Web MQTT NetXDuo64 NetXDuo_Fast Azure_IoT Secure Crypto Secure_Interoperabil…
|
| /NetX-Duo-v6.2.1/test/cmake/web/ |
| D | CMakeLists.txt | 27 set(SECURE -DNX_WEB_HTTPS_ENABLE -DNX_TCPSERVER_ENABLE_TLS -DNX_SECURE_ENABLE_CLIENT_CERTIFICATE_VE… variable 31 set(default_build_coverage ${SECURE} ${MULTIPART} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT) 33 set(digest_authenticate_build ${SECURE} ${MULTIPART} ${DIGEST})
|
| /NetX-Duo-v6.2.1/addons/mqtt/ |
| D | nxd_mqtt_client.h | 125 /* Define the default MQTT Non-TLS (Non-secure) port number */ 172 /* Define the default MQTT TLS (secure) port number */ 175 /* Define the default MQTT TLS (secure) over WebSocket port number */ 280 /* Define the default MQTT Non-TLS (Non-secure) port number */ 283 /* Define the default MQTT TLS (secure) port number */
|
| /NetX-Duo-v6.2.1/nx_secure/src/ |
| D | nx_secure_crypto_table_self_test.c | 15 /** NetX Secure Component */ 78 /* NetX Secure provides a number of vectors that can be used to test */ 79 /* crypto methods supported by NetX Secure. */
|
| D | nx_secure_x509_certificate_initialize.c | 15 /** NetX Secure Component */ 57 /* the value is considered user-defined and NetX Secure will perform */ 59 /* value defines a type known to NetX Secure that will be parsed */
|
| D | nx_secure_tls_process_clienthello.c | 15 /** NetX Secure Component */ 519 /* When secure renegotiating, the server MUST verify that it in _nx_secure_tls_process_clienthello() 526 /* Secure Renegotiation signalling ciphersuite value was encountered. in _nx_secure_tls_process_clienthello() 527 This indicates that the Client supports secure renegotiation. */ in _nx_secure_tls_process_clienthello()
|
| /NetX-Duo-v6.2.1/test/regression/web_test/ |
| D | netx_web_secure_connect_fail_test.c | 222 /* Secure connect fail. */ in thread_client_entry() 273 printf("NetX Test: Web Secure Connect Fail Test.............................."); in thread_server_entry() 377 printf("NetX Test: Web Secure Connect Fail Test..............................N/A\n"); in test_application_define()
|