Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 530) sorted by relevance

12345678910>>...22

/NetX-Duo-v6.2.1/test/cmake/mqtt/
DCMakeLists.txt30 set(SECURE -DNX_SECURE_ENABLE) variable
37 set(secure_build_coverage ${SECURE})
38 set(require_secure_build ${SECURE} ${REQUIRE_TLS})
42 set(cloud_secure_build_coverage ${SECURE} ${CLOUD})
43 set(cloud_require_secure_build ${SECURE} ${REQUIRE_TLS} ${CLOUD})
46 set(websocket_secure_build ${WEBSOCKET} ${SECURE} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT)
/NetX-Duo-v6.2.1/test/cmake/mqtt_interoperability/
DCMakeLists.txt30 set(SECURE -DNX_SECURE_ENABLE) variable
37 set(secure_build_coverage ${SECURE})
38 set(require_secure_build ${SECURE} ${REQUIRE_TLS})
42 set(cloud_secure_build_coverage ${SECURE} ${CLOUD})
43 set(cloud_require_secure_build ${SECURE} ${REQUIRE_TLS} ${CLOUD})
46 set(websocket_secure_build ${WEBSOCKET} ${SECURE} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT)
/NetX-Duo-v6.2.1/test/regression/nx_secure_test/
Dnx_secure_x509_list_test.c42 printf("NetX Secure Test: X509 list Test ..................................."); in thread_0_entry()
104 cert_name.nx_secure_x509_org_unit = (const UCHAR*)"NetX Secure"; in TEST()
105 cert_name.nx_secure_x509_org_unit_length= strlen("NetX Secure"); in TEST()
135 cert_name_ca.nx_secure_x509_common_name = (const UCHAR*)"NetX Secure Test CA"; in TEST()
136 cert_name_ca.nx_secure_x509_common_name_length = strlen("NetX Secure Test CA"); in TEST()
Dnx_secure_tls_session_start_test.c243 const CHAR *dns_tld = "certificate_with_policies"; //"NX Secure Device Certificate"; in certificate_verification_callback()
303 "<b>Hello NetX Secure User!</b>\r\n"\
305 "served up using NetX Secure!\r\n"\
365 printf("NetX Secure Test: TLS session start Test.............................."); in sync_thread_entry()
726 printf("NetX Secure Test: TLS Packet Chain Test..............................N/A\n"); in test_application_define()
Dnx_secure_x509_store_test.c43 printf("NetX Secure Test: X509 store test...................................."); in thread_0_entry()
124 cert_name.nx_secure_x509_org_unit = (const UCHAR*)"NetX Secure"; in TEST()
125 cert_name.nx_secure_x509_org_unit_length= strlen("NetX Secure"); in TEST()
Dnx_secure_tls_process_changecipherspec_test.c27 printf("NetX Secure Test: TLS Process Change Cipher Spec Test...................."); in test_application_define()
61 printf("NetX Secure Test: TLS Process Change Cipher Spec Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_shutdown_test.c43 printf("NetX Secure Test: TLS Shutdown Test...................."); in ntest_0_entry()
66 printf("NetX Secure Test: TLS Shutdown Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_send_certificate_test.c26 printf("NetX Secure Test: TLS Send Certificate Test...................."); in test_application_define()
75 printf("NetX Secure Test: TLS Send Certificate Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_process_certificate_request_test.c38 printf("NetX Secure Test: TLS Process Certificate Request Test...................."); in test_application_define()
76 printf("NetX Secure Test: TLS Process Certificate Request Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_process_finished_test.c33 printf("NetX Secure Test: TLS Process Finished Test...................."); in test_application_define()
75 printf("NetX Secure Test: TLS Process Finished Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_session_delete_test.c48 printf("NetX Secure Test: TLS Session Delete Test...................."); in ntest_0_entry()
89 printf("NetX Secure Test: TLS Session Delete Test....................N/A\n"); in test_application_define()
Dnx_secure_tls_client_handshake_test.c263 "<b>Hello NetX Secure User!</b>\r\n"\
265 "served up using NetX Secure!\r\n"\
317 printf("NetX Secure Test: TLS Client Handshake Test.........................."); in ntest_0_entry()
491 printf("NetX Secure Test: TLS Client Handshake Test..........................N/A\n"); in test_application_define()
Dnx_secure_tls_coverage_2_test.c262 "<b>Hello NetX Secure User!</b>\r\n"\
264 "served up using NetX Secure!\r\n"\
316 printf("NetX Secure Test: TLS Coverage 2 Test................................"); in ntest_0_entry()
490 printf("NetX Secure Test: TLS Coverage 2 Test................................N/A\n"); in test_application_define()
Dnx_secure_tls_server_ciphersuite_priority_test.c409 const CHAR *dns_tld = "certificate_with_policies"; //"NX Secure Device Certificate"; in certificate_verification_callback()
480 "<b>Hello NetX Secure User!</b>\r\n"\
482 "served up using NetX Secure!\r\n"\
546 printf("NetX Secure Test: TLS Server Ciphersuite Priority Test..............."); in ntest_0_entry()
1246 printf("NetX Secure Test: TLS Two Way Client/Server Test.....................N/A\n"); in test_application_define()
Dnx_secure_tls_send_record_coverage_test.c113 printf("NetX Secure Test: TLS Send Record Coverage Test ......."); in ntest_0_entry()
179 printf("NetX Secure Test: TLS Send Record Coverage Test .......N/A\n"); in test_application_define()
/NetX-Duo-v6.2.1/nx_secure/inc/
Dnx_secure_user_sample.h15 /** NetX Secure Component */
36 /* This file contains user defines for configuring NetX Secure in */
38 /* application and NetX Secure library are built with */
67 /* Define various build options for the NetX Secure port. The application should either make chang…
299 /* NX_SECURE_TLS_DISABLE_SECURE_RENEGOTIATION disables secure session renegotiation extension (RFC …
306 upon failure to receive the secure renegotiation extension during the initial handshake.
Dnx_secure_tls.h15 /** NetX Secure Component */
223 /* Configuration macro: disable secure session renegotiation extension (RFC 5746).
227 secure renegotiation extension during the initial handshake.
286 …_ERROR 0x133 /* An error occurred in processing or sending the Secure Renegotiation Indi…
427 /* The number of TLS versions actually recognized by the NetX Secure TLS stack. */
568 #define TLS_EMPTY_RENEGOTIATION_INFO_SCSV 0x00FF /* Secure renegotiation extension…
1231 /* This flag indicates whether the remote host supports secure renegotiation
1237 the data in the extension is verified during secure renegotiation. */
/NetX-Duo-v6.2.1/nx_secure/ports/
Dnx_secure_port.h15 /** NetX Secure Component */
52 /* Determine if the optional NetX Secure user define file should be used. */
67 /* Define the version ID of NetX Secure. This may be utilized by the application. */
71 … "Copyright (c) 2024 Microsoft Corporation. * NetX Secure Generic Version G6.4.1 *";
/NetX-Duo-v6.2.1/.github/workflows/
Dregression_test.yml146 Secure:
159 result_affix: Secure
216 …needs: [NetXDuo, Web, MQTT, NetXDuo64, NetXDuo_Fast, Azure_IoT, Secure, Crypto, Secure_Interoperab…
220 …deploy_list: "NetXDuo Web MQTT NetXDuo64 NetXDuo_Fast Azure_IoT Secure Crypto Secure_Interoperabil…
/NetX-Duo-v6.2.1/test/cmake/web/
DCMakeLists.txt27 set(SECURE -DNX_WEB_HTTPS_ENABLE -DNX_TCPSERVER_ENABLE_TLS -DNX_SECURE_ENABLE_CLIENT_CERTIFICATE_VE… variable
31 set(default_build_coverage ${SECURE} ${MULTIPART} -DNX_ENABLE_EXTENDED_NOTIFY_SUPPORT)
33 set(digest_authenticate_build ${SECURE} ${MULTIPART} ${DIGEST})
/NetX-Duo-v6.2.1/addons/mqtt/
Dnxd_mqtt_client.h125 /* Define the default MQTT Non-TLS (Non-secure) port number */
172 /* Define the default MQTT TLS (secure) port number */
175 /* Define the default MQTT TLS (secure) over WebSocket port number */
280 /* Define the default MQTT Non-TLS (Non-secure) port number */
283 /* Define the default MQTT TLS (secure) port number */
/NetX-Duo-v6.2.1/nx_secure/src/
Dnx_secure_crypto_table_self_test.c15 /** NetX Secure Component */
78 /* NetX Secure provides a number of vectors that can be used to test */
79 /* crypto methods supported by NetX Secure. */
Dnx_secure_x509_certificate_initialize.c15 /** NetX Secure Component */
57 /* the value is considered user-defined and NetX Secure will perform */
59 /* value defines a type known to NetX Secure that will be parsed */
Dnx_secure_tls_process_clienthello.c15 /** NetX Secure Component */
519 /* When secure renegotiating, the server MUST verify that it in _nx_secure_tls_process_clienthello()
526 /* Secure Renegotiation signalling ciphersuite value was encountered. in _nx_secure_tls_process_clienthello()
527 This indicates that the Client supports secure renegotiation. */ in _nx_secure_tls_process_clienthello()
/NetX-Duo-v6.2.1/test/regression/web_test/
Dnetx_web_secure_connect_fail_test.c222 /* Secure connect fail. */ in thread_client_entry()
273 printf("NetX Test: Web Secure Connect Fail Test.............................."); in thread_server_entry()
377 printf("NetX Test: Web Secure Connect Fail Test..............................N/A\n"); in test_application_define()

12345678910>>...22