Home
last modified time | relevance | path

Searched refs:data (Results 1 – 25 of 92) sorted by relevance

1234

/NetX-Duo-v6.2.1/test/regression/dhcp_test/
Dnetx_dhcp_clone_function.c10 UCHAR *data; in dhcp_get_option_value() local
18 data = dhcp_search_buffer(bootp_message, option, length); in dhcp_get_option_value()
21 if (data != NX_NULL) in dhcp_get_option_value()
25 if (*data > 4) in dhcp_get_option_value()
33 *value = dhcp_get_data(data + 1, 4); in dhcp_get_option_value()
49 *value = dhcp_get_data(data + 1, *data); in dhcp_get_option_value()
61 UCHAR *data; in dhcp_search_buffer() local
66 data = &bootp_message[NX_BOOTP_OFFSET_OPTIONS]; in dhcp_search_buffer()
74 if (*data == NX_DHCP_OPTION_PAD) in dhcp_search_buffer()
77 data++; in dhcp_search_buffer()
[all …]
/NetX-Duo-v6.2.1/test/regression/rtp_test/
Dnetx_rtp_multicast_test.c233 UCHAR *data; in ntest_1_entry() local
257 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
260 CHECK_STATUS(0x80, *data); in ntest_1_entry()
263 data++; in ntest_1_entry()
264 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry()
267 data++; in ntest_1_entry()
268 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry()
271 data += 2; in ntest_1_entry()
272 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | in ntest_1_entry()
275 data += 4; in ntest_1_entry()
[all …]
Dnetx_rtp_multi_clients_test.c250 UCHAR *data; in ntest_1_entry() local
269 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
272 CHECK_STATUS(0x80, *data); in ntest_1_entry()
275 data++; in ntest_1_entry()
276 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry()
279 data++; in ntest_1_entry()
280 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry()
283 data += 2; in ntest_1_entry()
284 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | in ntest_1_entry()
287 data += 4; in ntest_1_entry()
[all …]
Dnetx_rtp_session_h264_send_test.c175 static UINT validate_rtp_h264_data(UCHAR *data, UINT data_length) in validate_rtp_h264_data() argument
178 UCHAR *data_ptr = data; in validate_rtp_h264_data()
190 while (data_ptr < (data + data_length)) in validate_rtp_h264_data()
204 static UINT validate_rtp_h264_fragmentation_data(UINT index, UCHAR *data, UINT data_length) in validate_rtp_h264_fragmentation_data() argument
207 UCHAR *data_ptr = data; in validate_rtp_h264_fragmentation_data()
270 while (data_ptr < (data + data_length)) in validate_rtp_h264_fragmentation_data()
290 static UINT validate_rtp_h264_slice_data(UCHAR *data, UINT data_length) in validate_rtp_h264_slice_data() argument
293 UCHAR *data_ptr = data; in validate_rtp_h264_slice_data()
312 if (data_ptr >= (data + data_length - 4)) /* Skip 4 byte h264 header */ in validate_rtp_h264_slice_data()
398 UCHAR *data; in ntest_1_entry() local
[all …]
Dnetx_rtp_session_aac_send_test.c149 static UINT validate_rtp_aac_data(UCHAR *data, UINT data_length) in validate_rtp_aac_data() argument
152 UCHAR *data_ptr = data; in validate_rtp_aac_data()
173 while (data_ptr < (data + data_length)) in validate_rtp_aac_data()
187 static UINT validate_long_rtp_aac_data(UCHAR *data, UINT data_length) in validate_long_rtp_aac_data() argument
189 UCHAR *data_ptr = data; in validate_long_rtp_aac_data()
210 while (data_ptr < (data + data_length)) in validate_long_rtp_aac_data()
287 UCHAR *data; in ntest_1_entry() local
307 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
310 CHECK_STATUS(0x80, *data); in ntest_1_entry()
313 data++; in ntest_1_entry()
[all …]
Dnetx_rtp_session_jpeg_send_test.c238 static UINT validate_rtp_jpeg_data(UCHAR *data, UINT data_length) in validate_rtp_jpeg_data() argument
242 UCHAR *data_ptr = data; in validate_rtp_jpeg_data()
300 while (data_ptr < (data + data_length)) in validate_rtp_jpeg_data()
314 static UINT validate_long_rtp_jpeg_data(UCHAR *data, UINT data_length) in validate_long_rtp_jpeg_data() argument
318 UCHAR *data_ptr = data; in validate_long_rtp_jpeg_data()
385 while (data_ptr < (data + data_length)) in validate_long_rtp_jpeg_data()
462 UCHAR *data; in ntest_1_entry() local
482 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
485 CHECK_STATUS(0x80, *data); in ntest_1_entry()
488 data++; in ntest_1_entry()
[all …]
Dnetx_rtp_basic_test.c188 UCHAR *data; in ntest_1_entry() local
203 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
206 CHECK_STATUS(0x80, *data); in ntest_1_entry()
209 data++; in ntest_1_entry()
210 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry()
213 data++; in ntest_1_entry()
214 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry()
217 data += 2; in ntest_1_entry()
218 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | in ntest_1_entry()
221 data += 4; in ntest_1_entry()
[all …]
Dnetx_rtp_session_packet_send_test.c247 UCHAR *data; in ntest_1_entry() local
266 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry()
269 CHECK_STATUS(0x80, *data); in ntest_1_entry()
272 data++; in ntest_1_entry()
275 CHECK_STATUS((RTP_PAYLOAD_TYPE), *data); in ntest_1_entry()
279 CHECK_STATUS((NX_RTP_HEADER_MARKER_BIT | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry()
283 data++; in ntest_1_entry()
284 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry()
287 data += 2; in ntest_1_entry()
288 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | in ntest_1_entry()
[all …]
/NetX-Duo-v6.2.1/test/regression/nx_secure_test/
Dnx_secure_dtls_fragment_test.c272 UCHAR *data; in test_udp_packet_receive() local
281 data = packet_ptr -> nx_packet_prepend_ptr; in test_udp_packet_receive()
283 if ((data[8] == NX_SECURE_TLS_HANDSHAKE)) in test_udp_packet_receive()
287 if ((data[25] == 0) && (data[26] == 0 || data[26] == 2)) in test_udp_packet_receive()
298 temp_len = (UINT)((data[31] << 8 | data[32]) - fragment_length); in test_udp_packet_receive()
300 data[31] = (UCHAR)(temp_len >> 8); in test_udp_packet_receive()
301 data[32] = (UCHAR)(temp_len & 0xff); in test_udp_packet_receive()
302 temp_len = (UINT)((data[19] << 8 | data[20]) - fragment_length); in test_udp_packet_receive()
303 data[19] = (UCHAR)(temp_len >> 8); in test_udp_packet_receive()
304 data[20] = (UCHAR)(temp_len & 0xff); in test_udp_packet_receive()
[all …]
Dnx_secure_dtls_handshake_fail_test.c239 UCHAR *data; in udp_packet_filter_bad_helloverify() local
242 data = packet_ptr -> nx_packet_prepend_ptr; in udp_packet_filter_bad_helloverify()
244 if (data[8] == NX_SECURE_TLS_HANDSHAKE && data[21] == NX_SECURE_TLS_HELLO_VERIFY_REQUEST) in udp_packet_filter_bad_helloverify()
246 checksum = (data[6] << 8) + data[7]; in udp_packet_filter_bad_helloverify()
247 checksum = checksum + data[35]; in udp_packet_filter_bad_helloverify()
249 data[35] = 255; in udp_packet_filter_bad_helloverify()
251 checksum = checksum - data[35]; in udp_packet_filter_bad_helloverify()
252 data[6] = (UCHAR)((checksum & 0xFF00) >> 8); in udp_packet_filter_bad_helloverify()
253 data[7] = (UCHAR)(checksum & 0xFF); in udp_packet_filter_bad_helloverify()
262 UCHAR *data; in udp_packet_filter_bad_serverhello_length() local
[all …]
Dnetxtestcontrol.c531 CHAR data[4]={0, 1, 0, 0}; in kill_child() local
535 write(result_fd[1], data, sizeof(data)); in kill_child()
542 CHAR data[4]; in fork_child() local
561 read(result_fd[0], data, sizeof(data)); in fork_child()
562 test_control_successful_tests += (ULONG)data[0]; in fork_child()
563 test_control_failed_tests += (ULONG)data[1]; in fork_child()
564 test_control_warning_tests += (ULONG)data[2]; in fork_child()
565 test_control_na_tests += (ULONG)data[3]; in fork_child()
621 CHAR data[4]; in test_control_return() local
626 data[0] = (CHAR)test_control_successful_tests; in test_control_return()
[all …]
Dnx_secure_dtls_multiple_sessions_connect_fail_test.c516 UCHAR *data; in udp_packet_filter_bad_helloverify() local
519 data = packet_ptr -> nx_packet_prepend_ptr; in udp_packet_filter_bad_helloverify()
521 if (data[8] == NX_SECURE_TLS_HANDSHAKE && data[21] == NX_SECURE_TLS_HELLO_VERIFY_REQUEST) in udp_packet_filter_bad_helloverify()
523 checksum = (data[6] << 8) + data[7]; in udp_packet_filter_bad_helloverify()
524 checksum = checksum + data[35]; in udp_packet_filter_bad_helloverify()
526 data[35] = 255; in udp_packet_filter_bad_helloverify()
528 checksum = checksum - data[35]; in udp_packet_filter_bad_helloverify()
529 data[6] = (UCHAR)((checksum & 0xFF00) >> 8); in udp_packet_filter_bad_helloverify()
530 data[7] = (UCHAR)(checksum & 0xFF); in udp_packet_filter_bad_helloverify()
/NetX-Duo-v6.2.1/crypto_libraries/src/
Dnx_crypto_ec.c1188 UINT *data; in _nx_crypto_ec_secp192r1_reduce() local
1206 data = (UINT *)(((ULONG)scratch + 3) & (ULONG) ~3); in _nx_crypto_ec_secp192r1_reduce()
1209 _nx_crypto_huge_number_extract(value, (UCHAR *)data, 48, &size); in _nx_crypto_ec_secp192r1_reduce()
1212 … NX_CRYPTO_MEMMOVE((UCHAR *)data + (48 - size), data, size); /* Use case of memmove is verified. */ in _nx_crypto_ec_secp192r1_reduce()
1213 NX_CRYPTO_MEMSET(data, 0, (48 - size)); in _nx_crypto_ec_secp192r1_reduce()
1219 _nx_crypto_huge_number_setup(value, (UCHAR *)data + 24, 24); in _nx_crypto_ec_secp192r1_reduce()
1223 0, 0, data[4], data[5], in _nx_crypto_ec_secp192r1_reduce()
1224 data[4], data[5]); in _nx_crypto_ec_secp192r1_reduce()
1229 data[2], data[3], data[2], in _nx_crypto_ec_secp192r1_reduce()
1230 data[3], 0, 0); in _nx_crypto_ec_secp192r1_reduce()
[all …]
/NetX-Duo-v6.2.1/test/regression/crypto_test/
Dcryptotestcontrol.c243 CHAR data[4]={0, 1, 0, 0}; in kill_child() local
247 write(result_fd[1], data, sizeof(data)); in kill_child()
254 CHAR data[4]; in fork_child() local
273 read(result_fd[0], data, sizeof(data)); in fork_child()
274 test_control_successful_tests += (ULONG)data[0]; in fork_child()
275 test_control_failed_tests += (ULONG)data[1]; in fork_child()
276 test_control_warning_tests += (ULONG)data[2]; in fork_child()
277 test_control_na_tests += (ULONG)data[3]; in fork_child()
333 CHAR data[4]; in test_control_return() local
338 data[0] = (CHAR)test_control_successful_tests; in test_control_return()
[all …]
/NetX-Duo-v6.2.1/nx_secure/src/
Dnx_secure_tls_handshake_hash_update.c82 UINT _nx_secure_tls_handshake_hash_update(NX_SECURE_TLS_SESSION *tls_session, UCHAR *data, in _nx_secure_tls_handshake_hash_update() argument
120 data, in _nx_secure_tls_handshake_hash_update()
147 (data[0] == NX_SECURE_TLS_CLIENT_HELLO) && in _nx_secure_tls_handshake_hash_update()
160data + 4, /* Reuse input buffer since the input will not be used anymore. */ in _nx_secure_tls_handshake_hash_update()
176 data[0] = NX_SECURE_TLS_MESSAGE_HASH & 0xFF; in _nx_secure_tls_handshake_hash_update()
177 data[1] = 0; in _nx_secure_tls_handshake_hash_update()
178 data[2] = 0; in _nx_secure_tls_handshake_hash_update()
179 data[3] = hash_length & 0xFF; in _nx_secure_tls_handshake_hash_update()
186 data, in _nx_secure_tls_handshake_hash_update()
225 data, in _nx_secure_tls_handshake_hash_update()
[all …]
Dnx_secure_x509_pkcs1_rsa_private_key_parse.c26 static VOID _nx_secure_asn1_parse_unsigned_integer(const UCHAR *data, ULONG length,
351 static VOID _nx_secure_asn1_parse_unsigned_integer(const UCHAR *data, ULONG length, in _nx_secure_asn1_parse_unsigned_integer() argument
365 if (data[0] == 0x00 && ((data[1] & 0x80) != 0)) in _nx_secure_asn1_parse_unsigned_integer()
372 *target = &data[offset]; in _nx_secure_asn1_parse_unsigned_integer()
Dnx_secure_dtls_send_record.c108 UCHAR *data; in _nx_secure_dtls_send_record() local
115 data = send_packet -> nx_packet_prepend_ptr; in _nx_secure_dtls_send_record()
219 … NX_SECURE_DTLS_RECORD_HEADER_SIZE, data, length, record_hash, &hash_length, mac_secret); in _nx_secure_dtls_send_record()
221 if ((hash_length > ((ULONG)(send_packet -> nx_packet_data_end) - (ULONG)(&data[length]))) || in _nx_secure_dtls_send_record()
230 … NX_SECURE_MEMCPY(&data[length], record_hash, hash_length); /* Use case of memcpy is verified. */ in _nx_secure_dtls_send_record()
Dnx_secure_dtls_verify_mac.c78 USHORT header_length, UCHAR *data, UINT *length) in _nx_secure_dtls_verify_mac() argument
138data, (USHORT)(data_length), _generated_hash, &hash_length, mac_secret); in _nx_secure_dtls_verify_mac()
149 received_hash = &data[data_length]; in _nx_secure_dtls_verify_mac()
/NetX-Duo-v6.2.1/test/regression/netxduo_test/
Dnetx_nxd_udp_socket_send_special_test.c28 static UCHAR data[4096 * 32 + 2]; variable
230 memset(data, 0xff, 4096 * 32 + 2); in thread_0_entry()
231 data[4096*32 - 1] = 0x9f; in thread_0_entry()
232 data[4096*32] = 0xd5; in thread_0_entry()
233 data[4096*32 + 1] = 0x39; in thread_0_entry()
235 status = nx_packet_data_append(my_packet, data, sizeof(data), &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry()
Dnetx_icmp_ping6_data_append_test.c29 static CHAR data[4096]; variable
151 data[i] = 'A'; in ntest_0_entry()
157 status = nxd_icmp_ping(&ip_0, &global_address_1, data, 400, &my_packet, NX_IP_PERIODIC_RATE); in ntest_0_entry()
168 status = nxd_icmp_ping(&ip_0, &global_address_1, data, 4096, &my_packet, NX_IP_PERIODIC_RATE); in ntest_0_entry()
Dnetx_ipv6_fragmentation_error_test2.c156 UCHAR data; in thread_0_entry() local
189 data = 23; in thread_0_entry()
190 status = nx_packet_data_append(my_packet, &data, 1, &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry()
193 data = 16; in thread_0_entry()
194 status += nx_packet_data_append(my_packet, &data, 1, &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry()
/NetX-Duo-v6.2.1/samples/
Ddemo_netx_pppoe_server.c98 void PppOpenReq(UINT interfaceHandle, ULONG length, UCHAR *data);
101 void PppTransmitDataReq(UINT interfaceHandle, ULONG length, UCHAR *data, UINT packet_id);
102 void PppReceiveDataRsp(UINT interfaceHandle, UCHAR *data);
314 void PppOpenReq(UINT interfaceHandle, ULONG length, UCHAR *data) in PppOpenReq() argument
343 void PppTransmitDataReq(UINT interfaceHandle, ULONG length, UCHAR *data, UINT packet_id) in PppTransmitDataReq() argument
356 PppTransmitDataCnf(interfaceHandle, data, packet_id); in PppTransmitDataReq()
360 void PppReceiveDataRsp(UINT interfaceHandle, UCHAR *data) in PppReceiveDataRsp() argument
/NetX-Duo-v6.2.1/addons/pppoe/
Dnx_pppoe_server.h247 … (*nx_pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data);
250 … (*nx_pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id);
251 VOID (*nx_pppoe_data_send_notify)(UINT session_index, UCHAR *data);
312 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data),
315 … VOID (* pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id),
316 … VOID (* pppoe_data_send_notify)(UINT session_index, UCHAR *data));
341 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data),
344 … VOID (* pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id),
345 … VOID (* pppoe_data_send_notify)(UINT session_index, UCHAR *data));
348 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data),
[all …]
/NetX-Duo-v6.2.1/common/src/
Dnx_tcp_packet_send_probe.c73 VOID _nx_tcp_packet_send_probe(NX_TCP_SOCKET *socket_ptr, ULONG tx_sequence, UCHAR data) in _nx_tcp_packet_send_probe() argument
77 socket_ptr -> nx_tcp_socket_rx_sequence, 0, 0, &data); in _nx_tcp_packet_send_probe()
/NetX-Duo-v6.2.1/test/regression/interoperability_test/test_frame/
Dtls_test_instance_shared_buffer_manipulate.c30 INT tls_test_instance_append_data_to_shared_buffer( TLS_TEST_INSTANCE* instance_ptr, VOID* data, UI… in tls_test_instance_append_data_to_shared_buffer() argument
35 return_value_if_fail( NULL != data, TLS_TEST_INVALID_POINTER); in tls_test_instance_append_data_to_shared_buffer()
61 memcpy( (CHAR*)instance_ptr -> tls_test_shared_buffer + shared_buffer_offset, data, *length); in tls_test_instance_append_data_to_shared_buffer()

1234