| /NetX-Duo-v6.2.1/test/regression/dhcp_test/ |
| D | netx_dhcp_clone_function.c | 10 UCHAR *data; in dhcp_get_option_value() local 18 data = dhcp_search_buffer(bootp_message, option, length); in dhcp_get_option_value() 21 if (data != NX_NULL) in dhcp_get_option_value() 25 if (*data > 4) in dhcp_get_option_value() 33 *value = dhcp_get_data(data + 1, 4); in dhcp_get_option_value() 49 *value = dhcp_get_data(data + 1, *data); in dhcp_get_option_value() 61 UCHAR *data; in dhcp_search_buffer() local 66 data = &bootp_message[NX_BOOTP_OFFSET_OPTIONS]; in dhcp_search_buffer() 74 if (*data == NX_DHCP_OPTION_PAD) in dhcp_search_buffer() 77 data++; in dhcp_search_buffer() [all …]
|
| /NetX-Duo-v6.2.1/test/regression/rtp_test/ |
| D | netx_rtp_multicast_test.c | 233 UCHAR *data; in ntest_1_entry() local 257 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 260 CHECK_STATUS(0x80, *data); in ntest_1_entry() 263 data++; in ntest_1_entry() 264 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry() 267 data++; in ntest_1_entry() 268 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry() 271 data += 2; in ntest_1_entry() 272 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | … in ntest_1_entry() 275 data += 4; in ntest_1_entry() [all …]
|
| D | netx_rtp_multi_clients_test.c | 250 UCHAR *data; in ntest_1_entry() local 269 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 272 CHECK_STATUS(0x80, *data); in ntest_1_entry() 275 data++; in ntest_1_entry() 276 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry() 279 data++; in ntest_1_entry() 280 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry() 283 data += 2; in ntest_1_entry() 284 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | … in ntest_1_entry() 287 data += 4; in ntest_1_entry() [all …]
|
| D | netx_rtp_session_h264_send_test.c | 175 static UINT validate_rtp_h264_data(UCHAR *data, UINT data_length) in validate_rtp_h264_data() argument 178 UCHAR *data_ptr = data; in validate_rtp_h264_data() 190 while (data_ptr < (data + data_length)) in validate_rtp_h264_data() 204 static UINT validate_rtp_h264_fragmentation_data(UINT index, UCHAR *data, UINT data_length) in validate_rtp_h264_fragmentation_data() argument 207 UCHAR *data_ptr = data; in validate_rtp_h264_fragmentation_data() 270 while (data_ptr < (data + data_length)) in validate_rtp_h264_fragmentation_data() 290 static UINT validate_rtp_h264_slice_data(UCHAR *data, UINT data_length) in validate_rtp_h264_slice_data() argument 293 UCHAR *data_ptr = data; in validate_rtp_h264_slice_data() 312 if (data_ptr >= (data + data_length - 4)) /* Skip 4 byte h264 header */ in validate_rtp_h264_slice_data() 398 UCHAR *data; in ntest_1_entry() local [all …]
|
| D | netx_rtp_session_aac_send_test.c | 149 static UINT validate_rtp_aac_data(UCHAR *data, UINT data_length) in validate_rtp_aac_data() argument 152 UCHAR *data_ptr = data; in validate_rtp_aac_data() 173 while (data_ptr < (data + data_length)) in validate_rtp_aac_data() 187 static UINT validate_long_rtp_aac_data(UCHAR *data, UINT data_length) in validate_long_rtp_aac_data() argument 189 UCHAR *data_ptr = data; in validate_long_rtp_aac_data() 210 while (data_ptr < (data + data_length)) in validate_long_rtp_aac_data() 287 UCHAR *data; in ntest_1_entry() local 307 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 310 CHECK_STATUS(0x80, *data); in ntest_1_entry() 313 data++; in ntest_1_entry() [all …]
|
| D | netx_rtp_session_jpeg_send_test.c | 238 static UINT validate_rtp_jpeg_data(UCHAR *data, UINT data_length) in validate_rtp_jpeg_data() argument 242 UCHAR *data_ptr = data; in validate_rtp_jpeg_data() 300 while (data_ptr < (data + data_length)) in validate_rtp_jpeg_data() 314 static UINT validate_long_rtp_jpeg_data(UCHAR *data, UINT data_length) in validate_long_rtp_jpeg_data() argument 318 UCHAR *data_ptr = data; in validate_long_rtp_jpeg_data() 385 while (data_ptr < (data + data_length)) in validate_long_rtp_jpeg_data() 462 UCHAR *data; in ntest_1_entry() local 482 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 485 CHECK_STATUS(0x80, *data); in ntest_1_entry() 488 data++; in ntest_1_entry() [all …]
|
| D | netx_rtp_basic_test.c | 188 UCHAR *data; in ntest_1_entry() local 203 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 206 CHECK_STATUS(0x80, *data); in ntest_1_entry() 209 data++; in ntest_1_entry() 210 CHECK_STATUS((0x80 | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry() 213 data++; in ntest_1_entry() 214 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry() 217 data += 2; in ntest_1_entry() 218 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | … in ntest_1_entry() 221 data += 4; in ntest_1_entry() [all …]
|
| D | netx_rtp_session_packet_send_test.c | 247 UCHAR *data; in ntest_1_entry() local 266 data = received_packet -> nx_packet_prepend_ptr; in ntest_1_entry() 269 CHECK_STATUS(0x80, *data); in ntest_1_entry() 272 data++; in ntest_1_entry() 275 CHECK_STATUS((RTP_PAYLOAD_TYPE), *data); in ntest_1_entry() 279 CHECK_STATUS((NX_RTP_HEADER_MARKER_BIT | RTP_PAYLOAD_TYPE), *data); in ntest_1_entry() 283 data++; in ntest_1_entry() 284 CHECK_STATUS((rtp_session_0.nx_rtp_session_sequence_number - 1), (data[0] << 8 | data[1])); in ntest_1_entry() 287 data += 2; in ntest_1_entry() 288 …tp_session_0.nx_rtp_session_rtp_timestamp, (ULONG)(data[0] << 24 | data[1] << 16 | data[2] << 8 | … in ntest_1_entry() [all …]
|
| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_dtls_fragment_test.c | 272 UCHAR *data; in test_udp_packet_receive() local 281 data = packet_ptr -> nx_packet_prepend_ptr; in test_udp_packet_receive() 283 if ((data[8] == NX_SECURE_TLS_HANDSHAKE)) in test_udp_packet_receive() 287 if ((data[25] == 0) && (data[26] == 0 || data[26] == 2)) in test_udp_packet_receive() 298 temp_len = (UINT)((data[31] << 8 | data[32]) - fragment_length); in test_udp_packet_receive() 300 data[31] = (UCHAR)(temp_len >> 8); in test_udp_packet_receive() 301 data[32] = (UCHAR)(temp_len & 0xff); in test_udp_packet_receive() 302 temp_len = (UINT)((data[19] << 8 | data[20]) - fragment_length); in test_udp_packet_receive() 303 data[19] = (UCHAR)(temp_len >> 8); in test_udp_packet_receive() 304 data[20] = (UCHAR)(temp_len & 0xff); in test_udp_packet_receive() [all …]
|
| D | nx_secure_dtls_handshake_fail_test.c | 239 UCHAR *data; in udp_packet_filter_bad_helloverify() local 242 data = packet_ptr -> nx_packet_prepend_ptr; in udp_packet_filter_bad_helloverify() 244 if (data[8] == NX_SECURE_TLS_HANDSHAKE && data[21] == NX_SECURE_TLS_HELLO_VERIFY_REQUEST) in udp_packet_filter_bad_helloverify() 246 checksum = (data[6] << 8) + data[7]; in udp_packet_filter_bad_helloverify() 247 checksum = checksum + data[35]; in udp_packet_filter_bad_helloverify() 249 data[35] = 255; in udp_packet_filter_bad_helloverify() 251 checksum = checksum - data[35]; in udp_packet_filter_bad_helloverify() 252 data[6] = (UCHAR)((checksum & 0xFF00) >> 8); in udp_packet_filter_bad_helloverify() 253 data[7] = (UCHAR)(checksum & 0xFF); in udp_packet_filter_bad_helloverify() 262 UCHAR *data; in udp_packet_filter_bad_serverhello_length() local [all …]
|
| D | netxtestcontrol.c | 531 CHAR data[4]={0, 1, 0, 0}; in kill_child() local 535 write(result_fd[1], data, sizeof(data)); in kill_child() 542 CHAR data[4]; in fork_child() local 561 read(result_fd[0], data, sizeof(data)); in fork_child() 562 test_control_successful_tests += (ULONG)data[0]; in fork_child() 563 test_control_failed_tests += (ULONG)data[1]; in fork_child() 564 test_control_warning_tests += (ULONG)data[2]; in fork_child() 565 test_control_na_tests += (ULONG)data[3]; in fork_child() 621 CHAR data[4]; in test_control_return() local 626 data[0] = (CHAR)test_control_successful_tests; in test_control_return() [all …]
|
| D | nx_secure_dtls_multiple_sessions_connect_fail_test.c | 516 UCHAR *data; in udp_packet_filter_bad_helloverify() local 519 data = packet_ptr -> nx_packet_prepend_ptr; in udp_packet_filter_bad_helloverify() 521 if (data[8] == NX_SECURE_TLS_HANDSHAKE && data[21] == NX_SECURE_TLS_HELLO_VERIFY_REQUEST) in udp_packet_filter_bad_helloverify() 523 checksum = (data[6] << 8) + data[7]; in udp_packet_filter_bad_helloverify() 524 checksum = checksum + data[35]; in udp_packet_filter_bad_helloverify() 526 data[35] = 255; in udp_packet_filter_bad_helloverify() 528 checksum = checksum - data[35]; in udp_packet_filter_bad_helloverify() 529 data[6] = (UCHAR)((checksum & 0xFF00) >> 8); in udp_packet_filter_bad_helloverify() 530 data[7] = (UCHAR)(checksum & 0xFF); in udp_packet_filter_bad_helloverify()
|
| /NetX-Duo-v6.2.1/crypto_libraries/src/ |
| D | nx_crypto_ec.c | 1188 UINT *data; in _nx_crypto_ec_secp192r1_reduce() local 1206 data = (UINT *)(((ULONG)scratch + 3) & (ULONG) ~3); in _nx_crypto_ec_secp192r1_reduce() 1209 _nx_crypto_huge_number_extract(value, (UCHAR *)data, 48, &size); in _nx_crypto_ec_secp192r1_reduce() 1212 … NX_CRYPTO_MEMMOVE((UCHAR *)data + (48 - size), data, size); /* Use case of memmove is verified. */ in _nx_crypto_ec_secp192r1_reduce() 1213 NX_CRYPTO_MEMSET(data, 0, (48 - size)); in _nx_crypto_ec_secp192r1_reduce() 1219 _nx_crypto_huge_number_setup(value, (UCHAR *)data + 24, 24); in _nx_crypto_ec_secp192r1_reduce() 1223 0, 0, data[4], data[5], in _nx_crypto_ec_secp192r1_reduce() 1224 data[4], data[5]); in _nx_crypto_ec_secp192r1_reduce() 1229 data[2], data[3], data[2], in _nx_crypto_ec_secp192r1_reduce() 1230 data[3], 0, 0); in _nx_crypto_ec_secp192r1_reduce() [all …]
|
| /NetX-Duo-v6.2.1/test/regression/crypto_test/ |
| D | cryptotestcontrol.c | 243 CHAR data[4]={0, 1, 0, 0}; in kill_child() local 247 write(result_fd[1], data, sizeof(data)); in kill_child() 254 CHAR data[4]; in fork_child() local 273 read(result_fd[0], data, sizeof(data)); in fork_child() 274 test_control_successful_tests += (ULONG)data[0]; in fork_child() 275 test_control_failed_tests += (ULONG)data[1]; in fork_child() 276 test_control_warning_tests += (ULONG)data[2]; in fork_child() 277 test_control_na_tests += (ULONG)data[3]; in fork_child() 333 CHAR data[4]; in test_control_return() local 338 data[0] = (CHAR)test_control_successful_tests; in test_control_return() [all …]
|
| /NetX-Duo-v6.2.1/nx_secure/src/ |
| D | nx_secure_tls_handshake_hash_update.c | 82 UINT _nx_secure_tls_handshake_hash_update(NX_SECURE_TLS_SESSION *tls_session, UCHAR *data, in _nx_secure_tls_handshake_hash_update() argument 120 data, in _nx_secure_tls_handshake_hash_update() 147 (data[0] == NX_SECURE_TLS_CLIENT_HELLO) && in _nx_secure_tls_handshake_hash_update() 160 … data + 4, /* Reuse input buffer since the input will not be used anymore. */ in _nx_secure_tls_handshake_hash_update() 176 data[0] = NX_SECURE_TLS_MESSAGE_HASH & 0xFF; in _nx_secure_tls_handshake_hash_update() 177 data[1] = 0; in _nx_secure_tls_handshake_hash_update() 178 data[2] = 0; in _nx_secure_tls_handshake_hash_update() 179 data[3] = hash_length & 0xFF; in _nx_secure_tls_handshake_hash_update() 186 data, in _nx_secure_tls_handshake_hash_update() 225 data, in _nx_secure_tls_handshake_hash_update() [all …]
|
| D | nx_secure_x509_pkcs1_rsa_private_key_parse.c | 26 static VOID _nx_secure_asn1_parse_unsigned_integer(const UCHAR *data, ULONG length, 351 static VOID _nx_secure_asn1_parse_unsigned_integer(const UCHAR *data, ULONG length, in _nx_secure_asn1_parse_unsigned_integer() argument 365 if (data[0] == 0x00 && ((data[1] & 0x80) != 0)) in _nx_secure_asn1_parse_unsigned_integer() 372 *target = &data[offset]; in _nx_secure_asn1_parse_unsigned_integer()
|
| D | nx_secure_dtls_send_record.c | 108 UCHAR *data; in _nx_secure_dtls_send_record() local 115 data = send_packet -> nx_packet_prepend_ptr; in _nx_secure_dtls_send_record() 219 … NX_SECURE_DTLS_RECORD_HEADER_SIZE, data, length, record_hash, &hash_length, mac_secret); in _nx_secure_dtls_send_record() 221 if ((hash_length > ((ULONG)(send_packet -> nx_packet_data_end) - (ULONG)(&data[length]))) || in _nx_secure_dtls_send_record() 230 … NX_SECURE_MEMCPY(&data[length], record_hash, hash_length); /* Use case of memcpy is verified. */ in _nx_secure_dtls_send_record()
|
| D | nx_secure_dtls_verify_mac.c | 78 USHORT header_length, UCHAR *data, UINT *length) in _nx_secure_dtls_verify_mac() argument 138 … data, (USHORT)(data_length), _generated_hash, &hash_length, mac_secret); in _nx_secure_dtls_verify_mac() 149 received_hash = &data[data_length]; in _nx_secure_dtls_verify_mac()
|
| /NetX-Duo-v6.2.1/test/regression/netxduo_test/ |
| D | netx_nxd_udp_socket_send_special_test.c | 28 static UCHAR data[4096 * 32 + 2]; variable 230 memset(data, 0xff, 4096 * 32 + 2); in thread_0_entry() 231 data[4096*32 - 1] = 0x9f; in thread_0_entry() 232 data[4096*32] = 0xd5; in thread_0_entry() 233 data[4096*32 + 1] = 0x39; in thread_0_entry() 235 status = nx_packet_data_append(my_packet, data, sizeof(data), &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry()
|
| D | netx_icmp_ping6_data_append_test.c | 29 static CHAR data[4096]; variable 151 data[i] = 'A'; in ntest_0_entry() 157 status = nxd_icmp_ping(&ip_0, &global_address_1, data, 400, &my_packet, NX_IP_PERIODIC_RATE); in ntest_0_entry() 168 status = nxd_icmp_ping(&ip_0, &global_address_1, data, 4096, &my_packet, NX_IP_PERIODIC_RATE); in ntest_0_entry()
|
| D | netx_ipv6_fragmentation_error_test2.c | 156 UCHAR data; in thread_0_entry() local 189 data = 23; in thread_0_entry() 190 status = nx_packet_data_append(my_packet, &data, 1, &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry() 193 data = 16; in thread_0_entry() 194 status += nx_packet_data_append(my_packet, &data, 1, &pool_0, NX_IP_PERIODIC_RATE); in thread_0_entry()
|
| /NetX-Duo-v6.2.1/samples/ |
| D | demo_netx_pppoe_server.c | 98 void PppOpenReq(UINT interfaceHandle, ULONG length, UCHAR *data); 101 void PppTransmitDataReq(UINT interfaceHandle, ULONG length, UCHAR *data, UINT packet_id); 102 void PppReceiveDataRsp(UINT interfaceHandle, UCHAR *data); 314 void PppOpenReq(UINT interfaceHandle, ULONG length, UCHAR *data) in PppOpenReq() argument 343 void PppTransmitDataReq(UINT interfaceHandle, ULONG length, UCHAR *data, UINT packet_id) in PppTransmitDataReq() argument 356 PppTransmitDataCnf(interfaceHandle, data, packet_id); in PppTransmitDataReq() 360 void PppReceiveDataRsp(UINT interfaceHandle, UCHAR *data) in PppReceiveDataRsp() argument
|
| /NetX-Duo-v6.2.1/addons/pppoe/ |
| D | nx_pppoe_server.h | 247 … (*nx_pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data); 250 … (*nx_pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id); 251 VOID (*nx_pppoe_data_send_notify)(UINT session_index, UCHAR *data); 312 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data), 315 … VOID (* pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id), 316 … VOID (* pppoe_data_send_notify)(UINT session_index, UCHAR *data)); 341 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data), 344 … VOID (* pppoe_data_receive_notify)(UINT session_index, ULONG length, UCHAR *data, UINT packet_id), 345 … VOID (* pppoe_data_send_notify)(UINT session_index, UCHAR *data)); 348 … VOID (* pppoe_discover_request_notify)(UINT session_index, ULONG length, UCHAR *data), [all …]
|
| /NetX-Duo-v6.2.1/common/src/ |
| D | nx_tcp_packet_send_probe.c | 73 VOID _nx_tcp_packet_send_probe(NX_TCP_SOCKET *socket_ptr, ULONG tx_sequence, UCHAR data) in _nx_tcp_packet_send_probe() argument 77 socket_ptr -> nx_tcp_socket_rx_sequence, 0, 0, &data); in _nx_tcp_packet_send_probe()
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/test_frame/ |
| D | tls_test_instance_shared_buffer_manipulate.c | 30 INT tls_test_instance_append_data_to_shared_buffer( TLS_TEST_INSTANCE* instance_ptr, VOID* data, UI… in tls_test_instance_append_data_to_shared_buffer() argument 35 return_value_if_fail( NULL != data, TLS_TEST_INVALID_POINTER); in tls_test_instance_append_data_to_shared_buffer() 61 memcpy( (CHAR*)instance_ptr -> tls_test_shared_buffer + shared_buffer_offset, data, *length); in tls_test_instance_append_data_to_shared_buffer()
|