| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_tls_client_handshake_coverage_test.c | 233 static UCHAR data_buffer[DATA_BUFFER_SIZE]; variable 261 status = _nx_secure_tls_client_handshake(&session, data_buffer, 2, NX_NO_WAIT); in TEST() 266 data_buffer[0] = NX_SECURE_TLS_FINISHED; in TEST() 268 data_buffer[1] = 0; in TEST() 269 data_buffer[2] = 0; in TEST() 270 data_buffer[3] = 10; in TEST() 277 status = _nx_secure_tls_client_handshake(&session, data_buffer, DATA_BUFFER_SIZE, NX_NO_WAIT); in TEST() 282 status = _nx_secure_tls_client_handshake(&session, data_buffer, DATA_BUFFER_SIZE, NX_NO_WAIT); in TEST() 287 data_buffer[0] = NX_SECURE_TLS_HELLO_REQUEST; in TEST() 291 status = _nx_secure_tls_client_handshake(&session, data_buffer, DATA_BUFFER_SIZE, NX_NO_WAIT); in TEST() [all …]
|
| D | nx_secure_tls_process_record_test.c | 65 UCHAR data_buffer[NX_SECURE_TLS_MAX_CIPHERTEXT_LENGTH + 1] = "hello"; in test_application_define() local 112 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define() 133 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define() 154 memcpy(data_buffer, header_buffer, sizeof(header_buffer)); in test_application_define() 155 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define() 186 memcpy(data_buffer, header_buffer, sizeof(header_buffer)); in test_application_define() 187 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define() 214 memcpy(data_buffer, header_buffer, sizeof(header_buffer)); in test_application_define() 215 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define()
|
| D | nx_secure_tls_packet_trim_test.c | 65 UCHAR data_buffer[2000] = "hello"; in test_application_define() local 110 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define() 130 status = nx_packet_data_append(packet, data_buffer, data_length, &pool_0, NX_WAIT_FOREVER); in test_application_define()
|
| /NetX-Duo-v6.2.1/nx_secure/src/ |
| D | nx_secure_generate_server_key_exchange.c | 85 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size, in _nx_secure_generate_server_key_exchange() argument 125 NX_PARAMETER_NOT_USED(data_buffer); in _nx_secure_generate_server_key_exchange() 159 data_buffer[length] = (UCHAR)((identity_length & 0xFF00) >> 8); in _nx_secure_generate_server_key_exchange() 160 data_buffer[length + 1] = (UCHAR)(identity_length & 0x00FF); in _nx_secure_generate_server_key_exchange() 164 …NX_SECURE_MEMCPY(&data_buffer[length], identity, identity_length); /* Use case of memcpy is verifi… in _nx_secure_generate_server_key_exchange() 185 data_buffer[length] = NX_CRYPTO_EC_CURVE_TYPE_NAMED_CURVE; in _nx_secure_generate_server_key_exchange() 190 data_buffer[length] = (UCHAR)((named_curve >> 8) & 0xFF); in _nx_secure_generate_server_key_exchange() 191 data_buffer[length + 1] = (UCHAR)(named_curve & 0xFF); in _nx_secure_generate_server_key_exchange() 194 extended_output.nx_crypto_extended_output_data = &data_buffer[length]; in _nx_secure_generate_server_key_exchange() 228 … data_buffer, &length, ecdhe_data, public_cipher_metadata, public_cipher_metadata_size, in _nx_secure_generate_server_key_exchange()
|
| D | nx_secure_generate_client_key_exchange.c | 90 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size, in _nx_secure_generate_client_key_exchange() argument 144 …NX_SECURE_MEMCPY(data_buffer, tls_key_material -> nx_secure_tls_new_key_material_data, data_size);… in _nx_secure_generate_client_key_exchange() 151 encrypted_data_ptr = &data_buffer[2]; in _nx_secure_generate_client_key_exchange() 175 data_buffer[0] = (UCHAR)((data_size & 0xFF00) >> 8); in _nx_secure_generate_client_key_exchange() 176 data_buffer[1] = (UCHAR)(data_size & 0x00FF); in _nx_secure_generate_client_key_exchange() 188 extended_output.nx_crypto_extended_output_data = data_buffer; in _nx_secure_generate_client_key_exchange() 320 data_buffer[0] = (UCHAR)((data_size & 0xFF00) >> 8); in _nx_secure_generate_client_key_exchange() 321 data_buffer[1] = (UCHAR)(data_size & 0x00FF); in _nx_secure_generate_client_key_exchange()
|
| /NetX-Duo-v6.2.1/test/regression/bsd_test/ |
| D | netx_bsd_raw_tx_test.c | 76 char data_buffer[100]; in bsd_tx_packet_process_callback() local 92 memcpy(data_buffer, ipv4_packet, sizeof(ipv4_packet)); in bsd_tx_packet_process_callback() 105 data_buffer[4] = (ip_id & 0xFF00) >> 8; in bsd_tx_packet_process_callback() 106 data_buffer[5] = ip_id & 0xFF; in bsd_tx_packet_process_callback() 108 data_buffer[10] = packet_ptr -> nx_packet_prepend_ptr[10]; in bsd_tx_packet_process_callback() 109 data_buffer[11] = packet_ptr -> nx_packet_prepend_ptr[11]; in bsd_tx_packet_process_callback() 112 data_buffer, sizeof(ipv4_packet))) in bsd_tx_packet_process_callback()
|
| /NetX-Duo-v6.2.1/test/regression/test/ |
| D | nx_ram_network_driver_test_1500.c | 2693 CHAR data_buffer[3014]; in write_pcap_file() local 2700 nx_packet_data_retrieve(packet_ptr, data_buffer, &data_length); in write_pcap_file() 2716 fwrite(data_buffer, data_length, 1, nx_network_driver_pcap_fp); in write_pcap_file()
|
| /NetX-Duo-v6.2.1/nx_secure/inc/ |
| D | nx_secure_tls.h | 1418 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size, 1431 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size, 1866 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size, 1872 … UCHAR *data_buffer, ULONG buffer_length, ULONG *output_size,
|