| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_tls_two_way_test.c | 503 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 767 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 874 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 1134 if(strlen(html_data) != bytes) in ntest_1_entry() 1139 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry() 1244 if(strlen(html_data) != bytes) in ntest_1_entry() 1249 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_two_way_test_version_1_1.c | 383 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 526 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 695 if(strlen(html_data) != bytes) in ntest_1_entry() 700 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_rsa_private_key_test.c | 755 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 996 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 1228 if(strlen(html_data) != bytes) in ntest_1_entry() 1233 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_hash_clone_test.c | 484 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 734 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 1048 if(strlen(html_data) != bytes) in ntest_1_entry() 1053 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_server_ciphersuite_priority_test.c | 474 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 741 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 1064 if(strlen(html_data) != bytes) in ntest_1_entry() 1069 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_error_checking_test.c | 517 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 699 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry() 1227 if(strlen(html_data) != bytes) in ntest_1_entry() 1233 status = strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
|
| D | nx_secure_tls_cert_callback_fail_test.c | 484 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_no_client_cert_test.c | 699 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_client_handshake_test.c | 257 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_coverage_2_test.c | 256 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_session_start_test.c | 297 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_send_and_receive_record_test.c | 694 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_packet_chain_test.c | 776 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_handshake_fail_test.c | 871 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| D | nx_secure_tls_coverage_test.c | 260 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/ |
| D | demo_dtls_test_server.c | 39 CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 210 … status = nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_NO_WAIT); in server_thread_entry()
|
| D | demo_tls_test_server.c | 51 CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable 205 …status = nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER… in server_thread_entry()
|
| /NetX-Duo-v6.2.1/samples/ |
| D | demo_netx_secure_tls.c | 328 UCHAR html_data[] = { "HTTP/1.1 200 OK\r\n" \ variable 722 status = nx_packet_data_append(send_packet, html_data, sizeof(html_data), &server_pool, in tls_server_thread_entry()
|