Home
last modified time | relevance | path

Searched refs:html_data (Results 1 – 18 of 18) sorted by relevance

/NetX-Duo-v6.2.1/test/regression/nx_secure_test/
Dnx_secure_tls_two_way_test.c503 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
767 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
874 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
1134 if(strlen(html_data) != bytes) in ntest_1_entry()
1139 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
1244 if(strlen(html_data) != bytes) in ntest_1_entry()
1249 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_two_way_test_version_1_1.c383 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
526 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
695 if(strlen(html_data) != bytes) in ntest_1_entry()
700 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_rsa_private_key_test.c755 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
996 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
1228 if(strlen(html_data) != bytes) in ntest_1_entry()
1233 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_hash_clone_test.c484 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
734 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
1048 if(strlen(html_data) != bytes) in ntest_1_entry()
1053 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_server_ciphersuite_priority_test.c474 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
741 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
1064 if(strlen(html_data) != bytes) in ntest_1_entry()
1069 error_counter += strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_error_checking_test.c517 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
699 nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER); in ntest_0_entry()
1227 if(strlen(html_data) != bytes) in ntest_1_entry()
1233 status = strncmp((CHAR *)receive_buffer, html_data, strlen(html_data)); in ntest_1_entry()
Dnx_secure_tls_cert_callback_fail_test.c484 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_no_client_cert_test.c699 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_client_handshake_test.c257 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_coverage_2_test.c256 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_session_start_test.c297 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_send_and_receive_record_test.c694 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_packet_chain_test.c776 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_handshake_fail_test.c871 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
Dnx_secure_tls_coverage_test.c260 static CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
/NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/
Ddemo_dtls_test_server.c39 CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
210 … status = nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_NO_WAIT); in server_thread_entry()
Ddemo_tls_test_server.c51 CHAR *html_data = "HTTP/1.1 200 OK\r\n" \ variable
205 …status = nx_packet_data_append(send_packet, html_data, strlen(html_data), &pool_0, NX_WAIT_FOREVER… in server_thread_entry()
/NetX-Duo-v6.2.1/samples/
Ddemo_netx_secure_tls.c328 UCHAR html_data[] = { "HTTP/1.1 200 OK\r\n" \ variable
722 status = nx_packet_data_append(send_packet, html_data, sizeof(html_data), &server_pool, in tls_server_thread_entry()