/NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
D | nx_secure_tls_coverage_3_test.c | 25 USHORT id; in thread_0_entry() local 30 _nx_secure_tls_get_signature_algorithm_id(NX_SECURE_TLS_SIGNATURE_RSA_MD5, &id); in thread_0_entry() 31 EXPECT_EQ(NX_SECURE_TLS_X509_TYPE_RSA_MD5, id); in thread_0_entry() 33 _nx_secure_tls_get_signature_algorithm_id(NX_SECURE_TLS_SIGNATURE_RSA_SHA1, &id); in thread_0_entry() 34 EXPECT_EQ(NX_SECURE_TLS_X509_TYPE_RSA_SHA_1, id); in thread_0_entry() 36 _nx_secure_tls_get_signature_algorithm_id(NX_SECURE_TLS_SIGNATURE_RSA_SHA384, &id); in thread_0_entry() 37 EXPECT_EQ(NX_SECURE_TLS_X509_TYPE_RSA_SHA_384, id); in thread_0_entry() 39 _nx_secure_tls_get_signature_algorithm_id(NX_SECURE_TLS_SIGNATURE_RSA_SHA512, &id); in thread_0_entry() 40 EXPECT_EQ(NX_SECURE_TLS_X509_TYPE_RSA_SHA_512, id); in thread_0_entry() 42 _nx_secure_tls_get_signature_algorithm_id(NX_SECURE_TLS_SIGNATURE_ECDSA_SHA224, &id); in thread_0_entry() [all …]
|
D | nx_secure_tls_newest_supported_version_coverage_test.c | 60 …supported_version_negotiate(NX_SECURE_TLS_SESSION* session_ptr, USHORT* protocol_version, UINT id);
|
/NetX-Duo-v6.2.1/nx_secure/src/ |
D | nx_secure_tls_newest_supported_version.c | 76 USHORT *protocol_version, UINT id) in _nx_secure_tls_newest_supported_version() argument 94 …for (i = (INT)(nx_secure_supported_versions_list[id].nx_secure_versions_list_count - 1); i >= 0; -… in _nx_secure_tls_newest_supported_version() 97 … if (nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_is_supported) in _nx_secure_tls_newest_supported_version() 99 …(*protocol_version) = nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_t… in _nx_secure_tls_newest_supported_version() 152 USHORT *protocol_version, UINT id) in _nx_secure_tls_highest_supported_version_negotiate() argument 174 …for (i = (INT)(nx_secure_supported_versions_list[id].nx_secure_versions_list_count - 1); i >= 0; -… in _nx_secure_tls_highest_supported_version_negotiate() 177 … if (nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_is_supported) in _nx_secure_tls_highest_supported_version_negotiate() 179 …if (highest_version < nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_t… in _nx_secure_tls_highest_supported_version_negotiate() 181 …highest_version = nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_p… in _nx_secure_tls_highest_supported_version_negotiate() 184 …if (lowest_version > nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tl… in _nx_secure_tls_highest_supported_version_negotiate() [all …]
|
D | nx_secure_tls_check_protocol_version.c | 109 USHORT protocol_version, UINT id) in _nx_secure_tls_check_protocol_version() argument 152 for (i = 0; i < nx_secure_supported_versions_list[id].nx_secure_versions_list_count; ++i) in _nx_secure_tls_check_protocol_version() 154 …if (protocol_version == nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure… in _nx_secure_tls_check_protocol_version() 157 … if (nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_is_supported) in _nx_secure_tls_check_protocol_version()
|
D | nx_secure_tls_process_client_key_exchange.c | 86 UCHAR *packet_buffer, UINT message_length, UINT id) in _nx_secure_tls_process_client_key_exchange() argument 91 NX_PARAMETER_NOT_USED(id); in _nx_secure_tls_process_client_key_exchange() 130 NX_PARAMETER_NOT_USED(id); in _nx_secure_tls_process_client_key_exchange()
|
D | nx_secure_tls_protocol_version_get.c | 74 USHORT *protocol_version, UINT id) in _nx_secure_tls_protocol_version_get() argument 86 _nx_secure_tls_newest_supported_version(session_ptr, protocol_version, id); in _nx_secure_tls_protocol_version_get()
|
D | nx_secure_tls_generate_premaster_secret.c | 80 UINT _nx_secure_tls_generate_premaster_secret(NX_SECURE_TLS_SESSION *tls_session, UINT id) in _nx_secure_tls_generate_premaster_secret() argument 92 _nx_secure_tls_protocol_version_get(tls_session, &protocol_version, id); in _nx_secure_tls_generate_premaster_secret()
|
D | nx_secure_tls_send_clienthello_extensions.c | 566 UINT id = NX_SECURE_TLS; in _nx_secure_tls_send_clienthello_supported_versions_extension() local 579 … (nx_secure_supported_versions_list[id].nx_secure_versions_list_count << 1))) in _nx_secure_tls_send_clienthello_supported_versions_extension() 609 …for (i = (INT)(nx_secure_supported_versions_list[id].nx_secure_versions_list_count - 1); i >= 0; -… in _nx_secure_tls_send_clienthello_supported_versions_extension() 613 … if (nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_is_supported) in _nx_secure_tls_send_clienthello_supported_versions_extension() 617 …protocol_version = nx_secure_supported_versions_list[id].nx_secure_versions_list[i].nx_secure_tls_… in _nx_secure_tls_send_clienthello_supported_versions_extension() 916 UCHAR *id; in _nx_secure_tls_send_clienthello_psk_extension() local 1016 id = psk_store[i].nx_secure_tls_psk_id; in _nx_secure_tls_send_clienthello_psk_extension() 1030 NX_SECURE_MEMCPY(&packet_buffer[offset], id, id_len); /* Use case of memcpy is verified. */ in _nx_secure_tls_send_clienthello_psk_extension()
|
/NetX-Duo-v6.2.1/test/regression/interoperability_test/test_frame/ |
D | tls_test_director_register_test_instance.c | 8 UINT id = 0; in tls_test_director_register_test_instance() local 36 id = id > iter -> tls_test_instance_identify? id : iter -> tls_test_instance_identify; in tls_test_director_register_test_instance() 47 instance_ptr -> tls_test_instance_identify = id + 1; in tls_test_director_register_test_instance()
|
/NetX-Duo-v6.2.1/test/regression/netxduo_test/ |
D | netx_caller_check_test.c | 44 VOID test_process(ULONG id); 45 VOID test_process_1(ULONG id); 46 VOID test_process_2(ULONG id); 130 VOID test_process(ULONG id) in test_process() argument 414 VOID test_process_1(ULONG id) in test_process_1() argument 429 if (id == 1) in test_process_1() 457 if (id == 1) in test_process_1() 463 if (id == 1) in test_process_1() 531 if (id == 1) in test_process_1() 538 if (id == 1) in test_process_1() [all …]
|
D | netx_ip_create_test.c | 59 CHAR id; in ntest_0_entry() local 74 id = _nx_version_id[0]; in ntest_0_entry() 98 _nx_version_id[0] = id; in ntest_0_entry()
|
/NetX-Duo-v6.2.1/crypto_libraries/inc/ |
D | nx_crypto_ecjpake.h | 111 CHAR *id, UINT id_len, 117 CHAR *id, UINT id_len, 124 CHAR *id, UINT id_len, 132 CHAR *id, UINT id_len, 144 CHAR *id, 154 CHAR *id, 166 CHAR *id,
|
/NetX-Duo-v6.2.1/crypto_libraries/src/ |
D | nx_crypto_ecjpake.c | 165 CHAR *id, UINT id_len, in _nx_crypto_ecjpake_hello_generate() argument 197 id, id_len, in _nx_crypto_ecjpake_hello_generate() 249 id, id_len, in _nx_crypto_ecjpake_hello_generate() 335 CHAR *id, UINT id_len, in _nx_crypto_ecjpake_hello_process() argument 384 id, id_len, in _nx_crypto_ecjpake_hello_process() 423 id, id_len, in _nx_crypto_ecjpake_hello_process() 493 CHAR *id, UINT id_len, in _nx_crypto_ecjpake_key_exchange_generate() argument 536 id, id_len, in _nx_crypto_ecjpake_key_exchange_generate() 631 CHAR *id, UINT id_len, in _nx_crypto_ecjpake_key_exchange_process() argument 699 id, id_len, in _nx_crypto_ecjpake_key_exchange_process() [all …]
|
/NetX-Duo-v6.2.1/test/regression/dhcp_test/ |
D | netx_dhcp_client_two_interfaces.c | 632 ULONG *id = (ULONG *)work_ptr; in server0_thread_entry() local 634 NX_CHANGE_ULONG_ENDIAN(*id); in server0_thread_entry() 638 if ((iface_index == 1) && (*id != 0x2a3ef01d)) in server0_thread_entry() 644 else if ((iface_index == 0) && (*id != 0x319d58a2)) in server0_thread_entry() 652 if (*id == 0x2a3ef01d) in server0_thread_entry()
|
/NetX-Duo-v6.2.1/tsn/src/ |
D | nx_msrp.c | 1978 UCHAR *id[NX_MSRP_ATTRIBUTE_ARRAY_MAX_SIZE]; in nx_msrp_mrpdu_pack() local 2040 id[0] = ((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.talker_advertise.stream_id; in nx_msrp_mrpdu_pack() 2101 … id[index] = ((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.talker_advertise.stream_id; in nx_msrp_mrpdu_pack() 2105 if (memcmp(id[index], id[index - 1], 8) == 1) in nx_msrp_mrpdu_pack() 2176 id[0] = ((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.listener.stream_id; in nx_msrp_mrpdu_pack() 2235 id[index] = ((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.listener.stream_id; in nx_msrp_mrpdu_pack() 2241 if (memcmp(id[index], id[index - 1], 8) == 1) in nx_msrp_mrpdu_pack() 2309 id[0] = &((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.domain.sr_class_id; in nx_msrp_mrpdu_pack() 2367 … id[index] = &((NX_MSRP_ATTRIBUTE *)attribute) -> msrp_attribute_union.domain.sr_class_id; in nx_msrp_mrpdu_pack() 2371 if (memcmp(id[index], id[index - 1], 1) == 1) in nx_msrp_mrpdu_pack()
|
/NetX-Duo-v6.2.1/test/regression/ppp_test/ |
D | netx_ppp_chap_bad_secret_failed_retry_test.c | 59 static UINT get_challenge_values(CHAR *rand_value, CHAR *id, CHAR *name); 233 static UINT get_challenge_values(CHAR *rand_value, CHAR *id, CHAR *name) in get_challenge_values() argument 244 *id = '1'; /* One byte */ in get_challenge_values()
|
D | netx_ppp_chap_bad_secret_passed_on_retry_test.c | 58 static UINT get_challenge_values(CHAR *rand_value, CHAR *id, CHAR *name); 262 static UINT get_challenge_values(CHAR *rand_value, CHAR *id, CHAR *name) in get_challenge_values() argument 273 *id = '1'; /* One byte */ in get_challenge_values()
|
/NetX-Duo-v6.2.1/addons/ppp/ |
D | nx_ppp.h | 566 UINT (*nx_ppp_chap_get_challenge_values)(CHAR *rand_value, CHAR *id, CHAR *name); 695 UINT (*get_challenge_values)(CHAR *rand_value, CHAR *id, CHAR *name), 733 UINT (*get_challenge_values)(CHAR *rand_value, CHAR *id, CHAR *name), 737 UINT (*get_challenge_values)(CHAR *rand_value, CHAR *id, CHAR *name), 797 void _nx_ppp_timer_entry(ULONG id); 830 void _nx_ppp_hash_generator(unsigned char *hvalue, unsigned char id, unsigned char *secret, un…
|
D | nx_ppp.c | 1919 void _nx_ppp_timer_entry(ULONG id) in _nx_ppp_timer_entry() argument 1926 ppp_ptr = (NX_PPP *) id; in _nx_ppp_timer_entry() 5644 UCHAR id; in _nx_ppp_chap_challenge_send() local 5656 … (CHAR *) &id, ppp_ptr -> nx_ppp_chap_challenger_name); in _nx_ppp_chap_challenge_send() 5711 packet_ptr -> nx_packet_prepend_ptr[3] = id; /* ID */ in _nx_ppp_chap_challenge_send() 5800 UCHAR id; in _nx_ppp_chap_challenge_respond() local 5808 id = packet_ptr -> nx_packet_prepend_ptr[3]; in _nx_ppp_chap_challenge_respond() 5884 _nx_ppp_hash_generator(hvalue, id, secret, value, length); in _nx_ppp_chap_challenge_respond() 5919 response_packet_ptr -> nx_packet_prepend_ptr[3] = id; /* ID */ in _nx_ppp_chap_challenge_respond() 6012 UCHAR id; in _nx_ppp_chap_challenge_validate() local [all …]
|
/NetX-Duo-v6.2.1/test/regression/interoperability_test/ecc_certificates/ |
D | ECRevoked2.crt | 12 Public Key Algorithm: id-ecPublicKey
|
D | ECTestServer10.crt | 12 Public Key Algorithm: id-ecPublicKey
|
D | ECTestServer2.crt | 12 Public Key Algorithm: id-ecPublicKey
|
D | ECTestServer8_224.crt | 12 Public Key Algorithm: id-ecPublicKey
|
D | ECTestServer9_192.crt | 12 Public Key Algorithm: id-ecPublicKey
|
D | ECTestServer7_256.crt | 12 Public Key Algorithm: id-ecPublicKey
|