Home
last modified time | relevance | path

Searched refs:receive_buffer (Results 1 – 25 of 57) sorted by relevance

123

/NetX-Duo-v6.2.1/test/regression/nx_secure_test/
Dnx_secure_tls_coverage_test.c453 UCHAR receive_buffer[100]; in ntest_0_entry() local
600 receive_buffer[0] = NX_SECURE_TLS_HELLO_VERIFY_REQUEST; in ntest_0_entry()
602 receive_buffer[1] = 0; in ntest_0_entry()
603 receive_buffer[2] = 0; in ntest_0_entry()
604 receive_buffer[3] = 0; in ntest_0_entry()
607 status = _nx_secure_tls_server_handshake(&server_tls_session, receive_buffer, 4, NX_NO_WAIT); in ntest_0_entry()
616 receive_buffer[2] = 0; in ntest_0_entry()
617 receive_buffer[3] = 0; in ntest_0_entry()
620 receive_buffer[0] = NX_SECURE_TLS_EXTENSION_SERVER_NAME_INDICATION >> 8; in ntest_0_entry()
621 receive_buffer[1] = NX_SECURE_TLS_EXTENSION_SERVER_NAME_INDICATION & 0xff; in ntest_0_entry()
[all …]
Dnx_secure_tls_verify_mac_coverage_test.c54 UCHAR receive_buffer[10]; in TEST() local
68 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
82 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in TEST()
84 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
89 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
92 receive_buffer[0] = 0; in TEST()
94 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
98 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
103 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in TEST()
106 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST()
[all …]
Dnx_secure_tls_server_handshake_test.c214 UCHAR receive_buffer[100]; in ntest_0_entry() local
468 UCHAR receive_buffer[400]; in ntest_1_entry() local
491 receive_buffer[0] = NX_SECURE_TLS_CLIENT_HELLO; /* message type. */ in ntest_1_entry()
493 receive_buffer[1] = 0; in ntest_1_entry()
494 receive_buffer[2] = 0; in ntest_1_entry()
495 receive_buffer[3] = 42; in ntest_1_entry()
499 receive_buffer[4] = NX_SECURE_TLS_VERSION_TLS_1_2 >> 8; in ntest_1_entry()
500 receive_buffer[5] = NX_SECURE_TLS_VERSION_TLS_1_2 & 0xff; in ntest_1_entry()
502 receive_buffer[38] = 0; in ntest_1_entry()
504 receive_buffer[39] = 0; in ntest_1_entry()
[all …]
Dnx_secure_tls_error_checking_test.c535 UCHAR receive_buffer[100]; in ntest_0_entry() local
667 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in ntest_0_entry()
668 receive_buffer[bytes] = 0; in ntest_0_entry()
676 status = strncmp((CHAR *)receive_buffer, "Hello there!\r\n", bytes); in ntest_0_entry()
808 UCHAR receive_buffer[400]; in ntest_1_entry() local
840 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry()
850 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in ntest_1_entry()
852 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry()
856 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry()
859 receive_buffer[0] = 0; in ntest_1_entry()
[all …]
/NetX-Duo-v6.2.1/test/regression/web_test/
Dnetx_web_https_demo_test.c233 UCHAR receive_buffer[1000]; in https_client_thread_entry() local
279 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 1000, &bytes); in https_client_thread_entry()
282 receive_buffer[bytes] = 0; in https_client_thread_entry()
285 EXPECT_EQ(receive_buffer[0], 'h'); in https_client_thread_entry()
286 EXPECT_EQ(receive_buffer[1], 't'); in https_client_thread_entry()
287 EXPECT_EQ(receive_buffer[2], 't'); in https_client_thread_entry()
288 EXPECT_EQ(receive_buffer[3], 'p'); in https_client_thread_entry()
289 EXPECT_EQ(receive_buffer[4], 's'); in https_client_thread_entry()
290 EXPECT_EQ(receive_buffer[5], ' '); in https_client_thread_entry()
291 EXPECT_EQ(receive_buffer[6], 's'); in https_client_thread_entry()
[all …]
/NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/
Dnx_secure_dtls_echo_client_entry.c107 UCHAR receive_buffer[100]; in client_thread_entry() local
183 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
187 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
188 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
189 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
190 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
191 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
192 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Ddtls_nx_secure_client_certificate_verify_test_client_entry.c116 UCHAR receive_buffer[100]; in client_thread_entry() local
198 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
202 exit_if_fail('h' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
203 exit_if_fail('e' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
204 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
205 exit_if_fail('l' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
206 exit_if_fail('o' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
207 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Ddtls_nx_secure_ecc_test_client_entry.c121 UCHAR receive_buffer[100]; in client_thread_entry() local
200 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
204 exit_if_fail('h' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
205 exit_if_fail('e' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
206 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
207 exit_if_fail('l' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
208 exit_if_fail('o' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
209 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Ddtls_aes128_gcm_nx_secure_client_entry.c128 UCHAR receive_buffer[100]; in client_thread_entry() local
206 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
210 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
211 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
212 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
213 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
214 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
215 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_echo_client_entry.c118 UCHAR receive_buffer[100]; in client_thread_entry() local
192 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
196 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
197 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
198 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
199 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
200 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
201 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_client_certificate_verify_test_client_entry.c120 UCHAR receive_buffer[100]; in client_thread_entry() local
197 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
201 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
202 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
203 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
204 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
205 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
206 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_echo_client_aes128_gcm_entry.c138 UCHAR receive_buffer[100]; in client_thread_entry() local
213 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
217 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
218 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
219 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
220 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
221 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
222 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dtls_1_3_nx_secure_echo_client_entry.c159 UCHAR receive_buffer[100]; in client_thread_entry() local
211 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
215 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
216 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
217 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
218 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
219 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
220 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_client_certificate_verify_test_server_entry.c112 UCHAR receive_buffer[100]; in server_thread_entry() local
178 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry()
180 exit_if_fail( receive_buffer[0] == 'h', 5); in server_thread_entry()
181 exit_if_fail( receive_buffer[1] == 'e', 5); in server_thread_entry()
182 exit_if_fail( receive_buffer[2] == 'l', 5); in server_thread_entry()
183 exit_if_fail( receive_buffer[3] == 'l', 5); in server_thread_entry()
184 exit_if_fail( receive_buffer[4] == 'o', 5); in server_thread_entry()
Dnx_secure_ecc_client_cert_test_client_entry.c181 UCHAR receive_buffer[100]; in client_thread_entry() local
235 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
239 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
240 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
241 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
242 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
243 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
244 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_override_tls_1_1_echo_client_entry.c180 UCHAR receive_buffer[100]; in client_thread_entry() local
256 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
260 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
261 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
262 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
263 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
264 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
265 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dtls_1_3_client_certificate_verify_test_nx_secure_echo_client_entry.c168 UCHAR receive_buffer[100]; in client_thread_entry() local
220 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
224 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
225 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
226 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
227 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
228 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
229 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dnx_secure_1_0_1_1_echo_client_entry.c180 UCHAR receive_buffer[100]; in client_thread_entry() local
254 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
258 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
259 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
260 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
261 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
262 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
263 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dtls_1_3_psk_test_nx_secure_echo_client_entry.c159 UCHAR receive_buffer[100]; in client_thread_entry() local
218 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
222 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
223 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
224 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
225 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
226 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
227 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Dtls_1_3_client_session_reuse_test_nx_secure_echo_client_entry.c157 UCHAR receive_buffer[100]; in client_thread_entry() local
223 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
227 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
228 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
229 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
230 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
231 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
232 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Ddtls_version_1_0_nx_secure_client_entry.c189 UCHAR receive_buffer[100]; in client_thread_entry() local
268 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry()
272 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
273 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
274 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
275 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
276 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
277 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
Ddtls_reuse_nx_secure_server_entry.c132 UCHAR receive_buffer[100]; in server_thread_entry() local
193 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry()
194 receive_buffer[bytes] = 0; in server_thread_entry()
195 print_error_message("Server received data: %s\n", receive_buffer); in server_thread_entry()
202 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_NO_WAIT); in server_thread_entry()
Dnx_secure_echo_server_entry.c114 UCHAR receive_buffer[100]; in server_thread_entry() local
172 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry()
173 receive_buffer[bytes] = 0; in server_thread_entry()
174 print_error_message("Received data: %s\n", receive_buffer); in server_thread_entry()
181 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_WAIT_FOREVER); in server_thread_entry()
Dnx_secure_ecc_echo_server_entry.c110 UCHAR receive_buffer[100]; in server_thread_entry() local
170 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry()
171 receive_buffer[bytes] = 0; in server_thread_entry()
172 print_error_message("Received data: %s\n", receive_buffer); in server_thread_entry()
179 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_WAIT_FOREVER); in server_thread_entry()
/NetX-Duo-v6.2.1/samples/
Ddemo_netx_secure_tls.c470 UCHAR receive_buffer[200]; in tls_client_thread_entry() local
582 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, in tls_client_thread_entry()
583 sizeof(receive_buffer) - 1, &bytes); in tls_client_thread_entry()
586 receive_buffer[bytes] = 0; in tls_client_thread_entry()
587 printf("Received data: %s\n", receive_buffer); in tls_client_thread_entry()
614 UCHAR receive_buffer[100]; in tls_server_thread_entry() local
702 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, in tls_server_thread_entry()
703 sizeof(receive_buffer) - 1, &bytes); in tls_server_thread_entry()
708 receive_buffer[bytes] = 0; in tls_server_thread_entry()
709 printf("Received data: %s\n", receive_buffer); in tls_server_thread_entry()

123