/NetX-Duo-v6.4.1/nx_secure/src/ |
D | nx_secure_dtls_verify_mac.c | 87 UCHAR header[20]; in _nx_secure_dtls_verify_mac() local 124 if (header_length > sizeof(header)) in _nx_secure_dtls_verify_mac() 128 NX_SECURE_MEMCPY(header, header_data, header_length); /* Use case of memcpy is verified. */ in _nx_secure_dtls_verify_mac() 133 header[11] = (UCHAR)((data_length >> 8) & 0x00FF); in _nx_secure_dtls_verify_mac() 134 header[12] = (UCHAR)(data_length & 0x00FF); in _nx_secure_dtls_verify_mac() 137 …sh_record(dtls_session, tls_session -> nx_secure_tls_remote_sequence_number, header, header_length, in _nx_secure_dtls_verify_mac()
|
D | nx_secure_verify_mac.c | 88 UCHAR header[6]; in _nx_secure_verify_mac() local 137 if (header_length > sizeof(header)) in _nx_secure_verify_mac() 141 NX_SECURE_MEMCPY(header, header_data, header_length); /* Use case of memcpy is verified. */ in _nx_secure_verify_mac() 144 header[3] = (UCHAR)((data_length >> 8) & 0x00FF); in _nx_secure_verify_mac() 145 header[4] = (UCHAR)(data_length & 0x00FF); in _nx_secure_verify_mac() 148 _nx_secure_tls_hash_record(ciphersuite, sequence_num, header, header_length, in _nx_secure_verify_mac()
|
D | nx_secure_dtls_hash_record.c | 83 UCHAR *header, UINT header_length, UCHAR *data, UINT length, in _nx_secure_dtls_hash_record() argument 121 NX_SECURE_MEMCPY(adjusted_sequence_num, &header[3], 8); /* Use case of memcpy is verified. */ in _nx_secure_dtls_hash_record() 124 adjusted_header[0] = header[0]; /* Type. */ in _nx_secure_dtls_hash_record() 125 adjusted_header[1] = header[1]; /* Version. */ in _nx_secure_dtls_hash_record() 126 adjusted_header[2] = header[2]; in _nx_secure_dtls_hash_record() 127 adjusted_header[3] = header[11]; /* Length. */ in _nx_secure_dtls_hash_record() 128 adjusted_header[4] = header[12]; in _nx_secure_dtls_hash_record()
|
D | nx_secure_tls_record_hash_initialize.c | 75 UCHAR *header, UINT header_length, UINT *hash_length, in _nx_secure_tls_record_hash_initialize() argument 190 header, in _nx_secure_tls_record_hash_initialize()
|
D | nx_secure_tls_hash_record.c | 85 UCHAR *header, UINT header_length, NX_PACKET *packet_ptr, in _nx_secure_tls_hash_record() argument 187 header, in _nx_secure_tls_hash_record()
|
D | nx_secure_tls_process_clienthello_extensions.c | 1599 UCHAR header[] = { 0x01, 0x00, 0x00, 0x00 }; in _nx_secure_tls_process_clienthello_psk_extension() local 1600 header[2] = (UCHAR)((client_hello_length) >> 8); in _nx_secure_tls_process_clienthello_psk_extension() 1601 header[3] = (UCHAR)((client_hello_length) & 0xFF); in _nx_secure_tls_process_clienthello_psk_extension() 1602 _nx_secure_tls_handshake_hash_update(tls_session, header, sizeof(header)); in _nx_secure_tls_process_clienthello_psk_extension()
|
D | nx_secure_tls_send_clienthello_extensions.c | 1112 UCHAR header[] = { 0x01, 0x00, 0x01, 0x30 }; in _nx_secure_tls_send_clienthello_psk_extension() local 1113 header[2] = (UCHAR)((partial_client_hello_len + binder_total + 2) >> 8); in _nx_secure_tls_send_clienthello_psk_extension() 1114 header[3] = (UCHAR)((partial_client_hello_len + binder_total + 2) & 0xFF); in _nx_secure_tls_send_clienthello_psk_extension() 1115 _nx_secure_tls_handshake_hash_update(tls_session, header, sizeof(header)); in _nx_secure_tls_send_clienthello_psk_extension()
|
/NetX-Duo-v6.4.1/addons/rtp/ |
D | nx_rtp_sender.c | 62 static UINT _nx_rtcp_packet_rr_process(NX_RTP_SENDER *rtp_sender, NX_RTCP_HEADER *header); 63 static UINT _nx_rtcp_packet_sdes_process(NX_RTP_SENDER *rtp_sender, NX_RTCP_HEADER *header); 2304 NX_RTCP_HEADER *header; in _nx_rtcp_packet_process() local 2325 header = (NX_RTCP_HEADER *)(packet_ptr -> nx_packet_prepend_ptr); in _nx_rtcp_packet_process() 2328 if ((UCHAR *)header + sizeof(NX_RTCP_HEADER) > end) in _nx_rtcp_packet_process() 2337 if (((header -> nx_rtcp_byte0 & NX_RTCP_PAD_MASK) != NX_RTCP_PAD_VALUE) || in _nx_rtcp_packet_process() 2338 ((header -> nx_rtcp_packet_type & NX_RTCP_TYPE_MASK) != NX_RTCP_TYPE_SR)) in _nx_rtcp_packet_process() 2347 NX_CHANGE_USHORT_ENDIAN(header -> nx_rtcp_length); in _nx_rtcp_packet_process() 2349 next = (NX_RTCP_HEADER *)((ULONG *)header + header -> nx_rtcp_length + 1); in _nx_rtcp_packet_process() 2352 …if (((header -> nx_rtcp_byte0 & NX_RTCP_VERSION_MASK) != NX_RTCP_VERSION_VALUE) || ((UCHAR *)next … in _nx_rtcp_packet_process() [all …]
|
/NetX-Duo-v6.4.1/test/regression/netxduo_test/ |
D | netx_ip_fragmentation_timeout_check_test.c | 310 NX_IPV4_HEADER *header; in my_packet_process() local 317 header = (NX_IPV4_HEADER *)packet_ptr -> nx_packet_prepend_ptr; in my_packet_process() 319 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process() 322 if (header -> nx_ip_header_word_1 & NX_IP_FRAGMENT_MASK) in my_packet_process() 330 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
|
D | netx_ip_fragmentation_timeout_check_test2.c | 323 NX_IPV4_HEADER *header; in my_packet_process() local 330 header = (NX_IPV4_HEADER *)packet_ptr -> nx_packet_prepend_ptr; in my_packet_process() 332 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process() 335 if (header -> nx_ip_header_word_1 & NX_IP_FRAGMENT_MASK) in my_packet_process() 343 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
|
/NetX-Duo-v6.4.1/test/regression/interoperability_test/ |
D | nx_pcap_network_driver.c | 102 VOID _nx_lpcap_packet_receive_handler(u_char *param, const struct pcap_pkthdr *header, cons… 146 VOID _nx_pcap_packet_receive_handler(u_char *param, const struct pcap_pkthdr *header, const u_char … in _nx_pcap_packet_receive_handler() argument 180 status = nx_packet_data_append(packet_ptr, (VOID*)pkt_data, header -> len, in _nx_pcap_packet_receive_handler()
|
/NetX-Duo-v6.4.1/test/regression/web_test/ |
D | netx_https_api_test.c | 1232 CHAR *header = "header"; in nx_web_http_server_callback_response_send_test() local 1239 … status = nx_web_http_server_callback_response_send(NX_NULL, header, information, additional_info); in nx_web_http_server_callback_response_send_test() 1691 CHAR *header = "header"; in nx_web_http_server_callback_generate_response_header_test() local 1695 …llback_generate_response_header(&http_server, &packet_ptr, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test() 1704 …er_callback_generate_response_header(NX_NULL, &packet_ptr, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test() 1707 …r_callback_generate_response_header(&http_server, NX_NULL, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test() 1710 …r_callback_generate_response_header(&http_server, &packet_ptr, NX_NULL, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test()
|
/NetX-Duo-v6.4.1/addons/http/ |
D | nxd_http_server.c | 2585 UINT _nxe_http_server_callback_response_send(NX_HTTP_SERVER *server_ptr, CHAR *header, CHAR *infor… in _nxe_http_server_callback_response_send() argument 2591 …_ptr == NX_NULL) || (server_ptr -> nx_http_server_id != NXD_HTTP_SERVER_ID) || (header == NX_NULL)) in _nxe_http_server_callback_response_send() 2598 …status = _nx_http_server_callback_response_send(server_ptr, header, information, additional_info); in _nxe_http_server_callback_response_send() 2653 UINT _nx_http_server_callback_response_send(NX_HTTP_SERVER *server_ptr, CHAR *header, CHAR *inform… in _nx_http_server_callback_response_send() argument 2662 if (_nx_utility_string_length_check(header, &header_length, NX_MAX_STRING_LENGTH) || in _nx_http_server_callback_response_send() 2670 …status = _nx_http_server_response_send(server_ptr, header, header_length, information, information… in _nx_http_server_callback_response_send() 2726 UINT _nxe_http_server_callback_response_send_extended(NX_HTTP_SERVER *server_ptr, CHAR *header, UI… in _nxe_http_server_callback_response_send_extended() argument 2733 …_ptr == NX_NULL) || (server_ptr -> nx_http_server_id != NXD_HTTP_SERVER_ID) || (header == NX_NULL)) in _nxe_http_server_callback_response_send_extended() 2740 …status = _nx_http_server_callback_response_send_extended(server_ptr, header, header_length, infor… in _nxe_http_server_callback_response_send_extended() 2804 UINT _nx_http_server_callback_response_send_extended(NX_HTTP_SERVER *server_ptr, CHAR *header, UIN… in _nx_http_server_callback_response_send_extended() argument [all …]
|
/NetX-Duo-v6.4.1/docs/ |
D | revision_history.txt | 599 …cket.h Adjusted the packet data to fill the specified header. 623 …cket_data_adjust.c Adjusted the packet data to fill the specified header. 797 … Compute the checksum over all IGMP data, not just the header. 1255 Files are modified to support packet alignment for both header and payload: 1504 … nx_ip_dispatch_process.c Corrected length check for extension header. 1509 nx_ip_header_add.c Stored IP header for outgoing packet. 1520 …_compute.c Removed code not used. Fixed offset when IPv4 header contained options. 1522 … Fixed length calculation of IPv4 header. 1541 … Removed fragment check when IPsec is disabled for PMTU, stored IP header for outgoing packe… 1552 … Fixed the bug for ip header pointer set. [all …]
|
/NetX-Duo-v6.4.1/addons/azure_iot/ |
D | nx_azure_iot_adu_agent.c | 35 UCHAR **header, UINT *header_length, 1742 UCHAR **header, UINT *header_length, in nx_azure_iot_adu_agent_jws_split() argument 1753 *header = jws; in nx_azure_iot_adu_agent_jws_split() 1780 if ((dot_count != 2) || (dot2_pointer >= (*header + jws_length - 1))) in nx_azure_iot_adu_agent_jws_split() 1786 *header_length = (UINT)(dot1_pointer - *header); in nx_azure_iot_adu_agent_jws_split() 1790 *signature_length = (UINT)((*header + jws_length) - *signature); in nx_azure_iot_adu_agent_jws_split()
|
D | README.md | 35 …master/common/inc/nx_user_sample.h) to see how to define these macros in the NetX user header file.
|
/NetX-Duo-v6.4.1/nx_secure/inc/ |
D | nx_secure_dtls.h | 446 UCHAR *header, UINT header_length, UCHAR *data, UINT length,
|
D | nx_secure_tls.h | 1526 UCHAR *header, UINT header_length, NX_PACKET *packet_ptr, 1579 UCHAR *header, UINT header_length, UINT *hash_length,
|
/NetX-Duo-v6.4.1/ |
D | README.md | 39 > When you see xx-xx-xxxx, 6.x or x.x in function header, this means the file is not officially rel…
|
/NetX-Duo-v6.4.1/test/regression/nx_secure_test/ |
D | nx_secure_tls_coverage_test.c | 1399 UCHAR header[12]; in ntest_0_entry() local 1409 _nx_secure_tls_verify_mac(&server_tls_session, header, 6, &_packet, 0, &length); in ntest_0_entry()
|