Home
last modified time | relevance | path

Searched refs:header (Results 1 – 20 of 20) sorted by relevance

/NetX-Duo-v6.4.1/nx_secure/src/
Dnx_secure_dtls_verify_mac.c87 UCHAR header[20]; in _nx_secure_dtls_verify_mac() local
124 if (header_length > sizeof(header)) in _nx_secure_dtls_verify_mac()
128 NX_SECURE_MEMCPY(header, header_data, header_length); /* Use case of memcpy is verified. */ in _nx_secure_dtls_verify_mac()
133 header[11] = (UCHAR)((data_length >> 8) & 0x00FF); in _nx_secure_dtls_verify_mac()
134 header[12] = (UCHAR)(data_length & 0x00FF); in _nx_secure_dtls_verify_mac()
137 …sh_record(dtls_session, tls_session -> nx_secure_tls_remote_sequence_number, header, header_length, in _nx_secure_dtls_verify_mac()
Dnx_secure_verify_mac.c88 UCHAR header[6]; in _nx_secure_verify_mac() local
137 if (header_length > sizeof(header)) in _nx_secure_verify_mac()
141 NX_SECURE_MEMCPY(header, header_data, header_length); /* Use case of memcpy is verified. */ in _nx_secure_verify_mac()
144 header[3] = (UCHAR)((data_length >> 8) & 0x00FF); in _nx_secure_verify_mac()
145 header[4] = (UCHAR)(data_length & 0x00FF); in _nx_secure_verify_mac()
148 _nx_secure_tls_hash_record(ciphersuite, sequence_num, header, header_length, in _nx_secure_verify_mac()
Dnx_secure_dtls_hash_record.c83 UCHAR *header, UINT header_length, UCHAR *data, UINT length, in _nx_secure_dtls_hash_record() argument
121 NX_SECURE_MEMCPY(adjusted_sequence_num, &header[3], 8); /* Use case of memcpy is verified. */ in _nx_secure_dtls_hash_record()
124 adjusted_header[0] = header[0]; /* Type. */ in _nx_secure_dtls_hash_record()
125 adjusted_header[1] = header[1]; /* Version. */ in _nx_secure_dtls_hash_record()
126 adjusted_header[2] = header[2]; in _nx_secure_dtls_hash_record()
127 adjusted_header[3] = header[11]; /* Length. */ in _nx_secure_dtls_hash_record()
128 adjusted_header[4] = header[12]; in _nx_secure_dtls_hash_record()
Dnx_secure_tls_record_hash_initialize.c75 UCHAR *header, UINT header_length, UINT *hash_length, in _nx_secure_tls_record_hash_initialize() argument
190 header, in _nx_secure_tls_record_hash_initialize()
Dnx_secure_tls_hash_record.c85 UCHAR *header, UINT header_length, NX_PACKET *packet_ptr, in _nx_secure_tls_hash_record() argument
187 header, in _nx_secure_tls_hash_record()
Dnx_secure_tls_process_clienthello_extensions.c1599 UCHAR header[] = { 0x01, 0x00, 0x00, 0x00 }; in _nx_secure_tls_process_clienthello_psk_extension() local
1600 header[2] = (UCHAR)((client_hello_length) >> 8); in _nx_secure_tls_process_clienthello_psk_extension()
1601 header[3] = (UCHAR)((client_hello_length) & 0xFF); in _nx_secure_tls_process_clienthello_psk_extension()
1602 _nx_secure_tls_handshake_hash_update(tls_session, header, sizeof(header)); in _nx_secure_tls_process_clienthello_psk_extension()
Dnx_secure_tls_send_clienthello_extensions.c1112 UCHAR header[] = { 0x01, 0x00, 0x01, 0x30 }; in _nx_secure_tls_send_clienthello_psk_extension() local
1113 header[2] = (UCHAR)((partial_client_hello_len + binder_total + 2) >> 8); in _nx_secure_tls_send_clienthello_psk_extension()
1114 header[3] = (UCHAR)((partial_client_hello_len + binder_total + 2) & 0xFF); in _nx_secure_tls_send_clienthello_psk_extension()
1115 _nx_secure_tls_handshake_hash_update(tls_session, header, sizeof(header)); in _nx_secure_tls_send_clienthello_psk_extension()
/NetX-Duo-v6.4.1/addons/rtp/
Dnx_rtp_sender.c62 static UINT _nx_rtcp_packet_rr_process(NX_RTP_SENDER *rtp_sender, NX_RTCP_HEADER *header);
63 static UINT _nx_rtcp_packet_sdes_process(NX_RTP_SENDER *rtp_sender, NX_RTCP_HEADER *header);
2304 NX_RTCP_HEADER *header; in _nx_rtcp_packet_process() local
2325 header = (NX_RTCP_HEADER *)(packet_ptr -> nx_packet_prepend_ptr); in _nx_rtcp_packet_process()
2328 if ((UCHAR *)header + sizeof(NX_RTCP_HEADER) > end) in _nx_rtcp_packet_process()
2337 if (((header -> nx_rtcp_byte0 & NX_RTCP_PAD_MASK) != NX_RTCP_PAD_VALUE) || in _nx_rtcp_packet_process()
2338 ((header -> nx_rtcp_packet_type & NX_RTCP_TYPE_MASK) != NX_RTCP_TYPE_SR)) in _nx_rtcp_packet_process()
2347 NX_CHANGE_USHORT_ENDIAN(header -> nx_rtcp_length); in _nx_rtcp_packet_process()
2349 next = (NX_RTCP_HEADER *)((ULONG *)header + header -> nx_rtcp_length + 1); in _nx_rtcp_packet_process()
2352 …if (((header -> nx_rtcp_byte0 & NX_RTCP_VERSION_MASK) != NX_RTCP_VERSION_VALUE) || ((UCHAR *)next … in _nx_rtcp_packet_process()
[all …]
/NetX-Duo-v6.4.1/test/regression/netxduo_test/
Dnetx_ip_fragmentation_timeout_check_test.c310 NX_IPV4_HEADER *header; in my_packet_process() local
317 header = (NX_IPV4_HEADER *)packet_ptr -> nx_packet_prepend_ptr; in my_packet_process()
319 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
322 if (header -> nx_ip_header_word_1 & NX_IP_FRAGMENT_MASK) in my_packet_process()
330 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
Dnetx_ip_fragmentation_timeout_check_test2.c323 NX_IPV4_HEADER *header; in my_packet_process() local
330 header = (NX_IPV4_HEADER *)packet_ptr -> nx_packet_prepend_ptr; in my_packet_process()
332 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
335 if (header -> nx_ip_header_word_1 & NX_IP_FRAGMENT_MASK) in my_packet_process()
343 NX_CHANGE_ULONG_ENDIAN(header -> nx_ip_header_word_1); in my_packet_process()
/NetX-Duo-v6.4.1/test/regression/interoperability_test/
Dnx_pcap_network_driver.c102 VOID _nx_lpcap_packet_receive_handler(u_char *param, const struct pcap_pkthdr *header, cons…
146 VOID _nx_pcap_packet_receive_handler(u_char *param, const struct pcap_pkthdr *header, const u_char … in _nx_pcap_packet_receive_handler() argument
180 status = nx_packet_data_append(packet_ptr, (VOID*)pkt_data, header -> len, in _nx_pcap_packet_receive_handler()
/NetX-Duo-v6.4.1/test/regression/web_test/
Dnetx_https_api_test.c1232 CHAR *header = "header"; in nx_web_http_server_callback_response_send_test() local
1239 … status = nx_web_http_server_callback_response_send(NX_NULL, header, information, additional_info); in nx_web_http_server_callback_response_send_test()
1691 CHAR *header = "header"; in nx_web_http_server_callback_generate_response_header_test() local
1695 …llback_generate_response_header(&http_server, &packet_ptr, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test()
1704 …er_callback_generate_response_header(NX_NULL, &packet_ptr, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test()
1707 …r_callback_generate_response_header(&http_server, NX_NULL, status_code, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test()
1710 …r_callback_generate_response_header(&http_server, &packet_ptr, NX_NULL, 100, content_type, header); in nx_web_http_server_callback_generate_response_header_test()
/NetX-Duo-v6.4.1/addons/http/
Dnxd_http_server.c2585 UINT _nxe_http_server_callback_response_send(NX_HTTP_SERVER *server_ptr, CHAR *header, CHAR *infor… in _nxe_http_server_callback_response_send() argument
2591 …_ptr == NX_NULL) || (server_ptr -> nx_http_server_id != NXD_HTTP_SERVER_ID) || (header == NX_NULL)) in _nxe_http_server_callback_response_send()
2598 …status = _nx_http_server_callback_response_send(server_ptr, header, information, additional_info); in _nxe_http_server_callback_response_send()
2653 UINT _nx_http_server_callback_response_send(NX_HTTP_SERVER *server_ptr, CHAR *header, CHAR *inform… in _nx_http_server_callback_response_send() argument
2662 if (_nx_utility_string_length_check(header, &header_length, NX_MAX_STRING_LENGTH) || in _nx_http_server_callback_response_send()
2670 …status = _nx_http_server_response_send(server_ptr, header, header_length, information, information… in _nx_http_server_callback_response_send()
2726 UINT _nxe_http_server_callback_response_send_extended(NX_HTTP_SERVER *server_ptr, CHAR *header, UI… in _nxe_http_server_callback_response_send_extended() argument
2733 …_ptr == NX_NULL) || (server_ptr -> nx_http_server_id != NXD_HTTP_SERVER_ID) || (header == NX_NULL)) in _nxe_http_server_callback_response_send_extended()
2740 …status = _nx_http_server_callback_response_send_extended(server_ptr, header, header_length, infor… in _nxe_http_server_callback_response_send_extended()
2804 UINT _nx_http_server_callback_response_send_extended(NX_HTTP_SERVER *server_ptr, CHAR *header, UIN… in _nx_http_server_callback_response_send_extended() argument
[all …]
/NetX-Duo-v6.4.1/docs/
Drevision_history.txt599 …cket.h Adjusted the packet data to fill the specified header.
623 …cket_data_adjust.c Adjusted the packet data to fill the specified header.
797 … Compute the checksum over all IGMP data, not just the header.
1255 Files are modified to support packet alignment for both header and payload:
1504 … nx_ip_dispatch_process.c Corrected length check for extension header.
1509 nx_ip_header_add.c Stored IP header for outgoing packet.
1520 …_compute.c Removed code not used. Fixed offset when IPv4 header contained options.
1522 … Fixed length calculation of IPv4 header.
1541 … Removed fragment check when IPsec is disabled for PMTU, stored IP header for outgoing packe…
1552 … Fixed the bug for ip header pointer set.
[all …]
/NetX-Duo-v6.4.1/addons/azure_iot/
Dnx_azure_iot_adu_agent.c35 UCHAR **header, UINT *header_length,
1742 UCHAR **header, UINT *header_length, in nx_azure_iot_adu_agent_jws_split() argument
1753 *header = jws; in nx_azure_iot_adu_agent_jws_split()
1780 if ((dot_count != 2) || (dot2_pointer >= (*header + jws_length - 1))) in nx_azure_iot_adu_agent_jws_split()
1786 *header_length = (UINT)(dot1_pointer - *header); in nx_azure_iot_adu_agent_jws_split()
1790 *signature_length = (UINT)((*header + jws_length) - *signature); in nx_azure_iot_adu_agent_jws_split()
DREADME.md35 …master/common/inc/nx_user_sample.h) to see how to define these macros in the NetX user header file.
/NetX-Duo-v6.4.1/nx_secure/inc/
Dnx_secure_dtls.h446 UCHAR *header, UINT header_length, UCHAR *data, UINT length,
Dnx_secure_tls.h1526 UCHAR *header, UINT header_length, NX_PACKET *packet_ptr,
1579 UCHAR *header, UINT header_length, UINT *hash_length,
/NetX-Duo-v6.4.1/
DREADME.md39 > When you see xx-xx-xxxx, 6.x or x.x in function header, this means the file is not officially rel…
/NetX-Duo-v6.4.1/test/regression/nx_secure_test/
Dnx_secure_tls_coverage_test.c1399 UCHAR header[12]; in ntest_0_entry() local
1409 _nx_secure_tls_verify_mac(&server_tls_session, header, 6, &_packet, 0, &length); in ntest_0_entry()