| /NetX-Duo-v6.2.1/test/regression/nx_secure_test/ |
| D | nx_secure_tls_coverage_test.c | 453 UCHAR receive_buffer[100]; in ntest_0_entry() local 600 receive_buffer[0] = NX_SECURE_TLS_HELLO_VERIFY_REQUEST; in ntest_0_entry() 602 receive_buffer[1] = 0; in ntest_0_entry() 603 receive_buffer[2] = 0; in ntest_0_entry() 604 receive_buffer[3] = 0; in ntest_0_entry() 607 status = _nx_secure_tls_server_handshake(&server_tls_session, receive_buffer, 4, NX_NO_WAIT); in ntest_0_entry() 616 receive_buffer[2] = 0; in ntest_0_entry() 617 receive_buffer[3] = 0; in ntest_0_entry() 620 receive_buffer[0] = NX_SECURE_TLS_EXTENSION_SERVER_NAME_INDICATION >> 8; in ntest_0_entry() 621 receive_buffer[1] = NX_SECURE_TLS_EXTENSION_SERVER_NAME_INDICATION & 0xff; in ntest_0_entry() [all …]
|
| D | nx_secure_tls_verify_mac_coverage_test.c | 54 UCHAR receive_buffer[10]; in TEST() local 68 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() 82 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in TEST() 84 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() 89 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() 92 receive_buffer[0] = 0; in TEST() 94 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() 98 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() 103 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in TEST() 106 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in TEST() [all …]
|
| D | nx_secure_tls_server_handshake_test.c | 214 UCHAR receive_buffer[100]; in ntest_0_entry() local 468 UCHAR receive_buffer[400]; in ntest_1_entry() local 491 receive_buffer[0] = NX_SECURE_TLS_CLIENT_HELLO; /* message type. */ in ntest_1_entry() 493 receive_buffer[1] = 0; in ntest_1_entry() 494 receive_buffer[2] = 0; in ntest_1_entry() 495 receive_buffer[3] = 42; in ntest_1_entry() 499 receive_buffer[4] = NX_SECURE_TLS_VERSION_TLS_1_2 >> 8; in ntest_1_entry() 500 receive_buffer[5] = NX_SECURE_TLS_VERSION_TLS_1_2 & 0xff; in ntest_1_entry() 502 receive_buffer[38] = 0; in ntest_1_entry() 504 receive_buffer[39] = 0; in ntest_1_entry() [all …]
|
| D | nx_secure_tls_error_checking_test.c | 535 UCHAR receive_buffer[100]; in ntest_0_entry() local 667 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in ntest_0_entry() 668 receive_buffer[bytes] = 0; in ntest_0_entry() 676 status = strncmp((CHAR *)receive_buffer, "Hello there!\r\n", bytes); in ntest_0_entry() 808 UCHAR receive_buffer[400]; in ntest_1_entry() local 840 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry() 850 receive_buffer[0] = NX_SECURE_TLS_APPLICATION_DATA; in ntest_1_entry() 852 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry() 856 …status = _nx_secure_tls_verify_mac(&client_tls_session, receive_buffer, 0, send_packet, 0, &length… in ntest_1_entry() 859 receive_buffer[0] = 0; in ntest_1_entry() [all …]
|
| /NetX-Duo-v6.2.1/test/regression/web_test/ |
| D | netx_web_https_demo_test.c | 233 UCHAR receive_buffer[1000]; in https_client_thread_entry() local 279 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 1000, &bytes); in https_client_thread_entry() 282 receive_buffer[bytes] = 0; in https_client_thread_entry() 285 EXPECT_EQ(receive_buffer[0], 'h'); in https_client_thread_entry() 286 EXPECT_EQ(receive_buffer[1], 't'); in https_client_thread_entry() 287 EXPECT_EQ(receive_buffer[2], 't'); in https_client_thread_entry() 288 EXPECT_EQ(receive_buffer[3], 'p'); in https_client_thread_entry() 289 EXPECT_EQ(receive_buffer[4], 's'); in https_client_thread_entry() 290 EXPECT_EQ(receive_buffer[5], ' '); in https_client_thread_entry() 291 EXPECT_EQ(receive_buffer[6], 's'); in https_client_thread_entry() [all …]
|
| /NetX-Duo-v6.2.1/test/regression/interoperability_test/nx_secure_test/ |
| D | nx_secure_dtls_echo_client_entry.c | 107 UCHAR receive_buffer[100]; in client_thread_entry() local 183 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 187 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 188 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 189 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 190 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 191 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 192 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | dtls_nx_secure_client_certificate_verify_test_client_entry.c | 116 UCHAR receive_buffer[100]; in client_thread_entry() local 198 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 202 exit_if_fail('h' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 203 exit_if_fail('e' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 204 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 205 exit_if_fail('l' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 206 exit_if_fail('o' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 207 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | dtls_nx_secure_ecc_test_client_entry.c | 121 UCHAR receive_buffer[100]; in client_thread_entry() local 200 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 204 exit_if_fail('h' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 205 exit_if_fail('e' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 206 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 207 exit_if_fail('l' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 208 exit_if_fail('o' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 209 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | dtls_aes128_gcm_nx_secure_client_entry.c | 128 UCHAR receive_buffer[100]; in client_thread_entry() local 206 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 210 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 211 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 212 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 213 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 214 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 215 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_echo_client_entry.c | 118 UCHAR receive_buffer[100]; in client_thread_entry() local 192 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 196 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 197 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 198 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 199 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 200 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 201 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_client_certificate_verify_test_client_entry.c | 120 UCHAR receive_buffer[100]; in client_thread_entry() local 197 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 201 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 202 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 203 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 204 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 205 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 206 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_echo_client_aes128_gcm_entry.c | 138 UCHAR receive_buffer[100]; in client_thread_entry() local 213 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 217 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 218 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 219 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 220 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 221 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 222 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | tls_1_3_nx_secure_echo_client_entry.c | 159 UCHAR receive_buffer[100]; in client_thread_entry() local 211 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 215 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 216 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 217 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 218 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 219 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 220 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_client_certificate_verify_test_server_entry.c | 112 UCHAR receive_buffer[100]; in server_thread_entry() local 178 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry() 180 exit_if_fail( receive_buffer[0] == 'h', 5); in server_thread_entry() 181 exit_if_fail( receive_buffer[1] == 'e', 5); in server_thread_entry() 182 exit_if_fail( receive_buffer[2] == 'l', 5); in server_thread_entry() 183 exit_if_fail( receive_buffer[3] == 'l', 5); in server_thread_entry() 184 exit_if_fail( receive_buffer[4] == 'o', 5); in server_thread_entry()
|
| D | nx_secure_ecc_client_cert_test_client_entry.c | 181 UCHAR receive_buffer[100]; in client_thread_entry() local 235 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 239 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 240 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 241 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 242 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 243 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 244 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_override_tls_1_1_echo_client_entry.c | 180 UCHAR receive_buffer[100]; in client_thread_entry() local 256 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 260 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 261 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 262 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 263 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 264 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 265 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | tls_1_3_client_certificate_verify_test_nx_secure_echo_client_entry.c | 168 UCHAR receive_buffer[100]; in client_thread_entry() local 220 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 224 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 225 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 226 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 227 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 228 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 229 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | nx_secure_1_0_1_1_echo_client_entry.c | 180 UCHAR receive_buffer[100]; in client_thread_entry() local 254 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 258 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 259 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 260 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 261 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 262 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 263 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | tls_1_3_psk_test_nx_secure_echo_client_entry.c | 159 UCHAR receive_buffer[100]; in client_thread_entry() local 218 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 222 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 223 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 224 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 225 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 226 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 227 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | tls_1_3_client_session_reuse_test_nx_secure_echo_client_entry.c | 157 UCHAR receive_buffer[100]; in client_thread_entry() local 223 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 227 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 228 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 229 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 230 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 231 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 232 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | dtls_version_1_0_nx_secure_client_entry.c | 189 UCHAR receive_buffer[100]; in client_thread_entry() local 268 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in client_thread_entry() 272 exit_if_fail('o' == ((CHAR*)receive_buffer)[0], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 273 exit_if_fail('l' == ((CHAR*)receive_buffer)[1], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 274 exit_if_fail('l' == ((CHAR*)receive_buffer)[2], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 275 exit_if_fail('e' == ((CHAR*)receive_buffer)[3], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 276 exit_if_fail('h' == ((CHAR*)receive_buffer)[4], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry() 277 exit_if_fail('\n' == ((CHAR*)receive_buffer)[5], TLS_TEST_UNKNOWN_TYPE_ERROR); in client_thread_entry()
|
| D | dtls_reuse_nx_secure_server_entry.c | 132 UCHAR receive_buffer[100]; in server_thread_entry() local 193 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry() 194 receive_buffer[bytes] = 0; in server_thread_entry() 195 print_error_message("Server received data: %s\n", receive_buffer); in server_thread_entry() 202 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_NO_WAIT); in server_thread_entry()
|
| D | nx_secure_echo_server_entry.c | 114 UCHAR receive_buffer[100]; in server_thread_entry() local 172 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry() 173 receive_buffer[bytes] = 0; in server_thread_entry() 174 print_error_message("Received data: %s\n", receive_buffer); in server_thread_entry() 181 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_WAIT_FOREVER); in server_thread_entry()
|
| D | nx_secure_ecc_echo_server_entry.c | 110 UCHAR receive_buffer[100]; in server_thread_entry() local 170 nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, 100, &bytes); in server_thread_entry() 171 receive_buffer[bytes] = 0; in server_thread_entry() 172 print_error_message("Received data: %s\n", receive_buffer); in server_thread_entry() 179 status = nx_packet_data_append(send_packet, receive_buffer, bytes, &pool_0, NX_WAIT_FOREVER); in server_thread_entry()
|
| /NetX-Duo-v6.2.1/samples/ |
| D | demo_netx_secure_tls.c | 470 UCHAR receive_buffer[200]; in tls_client_thread_entry() local 582 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, in tls_client_thread_entry() 583 sizeof(receive_buffer) - 1, &bytes); in tls_client_thread_entry() 586 receive_buffer[bytes] = 0; in tls_client_thread_entry() 587 printf("Received data: %s\n", receive_buffer); in tls_client_thread_entry() 614 UCHAR receive_buffer[100]; in tls_server_thread_entry() local 702 status = nx_packet_data_extract_offset(receive_packet, 0, receive_buffer, in tls_server_thread_entry() 703 sizeof(receive_buffer) - 1, &bytes); in tls_server_thread_entry() 708 receive_buffer[bytes] = 0; in tls_server_thread_entry() 709 printf("Received data: %s\n", receive_buffer); in tls_server_thread_entry()
|