1
10
13
14
20
21
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
92
93
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_dtls.h"
#ifdef NX_SECURE_ENABLE_DTLS...
...
UINT _nx_secure_dtls_process_handshake_header(UCHAR *packet_buffer, USHORT *message_type,
UINT *header_size, UINT *message_length,
UINT *message_seq, UINT *fragment_offset,
UINT *fragment_length)
{
if (*header_size < NX_SECURE_DTLS_HANDSHAKE_HEADER_SIZE)
{
return(NX_SECURE_TLS_INCORRECT_MESSAGE_LENGTH);
}if (*header_size < NX_SECURE_DTLS_HANDSHAKE_HEADER_SIZE) { ... }
/* ... */
*message_type = packet_buffer[0];
packet_buffer++;
*message_length = (UINT)((packet_buffer[0] << 16) + (packet_buffer[1] << 8) + packet_buffer[2]);
packet_buffer += 3;
*message_seq = (UINT)((packet_buffer[0] << 8) + packet_buffer[1]);
packet_buffer += 2;
*fragment_offset = (UINT)((packet_buffer[0] << 16) + (packet_buffer[1] << 8) + packet_buffer[2]);
packet_buffer += 3;
*fragment_length = (UINT)((packet_buffer[0] << 16) + (packet_buffer[1] << 8) + packet_buffer[2]);
*header_size = NX_SECURE_DTLS_HANDSHAKE_HEADER_SIZE;
return(NX_SECURE_TLS_SUCCESS);
}_nx_secure_dtls_process_handshake_header (UCHAR *packet_buffer, USHORT *message_type, UINT *header_size, UINT *message_length, UINT *message_seq, UINT *fragment_offset, UINT *fragment_length) { ... }
/* ... */#endif