1
10
13
14
20
21
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
92
93
94
95
96
97
98
104
105
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
131
132
133
134
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
...
...
UINT _nx_secure_tls_process_header(NX_SECURE_TLS_SESSION *tls_session, NX_PACKET *packet_ptr,
ULONG record_offset, USHORT *message_type, UINT *length,
UCHAR *header_data, USHORT *header_length)
{
ULONG bytes_copied;
UINT status;
USHORT protocol_version;
if (packet_ptr == NX_NULL)
{
return(NX_SECURE_TLS_INVALID_PACKET);
}if (packet_ptr == NX_NULL) { ... }
status = nx_packet_data_extract_offset(packet_ptr, record_offset, header_data,
NX_SECURE_TLS_RECORD_HEADER_SIZE, &bytes_copied);
if (status != NX_SUCCESS)
{
return(NX_SECURE_TLS_INVALID_PACKET);
}if (status != NX_SUCCESS) { ... }
if (bytes_copied != NX_SECURE_TLS_RECORD_HEADER_SIZE)
{
return(NX_CONTINUE);
}if (bytes_copied != NX_SECURE_TLS_RECORD_HEADER_SIZE) { ... }
*message_type = header_data[0];
protocol_version = (USHORT)(((USHORT)header_data[1] << 8) | header_data[2]);
*length = (UINT)(((UINT)header_data[3] << 8) + header_data[4]);
*header_length = NX_SECURE_TLS_RECORD_HEADER_SIZE;
if (tls_session -> nx_secure_tls_protocol_version != 0)
{
status = _nx_secure_tls_check_protocol_version(tls_session, protocol_version, NX_SECURE_TLS);
return(status);
}if (tls_session -> nx_secure_tls_protocol_version != 0) { ... }
return(NX_SUCCESS);
}{ ... }