Releases: eclipse-threadx/netxduo
Eclipse ThreadX NetX Duo 6.4.5.202504
This release addresses a denial-of-service vulnerability in the IPv6 stack.
Important notice about version numbers
In the past, new versions of ThreadX and its companion components (NextX Duo, USBX, FileX, GUIX, LevelX) were published only when there were changes to the codebase. This led to discrepancies in version numbers across components. The Eclipse Foundation security team recommended that we move away from this approach, as it makes it harder to track things from a cybersecurity standpoint.
Going forward, we will keep version numbers aligned by publishing a new version of every component every quarter — whether there have been changes to the codebase or not. The release notes will clearly state if a specific release is simply a version number update.
For this particular release of NetX Duo, the version number jumped from v.6.4.4 to v.6.4.5 since NetX Duo was the component with the highest version number already.
Vulnerabilities addressed (Link will only work once the Eclipse Security team publishes the advisory)
CVE-2025-55102 Eclipse ThreadX NetX Duo IPv6 denial of service
Full Changelog: v6.4.4.202503a...v6.4.5.202504
Eclipse ThreadX NetX Duo 6.4.4.202503a
This hotfix release corrects issues preventing compilation when websockets are involved in secure mode.
Thank you to @Coueron for noticing the issue and bringing it to our attention in #344.
What's Changed
- Fixed issues with websocket changes and updated tests by @fdesbiens in #345
- Fixed websocket-related issues in the MQTT client
Full Changelog: v.6.4.4.202503_rel...v6.4.4.202503a
Eclipse ThreadX NetX Duo 6.4.4.202503
This version fixes a significant number of security vulnerabilities and provides a few bug fixes as well. Additionnally, an implementation of the ECDHE_PSK cipher suites is now available.
Vulnerabilities addressed (links will not work util the Eclipse security team publishes the advisories)
- CVE-2025-55081 Potential out of bound read in _nx_secure_tls_process_clienthello()
- CVE-2025-55082 Out of bound read and possible info leak in _nx_secure_tls_psk_identity_find()
- CVE-2025-55083 Broken bounds check in _nx_secure_tls_process_clienthello_psk_extension() doesn't account for offset
- CVE-2025-55084 Off-by-one out of bound read in _nx_secure_tls_proc_clienthello_supported_versions_extension()
- CVE-2025-55090 Potential out of bound read issue in _nx_ipv4_packet_receive()
- CVE-2025-55091 Potential out of bound read in _nx_ip_packet_receive()
- CVE-2025-55092 Potential out of bound read in _nx_ipv4_option_process()
- CVE-2025-55093 Out of bound read and write in _nx_ipv4_packet_receive() when handling unicast DHCP messages
- CVE-2025-55094 Potential out-of-bounds read in _nx_icmpv6_validate_options()
Upcoming deprecations
We have identified three components that will be deprecated in the next minor release and completely removed in a subsequent release.
Azure IoT Middleware for Azure RTOS
Since Microsoft is no longer directly involved in the Eclipse ThreadX project, the project team does not have access to Azure IoT infrastructure. Accordingly, we cannot properly maintain the Azure IoT Middleware addon. Unless users of Azure IoT are willing to take over maintenance, we will remove the addon from our codebase.
Microsoft still maintains its Azure SDK for Embedded C, upon which the ThreadX Azure IoT Middleware add-on is built. It represents a potential migration path for users.
IPSEC
The Eclipse ThreadX codebase never contained an IPsec implementation, but there are hooks to add one, as such a component was available commercially before ThreadX was made open source. We intend to remove those hooks in the future unless contributors to the project add an open source IPsec stack to NetX Duo.
NetX Duo HTTP Server
The NetX Duo HTTP Server is insecure as it does not support TLS. It was initially added to the code base as a troubleshooting aid and should not be used in production applications. We strongly recommend that developers use the NextX Duo Web Server instead, since it supports TLS.
What's Changed
- Websocket improvement headers. by @joelguittet in #330
- Implementation of ECDHE_PSK cipher suites. by @igortomiatti in #326
- #312 Handle HTTP code 429. by @mdkf in #313
- Fix HKDF implementation to prevent buffer overrun when compiled with NX_SECURE_KEY_CLEAR. by @sjscymru in #317
- Fixed ECDHE_PSK cipher suites implementation. by @fdesbiens in #342
CI
- Fixed the FileX and ThreadX dependencies by @hnguyenHWI in #318
- Fixed the build script and submodule definitions by @fdesbiens in #319
New Contributors
- @joelguittet made their first contribution in #330
- @igortomiatti made their first contribution in #326
- @mdkf made their first contribution in #313
- @sjscymru made their first contribution in #317
Full Changelog: v6.4.3_rel...v.6.4.4.202503_rel
Eclipse ThreadX NetX Duo 6.4.3
This service release addresses vulnerabilities in the NetX Duo HTTP Server. The same vulnerabilities had been fixed in the NetX Duo Web Server in release v6.4.2.
Please note that the NetX Duo HTTP Server is insecure as it does not support TLS. It was initially added to the code base as a troubleshooting aid and should not be used in production applications. We will deprecate the HTTP server in the next minor release and completely remove it in a subsequent release. We strongly recommend developers to use the NextX Duo Web Server instead since it supports TLS.
What's Changed
- Fix/internal http put by @hnguyenHWI in #304
- Version v6.4.3 by @fdesbiens in #307
- Release version v.6.4.3 by @fdesbiens in #308
Vulnerabilities addressed
CVE-2025-2258: Eclipse ThreadX NetX Duo HTTP component server single PUT request integer underflow vulnerability
CVE-2025-2259: Eclipse ThreadX NetX Duo HTTP Component server chunked PUT request integer underflow
CVE-2025-2260: Eclipse ThreadX NetX Duo HTTP Component server denial of service
New Contributors
- @hnguyenHWI made their first contribution in #304
Full Changelog: v6.4.2_rel...v6.4.3_rel
Eclipse ThreadX NetX Duo 6.4.2
This service release addresses vulnerabilities in the NetX Duo Web Server. It also adds a new callback function, allowing to notify the host application of a new connect request in the listen queue.
What's Changed
- Update README.md by @wickste in #257
- Update branding in issue templates by @wickste in #258
- Add listen queue callback function by @gresolio in #291
- Version 6.4.2 by @fdesbiens in #301
- Release version 6.4.2 by @fdesbiens in #302
Vulnerabilities addressed
Eclipse ThreadX NetX Duo Web server single PUT request integer underflow
Eclipse ThreadX NetX Duo Web server chunked PUT request integer underflow
Eclipse ThreadX NetX Duo Web server denial of service
New Contributors
- @gresolio made their first contribution in #291
- @fdesbiens made their first contribution in #301
Full Changelog: v6.4.1_rel...v6.4.2_rel
Eclipse ThreadX NetX Duo 6.4.1
What's Changed
- Update resources from azure-rtos to eclipse-threadx by @TiejunMS in #232
- Update resources from azure-rtos to eclipse-threadx by @ericwol-msft in #231
- Delete SECURITY.md by @ericwol-msft in #233
- Update copyright. by @bo-ms in #239
- Update version id string. by @bo-ms in #240
- Update README.md by @timlt in #241
- Create SECURITY.md by @wickste in #244
- Update CONTRIBUTING.md by @wickste in #245
- Update LICENSE.txt and Delete LICENSED-HARDWARE.txt by @wickste in #246
- Update README.md by @wickste in #248
- Update version number to 6.4.1 by @TiejunMS in #249
- Add revision history file. by @bo-ms in #250
New Contributors
- @ericwol-msft made their first contribution in #231
- @timlt made their first contribution in #241
- @wickste made their first contribution in #244
Full Changelog: v6.4.0_rel...v6.4.1_rel
Azure RTOS 6.4.0
In this release, Time Sensitive Networking (TSN) is supported by NetX Duo, including following features.
1. Generic link layer support
2. Virtual local area network (VLAN)
3. Multiple registration protocol (MRP)
3.1 Multiple VLAN registration protocol (MVRP)
3.2 Multiple Stream registration protocol (MSRP)
4. Stream reservation protocol (SRP)
5. Credit based shaper (CBS/Qav)
6. Time aware shaper (TAS/Qbv)
7. Frame preemption (FPE/Qbu)
Files are modified or added to support time sensitive networking:
addons/bsd/bsd.c
addons/bsd/bsd.h
addons/ptp/nxd_ptp_client.c
addons/ptp/nxd_ptp_client.h
addons/rtp/nx_rtp_sender.c
addons/rtp/nx_rtp_sender.h
common/inc/nx_api.h
common/inc/nx_link.h
common/inc/nx_packet.h
common/inc/nx_tcp.h
common/inc/nx_udp.h
common/inc/nx_user_sample.h
common/src/nx_ip_deferred_link_status_process.c
common/src/nx_link.c
common/src/nx_packet_allocate.c
common/src/nx_packet_vlan_priority_set.c
common/src/nx_ram_network_driver.c
common/src/nx_tcp_packet_send_control.c
common/src/nx_tcp_socket_create.c
common/src/nx_tcp_socket_retransmit.c
common/src/nx_tcp_socket_send_internal.c
common/src/nx_tcp_socket_transmit_configure.c
common/src/nx_tcp_socket_vlan_priority_set.c
common/src/nx_udp_socket_create.c
common/src/nx_udp_socket_vlan_priority_set.c
common/src/nxd_udp_socket_send.c
common/src/nxe_packet_vlan_priority_set.c
common/src/nxe_tcp_socket_vlan_priority_set.c
common/src/nxe_udp_socket_vlan_priority_set.c
tsn/inc/nx_mrp.h
tsn/inc/nx_msrp.h
tsn/inc/nx_mvrp.h
tsn/inc/nx_shaper.h
tsn/inc/nx_srp.h
tsn/src/nx_mrp.c
tsn/src/nx_msrp.c
tsn/src/nx_mvrp.c
tsn/src/nx_shaper.c
tsn/src/nx_srp.c
utility/iperf/nx_iperf.c
Files are modified for Azure IoT:
nx_azure_iot* Corrected the mutex release.
Fixed compilation warnings for Azure Device Update.
Added callback for tracking the telemetry ack.
Removed IoT Security Module.
Other modified files:
samples/demo_netxduo_snmp.c Improved string length verification.
samples/demo_netxduo_snmp.h Improved string length verification.
Added regression test systems and setup actions.
Azure RTOS 6.3.0
Files are added to support new protocols: Real Time Transport Protocol (RTP), RTP Control Protocol (RTCP), and Real Time Streaming Protocol (RTSP)
addons/rtp/nx_rtp_sender.c
addons/rtp/nx_rtp_sender.h
addons/rtsp/nx_rtsp_server.c
addons/rtsp/nx_rtsp_server.h
Files are modified to improve the internal logic for finding a free port:
common/src/nx_tcp_free_port_find.c
common/src/nx_udp_free_port_find.c
Files are modified to improve packet length or buffer length verification:
common/inc/nx_icmpv6.h
common/src/nx_icmpv6_packet_process.c
common/src/nx_icmpv6_process_na.c
common/src/nx_icmpv6_process_ns.c
common/src/nx_icmpv6_process_packet_too_big.c
common/src/nx_icmpv6_process_redirect.c
common/src/nx_icmpv6_process_ra.c
Files are modified to support random IP id:
common/inc/nx_api.h
common/inc/nx_user_sample.h
common/src/nx_ip_create.c
common/src/nx_ip_header_add.c
common/src/nx_ipv6_fragment_process.c
Files are modified to fix typo in the comments:
crypto_libraries/src/nx_crypto_3des.c
crypto_libraries/src/nx_crypto_aes.c
crypto_libraries/src/nx_crypto_des.c
crypto_libraries/src/nx_crypto_drbg.c
crypto_libraries/src/nx_crypto_ecdh.c
crypto_libraries/src/nx_crypto_ecdsa.c
crypto_libraries/src/nx_crypto_ecjpake.c
crypto_libraries/src/nx_crypto_hkdf.c
crypto_libraries/src/nx_crypto_hmac.c
crypto_libraries/src/nx_crypto_hmac_md5.c
crypto_libraries/src/nx_crypto_hmac_sha1.c
crypto_libraries/src/nx_crypto_hmac_sha2.c
crypto_libraries/src/nx_crypto_hmac_sha5.c
crypto_libraries/src/nx_crypto_md5.c
crypto_libraries/src/nx_crypto_pkcs1_v1.5.c
crypto_libraries/src/nx_crypto_rsa.c
crypto_libraries/src/nx_crypto_sha1.c
crypto_libraries/src/nx_crypto_sha2.c
crypto_libraries/src/nx_crypto_sha5.c
crypto_libraries/src/nx_crypto_tls_prf_1.c
crypto_libraries/src/nx_crypto_tls_prf_sha256.c
crypto_libraries/src/nx_crypto_tls_prf_sha384.c
crypto_libraries/src/nx_crypto_tls_prf_sha512.c
File is modified to fix packet buffer overrun:
nx_secure/src/nx_secure_tls_send_certificate.c
File is modified to check length before sending:
nx_secure/src/nxe_secure_tls_session_send.c
File is modified to fix the logic of handling close notify packet from peer:
nx_secure/src/nx_secure_dtls_session_end.c
Files are modified to avoid duplicate packet release when DTLS send fails:
nx_secure/src/nx_secure_dtls_send_record.c
nx_secure/src/nx_secure_dtls_server_handshake.c
nx_secure/src/nx_secure_dtls_session_receive.c
Files are modified for Azure IoT:
nx_azure_iot* Corrected the include order for IoT security module.
Added error state in notification callback to let user application have the chance to retry new update for Azure Device Update.
Reported the result of each step for Azure Device Update.
Improved the code to ignore null file url for Azure Device Update.
Added the PnP check for Azure Device Update.
Added sha256 in driver preprocess command for Azure Device Update.
Fixed multiple proxy update issue for Azure Device Update.
Added support for skipping failed step/update for Azure Device Update.
Corrected the packet allocation for MQTT over WebSocket.
Other modified files:
common/src/nx_ipv4_packet_receive.c Validated packet length for fragments. Make sure length of packet with more bit flag is multiple of 8.
common/src/nx_igmp_packet_process.c Unified checksum calculation by function call.
common/src/nx_tcp_packet_process.c Validated TCP header buffer to avoid span in multiple packets.
common/src/nx_tcp_socket_state_data_check.c Corrected the acked packet count.
addons/bsd/nxd_bsd.h Added options to disable OS BSD APIs overriding.
addons/bsd/nxd_bsd.c Support random IP id.
Used new APIs/structs naming.
addons/dhcp/nxd_dhcp_client.c Support random IP id.
Corrected caller checking for the function _nxe_dhcp_state_change_notify.
addons/dhcp/nxd_dhcp_server.c Fixed local variable type issue for the function _nx_dhcp_server_extract_information under strict aliasing compiling option.
Corrected the logic of verifying the incoming packet length.
addons/dhcp/nxd_dhcpv6_server.c Fixed server not update client record issue when continuous CONFIRM message received.
Corrected server for ignoring both preferred-lifetime and valid-lifetime in client request message(s).
addons/dns/nxd_dns.c Reset the receive status for mismatch ID to avoid processing and releasing null packet.
addons/ftp/nxd_ftp_client.c Corrected the length of packet buffer to avoid write overflow.
Fixed packet double release issue in _nx_ftp_client_file_write.
addons/ftp/nxd_ftp_server.c Set packet pointer to NULL after released to fix duplicate packet release issue.
Avoided duplicate creation for data socket when previous command is not finished.
Fixed data length underflow when TCP MSS is less than 255.
Removed deletion of control socket in stop API which is only needed in delete API.
addons/mdns/nxd_mdns.h Corrected mDNS symbols check for NX_MDNS_ENABLE_IPV6.
addons/mqtt/nxd_mqtt_client.c Improved internal logic for MQTT packet allocation.
addons/nat/nx_nat.c Fixed packet double release issue in _nx_nat_process_packet.
addons/ppp/nx_ppp.c Supported processing compressed data.
addons/ppp/nx_ppp.h Supported processing compressed data.
addons/smtp/nxd_smtp_client.c Set nx_smtp_server_packet to NULL to avoided duplicate packet release in _nx_smtp_utility_read_server_code.
addons/snmp/nxd_snmp_.c Combined the functions of processing snmp v1 and v2.
Improved packet length or buffer length verification.
Fixed packet double release issue.
addons/snmp/nxd_snmp_.h Combined the functions of processing snmp v1 and v2.
addons/sntp/nxd_sntp_client.c Dropped packet chain for SNTP data to avoid write overflow.
Azure RTOS 6.2.1
Azure RTOS NetX Duo 6.2.1 release contains the following features and changes:
Improvements of NetX Duo
File is modified to remove the invalid check which would disable the function of clearing tcp_receive_notify:
nxe_tcp_socket_receive_notify.c
Files are modified to remove duplicated macros in nx_port.h, as same macros are defined in nx_api.h:
netxduo/ports/cortex_m0/gnu/inc/nx_port.h
netxduo/ports/cortex_m23/gnu/inc/nx_port.h
netxduo/ports/cortex_m3/gnu/inc/nx_port.h
netxduo/ports/cortex_m33/gnu/inc/nx_port.h
netxduo/ports/cortex_m4/gnu/inc/nx_port.h
netxduo/ports/cortex_m7/gnu/inc/nx_port.h
netxduo/ports/cortex_r4/ac6/inc/nx_port.h
netxduo/ports/cortex_r4/gnu/inc/nx_port.h
netxduo/ports/cortex_r5/gnu/inc/nx_port.h
netxduo/ports/rxv2/ccrx/inc/nx_port.h
File is modified to fix the issue which caused by driver entry pointer is NULL:
nx_ip_interface_status_check.c
Files are modified to fix compiler warnings:
nx_icmpv6_send_queued_packets.c
nx_ip_packet_checksum_compute.c
nxd_ipv6_stateless_address_autoconfig_disable.c
nxd_ipv6_stateless_address_autoconfig_enable.c
Files are modified to fix compiler errors when x509 is disabled:
nx_secure_dtls_process_clienthello.c
nx_secure_dtls_server_local_certificate_add.c
nx_secure_dtls_server_local_certificate_remove.c
nx_secure_dtls_server_trusted_certificate_add.c
nx_secure_dtls_server_trusted_certificate_remove.c
nx_secure_dtls_session_local_certificate_add.c
nx_secure_dtls_session_local_certificate_remove.c
nx_secure_dtls_session_trusted_certificate_add.c
nx_secure_dtls_session_trusted_certificate_remove.c
nx_secure_generate_client_key_exchange.c
nx_secure_generate_premaster_secret.c
nx_secure_process_client_key_exchange.c
nx_secure_process_server_key_exchange.c
nx_secure_tls_active_certificate_set.c
nx_secure_tls_client_handshake.c
nx_secure_tls_ecc_generate_keys.c
nx_secure_tls_local_certificate_add.c
nx_secure_tls_local_certificate_find.c
nx_secure_tls_local_certificate_remove.c
nx_secure_tls_metadata_size_calculate.c
nx_secure_tls_process_certificate_request.c
nx_secure_tls_process_certificate_verify.c
nx_secure_tls_process_clienthello.c
nx_secure_tls_process_clienthello_extensions.c
nx_secure_tls_process_finished.c
nx_secure_tls_process_remote_certificate.c
nx_secure_tls_remote_certificate_allocate.c
nx_secure_tls_remote_certificate_buffer_allocate.c
nx_secure_tls_remote_certificate_free.c
nx_secure_tls_remote_certificate_free_all.c
nx_secure_tls_remote_certificate_verify.c
nx_secure_tls_send_certificate.c
nx_secure_tls_send_certificate_verify.c
nx_secure_tls_send_clienthello_extensions.c
nx_secure_tls_send_finished.c
nx_secure_tls_server_certificate_find.c
nx_secure_tls_server_certificate_remove.c
nx_secure_tls_session_create_ext.c
nx_secure_tls_session_renegotiate.c
nx_secure_tls_session_reset.c
nx_secure_tls_session_x509_client_verify_configure.c
nx_secure_tls_trusted_certificate_add.c
nx_secure_tls_trusted_certificate_remove.c
File is modified to initialize metadata for certificate using packet buffer:
nx_secure_tls_process_remote_certificate.c
File is modified to include TLS port header in X509 header:
nx_secure_x509.h
Files are modified to fix compiler warnings when NX_SECURE_KEY_CLEAR and NX_SECURE_TLS_ENABLE_TLS_1_3 are both defined:
nx_secure_tls_send_clienthello_extensions.c
nx_secure_tls_send_serverhello_extensions.c
Files are modified to fix the logic to cleanup key materials:
nx_secure_tls_1_3_client_handshake.c
nx_secure_tls_1_3_finished_hash_generate.c
nx_secure_tls_process_finished.c
nx_secure_tls_process_record.c
File is modified to fix packet leak in TLS 1.3:
nx_secure_tls_session_receive_records.c
File is modified to fix compiler errors when NX_SECURE_TLS_USE_SCSV_CIPHPERSUITE is defined:
nx_secure_tls_send_clienthello.c
File is modified to fix compiler errors when x509 is disabled:
nx_crypto_generic_ciphersuites.c
File is modified to align the buffer size of the huge numbers:
nx_crypto_rsa.c
Other modified files:
nx_api.h Updated product constants.
nx_azure_iot* When X509 authentication is used, clear MQTT password field.
Added ADU version string.
Reported ADU agent state as IDLE to server after receiving cancel command.
nx_cloud.c Fixed event clear function.
nxd_ftp_client.c Cleared the client ID.
nxd_sntp_client.c Cleared the client ID.
nxd_telnet_client.c Checked the client ID when creating, and cleared the client ID when deleting.
nxd_telnet_server.c Corrected the processing of disconnection to let user get the consistent value of open connections in different cases.
nxd_bsd.c Corrected the result of FIONREAD when using TCP socket.
Azure RTOS 6.2.0
Azure RTOS NetX Duo 6.2.0 release contains the following features and changes:
Device Update for IoT Hub agent
Azure Device Update for IoT Hub (a.k.a ADU) is a service that enables you to deploy over-the-air updates (OTA) to your IoT devices. Azure RTOS has included the ADU agent as part of the IoT Middleware.
Improvements of NetX Duo
nx_utility.c Improved the internal logic.
nx_azure_iot* Supported Device Update for IoT Hub.
Supported mqtt over websocket.
nx_websocket_client.c Initial release.
nx_websocket_client.h Initial release.
nx_web_http_server.c Supported random nonce for digest authentication.
Fixed the issue of processing empty password.
nx_web_http_server.h Supported random nonce for digest authentication.
nxd_http_server.c Fixed the issue of processing empty password.
Supported random nonce for digest authentication.
nxd_http_server.h Supported random nonce for digest authentication.
nxd_mqtt_client.c Supported mqtt over websocket.
Improved the logic of sending packet.
nxd_mqtt_client.h Supported mqtt over websocket.
nxd_snmp.c Fixed compiler warnings.
nxd_sntp_client.c Fixed the typo of August string.
Files are modified or added to support HTTP Proxy:
nx_api.h
nx_http_proxy_client.h
nx_http_proxy_client.c
nx_tcp_socket_block_cleanup.c
nx_tcp_socket_packet_process.c
nx_tcp_socket_state_data_check.c
nx_tcp_socket_state_established.c
nx_tcp_socket_state_syn_sent.c
nx_tcp_socket_state_wait.c
nxd_tcp_client_socket_connect.c
Files are modified to fix handling of multiple handshake messages:
nx_secure_tls_1_3_server_handshake.c
nx_secure_tls_server_handshake.c
Files are modified to fix TLS 1.3 version negotiation with no extensions in hello message:
nx_secure_tls_process_clienthello.c
nx_secure_tls_process_serverhello.c
Files are modified to fix compilation error:
nx_secure_tls_send_clienthello_extensions.c
nx_secure_tls_session_sni_extension_set.c
Files are modified to fix renegotiation when receiving in non-blocking mode:
nx_secure_tls.h
nx_secure_tls_session_receive.c
nx_secure_tls_session_renegotiate.c
nx_secure_tls_session_reset.c
Files are modified or added to support custom key generation:
nx_secure_tls.h
nx_secure_generate_client_key_exchange.c
nx_secure_generate_master_secret.c
nx_secure_generate_premaster_secret.c
nx_secure_generate_server_key_exchange.c
nx_secure_generate_session_keys.c
nx_secure_process_client_key_exchange.c
nx_secure_process_server_key_exchange.c
nx_secure_remote_certificate_verify.c
nx_secure_session_keys_set.c
nx_secure_tls_1_3_crypto_init.c
nx_secure_tls_ecc_generate_keys.c
nx_secure_tls_find_curve_method.c
nx_secure_tls_generate_keys.c
nx_secure_tls_generate_premaster_secret.c
nx_secure_tls_hash_record.c
nx_secure_tls_process_certificate_verify.c
nx_secure_tls_process_client_key_exchange.c
nx_secure_tls_process_clienthello_extensions.c
nx_secure_tls_process_server_key_exchange.c
nx_secure_tls_process_serverhello_extensions.c
nx_secure_tls_psk_add.c
nx_secure_tls_remote_certificate_verify.c
nx_secure_tls_send_certificate_verify.c
nx_secure_tls_send_client_key_exchange.c
nx_secure_tls_send_server_key_exchange.c
nx_secure_tls_session_create_ext.c
nx_secure_tls_session_keys_set.c
nx_secure_tls_trusted_certificate_add.c
nx_secure_tls_verify_mac.c
nx_secure_trusted_certificate_add.c
nx_secure_verify_mac.c
Files are modified or added to add an API that sets a custom packet pool for TLS session:
nx_secure_tls.h
nx_secure_tls_api.h
nx_secure_tls_session_packet_pool_set.c
nx_secure_tls_session_start.c
nxe_secure_tls_session_packet_pool_set.c
File is modified to add macro of EC curve types:
nx_crypto_const.h
Other modified file:
nx_crypto_generic_ciphersuites.c Modified comments.
nx_crypto_aes.c Fixed compiler warnings.