Home
last modified time | relevance | path

Searched full:handshake (Results 1 – 25 of 74) sorted by relevance

123

/Zephyr-latest/include/zephyr/ipc/
Dicmsg_me.h69 * This function is blocking until the handshake with the remote instance is
72 * possibly from a thread which can be safely blocked while handshake with the
101 * This function is intended to be used in the endpoints handshake procedure
102 * to make sure that handshake is not performed until the icmsg channel is
103 * ready to pass handshake messages.
146 * During endpoint handshake the handshake initiator must select an id number
147 * and store endpoint metadata required to finalize handshake and maintain
163 * handshake procedure is being initiated.
175 * During endpoint handshake the handshake follower must store endpoint id and
176 * metadata required to finalize handshake and maintain the connection. This
[all …]
Dicmsg.h65 * This function is blocking until the handshake with the remote instance is
68 * possibly from a thread which can be safely blocked while handshake with the
117 * @retval -EBUSY when the instance has not finished handshake with the remote
/Zephyr-latest/samples/drivers/espi/
DREADME.rst13 a simple eSPI handshake that includes exchanging virtual wire packets.
23 Any pins required for minimum eSPI handshake should be configured.
42 eSPI test - Handshake
Dsample.yaml2 description: A basic demo to showcase eSPI driver usage and handshake with eSPI
39 - "espi: eSPI test - Handshake with eSPI master..."
/Zephyr-latest/samples/drivers/espi/dts/bindings/
Dmec15xx-board-power.yaml9 GPIOs required before performing a eSPI host-slave handshake
24 is complete so eSPI master can proceed with eSPI handshake.
Dmec172x-board-power.yaml9 GPIOs required before performing a eSPI host-slave handshake
24 is complete so eSPI master can proceed with eSPI handshake.
/Zephyr-latest/modules/thrift/src/thrift/transport/
DTSSLSocket.h29 SSLTLS = 0, // Supports SSLv2 and SSLv3 handshake but only negotiates at TLSv1_0 or later.
70 * Set whether to use client or server side SSL handshake protocol.
72 * @param flag Use server side handshake protocol if true.
157 * Authorize peer access after SSL handshake completes.
161 * Initiate SSL handshake if not already initiated.
165 * Initiate SSL handshake params.
169 * Check if SSL handshake is completed or not.
263 * Set ciphers to be used in SSL handshake process.
404 * once after the SSL handshake completes successfully, before peer certificate
/Zephyr-latest/subsys/net/lib/websocket/
Dwebsocket_internal.h58 /** This is used during HTTP handshake to verify that the
72 /* The socket number is valid only after HTTP handshake is done
120 /** Did we receive all from peer during HTTP handshake */
/Zephyr-latest/tests/net/socket/misc/
Dprj.conf33 # TCP handshake requires more packets
/Zephyr-latest/drivers/usb/uvb/
Duvb.h79 /** Reply ACK handshake to a request */
81 /** Reply NACK handshake to a request */
83 /** Reply STALL handshake to a request */
98 /** Reply handshake */
/Zephyr-latest/subsys/ipc/rpmsg_service/
DKconfig67 is important to avoid race conditions in RPMsg endpoints handshake.
/Zephyr-latest/modules/openthread/
DKconfig.features99 handshake used in the commissioning procedure requires a larger
205 handshake used in the commissioning procedure requires a larger
/Zephyr-latest/soc/nxp/imxrt/imxrt10xx/
Dlpm_rt1064.c63 /* Clock switch need Handshake? */ in clock_set_mux()
65 /* Wait until CCM internal handshake finish. */ in clock_set_mux()
85 /* Clock switch need Handshake? */ in clock_set_div()
87 /* Wait until CCM internal handshake finish. */ in clock_set_div()
/Zephyr-latest/subsys/net/lib/sockets/
Dsockets_tls.c140 /** Information whether TLS handshake is currently in progress. */
158 /** Information whether TLS handshake is complete or not. */
202 /* DTLS handshake timeout */
1177 * even on handshake timeout in tls_mbedtls_reset()
1254 NET_ERR("TLS handshake timeout"); in tls_mbedtls_handshake()
1263 NET_ERR("TLS handshake error: -0x%x", -ret); in tls_mbedtls_handshake()
1825 /* Handshake is not complete */ in tls_opt_dtls_connection_id_status_get()
2182 /* Do not use any socket flags during the handshake. */ in ztls_connect_ctx()
2187 /* TODO For simplicity, TLS handshake blocks the socket in ztls_connect_ctx()
2246 /* Do not use any socket flags during the handshake. */ in ztls_accept_ctx()
[all …]
/Zephyr-latest/samples/net/sockets/websocket_client/
DREADME.rst11 or HTTPS handshake request to HTTP server, then start to send data and wait for
/Zephyr-latest/tests/benchmarks/mbedtls/src/
Dbenchmark.c790 TIME_PUBLIC(title, "handshake", in main()
800 TIME_PUBLIC(title, "handshake", in main()
909 TIME_PUBLIC(title, "handshake", in main()
937 TIME_PUBLIC(title, "handshake", in main()
975 TIME_PUBLIC(title, "handshake", in main()
1004 TIME_PUBLIC(title, "handshake", in main()
/Zephyr-latest/include/zephyr/net/
Dwebsocket.h58 * @param req HTTP handshake request
98 * handshake. This is optional parameter and normally not needed but
Dsocket.h129 /** Read-only socket option to read a ciphersuite chosen during TLS handshake.
157 * the TLS handshake.
160 /** Socket option to set DTLS min handshake timeout. The timeout starts at min,
166 /** Socket option to set DTLS max handshake timeout. The timeout starts at min,
232 * If set, DTLS connect() will execute the handshake with the configured peer.
235 * UDP socket) and will not attempt to execute DTLS handshake. The handshake
/Zephyr-latest/drivers/dai/intel/alh/
Dalh_map.h12 * Stream ID -> DMA Handshake map
Dalh.c156 LOG_DBG("handshake %u", prop->dma_hs_id); in dai_alh_get_properties()
/Zephyr-latest/drivers/dai/nxp/esai/
Desai.h52 /* use to fetch the handshake value for a given direction. The handshake
54 * handshake = CHANNEL_ID | (MUX_VALUE << 8)
/Zephyr-latest/drivers/dai/intel/ssp/
Dssp.h126 uint32_t handshake; member
/Zephyr-latest/drivers/dai/nxp/sai/
Dsai.h141 /* used to retrieve the handshake value for given direction. The handshake
143 * handshake = CHANNEL_ID | (MUX_VALUE << 8)
/Zephyr-latest/doc/connectivity/networking/api/
Dlwm2m.rst412 When DTLS is used, following options are recommended to reduce DTLS handshake traffic when connecti…
414 …dentifier support. When server supports it, this completely removes the handshake when device resu…
415 …s session cache when before falling back to full DTLS handshake. Reduces few packets from handshak…
/Zephyr-latest/drivers/dma/
Ddma_dw_axi.c72 /* channel software handshake source register */
74 /* channel software handshake destination register */
558 /* assign a hardware handshake interface */ in dma_dw_axi_config()
567 /* assign a hardware handshake interface */ in dma_dw_axi_config()

123