/Zephyr-latest/include/zephyr/ipc/ |
D | icmsg_me.h | 69 * This function is blocking until the handshake with the remote instance is 72 * possibly from a thread which can be safely blocked while handshake with the 101 * This function is intended to be used in the endpoints handshake procedure 102 * to make sure that handshake is not performed until the icmsg channel is 103 * ready to pass handshake messages. 146 * During endpoint handshake the handshake initiator must select an id number 147 * and store endpoint metadata required to finalize handshake and maintain 163 * handshake procedure is being initiated. 175 * During endpoint handshake the handshake follower must store endpoint id and 176 * metadata required to finalize handshake and maintain the connection. This [all …]
|
D | icmsg.h | 65 * This function is blocking until the handshake with the remote instance is 68 * possibly from a thread which can be safely blocked while handshake with the 117 * @retval -EBUSY when the instance has not finished handshake with the remote
|
/Zephyr-latest/samples/drivers/espi/ |
D | README.rst | 13 a simple eSPI handshake that includes exchanging virtual wire packets. 23 Any pins required for minimum eSPI handshake should be configured. 42 eSPI test - Handshake
|
D | sample.yaml | 2 description: A basic demo to showcase eSPI driver usage and handshake with eSPI 39 - "espi: eSPI test - Handshake with eSPI master..."
|
/Zephyr-latest/samples/drivers/espi/dts/bindings/ |
D | mec15xx-board-power.yaml | 9 GPIOs required before performing a eSPI host-slave handshake 24 is complete so eSPI master can proceed with eSPI handshake.
|
D | mec172x-board-power.yaml | 9 GPIOs required before performing a eSPI host-slave handshake 24 is complete so eSPI master can proceed with eSPI handshake.
|
/Zephyr-latest/modules/thrift/src/thrift/transport/ |
D | TSSLSocket.h | 29 SSLTLS = 0, // Supports SSLv2 and SSLv3 handshake but only negotiates at TLSv1_0 or later. 70 * Set whether to use client or server side SSL handshake protocol. 72 * @param flag Use server side handshake protocol if true. 157 * Authorize peer access after SSL handshake completes. 161 * Initiate SSL handshake if not already initiated. 165 * Initiate SSL handshake params. 169 * Check if SSL handshake is completed or not. 263 * Set ciphers to be used in SSL handshake process. 404 * once after the SSL handshake completes successfully, before peer certificate
|
/Zephyr-latest/subsys/net/lib/websocket/ |
D | websocket_internal.h | 58 /** This is used during HTTP handshake to verify that the 72 /* The socket number is valid only after HTTP handshake is done 120 /** Did we receive all from peer during HTTP handshake */
|
/Zephyr-latest/tests/net/socket/misc/ |
D | prj.conf | 33 # TCP handshake requires more packets
|
/Zephyr-latest/drivers/usb/uvb/ |
D | uvb.h | 79 /** Reply ACK handshake to a request */ 81 /** Reply NACK handshake to a request */ 83 /** Reply STALL handshake to a request */ 98 /** Reply handshake */
|
/Zephyr-latest/subsys/ipc/rpmsg_service/ |
D | Kconfig | 67 is important to avoid race conditions in RPMsg endpoints handshake.
|
/Zephyr-latest/modules/openthread/ |
D | Kconfig.features | 99 handshake used in the commissioning procedure requires a larger 205 handshake used in the commissioning procedure requires a larger
|
/Zephyr-latest/soc/nxp/imxrt/imxrt10xx/ |
D | lpm_rt1064.c | 63 /* Clock switch need Handshake? */ in clock_set_mux() 65 /* Wait until CCM internal handshake finish. */ in clock_set_mux() 85 /* Clock switch need Handshake? */ in clock_set_div() 87 /* Wait until CCM internal handshake finish. */ in clock_set_div()
|
/Zephyr-latest/subsys/net/lib/sockets/ |
D | sockets_tls.c | 140 /** Information whether TLS handshake is currently in progress. */ 158 /** Information whether TLS handshake is complete or not. */ 202 /* DTLS handshake timeout */ 1177 * even on handshake timeout in tls_mbedtls_reset() 1254 NET_ERR("TLS handshake timeout"); in tls_mbedtls_handshake() 1263 NET_ERR("TLS handshake error: -0x%x", -ret); in tls_mbedtls_handshake() 1825 /* Handshake is not complete */ in tls_opt_dtls_connection_id_status_get() 2182 /* Do not use any socket flags during the handshake. */ in ztls_connect_ctx() 2187 /* TODO For simplicity, TLS handshake blocks the socket in ztls_connect_ctx() 2246 /* Do not use any socket flags during the handshake. */ in ztls_accept_ctx() [all …]
|
/Zephyr-latest/samples/net/sockets/websocket_client/ |
D | README.rst | 11 or HTTPS handshake request to HTTP server, then start to send data and wait for
|
/Zephyr-latest/tests/benchmarks/mbedtls/src/ |
D | benchmark.c | 790 TIME_PUBLIC(title, "handshake", in main() 800 TIME_PUBLIC(title, "handshake", in main() 909 TIME_PUBLIC(title, "handshake", in main() 937 TIME_PUBLIC(title, "handshake", in main() 975 TIME_PUBLIC(title, "handshake", in main() 1004 TIME_PUBLIC(title, "handshake", in main()
|
/Zephyr-latest/include/zephyr/net/ |
D | websocket.h | 58 * @param req HTTP handshake request 98 * handshake. This is optional parameter and normally not needed but
|
D | socket.h | 129 /** Read-only socket option to read a ciphersuite chosen during TLS handshake. 157 * the TLS handshake. 160 /** Socket option to set DTLS min handshake timeout. The timeout starts at min, 166 /** Socket option to set DTLS max handshake timeout. The timeout starts at min, 232 * If set, DTLS connect() will execute the handshake with the configured peer. 235 * UDP socket) and will not attempt to execute DTLS handshake. The handshake
|
/Zephyr-latest/drivers/dai/intel/alh/ |
D | alh_map.h | 12 * Stream ID -> DMA Handshake map
|
D | alh.c | 156 LOG_DBG("handshake %u", prop->dma_hs_id); in dai_alh_get_properties()
|
/Zephyr-latest/drivers/dai/nxp/esai/ |
D | esai.h | 52 /* use to fetch the handshake value for a given direction. The handshake 54 * handshake = CHANNEL_ID | (MUX_VALUE << 8)
|
/Zephyr-latest/drivers/dai/intel/ssp/ |
D | ssp.h | 126 uint32_t handshake; member
|
/Zephyr-latest/drivers/dai/nxp/sai/ |
D | sai.h | 141 /* used to retrieve the handshake value for given direction. The handshake 143 * handshake = CHANNEL_ID | (MUX_VALUE << 8)
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | lwm2m.rst | 412 When DTLS is used, following options are recommended to reduce DTLS handshake traffic when connecti… 414 …dentifier support. When server supports it, this completely removes the handshake when device resu… 415 …s session cache when before falling back to full DTLS handshake. Reduces few packets from handshak…
|
/Zephyr-latest/drivers/dma/ |
D | dma_dw_axi.c | 72 /* channel software handshake source register */ 74 /* channel software handshake destination register */ 558 /* assign a hardware handshake interface */ in dma_dw_axi_config() 567 /* assign a hardware handshake interface */ in dma_dw_axi_config()
|