/Zephyr-latest/samples/net/sockets/echo_server/src/ |
D | tunnel.c | 19 struct net_if *peer; member 52 LOG_ERR("Tunnel peer address \"%s\" invalid.", ipaddr); in setup_iface() 84 struct sockaddr peer = { 0 }; in init_tunnel() local 92 LOG_INF("Tunnel peer address not set."); in init_tunnel() 98 &peer)) { in init_tunnel() 99 LOG_ERR("Tunnel peer address \"%s\" invalid.", in init_tunnel() 104 if (IS_ENABLED(CONFIG_NET_IPV6) && peer.sa_family == AF_INET6) { in init_tunnel() 108 &net_sin6(&peer)->sin6_addr); in init_tunnel() 109 ud.peer = iface; in init_tunnel() 112 &net_sin6(&peer)->sin6_addr); in init_tunnel() [all …]
|
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/reassembly/dut/src/ |
D | dut.c | 63 /* Link `cb` to notifications received from `peer` for `handle`. Using 67 static void fake_subscribe(bt_addr_le_t *peer, in fake_subscribe() argument 81 err = bt_gatt_resubscribe(0, peer, &sub_params); in fake_subscribe() 85 static void run_test_iteration(bt_addr_le_t *peer) in run_test_iteration() argument 91 err = bt_testlib_connect(peer, &conn); in run_test_iteration() 97 fake_subscribe(peer, GATT_HANDLE, received_notification); in run_test_iteration() 101 LOG_DBG("Wait for disconnection from peer"); in run_test_iteration() 114 * - `peer`: sends long GATT notifications in entrypoint_dut() 115 * - `dut`: receives long notifications from `peer` in entrypoint_dut() 126 * - [dut] establish connection to `peer` in entrypoint_dut() [all …]
|
/Zephyr-latest/tests/bsim/bluetooth/host/misc/sample_test/src/ |
D | dut.c | 72 * Verifies that we are able to send a notification to the peer when in entrypoint_dut() 73 * `CONFIG_BT_GATT_ENFORCE_SUBSCRIPTION` is disabled and the peer has in entrypoint_dut() 78 * - `peer`: will receive the notification in entrypoint_dut() 81 * - [dut] establish connection to `peer` in entrypoint_dut() 82 * - [peer] discover GATT and subscribe to the test characteristic in entrypoint_dut() 84 * - [peer] wait for notification in entrypoint_dut() 85 * - [peer] unsubscribe in entrypoint_dut() 87 * - [peer] and [dut] pass test in entrypoint_dut() 90 * - peer receives notifications #1 and #2 in entrypoint_dut() 93 bt_addr_le_t peer = {}; in entrypoint_dut() local [all …]
|
/Zephyr-latest/tests/bsim/bluetooth/host/att/eatt_notif/src/ |
D | common.c | 30 uint peer; in device_sync_init() local 33 peer = PERIPHERAL_ID; in device_sync_init() 35 peer = CENTRAL_ID; in device_sync_init() 38 uint dev_nbrs[BACK_CHANNELS] = { peer }; in device_sync_init() 47 /* Call it to make peer to proceed.*/ 55 /* Wait until peer send sync*/
|
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/test_scripts/ |
D | run_test_tolerate_pipeline_variant_rx_tx_prio_invert.sh | 11 # peer while a bad peer tries to spam ATT requests. 20 # - The well-behaved peer performs a discovery procedure 22 # - The bad peer spams ATT requests as fast as possible. 23 # - The connection with the well-behaved peer shall remain 25 # - Either: The DUT may disconnect the bad peer ACL after 26 # receiving a protocol violation occurs. The bad peer shall
|
/Zephyr-latest/samples/bluetooth/cap_initiator/src/ |
D | cap_initiator_unicast.c | 51 /** Struct to contain information for a specific peer (CAP) device */ 65 /** ACL connection object for the peer device */ 72 static struct peer_config peer; variable 167 if (stream == &peer.source_stream.bap_stream) { in unicast_stream_released_cb() 168 k_sem_give(&peer.source_stream_sem); in unicast_stream_released_cb() 169 } else if (stream == &peer.sink_stream.bap_stream) { in unicast_stream_released_cb() 170 k_sem_give(&peer.sink_stream_sem); in unicast_stream_released_cb() 239 if (peer.sink_ep == NULL) { in add_remote_sink() 241 peer.sink_ep = ep; in add_remote_sink() 248 if (peer.source_ep == NULL) { in add_remote_source() [all …]
|
/Zephyr-latest/samples/bluetooth/cap_acceptor/src/ |
D | main.c | 67 static struct peer_config peer; variable 78 peer.conn = bt_conn_ref(conn); in connected_cb() 86 if (conn != peer.conn) { in disconnected_cb() 93 bt_conn_unref(peer.conn); in disconnected_cb() 94 peer.conn = NULL; in disconnected_cb() 143 if (dir == BT_AUDIO_DIR_SINK && peer.sink_stream.bap_stream.ep == NULL) { in stream_alloc() 144 return &peer.sink_stream; in stream_alloc() 145 } else if (dir == BT_AUDIO_DIR_SOURCE && peer.source_stream.bap_stream.ep == NULL) { in stream_alloc() 146 return &peer.source_stream; in stream_alloc() 154 if (cap_stream == &peer.source_stream) { in stream_released() [all …]
|
D | cap_acceptor.h | 17 /** Struct to contain information for a specific peer (CAP) device */ 27 /** ACL connection object for the peer device */ 36 * @param peer Pointer to the specific peer to initialize the CAP Acceptor for 41 int init_cap_acceptor_unicast(struct peer_config *peer);
|
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/ecred/dut/src/ |
D | dut.c | 58 * Verify that a peer that doesn't support ECRED channels doesn't result in entrypoint_dut() 63 * - `peer`: rejects the request in entrypoint_dut() 70 * - [peer] reject command as unknown in entrypoint_dut() 77 bt_addr_le_t peer = {}; in entrypoint_dut() local 87 err = bt_testlib_scan_find_name(&peer, "ecred_peer"); in entrypoint_dut() 91 err = bt_testlib_connect(&peer, &conn); in entrypoint_dut() 107 /* The PSM doesn't matter, as the peer doesn't support the command */ in entrypoint_dut() 111 LOG_INF("Wait until peer rejects the channel establishment request"); in entrypoint_dut()
|
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/general/src/ |
D | common.c | 33 uint peer = CENTRAL_ID; in device_sync_init() local 36 peer = PERIPHERAL_ID; in device_sync_init() 39 uint dev_nbrs[BACK_CHANNELS] = {peer}; in device_sync_init() 48 /* Call it to make peer to proceed.*/ 56 /* Wait until peer send sync*/
|
/Zephyr-latest/tests/bsim/bluetooth/host/misc/acl_tx_frag/src/ |
D | dut.c | 156 static void test_iteration(bt_addr_le_t *peer) in test_iteration() argument 163 err = bt_testlib_connect(peer, &conn); in test_iteration() 168 LOG_INF("Wait until peer subscribes"); in test_iteration() 193 LOG_DBG("Wait until peer confirms our first indication"); in test_iteration() 221 * the RF link before we have sent all the ACL fragments the peer. We do in entrypoint_dut() 223 * important part is that the peer does not acknowledge them, so that in entrypoint_dut() 229 * - `peer`: anime side-character. not important. in entrypoint_dut() 232 * - [dut] establish connection to `peer` in entrypoint_dut() 233 * - [peer] discover GATT and subscribe to the test characteristic in entrypoint_dut() 235 * - [peer] wait for confirmation of indication in entrypoint_dut() [all …]
|
/Zephyr-latest/samples/net/sockets/dumb_http_server_mt/ |
D | Kconfig | 16 bool "Send large file to peer when queried" 18 If set, then send 100KB file to peer. Default is to send 19 a 2KB file to peer.
|
/Zephyr-latest/samples/net/sockets/txtime/src/ |
D | main.c | 45 struct sockaddr peer; member 181 msg.msg_name = &data->peer; in tx() 218 static int get_local_ipv6(struct net_if *iface, struct sockaddr *peer, in get_local_ipv6() argument 223 if (peer->sa_family != AF_INET6) { in get_local_ipv6() 227 addr = net_if_ipv6_select_src_addr(iface, &net_sin6(peer)->sin6_addr); in get_local_ipv6() 240 static int get_local_ipv4(struct net_if *iface, struct sockaddr *peer, in get_local_ipv4() argument 245 if (peer->sa_family != AF_INET) { in get_local_ipv4() 249 addr = net_if_ipv4_select_src_addr(iface, &net_sin(peer)->sin_addr); in get_local_ipv4() 262 static int create_socket(struct net_if *iface, struct sockaddr *peer) in create_socket() argument 295 sock = socket(peer->sa_family, SOCK_DGRAM, IPPROTO_UDP); in create_socket() [all …]
|
/Zephyr-latest/subsys/net/l2/virtual/ipip/ |
D | ipip.c | 44 struct net_addr peer; member 168 &ctx->peer.in6_addr); in interface_send() 171 ret = net_ipv6_create(tmp, ctx->my6addr, &ctx->peer.in6_addr); in interface_send() 208 &ctx->peer.in_addr); in interface_send() 222 &ctx->peer.in_addr, in interface_send() 277 if (memcmp(&ctx->peer.in_addr, &net_sin(remote_addr)->sin_addr, in verify_remote_addr() 282 if (memcmp(&ctx->peer.in6_addr, &net_sin6(remote_addr)->sin6_addr, in verify_remote_addr() 492 char peer[INET_ADDRSTRLEN]; in interface_set_config() local 495 net_ipaddr_copy(&ctx->peer.in_addr, &config->peer4addr); in interface_set_config() 497 addr_str = net_addr_ntop(AF_INET, &ctx->peer.in_addr, in interface_set_config() [all …]
|
/Zephyr-latest/tests/bsim/bluetooth/host/privacy/central/src/ |
D | dut.c | 61 bt_addr_le_t peer = {}; in dut_procedure_connect_short_rpa_timeout() local 72 err = bt_testlib_scan_find_name(&peer, CONFIG_BT_DEVICE_NAME); in dut_procedure_connect_short_rpa_timeout() 75 /* Indicate to the peer device that we have found the advertiser. */ in dut_procedure_connect_short_rpa_timeout() 79 err = bt_testlib_connect(&peer, &conn); in dut_procedure_connect_short_rpa_timeout() 90 bt_addr_le_t peer = {.type = BT_ADDR_LE_RANDOM, .a = {.val = {1, 2, 3, 4, 5, 6}}}; in dut_procedure_connect_timeout() local 104 err = bt_testlib_connect(&peer, &conn); in dut_procedure_connect_timeout()
|
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/dut/src/ |
D | main.c | 268 LOG_DBG("Test 0 start: good peer"); in good_peer_procedure() 288 PASS("Good peer done\n"); in good_peer_procedure() 302 LOG_DBG("Central: Connect to good peer"); in dut_procedure() 305 LOG_DBG("Central: Connect to bad peer"); in dut_procedure() 322 * violating peer that batches ATT requests without waiting for in test_procedure_0() 328 * - a "nice" peer, running a legal stress test, that is, running a in test_procedure_0() 330 * - a "bad" peer, spamming ATT requests as fast as possible. in test_procedure_0() 332 * The good peer uses the Zephyr host to send requests. in test_procedure_0() 333 * The bad peer uses the tinyhost (raw hci) to send requests. in test_procedure_0() 335 * The DUT is allowed to disconnect the ACL of the bad peer. in test_procedure_0() [all …]
|
/Zephyr-latest/samples/drivers/ipm/ipm_ivshmem/ |
D | README.rst | 91 followed by the destination peer-id, to get the peer-id destination 102 Peer id: 12 106 For example one of the instances has the peer-id 12, so go the other 108 by this peer-id: 118 Peer id: 11 130 Peer id: 12
|
/Zephyr-latest/subsys/net/l2/ppp/ |
D | Kconfig | 64 bool "Serve IP address to peer" 66 Enable support for serving IP address to PPP peer. 69 bool "Serve DNS addresses to peer" 71 Enable support for serving DNS addresses to PPP peer.
|
/Zephyr-latest/subsys/net/lib/shell/ |
D | capture.c | 61 get_address_str(info->peer, addr_peer, sizeof(addr_peer)); in capture_cb() 111 const char *remote, *local, *peer; in cmd_net_capture_setup() local 125 peer = argv[arg]; in cmd_net_capture_setup() 126 if (!peer) { in cmd_net_capture_setup() 127 PR_WARNING("Peer IP address not specified.\n"); in cmd_net_capture_setup() 137 ret = net_capture_setup(remote, local, peer, &capture_dev); in cmd_net_capture_setup() 254 "'net capture setup <remote-ip-addr> <local-addr> <peer-addr>'\n" 257 "<peer> is the (inner) peer IP address\n" 258 "Local and Peer addresses can have UDP port number in them (optional)\n"
|
/Zephyr-latest/samples/bluetooth/hci_ipc/ |
D | README.rst | 31 HCI IPC peer. 37 compatible with the peer application. For example, :kconfig:option:`CONFIG_BT_MAX_CONN` 38 must be equal to the maximum number of connections supported by the peer application.
|
/Zephyr-latest/tests/bsim/bluetooth/host/scan/slow/src/ |
D | peer.c | 16 LOG_MODULE_REGISTER(peer, LOG_LEVEL_DBG); 24 TEST_START("peer"); in entrypoint_peer() 27 bt_testlib_log_level_set("peer", runtime_log_level); in entrypoint_peer()
|
/Zephyr-latest/tests/bluetooth/host/id/mocks/ |
D | conn_expects.c | 12 void expect_single_call_bt_conn_lookup_state_le(uint8_t id, const bt_addr_le_t *peer, in expect_single_call_bt_conn_lookup_state_le() argument 22 zassert_equal_ptr(bt_conn_lookup_state_le_fake.arg1_val, peer, in expect_single_call_bt_conn_lookup_state_le() 23 "'%s()' was called with incorrect '%s' value", func_name, "peer"); in expect_single_call_bt_conn_lookup_state_le()
|
/Zephyr-latest/tests/bluetooth/host/conn/src/ |
D | main.c | 55 bt_addr_le_t peer = {.a.val = {0x01}}; in ZTEST() local 70 err = bt_conn_le_create(&peer, &create_param, BT_LE_CONN_PARAM_DEFAULT, &conn); in ZTEST() 86 err = bt_conn_le_create(&peer, &create_param, BT_LE_CONN_PARAM_DEFAULT, &conn); in ZTEST() 99 bt_addr_le_t peer = {.a.val = {0x01}}; in ZTEST() local 107 .peer = &peer, in ZTEST()
|
/Zephyr-latest/modules/thrift/src/thrift/transport/ |
D | TSSLSocket.h | 157 * Authorize peer access after SSL handshake completes. 271 * @param required Require peer to present valid certificate if true 403 * Determine whether the peer should be granted access or not. It's called 404 * once after the SSL handshake completes successfully, before peer certificate 407 * If a valid decision (ALLOW or DENY) is returned, the peer certificate is 410 * @param sa Peer IP address 411 * @return True if the peer is trusted, false otherwise 418 * Determine whether the peer should be granted access or not. It's called 419 * every time a DNS subjectAltName/common name is extracted from peer's 424 * @param name SubjectAltName or common name extracted from peer certificate [all …]
|
/Zephyr-latest/samples/bluetooth/handsfree_ag/ |
D | Kconfig | 20 The Delay time is used to wait for the peer to start dialing. If the 21 peer does not dial within the timeout period, AG satrt simulating a
|