Home
last modified time | relevance | path

Searched full:peer (Results 1 – 25 of 368) sorted by relevance

12345678910>>...15

/Zephyr-latest/samples/net/sockets/echo_server/src/
Dtunnel.c19 struct net_if *peer; member
52 LOG_ERR("Tunnel peer address \"%s\" invalid.", ipaddr); in setup_iface()
84 struct sockaddr peer = { 0 }; in init_tunnel() local
92 LOG_INF("Tunnel peer address not set."); in init_tunnel()
98 &peer)) { in init_tunnel()
99 LOG_ERR("Tunnel peer address \"%s\" invalid.", in init_tunnel()
104 if (IS_ENABLED(CONFIG_NET_IPV6) && peer.sa_family == AF_INET6) { in init_tunnel()
108 &net_sin6(&peer)->sin6_addr); in init_tunnel()
109 ud.peer = iface; in init_tunnel()
112 &net_sin6(&peer)->sin6_addr); in init_tunnel()
[all …]
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/reassembly/dut/src/
Ddut.c63 /* Link `cb` to notifications received from `peer` for `handle`. Using
67 static void fake_subscribe(bt_addr_le_t *peer, in fake_subscribe() argument
81 err = bt_gatt_resubscribe(0, peer, &sub_params); in fake_subscribe()
85 static void run_test_iteration(bt_addr_le_t *peer) in run_test_iteration() argument
91 err = bt_testlib_connect(peer, &conn); in run_test_iteration()
97 fake_subscribe(peer, GATT_HANDLE, received_notification); in run_test_iteration()
101 LOG_DBG("Wait for disconnection from peer"); in run_test_iteration()
114 * - `peer`: sends long GATT notifications in entrypoint_dut()
115 * - `dut`: receives long notifications from `peer` in entrypoint_dut()
126 * - [dut] establish connection to `peer` in entrypoint_dut()
[all …]
/Zephyr-latest/tests/bsim/bluetooth/host/misc/sample_test/src/
Ddut.c72 * Verifies that we are able to send a notification to the peer when in entrypoint_dut()
73 * `CONFIG_BT_GATT_ENFORCE_SUBSCRIPTION` is disabled and the peer has in entrypoint_dut()
78 * - `peer`: will receive the notification in entrypoint_dut()
81 * - [dut] establish connection to `peer` in entrypoint_dut()
82 * - [peer] discover GATT and subscribe to the test characteristic in entrypoint_dut()
84 * - [peer] wait for notification in entrypoint_dut()
85 * - [peer] unsubscribe in entrypoint_dut()
87 * - [peer] and [dut] pass test in entrypoint_dut()
90 * - peer receives notifications #1 and #2 in entrypoint_dut()
93 bt_addr_le_t peer = {}; in entrypoint_dut() local
[all …]
/Zephyr-latest/tests/bsim/bluetooth/host/att/eatt_notif/src/
Dcommon.c30 uint peer; in device_sync_init() local
33 peer = PERIPHERAL_ID; in device_sync_init()
35 peer = CENTRAL_ID; in device_sync_init()
38 uint dev_nbrs[BACK_CHANNELS] = { peer }; in device_sync_init()
47 /* Call it to make peer to proceed.*/
55 /* Wait until peer send sync*/
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/test_scripts/
Drun_test_tolerate_pipeline_variant_rx_tx_prio_invert.sh11 # peer while a bad peer tries to spam ATT requests.
20 # - The well-behaved peer performs a discovery procedure
22 # - The bad peer spams ATT requests as fast as possible.
23 # - The connection with the well-behaved peer shall remain
25 # - Either: The DUT may disconnect the bad peer ACL after
26 # receiving a protocol violation occurs. The bad peer shall
/Zephyr-latest/samples/bluetooth/cap_initiator/src/
Dcap_initiator_unicast.c51 /** Struct to contain information for a specific peer (CAP) device */
65 /** ACL connection object for the peer device */
72 static struct peer_config peer; variable
167 if (stream == &peer.source_stream.bap_stream) { in unicast_stream_released_cb()
168 k_sem_give(&peer.source_stream_sem); in unicast_stream_released_cb()
169 } else if (stream == &peer.sink_stream.bap_stream) { in unicast_stream_released_cb()
170 k_sem_give(&peer.sink_stream_sem); in unicast_stream_released_cb()
239 if (peer.sink_ep == NULL) { in add_remote_sink()
241 peer.sink_ep = ep; in add_remote_sink()
248 if (peer.source_ep == NULL) { in add_remote_source()
[all …]
/Zephyr-latest/samples/bluetooth/cap_acceptor/src/
Dmain.c67 static struct peer_config peer; variable
78 peer.conn = bt_conn_ref(conn); in connected_cb()
86 if (conn != peer.conn) { in disconnected_cb()
93 bt_conn_unref(peer.conn); in disconnected_cb()
94 peer.conn = NULL; in disconnected_cb()
143 if (dir == BT_AUDIO_DIR_SINK && peer.sink_stream.bap_stream.ep == NULL) { in stream_alloc()
144 return &peer.sink_stream; in stream_alloc()
145 } else if (dir == BT_AUDIO_DIR_SOURCE && peer.source_stream.bap_stream.ep == NULL) { in stream_alloc()
146 return &peer.source_stream; in stream_alloc()
154 if (cap_stream == &peer.source_stream) { in stream_released()
[all …]
Dcap_acceptor.h17 /** Struct to contain information for a specific peer (CAP) device */
27 /** ACL connection object for the peer device */
36 * @param peer Pointer to the specific peer to initialize the CAP Acceptor for
41 int init_cap_acceptor_unicast(struct peer_config *peer);
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/ecred/dut/src/
Ddut.c58 * Verify that a peer that doesn't support ECRED channels doesn't result in entrypoint_dut()
63 * - `peer`: rejects the request in entrypoint_dut()
70 * - [peer] reject command as unknown in entrypoint_dut()
77 bt_addr_le_t peer = {}; in entrypoint_dut() local
87 err = bt_testlib_scan_find_name(&peer, "ecred_peer"); in entrypoint_dut()
91 err = bt_testlib_connect(&peer, &conn); in entrypoint_dut()
107 /* The PSM doesn't matter, as the peer doesn't support the command */ in entrypoint_dut()
111 LOG_INF("Wait until peer rejects the channel establishment request"); in entrypoint_dut()
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/general/src/
Dcommon.c33 uint peer = CENTRAL_ID; in device_sync_init() local
36 peer = PERIPHERAL_ID; in device_sync_init()
39 uint dev_nbrs[BACK_CHANNELS] = {peer}; in device_sync_init()
48 /* Call it to make peer to proceed.*/
56 /* Wait until peer send sync*/
/Zephyr-latest/tests/bsim/bluetooth/host/misc/acl_tx_frag/src/
Ddut.c156 static void test_iteration(bt_addr_le_t *peer) in test_iteration() argument
163 err = bt_testlib_connect(peer, &conn); in test_iteration()
168 LOG_INF("Wait until peer subscribes"); in test_iteration()
193 LOG_DBG("Wait until peer confirms our first indication"); in test_iteration()
221 * the RF link before we have sent all the ACL fragments the peer. We do in entrypoint_dut()
223 * important part is that the peer does not acknowledge them, so that in entrypoint_dut()
229 * - `peer`: anime side-character. not important. in entrypoint_dut()
232 * - [dut] establish connection to `peer` in entrypoint_dut()
233 * - [peer] discover GATT and subscribe to the test characteristic in entrypoint_dut()
235 * - [peer] wait for confirmation of indication in entrypoint_dut()
[all …]
/Zephyr-latest/samples/net/sockets/dumb_http_server_mt/
DKconfig16 bool "Send large file to peer when queried"
18 If set, then send 100KB file to peer. Default is to send
19 a 2KB file to peer.
/Zephyr-latest/samples/net/sockets/txtime/src/
Dmain.c45 struct sockaddr peer; member
181 msg.msg_name = &data->peer; in tx()
218 static int get_local_ipv6(struct net_if *iface, struct sockaddr *peer, in get_local_ipv6() argument
223 if (peer->sa_family != AF_INET6) { in get_local_ipv6()
227 addr = net_if_ipv6_select_src_addr(iface, &net_sin6(peer)->sin6_addr); in get_local_ipv6()
240 static int get_local_ipv4(struct net_if *iface, struct sockaddr *peer, in get_local_ipv4() argument
245 if (peer->sa_family != AF_INET) { in get_local_ipv4()
249 addr = net_if_ipv4_select_src_addr(iface, &net_sin(peer)->sin_addr); in get_local_ipv4()
262 static int create_socket(struct net_if *iface, struct sockaddr *peer) in create_socket() argument
295 sock = socket(peer->sa_family, SOCK_DGRAM, IPPROTO_UDP); in create_socket()
[all …]
/Zephyr-latest/subsys/net/l2/virtual/ipip/
Dipip.c44 struct net_addr peer; member
168 &ctx->peer.in6_addr); in interface_send()
171 ret = net_ipv6_create(tmp, ctx->my6addr, &ctx->peer.in6_addr); in interface_send()
208 &ctx->peer.in_addr); in interface_send()
222 &ctx->peer.in_addr, in interface_send()
277 if (memcmp(&ctx->peer.in_addr, &net_sin(remote_addr)->sin_addr, in verify_remote_addr()
282 if (memcmp(&ctx->peer.in6_addr, &net_sin6(remote_addr)->sin6_addr, in verify_remote_addr()
492 char peer[INET_ADDRSTRLEN]; in interface_set_config() local
495 net_ipaddr_copy(&ctx->peer.in_addr, &config->peer4addr); in interface_set_config()
497 addr_str = net_addr_ntop(AF_INET, &ctx->peer.in_addr, in interface_set_config()
[all …]
/Zephyr-latest/tests/bsim/bluetooth/host/privacy/central/src/
Ddut.c61 bt_addr_le_t peer = {}; in dut_procedure_connect_short_rpa_timeout() local
72 err = bt_testlib_scan_find_name(&peer, CONFIG_BT_DEVICE_NAME); in dut_procedure_connect_short_rpa_timeout()
75 /* Indicate to the peer device that we have found the advertiser. */ in dut_procedure_connect_short_rpa_timeout()
79 err = bt_testlib_connect(&peer, &conn); in dut_procedure_connect_short_rpa_timeout()
90 bt_addr_le_t peer = {.type = BT_ADDR_LE_RANDOM, .a = {.val = {1, 2, 3, 4, 5, 6}}}; in dut_procedure_connect_timeout() local
104 err = bt_testlib_connect(&peer, &conn); in dut_procedure_connect_timeout()
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/dut/src/
Dmain.c268 LOG_DBG("Test 0 start: good peer"); in good_peer_procedure()
288 PASS("Good peer done\n"); in good_peer_procedure()
302 LOG_DBG("Central: Connect to good peer"); in dut_procedure()
305 LOG_DBG("Central: Connect to bad peer"); in dut_procedure()
322 * violating peer that batches ATT requests without waiting for in test_procedure_0()
328 * - a "nice" peer, running a legal stress test, that is, running a in test_procedure_0()
330 * - a "bad" peer, spamming ATT requests as fast as possible. in test_procedure_0()
332 * The good peer uses the Zephyr host to send requests. in test_procedure_0()
333 * The bad peer uses the tinyhost (raw hci) to send requests. in test_procedure_0()
335 * The DUT is allowed to disconnect the ACL of the bad peer. in test_procedure_0()
[all …]
/Zephyr-latest/samples/drivers/ipm/ipm_ivshmem/
DREADME.rst91 followed by the destination peer-id, to get the peer-id destination
102 Peer id: 12
106 For example one of the instances has the peer-id 12, so go the other
108 by this peer-id:
118 Peer id: 11
130 Peer id: 12
/Zephyr-latest/subsys/net/l2/ppp/
DKconfig64 bool "Serve IP address to peer"
66 Enable support for serving IP address to PPP peer.
69 bool "Serve DNS addresses to peer"
71 Enable support for serving DNS addresses to PPP peer.
/Zephyr-latest/subsys/net/lib/shell/
Dcapture.c61 get_address_str(info->peer, addr_peer, sizeof(addr_peer)); in capture_cb()
111 const char *remote, *local, *peer; in cmd_net_capture_setup() local
125 peer = argv[arg]; in cmd_net_capture_setup()
126 if (!peer) { in cmd_net_capture_setup()
127 PR_WARNING("Peer IP address not specified.\n"); in cmd_net_capture_setup()
137 ret = net_capture_setup(remote, local, peer, &capture_dev); in cmd_net_capture_setup()
254 "'net capture setup <remote-ip-addr> <local-addr> <peer-addr>'\n"
257 "<peer> is the (inner) peer IP address\n"
258 "Local and Peer addresses can have UDP port number in them (optional)\n"
/Zephyr-latest/samples/bluetooth/hci_ipc/
DREADME.rst31 HCI IPC peer.
37 compatible with the peer application. For example, :kconfig:option:`CONFIG_BT_MAX_CONN`
38 must be equal to the maximum number of connections supported by the peer application.
/Zephyr-latest/tests/bsim/bluetooth/host/scan/slow/src/
Dpeer.c16 LOG_MODULE_REGISTER(peer, LOG_LEVEL_DBG);
24 TEST_START("peer"); in entrypoint_peer()
27 bt_testlib_log_level_set("peer", runtime_log_level); in entrypoint_peer()
/Zephyr-latest/tests/bluetooth/host/id/mocks/
Dconn_expects.c12 void expect_single_call_bt_conn_lookup_state_le(uint8_t id, const bt_addr_le_t *peer, in expect_single_call_bt_conn_lookup_state_le() argument
22 zassert_equal_ptr(bt_conn_lookup_state_le_fake.arg1_val, peer, in expect_single_call_bt_conn_lookup_state_le()
23 "'%s()' was called with incorrect '%s' value", func_name, "peer"); in expect_single_call_bt_conn_lookup_state_le()
/Zephyr-latest/tests/bluetooth/host/conn/src/
Dmain.c55 bt_addr_le_t peer = {.a.val = {0x01}}; in ZTEST() local
70 err = bt_conn_le_create(&peer, &create_param, BT_LE_CONN_PARAM_DEFAULT, &conn); in ZTEST()
86 err = bt_conn_le_create(&peer, &create_param, BT_LE_CONN_PARAM_DEFAULT, &conn); in ZTEST()
99 bt_addr_le_t peer = {.a.val = {0x01}}; in ZTEST() local
107 .peer = &peer, in ZTEST()
/Zephyr-latest/modules/thrift/src/thrift/transport/
DTSSLSocket.h157 * Authorize peer access after SSL handshake completes.
271 * @param required Require peer to present valid certificate if true
403 * Determine whether the peer should be granted access or not. It's called
404 * once after the SSL handshake completes successfully, before peer certificate
407 * If a valid decision (ALLOW or DENY) is returned, the peer certificate is
410 * @param sa Peer IP address
411 * @return True if the peer is trusted, false otherwise
418 * Determine whether the peer should be granted access or not. It's called
419 * every time a DNS subjectAltName/common name is extracted from peer's
424 * @param name SubjectAltName or common name extracted from peer certificate
[all …]
/Zephyr-latest/samples/bluetooth/handsfree_ag/
DKconfig20 The Delay time is used to wait for the peer to start dialing. If the
21 peer does not dial within the timeout period, AG satrt simulating a

12345678910>>...15