/Zephyr-latest/subsys/net/ip/ |
D | Kconfig.tcp | 1 # TCP options 9 bool "TCP" 19 module-str = Log level for TCP 20 module-help = Enables TCP handler output debug messages 25 int "TCP work queue thread stack size" 30 Set the TCP work queue thread stack size in bytes. 33 int "Priority of the TCP work queue" 37 Set the priority of the TCP worker queue, that handles all 38 transmission and maintenance within the TCP stack. 44 avoid the TCP stack consume all net_bufs before transferring [all …]
|
D | tcp_internal.h | 2 @brief TCP data handler 42 * @brief Calculates and returns the MSS for a given TCP context 44 * @param tcp TCP context 49 uint16_t net_tcp_get_supported_mss(const struct tcp *conn); 51 static inline uint16_t net_tcp_get_supported_mss(const struct tcp *conn) in net_tcp_get_supported_mss() 61 * @brief Obtains the state for a TCP context 63 * @param tcp TCP context 66 static inline enum tcp_state net_tcp_get_state(const struct tcp *conn) in net_tcp_get_state() 71 static inline enum tcp_state net_tcp_get_state(const struct tcp *conn) in net_tcp_get_state() 79 * @brief Go through all the TCP connections and call callback [all …]
|
D | tcp.h | 8 * @brief Transmission Control Protocol (TCP) 11 IPPROTO_TCP, ...) and creates struct tcp for the net_context 14 * of net_context/struct tcp registers a new net_conn handle 24 * look into the unit test tests/net/tcp for insights. 38 * @brief Allocate a TCP connection for the net_context 39 * and mutually link the net_context and TCP connection. 48 * @brief Close and delete the TCP connection for the net_context 57 * @brief Listen for an incoming TCP connection 80 * with the old TCP 87 * @param tcp_access Helper variable for accessing TCP header [all …]
|
D | tcp.c | 76 K_MEM_SLAB_DEFINE_STATIC(tcp_conns_slab, sizeof(struct tcp), 82 static enum net_verdict tcp_in(struct tcp *conn, struct net_pkt *pkt); 84 static void tcp_out(struct tcp *conn, uint8_t flags); 88 size_t (*tcp_recv_cb)(struct tcp *conn, struct net_pkt *pkt) = NULL; 248 const struct tcp *conn = ctx->tcp; in net_tcp_endpoint_copy() 422 static void tcp_derive_rto(struct tcp *conn) in tcp_derive_rto() 448 static void tcp_new_reno_log(struct tcp *conn, char *step) in tcp_new_reno_log() 455 static void tcp_new_reno_init(struct tcp *conn) in tcp_new_reno_init() 463 static void tcp_new_reno_fast_retransmit(struct tcp *conn) in tcp_new_reno_fast_retransmit() 474 static void tcp_new_reno_timeout(struct tcp *conn) in tcp_new_reno_timeout() [all …]
|
/Zephyr-latest/samples/net/sockets/echo_client/src/ |
D | tcp.c | 1 /* tcp.c - TCP specific code for echo client */ 55 data->tcp.expecting = sys_rand32_get() % ipsum_len; in send_tcp_data() 56 } while (data->tcp.expecting == 0U); in send_tcp_data() 58 data->tcp.received = 0U; in send_tcp_data() 60 ret = sendall(data->tcp.sock, lorem_ipsum, data->tcp.expecting); in send_tcp_data() 63 LOG_ERR("%s TCP: Failed to send data, errno %d", data->proto, in send_tcp_data() 67 LOG_DBG("%s TCP: Sent %d bytes", data->proto, in send_tcp_data() 68 data->tcp.expecting); in send_tcp_data() 77 if (data->tcp.received + received > data->tcp.expecting) { in compare_tcp_data() 78 LOG_ERR("Too much data received: TCP %s", data->proto); in compare_tcp_data() [all …]
|
/Zephyr-latest/samples/net/sockets/echo_server/src/ |
D | tcp.c | 1 /* tcp.c - TCP specific code for echo server */ 75 data->tcp.sock = socket(bind_addr->sa_family, SOCK_STREAM, in start_tcp_proto() 78 data->tcp.sock = socket(bind_addr->sa_family, SOCK_STREAM, in start_tcp_proto() 81 if (data->tcp.sock < 0) { in start_tcp_proto() 82 LOG_ERR("Failed to create TCP socket (%s): %d", data->proto, in start_tcp_proto() 95 ret = setsockopt(data->tcp.sock, SOL_TLS, TLS_SEC_TAG_LIST, in start_tcp_proto() 98 LOG_ERR("Failed to set TCP secure option (%s): %d", data->proto, in start_tcp_proto() 107 (void)setsockopt(data->tcp.sock, IPPROTO_IPV6, in start_tcp_proto() 116 (void)setsockopt(data->tcp.sock, IPPROTO_IPV6, IPV6_V6ONLY, in start_tcp_proto() 120 ret = bind(data->tcp.sock, bind_addr, bind_addrlen); in start_tcp_proto() [all …]
|
/Zephyr-latest/samples/net/sockets/tcp/ |
D | README.rst | 1 .. zephyr:code-sample:: sockets-tcp-sample 2 :name: TCP sample for TTCN-3 based sanity check 5 Use TTCN-3 to validate the functionality of the TCP stack. 11 to validate the functionality of the TCP. 13 Building, Running and executing TTCN-3 based Sanity Check for TCP 24 Build the TCP sample app: 28 cd samples/net/sockets/tcp 33 Compile and run the TCP sanity check `net-test-suites`_:
|
D | sample.yaml | 2 description: A sample for running TTCN-3 based sanity check for TCP 3 name: tcp 5 sample.net.socket.tcp: 12 - tcp
|
/Zephyr-latest/tests/net/tcp/ |
D | testcase.yaml | 5 - tcp 7 net.tcp.simple: 10 net.tcp.no_recv_queue: 13 net.tcp.variable_buf_size:
|
/Zephyr-latest/subsys/net/lib/mqtt/ |
D | mqtt_transport_socket_tcp.c | 9 * @brief Internal functions to handle transport over TCP socket. 26 client->transport.tcp.sock = zsock_socket(broker->sa_family, SOCK_STREAM, in mqtt_client_tcp_connect() 28 if (client->transport.tcp.sock < 0) { in mqtt_client_tcp_connect() 34 ret = setsockopt(client->transport.tcp.sock, in mqtt_client_tcp_connect() 44 NET_DBG("Created socket %d", client->transport.tcp.sock); in mqtt_client_tcp_connect() 52 ret = zsock_connect(client->transport.tcp.sock, client->broker, in mqtt_client_tcp_connect() 62 (void)zsock_close(client->transport.tcp.sock); in mqtt_client_tcp_connect() 73 ret = zsock_send(client->transport.tcp.sock, data + offset, in mqtt_client_tcp_write() 98 ret = zsock_sendmsg(client->transport.tcp.sock, message, 0); in mqtt_client_tcp_write_msg() 135 ret = zsock_recv(client->transport.tcp.sock, data, buflen, flags); in mqtt_client_tcp_read() [all …]
|
/Zephyr-latest/samples/net/stats/src/ |
D | main.c | 102 printk("TCP bytes recv %u\tsent\t%d\n", in print_stats() 103 GET_STAT(iface, tcp.bytes.received), in print_stats() 104 GET_STAT(iface, tcp.bytes.sent)); in print_stats() 105 printk("TCP seg recv %d\tsent\t%d\tdrop\t%d\n", in print_stats() 106 GET_STAT(iface, tcp.recv), in print_stats() 107 GET_STAT(iface, tcp.sent), in print_stats() 108 GET_STAT(iface, tcp.drop)); in print_stats() 109 printk("TCP seg resent %d\tchkerr\t%d\tackerr\t%d\n", in print_stats() 110 GET_STAT(iface, tcp.resent), in print_stats() 111 GET_STAT(iface, tcp.chkerr), in print_stats() [all …]
|
/Zephyr-latest/tests/posix/headers/src/ |
D | netinet_tcp_h.c | 10 #include <netinet/tcp.h> 12 #include <zephyr/posix/netinet/tcp.h> 16 * @brief existence test for `<netinet/tcp.h>` 18 …ef="https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/netinet_tcp.h.html">netinet/tcp.h</a>
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | zperf.rst | 37 For TCP testing, the command line would look like this: 51 For TCP the zperf command would look like this: 55 zperf tcp upload 2001:db8::2 5001 10 1K 1M 66 or like this if you want to test TCP: 70 zperf tcp upload2 v6 10 1K 1M 80 or like this for TCP: 84 zperf tcp download 5001 95 and this if you are testing TCP:
|
/Zephyr-latest/samples/subsys/modbus/tcp_server/ |
D | README.rst | 1 .. zephyr:code-sample:: modbus-tcp-server 2 :name: Modbus TCP server 5 Implement a Modbus TCP server exposing Modbus commands to control LEDs. 10 This is a simple application demonstrating a Modbus TCP server implementation 20 TCP server example is running on an evaluation board. Client is running 32 The following commands build and flash TCP server sample. 41 to the TCP server. 45 # pymodbus.console tcp --host 192.0.2.1 --port 502
|
/Zephyr-latest/subsys/net/lib/shell/ |
D | tcp.c | 27 PR_SHELL(tcp_shell, "TCP connection failed (%d)\n", status); in tcp_connected() 29 PR_SHELL(tcp_shell, "TCP connected\n"); in tcp_connected() 184 PR_WARNING("Cannot get TCP context (%d)\n", ret); in tcp_connect() 190 PR_WARNING("Cannot bind TCP (%d)\n", ret); in tcp_connect() 263 /* tcp connect <ip> port */ in cmd_net_tcp_connect() 268 /* tcp connect <ip> port */ in cmd_net_tcp_connect() 295 "CONFIG_NET_TCP and CONFIG_NET_NATIVE", "TCP"); in cmd_net_tcp_connect() 308 /* tcp send <data> */ in cmd_net_tcp_send() 331 "CONFIG_NET_TCP and CONFIG_NET_NATIVE", "TCP"); in cmd_net_tcp_send() 343 /* tcp recv */ in cmd_net_tcp_recv() [all …]
|
/Zephyr-latest/doc/services/modbus/ |
D | index.rst | 10 TCP support is not implemented directly, but there are helper functions 11 to realize TCP support according to the application's needs. 30 * :zephyr:code-sample:`modbus-tcp-server` sample is a simple Modbus TCP server. 31 * :zephyr:code-sample:`modbus-gateway` sample shows how to build a TCP to serial line
|
/Zephyr-latest/samples/net/stats/ |
D | README.rst | 52 TCP bytes recv 0 sent 0 53 TCP seg recv 0 sent 0 drop 0 54 TCP seg resent 0 chkerr 0 ackerr 0 55 TCP seg rsterr 0 rst 0 re-xmit 0 56 TCP conn drop 0 connrst 0
|
/Zephyr-latest/tests/subsys/debug/gdbstub/ |
D | testcase.yaml | 35 - "tcp::5678" 39 - CONFIG_QEMU_EXTRA_FLAGS="-serial tcp::5678,server" 59 - "tcp::1235" 66 - CONFIG_QEMU_EXTRA_FLAGS="-S -gdb tcp::1235" 67 # Clear QEMU default 'tcp::1234'
|
/Zephyr-latest/tests/net/socket/tcp/ |
D | testcase.yaml | 16 net.socket.tcp: 19 net.socket.tcp.preempt: 23 net.socket.tcp.tracing:
|
/Zephyr-latest/samples/drivers/ethernet/eth_ivshmem/ |
D | README.rst | 36 * Enable SSH access by appending ``,hostfwd=tcp::2222-:22`` to 129 # Start zperf TCP server 130 zperf tcp download 5001 142 # Connect iPerf TCP client 149 TCP server started on port 5001 150 New TCP session started. 151 TCP session ended 160 Client connecting to 192.168.19.2, TCP port 5001 161 TCP window size: 85.0 KByte (default)
|
/Zephyr-latest/samples/net/sockets/echo_server/ |
D | overlay-802154.conf | 3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
|
D | overlay-qemu_802154.conf | 3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
|
/Zephyr-latest/subsys/logging/backends/ |
D | Kconfig.net | 13 RFC 6587 (syslog over TCP) specifications for details. 92 If you want to use TCP, add "tcp://" in front of the address 94 tcp://192.0.2.1:514 95 tcp://192.0.2.42 96 tcp://[2001:db8::1]:514
|
/Zephyr-latest/samples/net/sockets/echo_client/ |
D | overlay-802154.conf | 3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
|
D | overlay-qemu_802154.conf | 3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
|