Home
last modified time | relevance | path

Searched full:tcp (Results 1 – 25 of 255) sorted by relevance

1234567891011

/Zephyr-latest/subsys/net/ip/
DKconfig.tcp1 # TCP options
9 bool "TCP"
19 module-str = Log level for TCP
20 module-help = Enables TCP handler output debug messages
25 int "TCP work queue thread stack size"
30 Set the TCP work queue thread stack size in bytes.
33 int "Priority of the TCP work queue"
37 Set the priority of the TCP worker queue, that handles all
38 transmission and maintenance within the TCP stack.
44 avoid the TCP stack consume all net_bufs before transferring
[all …]
Dtcp_internal.h2 @brief TCP data handler
42 * @brief Calculates and returns the MSS for a given TCP context
44 * @param tcp TCP context
49 uint16_t net_tcp_get_supported_mss(const struct tcp *conn);
51 static inline uint16_t net_tcp_get_supported_mss(const struct tcp *conn) in net_tcp_get_supported_mss()
61 * @brief Obtains the state for a TCP context
63 * @param tcp TCP context
66 static inline enum tcp_state net_tcp_get_state(const struct tcp *conn) in net_tcp_get_state()
71 static inline enum tcp_state net_tcp_get_state(const struct tcp *conn) in net_tcp_get_state()
79 * @brief Go through all the TCP connections and call callback
[all …]
Dtcp.h8 * @brief Transmission Control Protocol (TCP)
11 IPPROTO_TCP, ...) and creates struct tcp for the net_context
14 * of net_context/struct tcp registers a new net_conn handle
24 * look into the unit test tests/net/tcp for insights.
38 * @brief Allocate a TCP connection for the net_context
39 * and mutually link the net_context and TCP connection.
48 * @brief Close and delete the TCP connection for the net_context
57 * @brief Listen for an incoming TCP connection
80 * with the old TCP
87 * @param tcp_access Helper variable for accessing TCP header
[all …]
Dtcp.c76 K_MEM_SLAB_DEFINE_STATIC(tcp_conns_slab, sizeof(struct tcp),
82 static enum net_verdict tcp_in(struct tcp *conn, struct net_pkt *pkt);
84 static void tcp_out(struct tcp *conn, uint8_t flags);
88 size_t (*tcp_recv_cb)(struct tcp *conn, struct net_pkt *pkt) = NULL;
248 const struct tcp *conn = ctx->tcp; in net_tcp_endpoint_copy()
422 static void tcp_derive_rto(struct tcp *conn) in tcp_derive_rto()
448 static void tcp_new_reno_log(struct tcp *conn, char *step) in tcp_new_reno_log()
455 static void tcp_new_reno_init(struct tcp *conn) in tcp_new_reno_init()
463 static void tcp_new_reno_fast_retransmit(struct tcp *conn) in tcp_new_reno_fast_retransmit()
474 static void tcp_new_reno_timeout(struct tcp *conn) in tcp_new_reno_timeout()
[all …]
/Zephyr-latest/samples/net/sockets/echo_client/src/
Dtcp.c1 /* tcp.c - TCP specific code for echo client */
55 data->tcp.expecting = sys_rand32_get() % ipsum_len; in send_tcp_data()
56 } while (data->tcp.expecting == 0U); in send_tcp_data()
58 data->tcp.received = 0U; in send_tcp_data()
60 ret = sendall(data->tcp.sock, lorem_ipsum, data->tcp.expecting); in send_tcp_data()
63 LOG_ERR("%s TCP: Failed to send data, errno %d", data->proto, in send_tcp_data()
67 LOG_DBG("%s TCP: Sent %d bytes", data->proto, in send_tcp_data()
68 data->tcp.expecting); in send_tcp_data()
77 if (data->tcp.received + received > data->tcp.expecting) { in compare_tcp_data()
78 LOG_ERR("Too much data received: TCP %s", data->proto); in compare_tcp_data()
[all …]
/Zephyr-latest/samples/net/sockets/echo_server/src/
Dtcp.c1 /* tcp.c - TCP specific code for echo server */
75 data->tcp.sock = socket(bind_addr->sa_family, SOCK_STREAM, in start_tcp_proto()
78 data->tcp.sock = socket(bind_addr->sa_family, SOCK_STREAM, in start_tcp_proto()
81 if (data->tcp.sock < 0) { in start_tcp_proto()
82 LOG_ERR("Failed to create TCP socket (%s): %d", data->proto, in start_tcp_proto()
95 ret = setsockopt(data->tcp.sock, SOL_TLS, TLS_SEC_TAG_LIST, in start_tcp_proto()
98 LOG_ERR("Failed to set TCP secure option (%s): %d", data->proto, in start_tcp_proto()
107 (void)setsockopt(data->tcp.sock, IPPROTO_IPV6, in start_tcp_proto()
116 (void)setsockopt(data->tcp.sock, IPPROTO_IPV6, IPV6_V6ONLY, in start_tcp_proto()
120 ret = bind(data->tcp.sock, bind_addr, bind_addrlen); in start_tcp_proto()
[all …]
/Zephyr-latest/samples/net/sockets/tcp/
DREADME.rst1 .. zephyr:code-sample:: sockets-tcp-sample
2 :name: TCP sample for TTCN-3 based sanity check
5 Use TTCN-3 to validate the functionality of the TCP stack.
11 to validate the functionality of the TCP.
13 Building, Running and executing TTCN-3 based Sanity Check for TCP
24 Build the TCP sample app:
28 cd samples/net/sockets/tcp
33 Compile and run the TCP sanity check `net-test-suites`_:
Dsample.yaml2 description: A sample for running TTCN-3 based sanity check for TCP
3 name: tcp
5 sample.net.socket.tcp:
12 - tcp
/Zephyr-latest/tests/net/tcp/
Dtestcase.yaml5 - tcp
7 net.tcp.simple:
10 net.tcp.no_recv_queue:
13 net.tcp.variable_buf_size:
/Zephyr-latest/subsys/net/lib/mqtt/
Dmqtt_transport_socket_tcp.c9 * @brief Internal functions to handle transport over TCP socket.
26 client->transport.tcp.sock = zsock_socket(broker->sa_family, SOCK_STREAM, in mqtt_client_tcp_connect()
28 if (client->transport.tcp.sock < 0) { in mqtt_client_tcp_connect()
34 ret = setsockopt(client->transport.tcp.sock, in mqtt_client_tcp_connect()
44 NET_DBG("Created socket %d", client->transport.tcp.sock); in mqtt_client_tcp_connect()
52 ret = zsock_connect(client->transport.tcp.sock, client->broker, in mqtt_client_tcp_connect()
62 (void)zsock_close(client->transport.tcp.sock); in mqtt_client_tcp_connect()
73 ret = zsock_send(client->transport.tcp.sock, data + offset, in mqtt_client_tcp_write()
98 ret = zsock_sendmsg(client->transport.tcp.sock, message, 0); in mqtt_client_tcp_write_msg()
135 ret = zsock_recv(client->transport.tcp.sock, data, buflen, flags); in mqtt_client_tcp_read()
[all …]
/Zephyr-latest/samples/net/stats/src/
Dmain.c102 printk("TCP bytes recv %u\tsent\t%d\n", in print_stats()
103 GET_STAT(iface, tcp.bytes.received), in print_stats()
104 GET_STAT(iface, tcp.bytes.sent)); in print_stats()
105 printk("TCP seg recv %d\tsent\t%d\tdrop\t%d\n", in print_stats()
106 GET_STAT(iface, tcp.recv), in print_stats()
107 GET_STAT(iface, tcp.sent), in print_stats()
108 GET_STAT(iface, tcp.drop)); in print_stats()
109 printk("TCP seg resent %d\tchkerr\t%d\tackerr\t%d\n", in print_stats()
110 GET_STAT(iface, tcp.resent), in print_stats()
111 GET_STAT(iface, tcp.chkerr), in print_stats()
[all …]
/Zephyr-latest/tests/posix/headers/src/
Dnetinet_tcp_h.c10 #include <netinet/tcp.h>
12 #include <zephyr/posix/netinet/tcp.h>
16 * @brief existence test for `<netinet/tcp.h>`
18 …ef="https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/netinet_tcp.h.html">netinet/tcp.h</a>
/Zephyr-latest/doc/connectivity/networking/api/
Dzperf.rst37 For TCP testing, the command line would look like this:
51 For TCP the zperf command would look like this:
55 zperf tcp upload 2001:db8::2 5001 10 1K 1M
66 or like this if you want to test TCP:
70 zperf tcp upload2 v6 10 1K 1M
80 or like this for TCP:
84 zperf tcp download 5001
95 and this if you are testing TCP:
/Zephyr-latest/samples/subsys/modbus/tcp_server/
DREADME.rst1 .. zephyr:code-sample:: modbus-tcp-server
2 :name: Modbus TCP server
5 Implement a Modbus TCP server exposing Modbus commands to control LEDs.
10 This is a simple application demonstrating a Modbus TCP server implementation
20 TCP server example is running on an evaluation board. Client is running
32 The following commands build and flash TCP server sample.
41 to the TCP server.
45 # pymodbus.console tcp --host 192.0.2.1 --port 502
/Zephyr-latest/subsys/net/lib/shell/
Dtcp.c27 PR_SHELL(tcp_shell, "TCP connection failed (%d)\n", status); in tcp_connected()
29 PR_SHELL(tcp_shell, "TCP connected\n"); in tcp_connected()
184 PR_WARNING("Cannot get TCP context (%d)\n", ret); in tcp_connect()
190 PR_WARNING("Cannot bind TCP (%d)\n", ret); in tcp_connect()
263 /* tcp connect <ip> port */ in cmd_net_tcp_connect()
268 /* tcp connect <ip> port */ in cmd_net_tcp_connect()
295 "CONFIG_NET_TCP and CONFIG_NET_NATIVE", "TCP"); in cmd_net_tcp_connect()
308 /* tcp send <data> */ in cmd_net_tcp_send()
331 "CONFIG_NET_TCP and CONFIG_NET_NATIVE", "TCP"); in cmd_net_tcp_send()
343 /* tcp recv */ in cmd_net_tcp_recv()
[all …]
/Zephyr-latest/doc/services/modbus/
Dindex.rst10 TCP support is not implemented directly, but there are helper functions
11 to realize TCP support according to the application's needs.
30 * :zephyr:code-sample:`modbus-tcp-server` sample is a simple Modbus TCP server.
31 * :zephyr:code-sample:`modbus-gateway` sample shows how to build a TCP to serial line
/Zephyr-latest/samples/net/stats/
DREADME.rst52 TCP bytes recv 0 sent 0
53 TCP seg recv 0 sent 0 drop 0
54 TCP seg resent 0 chkerr 0 ackerr 0
55 TCP seg rsterr 0 rst 0 re-xmit 0
56 TCP conn drop 0 connrst 0
/Zephyr-latest/tests/subsys/debug/gdbstub/
Dtestcase.yaml35 - "tcp::5678"
39 - CONFIG_QEMU_EXTRA_FLAGS="-serial tcp::5678,server"
59 - "tcp::1235"
66 - CONFIG_QEMU_EXTRA_FLAGS="-S -gdb tcp::1235"
67 # Clear QEMU default 'tcp::1234'
/Zephyr-latest/tests/net/socket/tcp/
Dtestcase.yaml16 net.socket.tcp:
19 net.socket.tcp.preempt:
23 net.socket.tcp.tracing:
/Zephyr-latest/samples/drivers/ethernet/eth_ivshmem/
DREADME.rst36 * Enable SSH access by appending ``,hostfwd=tcp::2222-:22`` to
129 # Start zperf TCP server
130 zperf tcp download 5001
142 # Connect iPerf TCP client
149 TCP server started on port 5001
150 New TCP session started.
151 TCP session ended
160 Client connecting to 192.168.19.2, TCP port 5001
161 TCP window size: 85.0 KByte (default)
/Zephyr-latest/samples/net/sockets/echo_server/
Doverlay-802154.conf3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
Doverlay-qemu_802154.conf3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
/Zephyr-latest/subsys/logging/backends/
DKconfig.net13 RFC 6587 (syslog over TCP) specifications for details.
92 If you want to use TCP, add "tcp://" in front of the address
94 tcp://192.0.2.1:514
95 tcp://192.0.2.42
96 tcp://[2001:db8::1]:514
/Zephyr-latest/samples/net/sockets/echo_client/
Doverlay-802154.conf3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)
Doverlay-qemu_802154.conf3 # Disable TCP and IPv4 (TCP disabled to avoid heavy traffic)

1234567891011