/Zephyr-latest/include/zephyr/ipc/ |
D | ipc_service_backend.h | 57 * @param[in] token Backend-specific token. 71 int (*send)(const struct device *instance, void *token, 77 * @param[out] token Backend-specific token. 88 void **token, 94 * @param[in] token Backend-specific token. 104 int (*deregister_endpoint)(const struct device *instance, void *token); 109 * @param[in] token Backend-specific token. 119 int (*get_tx_buffer_size)(const struct device *instance, void *token); 124 * @param[in] token Backend-specific token. 141 int (*get_tx_buffer)(const struct device *instance, void *token, [all …]
|
/Zephyr-latest/subsys/net/lib/lwm2m/ |
D | lwm2m_util.h | 40 * @brief Converts the token to a printable format. 42 * @param[in] token Token to be printed 43 * @param[in] tkl Lengths of token 44 * @return char buffer with the string representation of the token 46 char *sprint_token(const uint8_t *token, uint8_t tkl);
|
D | lwm2m_observation.h | 18 uint8_t token[MAX_TOKEN_LEN]; /* Observation Token */ member 46 const uint8_t *token, uint8_t tkl); 48 int engine_remove_observer_by_token(struct lwm2m_ctx *ctx, const uint8_t *token, uint8_t tkl);
|
D | lwm2m_observation.c | 443 static void engine_observe_node_init(struct observe_node *obs, const uint8_t *token, in engine_observe_node_init() argument 449 memcpy(obs->token, token, tkl); in engine_observe_node_init() 473 LOG_DBG("token:'%s' addr:%s", sprint_token(token, tkl), in engine_observe_node_init() 547 const uint8_t *token, uint8_t tkl) in engine_observe_node_discover() argument 576 if (token && memcmp(obs->token, token, tkl)) { in engine_observe_node_discover() 577 /* Token not match */ in engine_observe_node_discover() 586 static int engine_add_observer(struct lwm2m_message *msg, const uint8_t *token, uint8_t tkl, in engine_add_observer() argument 601 if (!token || (tkl == 0U || tkl > MAX_TOKEN_LEN)) { in engine_add_observer() 602 LOG_ERR("token(%p) and token length(%u) must be valid.", token, tkl); in engine_add_observer() 614 memcpy(obs->token, token, tkl); in engine_add_observer() [all …]
|
/Zephyr-latest/scripts/ |
D | github_helpers.py | 61 token = os.environ.get('GITHUB_TOKEN') 62 if token: 63 return {'login_or_token': token} 69 'Please give your GitHub token.', 71 token = getpass.getpass('token: ') 72 return {'login_or_token': token}
|
/Zephyr-latest/tests/subsys/sip_svc/src/ |
D | main.c | 50 * @param token sip_svc token 52 static void sip_svc_send_sync_request(uint32_t token) in sip_svc_send_sync_request() argument 64 tot_time = (struct total_time *)sip_svc_get_priv_data(ctrl, token); in sip_svc_send_sync_request() 67 err = sip_svc_open(ctrl, token, K_FOREVER); in sip_svc_send_sync_request() 77 trans_id = sip_svc_send(ctrl, token, &req, get_sync_callback); in sip_svc_send_sync_request() 89 err = sip_svc_close(ctrl, token, NULL); in sip_svc_send_sync_request() 116 * @param token sip_svc token 118 static void sip_svc_send_async_request(uint32_t token) in sip_svc_send_async_request() argument 135 err = sip_svc_open(ctrl, token, K_FOREVER); in sip_svc_send_async_request() 138 tot_time = (struct total_time *)sip_svc_get_priv_data(ctrl, token); in sip_svc_send_async_request() [all …]
|
/Zephyr-latest/include/zephyr/data/ |
D | jwt.h | 18 * @brief JSON Web Token (JWT) - RFC 7519 19 * @defgroup jwt JSON Web Token (JWT) 28 * This structure tracks the token as it is being built, including 45 * buffer. If set, the token is not valid. 59 * Initialize the given JWT builder for the creation of a fresh token. 60 * The buffer size should be long enough to store the entire token. 63 * @param buffer The buffer to write the token to. 64 * @param buffer_size The size of this buffer. The token will be NULL
|
/Zephyr-latest/samples/net/sockets/coap_server/src/ |
D | test.c | 23 uint8_t token[COAP_TOKEN_MAX_LEN]; in piggyback_get() local 33 tkl = coap_header_get_token(request, token); in piggyback_get() 46 COAP_VERSION_1, type, tkl, token, in piggyback_get() 87 uint8_t token[COAP_TOKEN_MAX_LEN]; in test_del() local 97 tkl = coap_header_get_token(request, token); in test_del() 110 COAP_VERSION_1, type, tkl, token, in test_del() 127 uint8_t token[COAP_TOKEN_MAX_LEN]; in test_put() local 139 tkl = coap_header_get_token(request, token); in test_put() 157 COAP_VERSION_1, type, tkl, token, in test_put() 179 uint8_t token[COAP_TOKEN_MAX_LEN]; in test_post() local [all …]
|
D | observer.c | 24 const uint8_t *token, uint8_t tkl, in send_notification_packet() argument 44 COAP_VERSION_1, type, tkl, token, in send_notification_packet() 92 uint8_t token[COAP_TOKEN_MAX_LEN]; in obs_get() local 104 tkl = coap_header_get_token(request, token); in obs_get() 112 id, token, tkl, true); in obs_get() 122 observer->token, observer->tkl, false); in obs_notify()
|
D | location_query.c | 24 uint8_t token[COAP_TOKEN_MAX_LEN]; in location_query_post() local 34 tkl = coap_header_get_token(request, token); in location_query_post() 47 COAP_VERSION_1, type, tkl, token, in location_query_post()
|
/Zephyr-latest/include/zephyr/mgmt/hawkbit/ |
D | config.h | 36 /** Security token */ 97 * @brief Set the hawkBit security token. 99 * @param token Security token to set. 103 static inline int hawkbit_set_ddi_security_token(char *token) in hawkbit_set_ddi_security_token() argument 108 .auth_token = token, in hawkbit_set_ddi_security_token() 155 * @brief Get the hawkBit security token. 157 * @return Security token.
|
/Zephyr-latest/tests/kernel/interrupt/src/ |
D | nested_irq.c | 96 /* Set verification token */ in isr1() 108 /* Set verification token */ in isr0() 117 /* Validate nested ISR result token */ in isr0() 136 * 2. [isr0] Set ISR 0 result token and trigger IRQ 1 (higher priority) 137 * 3. [isr1] Set ISR 1 result token and return 138 * 4. [isr0] Validate ISR 1 result token and return 139 * 5. [thread] Validate ISR 0 result token 165 /* Validate ISR result token */ in ZTEST()
|
/Zephyr-latest/subsys/ipc/ipc_service/backends/ |
D | ipc_icmsg.c | 17 static int register_ept(const struct device *instance, void **token, in register_ept() argument 23 /* Only one endpoint is supported. No need for a token. */ in register_ept() 24 *token = NULL; in register_ept() 29 static int deregister_ept(const struct device *instance, void *token) in deregister_ept() argument 37 static int send(const struct device *instance, void *token, in send() argument
|
D | ipc_icmsg_me_initiator.c | 83 void **token) in store_id_for_token() argument 98 *token = &data->ids[i]; in store_id_for_token() 103 static int register_ept(const struct device *instance, void **token, in register_ept() argument 128 r = store_id_for_token(data, id, token); in register_ept() 159 static int send(const struct device *instance, void *token, in send() argument 164 icmsg_me_ept_id_t *id = token; in send()
|
/Zephyr-latest/subsys/mgmt/hawkbit/ |
D | Kconfig | 84 bool "Use target security token authentication" 86 Use target security token authentication for the hawkBit DDI API. 89 bool "Use gateway security token authentication" 91 Use gateway security token authentication for the hawkBit DDI API. 96 string "Authentication security token" 100 Authentication security token for the configured hawkBit DDI
|
/Zephyr-latest/scripts/release/ |
D | bug_bash.py | 28 parser.add_argument('-t', '--token', dest='tokenfile', 29 …help='File containing GitHub token (alternatively, use GITHUB_TOKEN env variable)', metavar='FILE') 43 token = file.read() 44 token = token.strip() 48 token = os.environ['GITHUB_TOKEN'] 50 setattr(args, 'token', token) 170 bbt = BugBashTally(Github(args.token), args.start, args.end)
|
/Zephyr-latest/dts/bindings/test/ |
D | vnd,string-array-token.yaml | 4 description: Test string array token property container 6 compatible: "vnd,string-array-token"
|
D | vnd,string-token.yaml | 4 description: Test string token property container 6 compatible: "vnd,string-token"
|
/Zephyr-latest/subsys/ipc/ipc_service/ |
D | ipc_service.c | 87 return backend->register_endpoint(instance, &ept->token, cfg); in ipc_service_register_endpoint() 112 err = backend->deregister_endpoint(ept->instance, ept->token); in ipc_service_deregister_endpoint() 144 return backend->send(ept->instance, ept->token, data, len); in ipc_service_send() 173 return backend->get_tx_buffer_size(ept->instance, ept->token); in ipc_service_get_tx_buffer_size() 202 return backend->get_tx_buffer(ept->instance, ept->token, data, len, wait); in ipc_service_get_tx_buffer() 231 return backend->drop_tx_buffer(ept->instance, ept->token, data); in ipc_service_drop_tx_buffer() 260 return backend->send_nocopy(ept->instance, ept->token, data, len); in ipc_service_send_nocopy() 290 return backend->hold_rx_buffer(ept->instance, ept->token, data); in ipc_service_hold_rx_buffer() 319 return backend->release_rx_buffer(ept->instance, ept->token, data); in ipc_service_release_rx_buffer()
|
/Zephyr-latest/subsys/lorawan/services/ |
D | clock_sync.c | 47 /** Continuously incremented token to map clock sync answers and requests */ 129 uint8_t token = rx_buf[rx_pos++] & 0x0F; in clock_sync_package_callback() local 131 if (token == ctx.req_token) { in clock_sync_package_callback() 136 LOG_DBG("AppTimeAns time_correction %d (token %d)", in clock_sync_package_callback() 137 time_correction, token); in clock_sync_package_callback() 139 LOG_WRN("AppTimeAns with outdated token %d", token); in clock_sync_package_callback() 199 LOG_DBG("Sending clock sync AppTimeReq (token %d)", ctx.req_token); in clock_sync_app_time_req()
|
/Zephyr-latest/include/zephyr/sip_svc/ |
D | sip_svc.h | 56 * @param c_token Client's token 65 * the service will return a token to the client. The client can then 66 * use the token to open the channel on the service and communicate 86 * @param c_token Client's token 107 * @param c_token Client's token 127 * @param c_token Client's token 147 * @param c_token Client's token 171 * @param c_token Client's token
|
/Zephyr-latest/include/zephyr/drivers/firmware/scmi/ |
D | protocol.h | 29 * @param token message token 31 #define SCMI_MESSAGE_HDR_MAKE(id, type, proto, token) \ argument 35 SCMI_FIELD_MAKE(token, GENMASK(9, 0), 18))
|
/Zephyr-latest/subsys/sip_svc/ |
D | sip_svc_shell.c | 56 shell_print(sh, "%s: register success: client token %08x\n", ctrl->method, c_token); in cmd_reg() 87 shell_error(sh, "%s: unregister fail (%d): client token %08x", ctrl->method, err, in cmd_unreg() 90 shell_print(sh, "%s: unregister success: client token %08x", ctrl->method, in cmd_unreg() 141 shell_error(sh, "%s: open fail (%d): client token %08x", ctrl->method, err, in cmd_open() 144 shell_print(sh, "%s: open success: client token %08x", ctrl->method, in cmd_open() 175 shell_error(sh, "%s: close fail (%d): client token %08x", ctrl->method, err, in cmd_close() 178 shell_print(sh, "%s: close success: client token %08x", ctrl->method, in cmd_close() 327 shell_error(sh, "%s: send fail: client token %08x", ctrl->method, in cmd_send() 334 shell_print(sh, "%s: send success: client token %08x, trans_id %d", ctrl->method, in cmd_send() 362 shell_print(sh, "Client Token\tState\tTrans Cnt\n"); in cmd_info() [all …]
|
/Zephyr-latest/tests/subsys/ipc/ipc_service/src/ |
D | backend.c | 27 static int send(const struct device *instance, void *token, in send() argument 46 void **token, in register_ept() argument 56 static int deregister_ept(const struct device *instance, void *token) in deregister_ept() argument
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | coap_server.rst | 84 uint8_t token[COAP_TOKEN_MAX_LEN]; 89 tkl = coap_header_get_token(request, token); 94 coap_packet_init(&response, data, sizeof(data), COAP_VERSION_1, type, tkl, token, 147 uint16_t age, uint16_t id, const uint8_t *token, uint8_t tkl, 165 coap_packet_init(&response, data, sizeof(data), COAP_VERSION_1, type, tkl, token, 193 uint8_t token[COAP_TOKEN_MAX_LEN]; 202 tkl = coap_header_get_token(request, token); 205 id, token, tkl, true); 211 observer->token, observer->tkl, false);
|