/Zephyr-latest/samples/net/sockets/echo_server/src/ |
D | tcp.c | 147 client = data->tcp.accepted[slot].sock; in handle_data() 151 data->tcp.accepted[slot].recv_buffer + offset, in handle_data() 152 sizeof(data->tcp.accepted[slot].recv_buffer) - offset, in handle_data() 174 if (offset == sizeof(data->tcp.accepted[slot].recv_buffer) || in handle_data() 176 data->tcp.accepted[slot].recv_buffer + offset, in handle_data() 177 sizeof(data->tcp.accepted[slot].recv_buffer) - in handle_data() 183 data->tcp.accepted[slot].recv_buffer, in handle_data() 194 if (++data->tcp.accepted[slot].counter % 1000 == 0U) { in handle_data() 196 data->tcp.accepted[slot].counter); in handle_data() 209 data->tcp.accepted[slot].sock = -1; in handle_data() [all …]
|
D | common.h | 57 } accepted[CONFIG_NET_SAMPLE_NUM_HANDLERS]; member
|
/Zephyr-latest/samples/net/sockets/dumb_http_server_mt/src/ |
D | main.c | 253 static int get_free_slot(int *accepted) in get_free_slot() argument 258 if (accepted[i] < 0) { in get_free_slot() 266 static int process_tcp(int *sock, int *accepted) in process_tcp() argument 282 slot = get_free_slot(accepted); in process_tcp() 289 accepted[slot] = client; in process_tcp() 299 &accepted[slot], in process_tcp() 314 &accepted[slot], in process_tcp()
|
/Zephyr-latest/doc/templates/ |
D | board.tmpl | 8 are also accepted.
|
/Zephyr-latest/samples/net/lwm2m_client/ |
D | Kconfig | 39 Only accepted protocols are "coap://" and "coaps://"
|
/Zephyr-latest/samples/bluetooth/peripheral_accept_list/ |
D | README.rst | 13 accepted if the central device is on the accept list. Additionally, scan response
|
/Zephyr-latest/doc/services/ |
D | notify.rst | 28 accepted from userspace callers.
|
/Zephyr-latest/samples/tfm_integration/ |
D | tfm_integration.rst | 19 images to be verified and either accepted or rejected during the image
|
/Zephyr-latest/subsys/mgmt/mcumgr/grp/shell_mgmt/ |
D | Kconfig | 30 Note that maximum length of shell command accepted is regulated by
|
/Zephyr-latest/subsys/bluetooth/host/classic/ |
D | Kconfig | 23 prompt "Minimum encryption key size accepted in octets" if !BT_SMP_SC_ONLY 27 This option sets the minimum encryption key size accepted during pairing
|
/Zephyr-latest/subsys/net/l2/ppp/ |
D | Kconfig | 37 int "Maximum number of NACK loops accepted"
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | ieee802154.rst | 26 were accepted into the standard, namely IEEE 802.15.4g (SUN FSK) and IEEE
|
/Zephyr-latest/doc/safety/ |
D | safety_requirements.rst | 120 * Other formats are accepted as long as the characteristics of a requirement from above are met.
|
/Zephyr-latest/doc/contribute/ |
D | external.rst | 14 process in order to determine whether it will be accepted. These will be 59 Committee and evaluated carefully before the external source code is accepted 163 and accepted by the Technical Steering Committee (TSC) and, in some cases, by
|
D | bin_blobs.rst | 119 be unconditionally accepted by the project; any blob may be rejected for other 233 reviewed and accepted by the Technical Steering Committee (TSC). This process is
|
D | guidelines.rst | 13 be accepted quickly in the codebase. 467 For examples of accepted commit messages, you can refer to the Zephyr GitHub 864 #. While you're waiting for your pull request to be accepted and merged, you 969 successfully accepted into the project. Providing the following information 1069 devel@lists.zephyrproject.org about the RFC if it is accepted by the
|
/Zephyr-latest/doc/services/resource_management/ |
D | index.rst | 57 responsible for recording whether their requests were accepted, and for
|
/Zephyr-latest/doc/build/kconfig/ |
D | extensions.rst | 80 The wildcard patterns accepted are the same as for the Python `glob
|
/Zephyr-latest/doc/security/ |
D | secure-coding.rst | 57 widely accepted principles for protection mechanisms are defined to 63 security measures, publicly accepted cryptographic algorithms and 180 to determine if they are valid before they are accepted; this
|
D | security-overview.rst | 86 3. Once accepted, these changes will become part of the document. 278 accepted principles for protection mechanisms are defined to prevent 284 security measures, publicly accepted cryptographic algorithms and 353 Based on these design principles and commonly accepted best practices, a
|
/Zephyr-latest/subsys/canbus/isotp/ |
D | Kconfig | 60 By default, received CAN frames with or without padding are accepted.
|
/Zephyr-latest/doc/develop/west/ |
D | why.rst | 112 - **Conservative about features**: no features will be accepted without
|
/Zephyr-latest/share/zephyr-package/cmake/ |
D | ZephyrConfigVersion.cmake | 19 …message("\n The following Zephyr repository configuration file were considered but not accepted:")
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/audio/ |
D | ccp.rst | 231 Incoming call from a peer device, accepted by client:
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | l2cap.c | 1056 bool accepted; in le_conn_param_update_req() local 1088 accepted = le_param_req(conn, ¶m); in le_conn_param_update_req() 1091 if (accepted) { in le_conn_param_update_req() 1099 if (accepted) { in le_conn_param_update_req()
|