/Zephyr-latest/tests/net/socket/tls_ext/src/ |
D | main.c | 155 struct sockaddr_in sa; in server_thread_fn() local 162 memset(&sa, 0, sizeof(sa)); in server_thread_fn() 163 addrlen = sizeof(sa); in server_thread_fn() 167 r = accept(server_fd, (struct sockaddr *)&sa, &addrlen); in server_thread_fn() 172 addrstrp = (char *)inet_ntop(AF_INET, &sa.sin_addr, in server_thread_fn() 177 addrstr, ntohs(sa.sin_port), client_fd); in server_thread_fn() 204 struct sockaddr_in sa; in test_common() local 273 memset(&sa, 0, sizeof(sa)); in test_common() 275 sa.sin_addr.s_addr = INADDR_ANY; in test_common() 276 sa.sin_family = AF_INET; in test_common() [all …]
|
/Zephyr-latest/samples/net/sockets/coap_download/src/ |
D | main.c | 52 static void do_coap_download(struct sockaddr *sa) in do_coap_download() argument 66 LOG_INF("Starting CoAP download using %s", (AF_INET == sa->sa_family) ? "IPv4" : "IPv6"); in do_coap_download() 68 sockfd = zsock_socket(sa->sa_family, SOCK_DGRAM, 0); in do_coap_download() 76 ret = coap_client_req(&client, sockfd, sa, &request, NULL); in do_coap_download() 101 struct sockaddr sa; in main() local 104 struct sockaddr_in *addr4 = (struct sockaddr_in *)&sa; in main() 110 do_coap_download(&sa); in main() 114 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&sa; in main() 120 do_coap_download(&sa); in main()
|
/Zephyr-latest/tests/net/lib/http_server/crime/src/ |
D | main.c | 71 struct sockaddr_in sa; in test_crime() local 80 sa.sin_family = AF_INET; in test_crime() 81 sa.sin_port = htons(SERVER_PORT); in test_crime() 83 ret = zsock_inet_pton(AF_INET, MY_IPV4_ADDR, &sa.sin_addr.s_addr); in test_crime() 89 ptr = (char *)zsock_inet_ntop(AF_INET, &sa.sin_addr, buf, sizeof(buf)); in test_crime() 92 ret = zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)); in test_crime()
|
/Zephyr-latest/modules/thrift/src/thrift/transport/ |
D | TSSLServerSocket.cpp | 171 struct sockaddr_storage sa; in listen() local 172 socklen_t len = sizeof(sa); in listen() 173 std::memset(&sa, 0, len); in listen() 174 if (::getsockname(serverSocket_, reinterpret_cast<struct sockaddr *>(&sa), &len) < in listen() 179 if (sa.ss_family == AF_INET6) { in listen() 181 reinterpret_cast<const struct sockaddr_in6 *>(&sa); in listen() 184 const auto *sin = reinterpret_cast<const struct sockaddr_in *>(&sa); in listen()
|
D | TSSLSocket.cpp | 585 Decision DefaultClientAccessManager::verify(const sockaddr_storage &sa) noexcept in verify() argument 587 (void)sa; in verify() 599 Decision DefaultClientAccessManager::verify(const sockaddr_storage &sa, const char *data, in verify() argument 603 if (sa.ss_family == AF_INET && size == sizeof(in_addr)) { in verify() 604 match = (memcmp(&((sockaddr_in *)&sa)->sin_addr, data, size) == 0); in verify() 605 } else if (sa.ss_family == AF_INET6 && size == sizeof(in6_addr)) { in verify() 606 match = (memcmp(&((sockaddr_in6 *)&sa)->sin6_addr, data, size) == 0); in verify()
|
D | TSSLSocket.h | 457 Decision verify(const sockaddr_storage &sa) noexcept override; 459 Decision verify(const sockaddr_storage &sa, const char *data, int size) noexcept override;
|
/Zephyr-latest/tests/net/lib/http_server/tls/src/ |
D | main.c | 135 struct sockaddr_in sa; in test_tls() local 175 sa.sin_family = AF_INET; in test_tls() 176 sa.sin_port = htons(SERVER_PORT); in test_tls() 178 ret = zsock_inet_pton(AF_INET, MY_IPV4_ADDR, &sa.sin_addr.s_addr); in test_tls() 184 ptr = (char *)zsock_inet_ntop(AF_INET, &sa.sin_addr, buf, sizeof(buf)); in test_tls() 187 ret = zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)); in test_tls()
|
/Zephyr-latest/subsys/net/lib/mqtt_sn/ |
D | mqtt_sn_transport_udp.c | 24 static char *get_ip_str(const struct sockaddr *sa, char *s, size_t maxlen) in get_ip_str() argument 26 switch (sa->sa_family) { in get_ip_str() 28 inet_ntop(AF_INET, &(((struct sockaddr_in *)sa)->sin_addr), s, maxlen); in get_ip_str() 32 inet_ntop(AF_INET6, &(((struct sockaddr_in6 *)sa)->sin6_addr), s, maxlen); in get_ip_str()
|
/Zephyr-latest/subsys/net/lib/http/ |
D | http_server_core.c | 262 struct sockaddr_storage sa; in accept_new_client() local 264 memset(&sa, 0, sizeof(sa)); in accept_new_client() 265 addrlen = sizeof(sa); in accept_new_client() 267 new_socket = zsock_accept(server_fd, (struct sockaddr *)&sa, &addrlen); in accept_new_client() 275 net_sprint_addr(sa.ss_family, &net_sin((struct sockaddr *)&sa)->sin_addr), in accept_new_client() 276 ntohs(net_sin((struct sockaddr *)&sa)->sin_port)); in accept_new_client()
|
/Zephyr-latest/drivers/dma/ |
D | dma_sam_xdmac.h | 56 uint32_t sa; member
|
D | dma_sam_xdmac.c | 148 xdmac->XDMAC_CHID[channel].XDMAC_CSA = param->sa; in sam_xdmac_transfer_configure() 278 transfer_cfg.sa = cfg->head_block->source_address; in sam_xdmac_config() 292 .sa = src, in sam_xdmac_transfer_reload()
|
D | dma_xilinx_axi_dma.c | 196 uint32_t sa; member
|
/Zephyr-latest/tests/net/lib/http_server/core/src/ |
D | main.c | 2158 struct sockaddr_in sa = { 0 }; in ZTEST() local 2161 sa.sin_family = AF_INET; in ZTEST() 2162 sa.sin_port = htons(SERVER_PORT); in ZTEST() 2164 ret = zsock_inet_pton(AF_INET, SERVER_IPV4_ADDR, &sa.sin_addr.s_addr); in ZTEST() 2180 zassert_ok(zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)), in ZTEST() 2196 zassert_ok(zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)), in ZTEST() 2290 struct sockaddr_in sa; in http_server_tests_before() local 2325 sa.sin_family = AF_INET; in http_server_tests_before() 2326 sa.sin_port = htons(SERVER_PORT); in http_server_tests_before() 2328 ret = zsock_inet_pton(AF_INET, SERVER_IPV4_ADDR, &sa.sin_addr.s_addr); in http_server_tests_before() [all …]
|
/Zephyr-latest/subsys/net/lib/dns/ |
D | dns_sd.c | 677 struct sockaddr_in sa = { 0 }; in port_in_use() local 679 sa.sin_family = AF_INET; in port_in_use() 680 sa.sin_addr = *addr4; in port_in_use() 683 (struct sockaddr *)&sa); in port_in_use() 690 struct sockaddr_in6 sa = { 0 }; in port_in_use() local 692 sa.sin6_family = AF_INET6; in port_in_use() 693 sa.sin6_addr = *addr6; in port_in_use() 696 (struct sockaddr *)&sa); in port_in_use()
|
/Zephyr-latest/subsys/net/ip/ |
D | tcp.c | 204 ep->sa.sa_family = AF_INET; in tcp_endpoint_set() 228 ep->sa.sa_family = AF_INET6; in tcp_endpoint_set() 277 memcpy(local, &conn->src.sa, newlen); in net_tcp_endpoint_copy() 282 memcpy(peer, &conn->dst.sa, newlen); in net_tcp_endpoint_copy() 784 net_if_addr_unref(conn->iface, conn->src.sa.sa_family, in tcp_conn_release() 785 conn->src.sa.sa_family == AF_INET ? in tcp_conn_release() 2208 return !memcmp(ep, &ep_tmp, tcp_endpoint_len(ep->sa.sa_family)); in tcp_endpoint_cmp() 2424 net_sprint_addr(conn->src.sa.sa_family, in tcp_conn_new() 2426 net_sprint_addr(conn->dst.sa.sa_family, in tcp_conn_new() 2498 net_if_addr_ref(conn->iface, conn->dst.sa.sa_family, in tcp_conn_new() [all …]
|
D | tcp_private.h | 220 struct sockaddr sa; member
|
/Zephyr-latest/subsys/net/lib/tftp/ |
D | tftp_client.c | 14 #define ADDRLEN(sa) \ argument 15 (sa.sa_family == AF_INET ? \
|
/Zephyr-latest/drivers/wifi/nrf_wifi/src/ |
D | wpa_supp_if.c | 289 memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in nrf_wifi_wpa_supp_event_proc_auth_resp() 392 event.deauth_info.addr = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_deauth() 428 event.disassoc_info.addr = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_disassoc() 1362 event.unprot_deauth.sa = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_unprot_mgmt()
|
/Zephyr-latest/modules/hostap/src/ |
D | supp_main.c | 615 os_free((char *)data->unprot_deauth.sa); in event_socket_handler() 618 os_free((char *)data->unprot_disassoc.sa); in event_socket_handler()
|
/Zephyr-latest/drivers/ethernet/dwc_xgmac/ |
D | eth_dwc_xgmac.c | 415 bool sa) in dwxgmac_set_mac_addr_by_idx() argument 428 reg_val |= CORE_MAC_ADDRESSx_HIGH_SA_SET(sa); in dwxgmac_set_mac_addr_by_idx()
|
/Zephyr-latest/doc/_static/css/ |
D | custom.css | 452 .highlight .sa /* Literal.String.Affix */,
|