Home
last modified time | relevance | path

Searched refs:sa (Results 1 – 21 of 21) sorted by relevance

/Zephyr-latest/tests/net/socket/tls_ext/src/
Dmain.c155 struct sockaddr_in sa; in server_thread_fn() local
162 memset(&sa, 0, sizeof(sa)); in server_thread_fn()
163 addrlen = sizeof(sa); in server_thread_fn()
167 r = accept(server_fd, (struct sockaddr *)&sa, &addrlen); in server_thread_fn()
172 addrstrp = (char *)inet_ntop(AF_INET, &sa.sin_addr, in server_thread_fn()
177 addrstr, ntohs(sa.sin_port), client_fd); in server_thread_fn()
204 struct sockaddr_in sa; in test_common() local
273 memset(&sa, 0, sizeof(sa)); in test_common()
275 sa.sin_addr.s_addr = INADDR_ANY; in test_common()
276 sa.sin_family = AF_INET; in test_common()
[all …]
/Zephyr-latest/samples/net/sockets/coap_download/src/
Dmain.c52 static void do_coap_download(struct sockaddr *sa) in do_coap_download() argument
66 LOG_INF("Starting CoAP download using %s", (AF_INET == sa->sa_family) ? "IPv4" : "IPv6"); in do_coap_download()
68 sockfd = zsock_socket(sa->sa_family, SOCK_DGRAM, 0); in do_coap_download()
76 ret = coap_client_req(&client, sockfd, sa, &request, NULL); in do_coap_download()
101 struct sockaddr sa; in main() local
104 struct sockaddr_in *addr4 = (struct sockaddr_in *)&sa; in main()
110 do_coap_download(&sa); in main()
114 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&sa; in main()
120 do_coap_download(&sa); in main()
/Zephyr-latest/tests/net/lib/http_server/crime/src/
Dmain.c71 struct sockaddr_in sa; in test_crime() local
80 sa.sin_family = AF_INET; in test_crime()
81 sa.sin_port = htons(SERVER_PORT); in test_crime()
83 ret = zsock_inet_pton(AF_INET, MY_IPV4_ADDR, &sa.sin_addr.s_addr); in test_crime()
89 ptr = (char *)zsock_inet_ntop(AF_INET, &sa.sin_addr, buf, sizeof(buf)); in test_crime()
92 ret = zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)); in test_crime()
/Zephyr-latest/modules/thrift/src/thrift/transport/
DTSSLServerSocket.cpp171 struct sockaddr_storage sa; in listen() local
172 socklen_t len = sizeof(sa); in listen()
173 std::memset(&sa, 0, len); in listen()
174 if (::getsockname(serverSocket_, reinterpret_cast<struct sockaddr *>(&sa), &len) < in listen()
179 if (sa.ss_family == AF_INET6) { in listen()
181 reinterpret_cast<const struct sockaddr_in6 *>(&sa); in listen()
184 const auto *sin = reinterpret_cast<const struct sockaddr_in *>(&sa); in listen()
DTSSLSocket.cpp585 Decision DefaultClientAccessManager::verify(const sockaddr_storage &sa) noexcept in verify() argument
587 (void)sa; in verify()
599 Decision DefaultClientAccessManager::verify(const sockaddr_storage &sa, const char *data, in verify() argument
603 if (sa.ss_family == AF_INET && size == sizeof(in_addr)) { in verify()
604 match = (memcmp(&((sockaddr_in *)&sa)->sin_addr, data, size) == 0); in verify()
605 } else if (sa.ss_family == AF_INET6 && size == sizeof(in6_addr)) { in verify()
606 match = (memcmp(&((sockaddr_in6 *)&sa)->sin6_addr, data, size) == 0); in verify()
DTSSLSocket.h457 Decision verify(const sockaddr_storage &sa) noexcept override;
459 Decision verify(const sockaddr_storage &sa, const char *data, int size) noexcept override;
/Zephyr-latest/tests/net/lib/http_server/tls/src/
Dmain.c135 struct sockaddr_in sa; in test_tls() local
175 sa.sin_family = AF_INET; in test_tls()
176 sa.sin_port = htons(SERVER_PORT); in test_tls()
178 ret = zsock_inet_pton(AF_INET, MY_IPV4_ADDR, &sa.sin_addr.s_addr); in test_tls()
184 ptr = (char *)zsock_inet_ntop(AF_INET, &sa.sin_addr, buf, sizeof(buf)); in test_tls()
187 ret = zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)); in test_tls()
/Zephyr-latest/subsys/net/lib/mqtt_sn/
Dmqtt_sn_transport_udp.c24 static char *get_ip_str(const struct sockaddr *sa, char *s, size_t maxlen) in get_ip_str() argument
26 switch (sa->sa_family) { in get_ip_str()
28 inet_ntop(AF_INET, &(((struct sockaddr_in *)sa)->sin_addr), s, maxlen); in get_ip_str()
32 inet_ntop(AF_INET6, &(((struct sockaddr_in6 *)sa)->sin6_addr), s, maxlen); in get_ip_str()
/Zephyr-latest/subsys/net/lib/http/
Dhttp_server_core.c262 struct sockaddr_storage sa; in accept_new_client() local
264 memset(&sa, 0, sizeof(sa)); in accept_new_client()
265 addrlen = sizeof(sa); in accept_new_client()
267 new_socket = zsock_accept(server_fd, (struct sockaddr *)&sa, &addrlen); in accept_new_client()
275 net_sprint_addr(sa.ss_family, &net_sin((struct sockaddr *)&sa)->sin_addr), in accept_new_client()
276 ntohs(net_sin((struct sockaddr *)&sa)->sin_port)); in accept_new_client()
/Zephyr-latest/drivers/dma/
Ddma_sam_xdmac.h56 uint32_t sa; member
Ddma_sam_xdmac.c148 xdmac->XDMAC_CHID[channel].XDMAC_CSA = param->sa; in sam_xdmac_transfer_configure()
278 transfer_cfg.sa = cfg->head_block->source_address; in sam_xdmac_config()
292 .sa = src, in sam_xdmac_transfer_reload()
Ddma_xilinx_axi_dma.c196 uint32_t sa; member
/Zephyr-latest/tests/net/lib/http_server/core/src/
Dmain.c2158 struct sockaddr_in sa = { 0 }; in ZTEST() local
2161 sa.sin_family = AF_INET; in ZTEST()
2162 sa.sin_port = htons(SERVER_PORT); in ZTEST()
2164 ret = zsock_inet_pton(AF_INET, SERVER_IPV4_ADDR, &sa.sin_addr.s_addr); in ZTEST()
2180 zassert_ok(zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)), in ZTEST()
2196 zassert_ok(zsock_connect(client_fd, (struct sockaddr *)&sa, sizeof(sa)), in ZTEST()
2290 struct sockaddr_in sa; in http_server_tests_before() local
2325 sa.sin_family = AF_INET; in http_server_tests_before()
2326 sa.sin_port = htons(SERVER_PORT); in http_server_tests_before()
2328 ret = zsock_inet_pton(AF_INET, SERVER_IPV4_ADDR, &sa.sin_addr.s_addr); in http_server_tests_before()
[all …]
/Zephyr-latest/subsys/net/lib/dns/
Ddns_sd.c677 struct sockaddr_in sa = { 0 }; in port_in_use() local
679 sa.sin_family = AF_INET; in port_in_use()
680 sa.sin_addr = *addr4; in port_in_use()
683 (struct sockaddr *)&sa); in port_in_use()
690 struct sockaddr_in6 sa = { 0 }; in port_in_use() local
692 sa.sin6_family = AF_INET6; in port_in_use()
693 sa.sin6_addr = *addr6; in port_in_use()
696 (struct sockaddr *)&sa); in port_in_use()
/Zephyr-latest/subsys/net/ip/
Dtcp.c204 ep->sa.sa_family = AF_INET; in tcp_endpoint_set()
228 ep->sa.sa_family = AF_INET6; in tcp_endpoint_set()
277 memcpy(local, &conn->src.sa, newlen); in net_tcp_endpoint_copy()
282 memcpy(peer, &conn->dst.sa, newlen); in net_tcp_endpoint_copy()
784 net_if_addr_unref(conn->iface, conn->src.sa.sa_family, in tcp_conn_release()
785 conn->src.sa.sa_family == AF_INET ? in tcp_conn_release()
2208 return !memcmp(ep, &ep_tmp, tcp_endpoint_len(ep->sa.sa_family)); in tcp_endpoint_cmp()
2424 net_sprint_addr(conn->src.sa.sa_family, in tcp_conn_new()
2426 net_sprint_addr(conn->dst.sa.sa_family, in tcp_conn_new()
2498 net_if_addr_ref(conn->iface, conn->dst.sa.sa_family, in tcp_conn_new()
[all …]
Dtcp_private.h220 struct sockaddr sa; member
/Zephyr-latest/subsys/net/lib/tftp/
Dtftp_client.c14 #define ADDRLEN(sa) \ argument
15 (sa.sa_family == AF_INET ? \
/Zephyr-latest/drivers/wifi/nrf_wifi/src/
Dwpa_supp_if.c289 memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in nrf_wifi_wpa_supp_event_proc_auth_resp()
392 event.deauth_info.addr = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_deauth()
428 event.disassoc_info.addr = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_disassoc()
1362 event.unprot_deauth.sa = &mgmt->sa[0]; in nrf_wifi_wpa_supp_event_proc_unprot_mgmt()
/Zephyr-latest/modules/hostap/src/
Dsupp_main.c615 os_free((char *)data->unprot_deauth.sa); in event_socket_handler()
618 os_free((char *)data->unprot_disassoc.sa); in event_socket_handler()
/Zephyr-latest/drivers/ethernet/dwc_xgmac/
Deth_dwc_xgmac.c415 bool sa) in dwxgmac_set_mac_addr_by_idx() argument
428 reg_val |= CORE_MAC_ADDRESSx_HIGH_SA_SET(sa); in dwxgmac_set_mac_addr_by_idx()
/Zephyr-latest/doc/_static/css/
Dcustom.css452 .highlight .sa /* Literal.String.Affix */,