Home
last modified time | relevance | path

Searched refs:client (Results 1 – 25 of 39) sorted by relevance

12

/net-tools-3.5.0/
DMakefile1 all: tunslip6 echo-client echo-server monitor_15_4 coap-client dtls-client dtls-server throughput-c…
6 echo-client: echo-client.o
7 $(CC) -o $@ $(CFLAGS) $(LIBS) echo-client.c
12 throughput-client: throughput-client.o
13 $(CC) -o $@ $(CFLAGS) $(LIBS) throughput-client.c
36 dtls-client.o: dtls-client.c
37 $(CC) -c -o $@ $(CFLAGS) $(MBEDTLS_CFLAGS) dtls-client.c
39 dtls-client: dtls-client.o $(MBEDTLS_LIB)
40 $(CC) -o $@ $(LIBS) dtls-client.o $(MBEDTLS_LIB)
66 coap-client.o: coap-client.c libcoap tinydtls
[all …]
Dzephyr-websocket-server.py11 def new_client(client, server): argument
12 print("New client connected and was given id %d" % client['id'])
16 def client_left(client, server): argument
17 print("Client(%d) disconnected" % client['id'])
20 def message_received(client, server, message): argument
21 print("Client(%d) sent[%d]" % (client['id'], len(message)))
22 server.send_message(client, message)
Dstunnel_sc.conf13 ; *:4243 - Listen unencrypted traffic from localhost (client)
15 [echo-client-ipv4]
19 cert = client.crt
21 client = yes
24 [echo-client-ipv6]
28 cert = client.crt
30 client = yes
Dstunnel.conf14 ; *:4243 - Listen unencrypted traffic from localhost (client)
17 [echo-client-ipv6]
23 client = yes
26 [echo-client-ipv4]
32 client = yes
39 client = no
46 client = no
DREADME.legacy103 echo-client
106 echo-client is a tool that is run in Linux host side and
108 application that is running in qemu side. This client
118 $ ./echo-client 2001:db8::2
123 $ ./echo-client -i tun0 ff84::2
130 which waits UDP data sent by echo-client application that
135 host firewall is not blocking the packets that the echo-client
143 dtls-client
146 dtls-client is a tool that is run in Linux host side and
154 $ make dtls-client
[all …]
D.gitignore14 coap-client
15 coap-client.o
60 libcoap/examples/coap-client
63 libcoap/examples/coap-client.5
64 libcoap/examples/coap-client.txt
99 tinydtls-0.8.2/tests/dtls-client
DREADME.docker45 * Execute tests like echo-client
47 docker container exec net-tools /net-tools/echo-client 2001:db8::1
48 docker container exec net-tools /net-tools/echo-client -t 2001:db8::1
49 docker container exec net-tools /net-tools/echo-client 192.0.2.1
50 docker container exec net-tools /net-tools/echo-client -t 192.0.2.1
DREADME.md53 If your have echo-server running in the Qemu, then you can use the echo-client
56 # ./echo-client -i tap0 2001:db8::1
137 And connect echo-client to this SSL tunnel (note that the IP address
140 $ ./echo-client -p 4243 2001:db8::2 -t
142 If you are running echo-client in Zephyr QEMU, then run echo-server like
148 If you want to re-create the certificates in echo-server and echo-client in
151 echo-client sample sources):
158 echo-client, can be generated like this:
172 net samples and echo-client in net-tools, then they can be created like this
174 in echo-server and echo-client sources):
[all …]
/net-tools-3.5.0/python-websocket-server/tests/
Dtest_text_messages.py6 client, server = session
8 assert client.recv() == '$'
12 client, server = session
17 assert client.recv() == msg
21 client, server = session
26 assert client.recv() == msg
30 client, server = session
35 assert client.recv() == msg
39 client, server = session
45 assert client.recv() == msg
[all …]
/net-tools-3.5.0/python-websocket-server/
Dserver.py4 def new_client(client, server): argument
5 print("New client connected and was given id %d" % client['id'])
10 def client_left(client, server): argument
11 print("Client(%d) disconnected" % client['id'])
15 def message_received(client, server, message): argument
18 print("Client(%d) said: %s" % (client['id'], message))
DREADME.md36 Then just open `client.html` in your browser and you should be able to send and receive messages.
67 | clients | A list of `client` |
74 | `set_fn_new_client()` | Sets a callback function that will be called for every new `client`…
75 | `set_fn_client_left()` | Sets a callback function that will be called for every `client` dis…
76 | `set_fn_message_received()` | Sets a callback function that will be called when a `client` sends …
77 … | Sends a `message` to a specific `client`. The message is a simple string. …
85 | `set_fn_new_client()` | Called for every new `client` connecting to us | client, server …
86 | `set_fn_client_left()` | Called for every `client` disconnecting from us | client, server …
87 | `set_fn_message_received()` | Called when a `client` sends a `message` | client, server,…
90 The client passed to the callback is the client that left, sent the message, etc. The server might …
[all …]
Dtox.ini5 websocket-client
/net-tools-3.5.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_ecjpake.data4 ECJPAKE round one: client, valid
112 ECJPAKE round two client: valid
115 ECJPAKE round two client: trailing byte
118 ECJPAKE round two client: no data
121 ECJPAKE round two client: ECParams too short
124 ECJPAKE round two client: ECParams not named curve
127 ECJPAKE round two client: ECParams wrong curve
130 ECJPAKE round two client: no data after ECParams
133 ECJPAKE round two client: length of first point too small
136 ECJPAKE round two client: length of first point too big
[all …]
/net-tools-3.5.0/python-websocket-server/websocket_server/
Dwebsocket_server.py66 def new_client(self, client, server): argument
69 def client_left(self, client, server): argument
72 def message_received(self, client, server, message): argument
84 def send_message(self, client, msg): argument
85 self._unicast_(client, msg)
137 client = {
142 self.clients.append(client)
143 self.new_client(client, self)
146 client = self.handler_to_client(handler)
147 self.client_left(client, self)
[all …]
/net-tools-3.5.0/tinydtls-0.8.2/examples/contiki/
DMakefile.in28 DTLS_SOURCES:=dtls-server.c dtls-client.c
31 all: dtls-server dtls-client
34 $(MAKE) $(MAKEFLAGS) ROLE=client dtls-client
41 ifneq ($(ROLE),client)
/net-tools-3.5.0/libcoap/examples/
Dcoap-client.txt.in4 coap-client(5)
7 :man source: coap-client
9 :man manual: coap-client Manual
13 coap-client - CoAP Client based on libcoap
17 *coap-client* [*-A* type1, _type2_ ,...] [*-t* type] [*-b* [num,]size]
24 *coap-client* is a CoAP client to communicate with 6LoWPAN devices via
27 coap-client was built with support for secure communication). The URI's
42 option in its response to a GET request, coap-client will automatically
112 coap-client coap://coap.me
118 coap-client -m get coap://[::1]/
[all …]
DMakefile.am15 bin_PROGRAMS = coap-client coap-server coap-rd
17 coap_client_SOURCES = client.c coap_list.c
30 TXT5 = coap-client.txt \
Detsi_coaptest.sh6 COAP_CLIENT=./coap-client
/net-tools-3.5.0/docker/
DDockerfile18 make tunslip6 && make echo-client && \
19 make echo-server && make throughput-client && \
20 make coap-client
39 install -s -m755 /mosquitto/client/mosquitto_pub \
41 install -s -m755 /mosquitto/client/mosquitto_rr \
43 install -s -m755 /mosquitto/client/mosquitto_sub \
61 # Simple Python based HTTP server for http-client API testing
Ddanted.conf7 client pass {
/net-tools-3.5.0/libcoap/
D.gitignore46 examples/coap-client
49 examples/coap-client.5
50 examples/coap-client.txt
DREADME19 sockets. The examples directory contains a client and a server to
/net-tools-3.5.0/mbedtls-2.4.0/tests/
DDescriptions.txt15 version, both ways (client/server), using client authentication or not.
/net-tools-3.5.0/tinydtls-0.8.2/tests/
DMakefile.in39 dtls-client.c
/net-tools-3.5.0/mbedtls-2.4.0/
DChangeLog62 * Fix compatibility issue with Internet Explorer client authentication,
63 where the limited hash choices prevented the client from sending its
234 * Fix potential heap buffer overflow in servers that perform client
236 unless you allow third parties to pick trust CAs for client auth.
256 * Fix possible client-side NULL pointer dereference (read) when the client
269 * When a client initiates a reconnect from the same port as a live
308 * Fix memory corruption on client with overlong PSK identity, around
580 * Fix bug related to ssl_set_curves(): the client didn't check that the
611 client certificate) (found using Codenomicon Defensics).
613 (TLS server is not affected if it doesn't ask for a client certificate)
[all …]

12