/Zephyr-latest/tests/net/lib/dns_packet/src/ |
D | main.c | 87 /* Authoritative Answer must be 0 for a Query */ in eval_query() 129 /* Answer counter must be 0 */ in eval_query() 185 /* DNS answer TTL size */ 201 /* answer counter */ 203 /* answer TTL */ 246 /* Authoritative Answer */ in eval_response1() 288 /* Answer counter */ in eval_response1() 440 * Answer type: RR A 441 * Answer counter: 1 492 * Answer is for a.www.wireshark.org for testing purposes. [all …]
|
/Zephyr-latest/subsys/net/lib/dns/ |
D | dns_pack.c | 81 static int skip_fqdn(uint8_t *answer, int buf_sz) in skip_fqdn() argument 90 if (answer[i] == 0) { in skip_fqdn() 93 } else if (answer[i] >= 0xc0) { in skip_fqdn() 99 } else if (answer[i] < DNS_LABEL_MAX_SIZE) { in skip_fqdn() 100 i += answer[i] + 1; in skip_fqdn() 116 uint8_t *answer; in dns_unpack_answer() local 118 answer = dns_msg->msg + dns_msg->answer_offset; in dns_unpack_answer() 120 dname_len = skip_fqdn(answer, in dns_unpack_answer() 128 * to contain the answer. in dns_unpack_answer() 133 * So, answer size >= 12 in dns_unpack_answer() [all …]
|
D | dns_pack.h | 139 …* | AA | 10 | 1 | Answer Authenticated / Answer Authoritative. 0 := Not Authenticated, 1 := Authen… 146 /** Answer count */ 300 static inline int dns_answer_type(uint16_t dname_size, uint8_t *answer) in dns_answer_type() argument 303 return ntohs(UNALIGNED_GET((uint16_t *)(answer + dname_size + 0))); in dns_answer_type() 306 static inline int dns_answer_class(uint16_t dname_size, uint8_t *answer) in dns_answer_class() argument 309 return ntohs(UNALIGNED_GET((uint16_t *)(answer + dname_size + 2))); in dns_answer_class() 312 static inline int dns_answer_ttl(uint16_t dname_size, uint8_t *answer) in dns_answer_ttl() argument 314 return ntohl(UNALIGNED_GET((uint32_t *)(answer + dname_size + 4))); in dns_answer_ttl() 318 uint8_t *answer) in dns_answer_rdlength() argument 320 return ntohs(UNALIGNED_GET((uint16_t *)(answer + dname_size + 8))); in dns_answer_rdlength() [all …]
|
D | resolve.c | 750 /* index that points to the current answer being analyzed */ in dns_validate_msg() 811 * answer starts immediately after the header. in dns_validate_msg() 817 * on reply, we need to figure out the answer in order to find in dns_validate_msg() 940 /* Update the answer offset to point to the next RR (answer) */ in dns_validate_msg() 1082 * hash checker can find it later when we get the answer. in dns_write()
|
D | Kconfig | 43 generate when the RR ANSWER only contains CNAME(s).
|
D | dispatcher.c | 80 /* So this was an answer to a query that was made by resolver. in dns_dispatch()
|
D | mdns_responder.c | 182 flags |= BIT(10); /* Authoritative Answer */ in setup_dns_hdr() 251 * query buffer has to get enough free space: dns_hdr + answer in create_answer()
|
/Zephyr-latest/drivers/interrupt_controller/ |
D | Kconfig.shared_irq | 12 support is NOT required in most systems. If in doubt answer no.
|
/Zephyr-latest/tests/bsim/bluetooth/audio/src/ |
D | tbs_test.c | 208 printk("Test answer & terminate successful\n"); in test_answer_terminate() 272 FAIL("Could not answer first call: %d\n", err); in test_join() 289 FAIL("Could not answer second call: %d\n", err); in test_join() 424 FAIL("Remote could not answer call: %d\n", err); in test_main() 439 FAIL("Remote could not answer call: %d\n", err); in test_main()
|
/Zephyr-latest/samples/bluetooth/mtu_update/ |
D | README.rst | 12 | Answer: To get an ATT MTU of x octets, do the following: 25 Answer: Yes. [#mtu_exchange]_ The Bluetooth specification mandates a symmetric MTU for ATT.
|
/Zephyr-latest/dts/bindings/watchdog/ |
D | nxp,fs26-wdog.yaml | 55 This mode is based on a question/answer process with the microcontroller.
|
/Zephyr-latest/drivers/watchdog/ |
D | wdt_nxp_fs26.c | 255 * @brief Calculate watchdog answer based on received token 257 * @return answer value to write to FS_WD_ANSWER 283 uint16_t answer; in fs26_wd_refresh() local 288 LOG_ERR("Failed to write answer"); in fs26_wd_refresh() 302 answer = fs26_wd_compute_answer(data->token); in fs26_wd_refresh() 303 if (fs26_setreg(&config->spi, FS26_FS_WD_ANSWER, answer)) { in fs26_wd_refresh() 304 LOG_ERR("Failed to write answer"); in fs26_wd_refresh()
|
/Zephyr-latest/drivers/timer/ |
D | native_posix_timer.c | 103 * instantaneous answer.
|
/Zephyr-latest/drivers/video/ |
D | video_common.c | 150 __ASSERT(false, "invalid answer from the queried video device"); in video_closest_frmival()
|
/Zephyr-latest/include/zephyr/drivers/timer/ |
D | system_timer.h | 108 * instantaneous answer.
|
/Zephyr-latest/subsys/lorawan/services/ |
D | clock_sync.c | 119 /* answer from application server */ in clock_sync_package_callback()
|
/Zephyr-latest/samples/subsys/ipc/ipc_service/static_vrings/remote/src/ |
D | main.c | 206 * This will only support a synchronous request-answer mechanism. For in ipc1_ept_recv()
|
/Zephyr-latest/samples/subsys/ipc/ipc_service/static_vrings/src/ |
D | main.c | 204 * This will only support a synchronous request-answer mechanism. For in ipc1_ept_recv()
|
/Zephyr-latest/drivers/sensor/ti/ina3221/ |
D | ina3221.c | 75 LOG_ERR("No answer from sensor."); in ina3221_init()
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | tbs_internal.h | 92 return "remote answer"; in bt_tbs_opcode_str()
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/audio/ |
D | ccp.rst | 191 remote_answer :Simulate remote answer outgoing call <call_index>
|
/Zephyr-latest/drivers/sensor/ams/tmd2620/ |
D | tmd2620.c | 176 /* trying to read the id twice, as the sensor does not answer the first request */ in tmd2620_sensor_setup()
|
/Zephyr-latest/include/zephyr/drivers/ |
D | w1.h | 177 * Connected slaves answer with a presence pulse once they are ready 187 * @retval 0 If no slaves answer with a present pulse.
|
/Zephyr-latest/drivers/serial/ |
D | uart_hostlink.c | 54 uint32_t buf_addr; /* Address for host to write answer. */
|
/Zephyr-latest/doc/build/dts/ |
D | phandles.rst | 192 enforced. To answer this question, we'll need to introduce a concept called
|