/Zephyr-latest/tests/net/lib/lwm2m/interop/pytest/ |
D | test_portfolio.py | 29 resp = leshan.discover(endpoint, '16/0') 31 missing_keys = [key for key in expected_keys if key not in resp.keys()] 33 assert int(resp['/16/0/0']['dim']) == 4 39 resp = leshan.discover(endpoint, '16/1') 40 assert int(resp['/16/1/0']['dim']) == 2 41 resp = leshan.read(endpoint, '16') 50 assert resp == expected 57 resp = leshan.discover(endpoint, '16') 59 missing_keys = [key for key in expected_keys if key not in resp.keys()] 62 resp = leshan.discover(endpoint, '16') [all …]
|
D | test_lwm2m.py | 99 def verify_device_object(resp): argument 101 assert resp[0][0] == 'Zephyr' 102 assert resp[0][1] == 'client-1' 103 assert resp[0][2] == 'serial-1' 104 assert resp[0][3] == '1.2.3' 105 assert resp[0][11][0] == 0 106 assert resp[0][16] == 'U' 122 resp = leshan.read(endpoint,'3/0') 123 verify_device_object(resp) 130 resp = leshan.read(endpoint, '3/0') [all …]
|
D | leshan.py | 30 resp = self.get('/security/clients') 31 if not isinstance(resp, list): 37 def handle_response(resp: requests.models.Response): 50 if resp.status_code >= 300 or resp.status_code < 200: 52 if len(resp.text): 53 obj = json.loads(resp.text) 62 resp = self._s.get(f'{self.api_url}{path}', params=params, timeout=self.timeout) 63 return Leshan.handle_response(resp) 67 …resp = self._s.put(f'{self.api_url}{path}', data=data, headers=headers, params=params, timeout=sel… 68 return Leshan.handle_response(resp) [all …]
|
D | test_bootstrap.py | 104 resp = leshan.get(f'/clients/{endpoint}') 105 assert resp["secure"]
|
/Zephyr-latest/samples/drivers/ipm/ipm_esp32/remote/src/ |
D | main.c | 14 static char resp[64]; variable 37 snprintf(resp, sizeof(resp), "APP_CPU uptime ticks %lli\n", k_uptime_ticks()); in main() 38 ipm_send(ipm_dev, -1, sizeof(resp), &resp, sizeof(resp)); in main()
|
/Zephyr-latest/tests/net/lib/dns_packet/src/ |
D | main.c | 218 static int eval_response1(struct dns_response_test *resp, bool unpack_answer) in eval_response1() argument 220 uint8_t *ptr = resp->res; in eval_response1() 224 if (resp->res_len < RESPONSE_MIN_SIZE) { in eval_response1() 229 if (dns_unpack_header_id(resp->res) != resp->tid) { in eval_response1() 235 if (dns_header_qr(resp->res) != DNS_RESPONSE) { in eval_response1() 241 if (dns_header_opcode(resp->res) != DNS_QUERY) { in eval_response1() 247 if (dns_header_aa(resp->res) != 0) { in eval_response1() 253 if (dns_header_tc(resp->res) != 0) { in eval_response1() 259 if (dns_header_rd(resp->res) != resp->rd) { in eval_response1() 265 if (dns_header_ra(resp->res) != resp->ra) { in eval_response1() [all …]
|
/Zephyr-latest/subsys/net/lib/ptp/ |
D | port.c | 220 struct ptp_msg *resp = ptp_msg_alloc(); in port_sync_timestamp_cb() local 222 if (!resp) { in port_sync_timestamp_cb() 226 resp->header.type_major_sdo_id = PTP_MSG_FOLLOW_UP; in port_sync_timestamp_cb() 227 resp->header.version = PTP_VERSION; in port_sync_timestamp_cb() 228 resp->header.msg_length = sizeof(struct ptp_follow_up_msg); in port_sync_timestamp_cb() 229 resp->header.domain_number = dds->domain; in port_sync_timestamp_cb() 230 resp->header.flags[1] = tpds->flags; in port_sync_timestamp_cb() 231 resp->header.src_port_id = port->port_ds.id; in port_sync_timestamp_cb() 232 resp->header.sequence_id = port->seq_id.sync++; in port_sync_timestamp_cb() 233 resp->header.log_msg_interval = port->port_ds.log_sync_interval; in port_sync_timestamp_cb() [all …]
|
/Zephyr-latest/scripts/west_commands/fetchers/ |
D | http.py | 19 resp = requests.get(url) 20 open(path, "wb").write(resp.content)
|
/Zephyr-latest/tests/drivers/sdhc/src/ |
D | main.c | 147 int ret, resp; in ZTEST() local 181 resp = cmd.response[1]; in ZTEST() 183 resp = cmd.response[0]; in ZTEST() 185 if ((resp & 0xFF) == check_pattern) { in ZTEST() 190 } else if (resp & 0x4) { in ZTEST()
|
/Zephyr-latest/modules/hostap/src/ |
D | supp_api.c | 851 struct add_network_resp resp = {0}; in wpas_add_and_config_network() local 873 ret = z_wpa_ctrl_add_network(&resp); in wpas_add_and_config_network() 879 wpa_printf(MSG_DEBUG, "NET added: %d", resp.network_id); in wpas_add_and_config_network() 882 if (!wpa_cli_cmd_v("set_network %d mode 2", resp.network_id)) { in wpas_add_and_config_network() 896 resp.network_id, ssid_null_terminated)) { in wpas_add_and_config_network() 900 if (!wpa_cli_cmd_v("set_network %d scan_ssid 1", resp.network_id)) { in wpas_add_and_config_network() 904 if (!wpa_cli_cmd_v("set_network %d key_mgmt NONE", resp.network_id)) { in wpas_add_and_config_network() 908 if (!wpa_cli_cmd_v("set_network %d ieee80211w 0", resp.network_id)) { in wpas_add_and_config_network() 919 if (!wpa_cli_cmd_v("set_network %d scan_freq%s", resp.network_id, in wpas_add_and_config_network() 953 resp.network_id)) { in wpas_add_and_config_network() [all …]
|
/Zephyr-latest/scripts/west_commands/zspdx/ |
D | getincludes.py | 43 def extractIncludes(resp): argument 56 for rline in resp.splitlines():
|
/Zephyr-latest/subsys/sd/ |
D | sd.c | 45 uint32_t resp; in sd_send_interface_condition() local 67 resp = cmd.response[1]; in sd_send_interface_condition() 69 resp = cmd.response[0]; in sd_send_interface_condition() 71 if ((resp & 0xFF) != SD_IF_COND_CHECK) { in sd_send_interface_condition() 76 if ((resp & SD_IF_COND_VHS_MASK) != SD_IF_COND_VHS_3V3) { in sd_send_interface_condition()
|
/Zephyr-latest/scripts/west_commands/ |
D | sdk.py | 241 resp = requests.get(url, headers=req_headers, params=params) 242 if resp.status_code != 200: 245 data = resp.json() 294 resp = requests.get(sha256_url, headers=req_headers, stream=True) 295 if resp.status_code != 200: 298 sha256 = self.minimal_sdk_sha256(resp.content.decode("UTF-8"), target_release) 302 resp = requests.get(archive_url, headers=req_headers, stream=True) 303 if resp.status_code != 200: 313 total_length = int(resp.headers["Content-Length"]) 316 for chunk in resp.iter_content(chunk_size=8192):
|
/Zephyr-latest/samples/net/cloud/tagoio_http_post/src/ |
D | sockets.h | 12 uint8_t resp[TAGOIO_SOCKET_MAX_BUF_LEN]; member
|
D | sockets.c | 117 req.recv_buf = ctx->resp; in tagoio_http_push() 118 req.recv_buf_len = sizeof(ctx->resp); in tagoio_http_push()
|
/Zephyr-latest/subsys/net/l2/ethernet/gptp/ |
D | gptp_messages.c | 406 struct net_pkt *resp) in gptp_prepare_pdelay_follow_up() argument 408 struct net_if *iface = net_pkt_iface(resp); in gptp_prepare_pdelay_follow_up() 429 pdelay_resp = GPTP_PDELAY_RESP(resp); in gptp_prepare_pdelay_follow_up() 430 resp_hdr = GPTP_HDR(resp); in gptp_prepare_pdelay_follow_up() 662 struct gptp_pdelay_resp *resp; in gptp_handle_pdelay_resp() local 666 resp = GPTP_PDELAY_RESP(pkt); in gptp_handle_pdelay_resp() 677 if (memcmp(default_ds->clk_id, resp->requesting_port_id.clk_id, in gptp_handle_pdelay_resp() 689 if (resp->requesting_port_id.port_number != htons(port)) { in gptp_handle_pdelay_resp() 882 struct gptp_pdelay_resp *resp; in gptp_send_pdelay_resp() local 890 resp = GPTP_PDELAY_RESP(pkt); in gptp_send_pdelay_resp() [all …]
|
D | gptp_md.c | 308 struct gptp_pdelay_resp *resp; in gptp_md_compute_prop_time() local 333 resp = GPTP_PDELAY_RESP(pkt); in gptp_md_compute_prop_time() 335 t2_ns = ((uint64_t)ntohs(resp->req_receipt_ts_secs_high)) << 32; in gptp_md_compute_prop_time() 336 t2_ns |= ntohl(resp->req_receipt_ts_secs_low); in gptp_md_compute_prop_time() 338 t2_ns += ntohl(resp->req_receipt_ts_nsecs); in gptp_md_compute_prop_time()
|
D | gptp_messages.h | 382 struct net_pkt *resp);
|
/Zephyr-latest/subsys/bluetooth/host/classic/ |
D | at.h | 97 at_resp_cb_t resp; member 103 void at_register(struct at_client *at, at_resp_cb_t resp,
|
D | at.c | 219 if (at->resp) { in at_state_process_cmd() 220 at->resp(at, buf); in at_state_process_cmd() 221 at->resp = NULL; in at_state_process_cmd() 532 void at_register(struct at_client *at, at_resp_cb_t resp, at_finish_cb_t finish) in at_register() argument 534 at->resp = resp; in at_register()
|
/Zephyr-latest/drivers/sip_svc/ |
D | sip_smc_intel_socfpga.c | 137 uint32_t *resp = (uint32_t *)buf; in intel_sip_smc_plat_async_res_res() local 143 *trans_id = SIP_SVC_MB_HEADER_GET_TRANS_ID(resp[0]); in intel_sip_smc_plat_async_res_res() 145 *size = (SIP_SVC_MB_HEADER_GET_LENGTH(resp[0]) + 1) * 4; in intel_sip_smc_plat_async_res_res()
|
/Zephyr-latest/drivers/sdhc/ |
D | sdhc_spi.c | 544 uint8_t token, resp; in sdhc_spi_write_data() local 587 &resp, sizeof(resp)); in sdhc_spi_write_data() 592 if ((resp & 0xF) != SD_SPI_RESPONSE_ACCEPTED) { in sdhc_spi_write_data() 593 if ((resp & 0xF) == SD_SPI_RESPONSE_CRC_ERR) { in sdhc_spi_write_data() 595 } else if ((resp & 0xF) == SD_SPI_RESPONSE_WRITE_ERR) { in sdhc_spi_write_data() 598 LOG_DBG("Unknown write response token 0x%x", resp); in sdhc_spi_write_data()
|
/Zephyr-latest/tests/lib/notify/src/ |
D | main.c | 25 int *resp) in callback() argument 27 zassert_equal(sys_notify_fetch_result(anp, resp), 0, in callback()
|
/Zephyr-latest/subsys/net/l2/wifi/ |
D | wifi_shell.c | 366 const struct wifi_twt_params *resp = in handle_wifi_twt_event() local 370 if (resp->operation == WIFI_TWT_TEARDOWN) { in handle_wifi_twt_event() 371 if (resp->teardown_status == WIFI_TWT_TEARDOWN_SUCCESS) { in handle_wifi_twt_event() 373 resp->flow_id); in handle_wifi_twt_event() 376 resp->flow_id); in handle_wifi_twt_event() 381 if (resp->resp_status == WIFI_TWT_RESP_RECEIVED) { in handle_wifi_twt_event() 383 wifi_twt_setup_cmd_txt(resp->setup_cmd)); in handle_wifi_twt_event() 385 print_twt_params(resp->dialog_token, in handle_wifi_twt_event() 386 resp->flow_id, in handle_wifi_twt_event() 387 resp->negotiation_type, in handle_wifi_twt_event() [all …]
|
/Zephyr-latest/scripts/west_commands/runners/ |
D | core.py | 951 resp = sock.recv(2048) 952 if resp: 953 print(resp.decode())
|