Home
last modified time | relevance | path

Searched full:peer (Results 1 – 25 of 154) sorted by relevance

1234567

/nrf52832-nimble/packages/NimBLE-latest/apps/blecent/src/
H A Dpeer.c36 static SLIST_HEAD(, peer) peers;
39 peer_svc_find_range(struct peer *peer, uint16_t attr_handle);
41 peer_svc_find(struct peer *peer, uint16_t svc_start_handle,
54 peer_disc_chrs(struct peer *peer);
61 static struct peer *
64 struct peer *peer; in peer_find() local
66 SLIST_FOREACH(peer, &peers, next) { in peer_find()
67 if (peer->conn_handle == conn_handle) { in peer_find()
68 return peer; in peer_find()
76 peer_disc_complete(struct peer *peer, int rc) in peer_disc_complete() argument
[all …]
H A Dblecent.h50 /** Peer. */
73 struct peer;
74 typedef void peer_disc_fn(const struct peer *peer, int status, void *arg);
76 struct peer { struct
77 SLIST_ENTRY(peer) next;
96 peer_dsc_find_uuid(const struct peer *peer, const ble_uuid_t *svc_uuid, argument
99 peer_chr_find_uuid(const struct peer *peer, const ble_uuid_t *svc_uuid,
102 peer_svc_find_uuid(const struct peer *peer, const ble_uuid_t *uuid);
H A Dblecent.c98 * Performs three concurrent GATT operations against the specified peer:
104 * If the peer does not support a required service, characteristic, or
105 * descriptor, then the peer lied when it claimed support for the alert
110 blecent_read_write_subscribe(const struct peer *peer) in blecent_read_write_subscribe() argument
118 chr = peer_chr_find_uuid(peer, in blecent_read_write_subscribe()
122 MODLOG_DFLT(ERROR, "Error: Peer doesn't support the Supported New " in blecent_read_write_subscribe()
127 rc = ble_gattc_read(peer->conn_handle, chr->chr.val_handle, in blecent_read_write_subscribe()
138 chr = peer_chr_find_uuid(peer, in blecent_read_write_subscribe()
142 MODLOG_DFLT(ERROR, "Error: Peer doesn't support the Alert " in blecent_read_write_subscribe()
149 rc = ble_gattc_write_flat(peer->conn_handle, chr->chr.val_handle, in blecent_read_write_subscribe()
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/include/netif/ppp/
H A Dppp.h200 unsigned int auth_required :1; /* Peer is required to authenticate */
220 unsigned int usepeerdns :1; /* Ask peer for DNS adds */
239 …u16_t listen_time; /* time to listen first (ms), waiting for peer to send LCP pac…
253 char remote_name[MAXNAMELEN + 1]; /* Peer's name for authentication */
260 u8_t pap_req_timeout; /* Time to wait for auth-req from peer */
268 u8_t chap_rechallenge_time; /* Time to wait for auth-req from peer */
288 u8_t lcp_loopbackfail; /* Number of times we receive our magic number from the peer
327 unsigned int ask_for_local :1; /* request our address from peer */
344 unsigned int ccp_all_rejected :1; /* we rejected all peer's options */
353 char peer_authname[MAXNAMELEN + 1]; /* The name by which the peer authenticated itself to us. */
[all …]
H A Dipcp.h85 unsigned int req_addr :1; /* Ask peer to send IP address? */
91 unsigned int proxy_arp :1; /* Make proxy ARP entry for peer? */
98 unsigned int accept_local :1; /* accept peer's value for ouraddr */
99 unsigned int accept_remote :1; /* accept peer's value for hisaddr */
101 unsigned int req_dns1 :1; /* Ask peer to send primary DNS address? */
102 unsigned int req_dns2 :1; /* Ask peer to send secondary DNS address? */
H A Dpppol2tp.h180 u16_t our_ns; /* NS to peer */
181 u16_t peer_nr; /* NR from peer */
182 u16_t peer_ns; /* NS from peer */
183 u16_t source_tunnel_id; /* Tunnel ID assigned by peer */
184 u16_t remote_tunnel_id; /* Tunnel ID assigned to peer */
185 u16_t source_session_id; /* Session ID assigned by peer */
186 u16_t remote_session_id; /* Session ID assigned to peer */
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/include/netif/ppp/
H A Dppp.h204 unsigned int auth_required :1; /* Peer is required to authenticate */
224 unsigned int usepeerdns :1; /* Ask peer for DNS adds */
243 …u16_t listen_time; /* time to listen first (ms), waiting for peer to send LCP pac…
257 char remote_name[MAXNAMELEN + 1]; /* Peer's name for authentication */
264 u8_t pap_req_timeout; /* Time to wait for auth-req from peer */
272 u8_t chap_rechallenge_time; /* Time to wait for auth-req from peer */
292 u8_t lcp_loopbackfail; /* Number of times we receive our magic number from the peer
331 unsigned int ask_for_local :1; /* request our address from peer */
348 unsigned int ccp_all_rejected :1; /* we rejected all peer's options */
357 char peer_authname[MAXNAMELEN + 1]; /* The name by which the peer authenticated itself to us. */
[all …]
H A Dipcp.h89 unsigned int req_addr :1; /* Ask peer to send IP address? */
95 unsigned int proxy_arp :1; /* Make proxy ARP entry for peer? */
102 unsigned int accept_local :1; /* accept peer's value for ouraddr */
103 unsigned int accept_remote :1; /* accept peer's value for hisaddr */
105 unsigned int req_dns1 :1; /* Ask peer to send primary DNS address? */
106 unsigned int req_dns2 :1; /* Ask peer to send secondary DNS address? */
H A Dpppol2tp.h184 u16_t our_ns; /* NS to peer */
185 u16_t peer_nr; /* NR from peer */
186 u16_t peer_ns; /* Expected NS from peer */
187 u16_t source_tunnel_id; /* Tunnel ID assigned by peer */
188 u16_t remote_tunnel_id; /* Tunnel ID assigned to peer */
189 u16_t source_session_id; /* Session ID assigned by peer */
190 u16_t remote_session_id; /* Session ID assigned to peer */
/nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/src/netif/ppp/
H A Dauth.c98 /* The name by which the peer authenticated itself to us. */
111 /* List of addresses which the peer may use. */
115 /* Wordlist giving addresses which the peer may use
119 /* Extra options to apply, from the secrets file entry for the peer. */
141 /* Hook for a plugin to say whether we can possibly authenticate any peer */
177 bool auth_required = 0; /* Always require authentication from peer */
178 bool allow_any_ip = 0; /* Allow peer to use any IP address */
180 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
236 "Require PAP authentication from peer", 1, &auth_required },
238 "Require PAP authentication from peer", 1, &auth_required },
[all …]
H A Dipcp.h81 u_int req_addr : 1; /* Ask peer to send IP address? */
83 u_int proxy_arp : 1; /* Make proxy ARP entry for peer? */
86 u_int accept_local : 1; /* accept peer's value for ouraddr */
87 u_int accept_remote : 1; /* accept peer's value for hisaddr */
88 u_int req_dns1 : 1; /* Ask peer to send primary DNS address? */
89 u_int req_dns2 : 1; /* Ask peer to send secondary DNS address? */
H A Dipcp.c74 ipcp_options ipcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
75 ipcp_options ipcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */
89 static int ipcp_ackci (fsm *, u_char *, int); /* Peer ack'd our CI */
90 static int ipcp_nakci (fsm *, u_char *, int); /* Peer nak'd our CI */
91 static int ipcp_rejci (fsm *, u_char *, int); /* Peer rej'd our CI */
111 ipcp_reqci, /* Request peer's Configuration Information */
291 /* Request DNS addresses from the peer */ in ipcp_resetci()
315 * forms because we have received old forms from the peer. in ipcp_cilen()
325 /* keep trying the new style until we see some CI from the peer */ in ipcp_cilen()
328 /* use the old style only if the peer did */ in ipcp_cilen()
[all …]
H A Dchap.h109 int chal_interval; /* Time until we challenge peer again */
123 * Client (peer) states.
127 #define CHAPCS_PENDING 2 /* Auth us to peer when lower up */
137 #define CHAPSS_PENDING 2 /* Auth peer when lower up */
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/include/host/
H A Dble_gap.h130 /** Peer's CCCD subscription state changed due to a descriptor write. */
133 /** Peer's CCCD subscription state cleared due to connection termination. */
137 * Peer's CCCD subscription state changed due to restore from persistence
197 /** Peer identity address */
203 /** Peer over-the-air address */
406 * peer's identity.
423 * peer's identity.
465 * Represents a peer's request to update the connection parameters.
466 * This event is generated when a peer performs any of the following
480 * Indicates the connection parameters that the peer would like to
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/
H A Dauth.c143 /* List of addresses which the peer may use. */
146 /* Wordlist giving addresses which the peer may use
156 /* Extra options to apply, from the secrets file entry for the peer. */
167 /* Hook for a plugin to say whether we can possibly authenticate any peer */
181 /* Hook for a plugin to say if we can possibly authenticate a peer using CHAP */
187 /* Hook for a plugin to say whether it is OK if the peer
201 /* A notifier for when the peer has authenticated itself,
227 bool auth_required = 0; /* Always require authentication from peer */
228 bool allow_any_ip = 0; /* Allow peer to use any IP address */
232 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
[all …]
H A Dipcp.c103 static bool ask_for_local; /* request our address from peer */
116 static int ipcp_ackci(fsm *f, u_char *p, int len); /* Peer ack'd our CI */
117 static int ipcp_nakci(fsm *f, u_char *p, int len, int treat_as_reject);/* Peer nak'd our CI */
118 static int ipcp_rejci(fsm *f, u_char *p, int len); /* Peer rej'd our CI */
131 ipcp_reqci, /* Request peer's Configuration Information */
178 "Accept peer's address for us", 1 },
180 "Accept peer's address for it", 1 },
189 "DNS address for the peer's use" },
191 "Nameserver for SMB over TCP/IP for peer" },
229 "Ask peer for DNS address(es)", 1 },
[all …]
H A Dccp.c466 ppp_notice("Compression disabled by peer."); in ccp_input()
470 lcp_close(pcb, "MPPE disabled by peer"); in ccp_input()
518 * ccp_protrej - peer doesn't talk CCP.
531 ppp_error("MPPE required but peer negotiation failed"); in ccp_protrej()
532 lcp_close(pcb, "MPPE required but peer negotiation failed"); in ccp_protrej()
574 * 'derived from the credentials of the peer that initiated the call', in ccp_resetci()
947 * Peer wants us to use a different strength or other setting. in ccp_nakci()
952 ppp_error("Refusing MPPE stateful mode offered by peer"); in ccp_nakci()
955 /* Peer must have set options we didn't request (suggest) */ in ccp_nakci()
960 ppp_error("MPPE required but peer negotiation failed"); in ccp_nakci()
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/
H A Dauth.c143 /* List of addresses which the peer may use. */
146 /* Wordlist giving addresses which the peer may use
156 /* Extra options to apply, from the secrets file entry for the peer. */
167 /* Hook for a plugin to say whether we can possibly authenticate any peer */
181 /* Hook for a plugin to say if we can possibly authenticate a peer using CHAP */
187 /* Hook for a plugin to say whether it is OK if the peer
201 /* A notifier for when the peer has authenticated itself,
227 bool auth_required = 0; /* Always require authentication from peer */
228 bool allow_any_ip = 0; /* Allow peer to use any IP address */
232 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
[all …]
H A Dipcp.c103 static bool ask_for_local; /* request our address from peer */
116 static int ipcp_ackci(fsm *f, u_char *p, int len); /* Peer ack'd our CI */
117 static int ipcp_nakci(fsm *f, u_char *p, int len, int treat_as_reject);/* Peer nak'd our CI */
118 static int ipcp_rejci(fsm *f, u_char *p, int len); /* Peer rej'd our CI */
131 ipcp_reqci, /* Request peer's Configuration Information */
178 "Accept peer's address for us", 1 },
180 "Accept peer's address for it", 1 },
189 "DNS address for the peer's use" },
191 "Nameserver for SMB over TCP/IP for peer" },
229 "Ask peer for DNS address(es)", 1 },
[all …]
H A Dccp.c466 ppp_notice("Compression disabled by peer."); in ccp_input()
470 lcp_close(pcb, "MPPE disabled by peer"); in ccp_input()
518 * ccp_protrej - peer doesn't talk CCP.
531 ppp_error("MPPE required but peer negotiation failed"); in ccp_protrej()
532 lcp_close(pcb, "MPPE required but peer negotiation failed"); in ccp_protrej()
574 * 'derived from the credentials of the peer that initiated the call', in ccp_resetci()
947 * Peer wants us to use a different strength or other setting. in ccp_nakci()
952 ppp_error("Refusing MPPE stateful mode offered by peer"); in ccp_nakci()
955 /* Peer must have set options we didn't request (suggest) */ in ccp_nakci()
960 ppp_error("MPPE required but peer negotiation failed"); in ccp_nakci()
[all …]
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/
H A Dble_sm_test_util.c555 /* Peer is the initiator so we must be the slave. */ in ble_sm_test_util_init_good()
1584 /* Verify we sent the peer's IRK to the controller. */ in ble_sm_test_util_verify_persist()
1723 * 1: Peer sends a security request at start.
1829 /* Receive a pair request from the peer. */ in ble_sm_test_util_peer_fail_inval()
1885 /* Peer is the initiator so we must be the slave. */ in ble_sm_test_util_peer_lgcy_fail_confirm()
1890 /* Receive a pair request from the peer. */ in ble_sm_test_util_peer_lgcy_fail_confirm()
1900 /* Receive a pair confirm from the peer. */ in ble_sm_test_util_peer_lgcy_fail_confirm()
1910 /* Receive a pair random from the peer. */ in ble_sm_test_util_peer_lgcy_fail_confirm()
1967 /* We are master; peer initiates procedure via security request. */ in ble_sm_test_util_bonding_all()
1980 /* Peer is master; peer initiates procedure. */ in ble_sm_test_util_bonding_all()
[all …]
H A Dble_store_test.c183 /* First two belong to first peer. */ in TEST_CASE()
193 /* Last belongs to second peer. */ in TEST_CASE()
219 /* Delete first peer. */ in TEST_CASE()
223 /* Ensure all traces of first peer have been removed. */ in TEST_CASE()
226 /* Ensure second peer data is still intact. */ in TEST_CASE()
255 /* Delete second peer. */ in TEST_CASE()
259 /* Ensure all traces of first peer have been removed. */ in TEST_CASE()
362 /* First two belong to first peer. */ in TEST_CASE()
372 /* Last belongs to second peer. */ in TEST_CASE()
/nrf52832-nimble/packages/NimBLE-latest/docs/btshell/
H A Dbtshell_api.rst14 characteristics from peer devices. For descriptions of the full API, go to the next sections on
62 assumes you know the address of the peer, either by scanning for available peers or because you hav…
115 Discover and display peer's services, characteristics, and descriptors.
118 This is how you discover and then display the services of the peer you established earlier across c…
132 Read an attribute belonging to the peer
139 Write to an attribute belonging to the peer
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/
H A Dble_store_util.c43 /* Do nothing if this peer is a duplicate. */ in ble_store_util_iter_unique_peer()
63 * Retrieves the set of peer addresses for which a bond has been established.
65 * @param out_peer_id_addrs On success, the set of bonded peer addresses
103 * Deletes all entries from the store that are attached to the specified peer
106 * @param peer_id_addr Entries with this peer address get deleted.
H A Dble_hs_pvcy.c138 * sort it out somehow. For now we set device mode for all of the peer in ble_hs_pvcy_add_entry_hci()
233 * is set to rpa_pub since we use all-zero address as peer addres in in ble_hs_pvcy_set_our_irk()
234 * such case. Peer IRK should be left all-zero since this is not for an in ble_hs_pvcy_set_our_irk()
235 * actual peer. in ble_hs_pvcy_set_our_irk()

1234567