@@ -48,7 +48,7 @@ static int get_device_ip_address(uint8_t *d4_addr)
4848 LOG_ERR ("Could not get IP addr: %d" , err );
4949 return err ;
5050 }
51- err = inet_pton (AF_INET , buf , d4_addr );
51+ err = zsock_inet_pton (AF_INET , buf , d4_addr );
5252 if (err == 1 ) {
5353 return 0 ;
5454 }
@@ -81,7 +81,7 @@ int nrfc_dtls_setup(int sock)
8181 LOG_DBG ("Setting socket options:" );
8282
8383 LOG_DBG (" hostname: %s" , CONFIG_NRF_CLOUD_COAP_SERVER_HOSTNAME );
84- err = setsockopt (sock , SOL_TLS , TLS_HOSTNAME , CONFIG_NRF_CLOUD_COAP_SERVER_HOSTNAME ,
84+ err = zsock_setsockopt (sock , SOL_TLS , TLS_HOSTNAME , CONFIG_NRF_CLOUD_COAP_SERVER_HOSTNAME ,
8585 sizeof (CONFIG_NRF_CLOUD_COAP_SERVER_HOSTNAME ));
8686 if (err ) {
8787 LOG_ERR ("Error setting hostname: %d" , - errno );
@@ -91,7 +91,7 @@ int nrfc_dtls_setup(int sock)
9191 sectag = nrf_cloud_sec_tag_get ();
9292 LOG_DBG (" sectag: %d" , sectag );
9393
94- err = setsockopt (sock , SOL_TLS , TLS_SEC_TAG_LIST , & sectag , sizeof (sectag ));
94+ err = zsock_setsockopt (sock , SOL_TLS , TLS_SEC_TAG_LIST , & sectag , sizeof (sectag ));
9595 if (err ) {
9696 LOG_ERR ("Error setting sectag list: %d" , - errno );
9797 return - errno ;
@@ -100,7 +100,7 @@ int nrfc_dtls_setup(int sock)
100100 int cid_option = TLS_DTLS_CID_SUPPORTED ;
101101
102102 LOG_DBG (" Enable connection id" );
103- err = setsockopt (sock , SOL_TLS , TLS_DTLS_CID , & cid_option , sizeof (cid_option ));
103+ err = zsock_setsockopt (sock , SOL_TLS , TLS_DTLS_CID , & cid_option , sizeof (cid_option ));
104104 if (!err ) {
105105 cid_supported = true;
106106 } else if ((err != EOPNOTSUPP ) && (err != EINVAL )) {
@@ -114,7 +114,7 @@ int nrfc_dtls_setup(int sock)
114114 int timeout = TLS_DTLS_HANDSHAKE_TIMEO_123S ;
115115
116116 LOG_DBG (" Set handshake timeout %d" , timeout );
117- err = setsockopt (sock , SOL_TLS , TLS_DTLS_HANDSHAKE_TIMEO ,
117+ err = zsock_setsockopt (sock , SOL_TLS , TLS_DTLS_HANDSHAKE_TIMEO ,
118118 & timeout , sizeof (timeout ));
119119 if (!err ) {
120120 } else if ((err != EOPNOTSUPP ) || (err != EINVAL )) {
@@ -124,7 +124,7 @@ int nrfc_dtls_setup(int sock)
124124 int verify = TLS_PEER_VERIFY_REQUIRED ;
125125
126126 LOG_DBG (" Peer verify: %d" , verify );
127- err = setsockopt (sock , SOL_TLS , TLS_PEER_VERIFY , & verify , sizeof (verify ));
127+ err = zsock_setsockopt (sock , SOL_TLS , TLS_PEER_VERIFY , & verify , sizeof (verify ));
128128 if (err ) {
129129 LOG_ERR ("Failed to setup peer verification, errno %d" , - errno );
130130 return - errno ;
@@ -133,15 +133,15 @@ int nrfc_dtls_setup(int sock)
133133 int session_cache = TLS_SESSION_CACHE_ENABLED ;
134134
135135 LOG_DBG (" TLS session cache: %d" , session_cache );
136- err = setsockopt (sock , SOL_TLS , TLS_SESSION_CACHE , & session_cache , sizeof (session_cache ));
136+ err = zsock_setsockopt (sock , SOL_TLS , TLS_SESSION_CACHE , & session_cache , sizeof (session_cache ));
137137 if (err ) {
138138 LOG_ERR ("Failed to enable session cache, errno: %d" , - errno );
139139 err = - errno ;
140140 }
141141
142142 keepopen_supported = false;
143143 if (IS_ENABLED (CONFIG_NRF_CLOUD_COAP_KEEPOPEN )) {
144- err = setsockopt (sock , SOL_SOCKET , SO_KEEPOPEN , & (int ){1 }, sizeof (int ));
144+ err = zsock_setsockopt (sock , SOL_SOCKET , SO_KEEPOPEN , & (int ){1 }, sizeof (int ));
145145 if (err ) {
146146 /* Either not supported or unusable due to unknown error. */
147147 err = 0 ;
@@ -158,7 +158,7 @@ int nrfc_dtls_session_save(int sock)
158158 int err ;
159159
160160 LOG_DBG ("Save DTLS CID session" );
161- err = setsockopt (sock , SOL_TLS , TLS_DTLS_CONN_SAVE , & (int ){0 }, sizeof (int ));
161+ err = zsock_setsockopt (sock , SOL_TLS , TLS_DTLS_CONN_SAVE , & (int ){0 }, sizeof (int ));
162162 if (err ) {
163163 LOG_DBG ("Failed to save DTLS CID session, errno %d" , - errno );
164164 err = - errno ;
@@ -171,7 +171,7 @@ int nrfc_dtls_session_load(int sock)
171171 int err ;
172172
173173 LOG_DBG ("Load DTLS CID session" );
174- err = setsockopt (sock , SOL_TLS , TLS_DTLS_CONN_LOAD , & (int ){1 }, sizeof (int ));
174+ err = zsock_setsockopt (sock , SOL_TLS , TLS_DTLS_CONN_LOAD , & (int ){1 }, sizeof (int ));
175175 if (err ) {
176176 LOG_DBG ("Failed to load DTLS CID session, errno %d" , - errno );
177177 err = - errno ;
@@ -192,7 +192,7 @@ bool nrfc_dtls_cid_is_active(int sock)
192192
193193#if defined(CONFIG_NRF_CLOUD_COAP_LOG_LEVEL_DBG )
194194
195- err = getsockopt (sock , SOL_TLS , TLS_DTLS_HANDSHAKE_STATUS , & status , & len );
195+ err = zsock_getsockopt (sock , SOL_TLS , TLS_DTLS_HANDSHAKE_STATUS , & status , & len );
196196 if (!err ) {
197197 if (len > 0 ) {
198198 if (status == TLS_DTLS_HANDSHAKE_STATUS_FULL ) {
@@ -212,7 +212,7 @@ bool nrfc_dtls_cid_is_active(int sock)
212212#endif /* CONFIG_NRF_CLOUD_COAP_LOG_LEVEL_DBG */
213213
214214 len = sizeof (status );
215- err = getsockopt (sock , SOL_TLS , TLS_DTLS_CID_STATUS , & status , & len );
215+ err = zsock_getsockopt (sock , SOL_TLS , TLS_DTLS_CID_STATUS , & status , & len );
216216 if (!err ) {
217217 if (len > 0 ) {
218218 switch (status ) {
0 commit comments