/hal_espressif-3.6.0/components/bt/host/bluedroid/api/ |
D | esp_gap_bt_api.c | 296 esp_err_t esp_bt_gap_pin_reply(esp_bd_addr_t bd_addr, bool accept, uint8_t pin_code_len, esp_bt_pin… in esp_bt_gap_pin_reply() argument 308 arg.pin_reply.accept = accept; in esp_bt_gap_pin_reply() 339 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument 351 arg.passkey_reply.accept = accept; in esp_bt_gap_ssp_passkey_reply() 358 esp_err_t esp_bt_gap_ssp_confirm_reply(esp_bd_addr_t bd_addr, bool accept) in esp_bt_gap_ssp_confirm_reply() argument 370 arg.confirm_reply.accept = accept; in esp_bt_gap_ssp_confirm_reply()
|
D | esp_gap_ble_api.c | 605 esp_err_t esp_ble_gap_security_rsp(esp_bd_addr_t bd_addr, bool accept) in esp_ble_gap_security_rsp() argument 615 arg.sec_rsp.accept = accept; in esp_ble_gap_security_rsp() 623 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument 633 arg.enc_passkey_replay.accept = accept; in esp_ble_passkey_reply() 641 esp_err_t esp_ble_confirm_reply(esp_bd_addr_t bd_addr, bool accept) in esp_ble_confirm_reply() argument 651 arg.enc_comfirm_replay.accept = accept; in esp_ble_confirm_reply()
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/dm/ |
D | bta_dm_ci.c | 72 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) in bta_dm_ci_rmt_oob() argument 79 p_msg->accept = accept; in bta_dm_ci_rmt_oob()
|
D | bta_dm_api.c | 606 void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) in BTA_DmPinReply() argument 613 p_msg->accept = accept; in BTA_DmPinReply() 614 if (accept) { in BTA_DmPinReply() 689 void BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) in BTA_DmConfirm() argument 696 p_msg->accept = accept; in BTA_DmConfirm() 712 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument 718 p_msg->accept = accept; in BTA_DmPasskeyReqReply() 1004 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument 1013 p_msg->accept = accept; in BTA_DmBlePasskeyReply() 1015 if (accept) { in BTA_DmBlePasskeyReply() [all …]
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/btc/profile/std/include/ |
D | btc_gap_bt.h | 114 bool accept; member 129 bool accept; member 136 bool accept; member
|
D | btc_gap_ble.h | 192 bool accept; member 197 bool accept; member 203 bool accept; member
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/api/include/api/ |
D | esp_gap_bt_api.h | 677 esp_err_t esp_bt_gap_pin_reply(esp_bd_addr_t bd_addr, bool accept, uint8_t pin_code_len, esp_bt_pin… 711 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey); 726 esp_err_t esp_bt_gap_ssp_confirm_reply(esp_bd_addr_t bd_addr, bool accept);
|
D | esp_gap_ble_api.h | 1677 esp_err_t esp_ble_gap_security_rsp(esp_bd_addr_t bd_addr, bool accept); 1707 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey); 1720 esp_err_t esp_ble_confirm_reply(esp_bd_addr_t bd_addr, bool accept);
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/stack/hid/ |
D | hidd_conn.c | 156 bool accept = TRUE; // accept by default in hidd_l2cif_connect_ind() local 177 accept = FALSE; in hidd_l2cif_connect_ind() 181 accept = FALSE; in hidd_l2cif_connect_ind() 187 accept = FALSE; in hidd_l2cif_connect_ind() 192 accept = FALSE; in hidd_l2cif_connect_ind() 196 if (!accept) { in hidd_l2cif_connect_ind()
|
/hal_espressif-3.6.0/ |
D | CONTRIBUTING.rst | 9 …f - fixing bugs, adding features, adding documentation - are welcome. We accept contributions via … 16 …n Apache License 2.0 compatible Open Source License? If not then we unfortunately cannot accept it.
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/include/bta/ |
D | bta_dm_ci.h | 62 extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
|
D | bta_api.h | 1869 extern void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, 1912 extern void BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept); 1924 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey); 2124 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey); 2154 extern void BTA_DmBleConfirmReply(BD_ADDR bd_addr, BOOLEAN accept);
|
/hal_espressif-3.6.0/examples/protocols/mqtt/tcp/ |
D | mqtt_tcp_example_test.py | 32 q,addr = s.accept()
|
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/dm/include/ |
D | bta_dm_int.h | 381 BOOLEAN accept; member 403 BOOLEAN accept; member 410 BOOLEAN accept; member 429 BOOLEAN accept; member 566 BOOLEAN accept; member
|
/hal_espressif-3.6.0/examples/bluetooth/nimble/throughput_app/ |
D | README.md | 3 …CLI support to select GATT operation from READ/WRITE/NOTIFY. It can also accept connection paramet…
|
/hal_espressif-3.6.0/tools/kconfig/ |
D | qconf.cc | 299 e->accept(); in keyPressEvent() 717 ev->accept(); in keyPressEvent() 759 ev->accept(); in keyPressEvent() 904 e->accept(); in contextMenuEvent() 1714 e->accept(); in closeEvent() 1725 e->accept(); in closeEvent() 1730 e->accept(); in closeEvent()
|
/hal_espressif-3.6.0/tools/test_apps/protocols/pppos/ |
D | app_test.py | 92 conn, addr = sock.accept()
|
/hal_espressif-3.6.0/examples/protocols/sockets/tcp_server/main/ |
D | tcp_server.c | 127 int sock = accept(listen_sock, (struct sockaddr *)&source_addr, &addr_len); in tcp_server_task()
|
/hal_espressif-3.6.0/examples/bluetooth/bluedroid/ble/gatt_security_server/tutorial/ |
D | Gatt_Security_Server_Example_Walkthrough.md | 224 …ich will reply a positive (true) security response to the peer device to accept the request or a n… 228 … /* send the positive (true) security response to the peer device to accept the security request. 229 …If not accept the security request, should send the security response with negative(false) accept …
|
/hal_espressif-3.6.0/examples/bluetooth/bluedroid/ble_50/ble50_security_server/tutorial/ |
D | ble50_security_server_Example_Walkthrough.md | 224 …ich will reply a positive (true) security response to the peer device to accept the request or a n… 228 … /* send the positive (true) security response to the peer device to accept the security request. 229 …If not accept the security request, should send the security response with negative(false) accept …
|
/hal_espressif-3.6.0/examples/bluetooth/esp_ble_mesh/ble_mesh_coex_test/components/case/ |
D | wifi_unit.c | 89 *socket_id = accept(ls_sock, (struct sockaddr *)&sourceAddr, &addrLen); in wifi_unit_server_establish()
|
/hal_espressif-3.6.0/tools/test_apps/protocols/openssl/ |
D | app_test.py | 73 self.conn, address = self.socket.accept() # accept new connection
|
/hal_espressif-3.6.0/examples/protocols/sockets/tcp_client/ |
D | example_test.py | 70 conn, address = self.socket.accept() # accept new connection
|
/hal_espressif-3.6.0/examples/openthread/ot_cli/main/ |
D | esp_ot_tcp_socket.c | 62 client_sock = accept(listen_sock, (struct sockaddr *)&source_addr, &addr_len); in tcp_socket_server_task()
|
/hal_espressif-3.6.0/tools/test_idf_monitor/ |
D | run_test_idf_monitor.py | 94 (clientsocket, address) = self.serversocket.accept()
|