Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 69) sorted by relevance

123

/hal_espressif-3.6.0/components/bt/host/bluedroid/api/
Desp_gap_bt_api.c296 esp_err_t esp_bt_gap_pin_reply(esp_bd_addr_t bd_addr, bool accept, uint8_t pin_code_len, esp_bt_pin… in esp_bt_gap_pin_reply() argument
308 arg.pin_reply.accept = accept; in esp_bt_gap_pin_reply()
339 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument
351 arg.passkey_reply.accept = accept; in esp_bt_gap_ssp_passkey_reply()
358 esp_err_t esp_bt_gap_ssp_confirm_reply(esp_bd_addr_t bd_addr, bool accept) in esp_bt_gap_ssp_confirm_reply() argument
370 arg.confirm_reply.accept = accept; in esp_bt_gap_ssp_confirm_reply()
Desp_gap_ble_api.c605 esp_err_t esp_ble_gap_security_rsp(esp_bd_addr_t bd_addr, bool accept) in esp_ble_gap_security_rsp() argument
615 arg.sec_rsp.accept = accept; in esp_ble_gap_security_rsp()
623 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument
633 arg.enc_passkey_replay.accept = accept; in esp_ble_passkey_reply()
641 esp_err_t esp_ble_confirm_reply(esp_bd_addr_t bd_addr, bool accept) in esp_ble_confirm_reply() argument
651 arg.enc_comfirm_replay.accept = accept; in esp_ble_confirm_reply()
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/dm/
Dbta_dm_ci.c72 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) in bta_dm_ci_rmt_oob() argument
79 p_msg->accept = accept; in bta_dm_ci_rmt_oob()
Dbta_dm_api.c606 void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) in BTA_DmPinReply() argument
613 p_msg->accept = accept; in BTA_DmPinReply()
614 if (accept) { in BTA_DmPinReply()
689 void BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) in BTA_DmConfirm() argument
696 p_msg->accept = accept; in BTA_DmConfirm()
712 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument
718 p_msg->accept = accept; in BTA_DmPasskeyReqReply()
1004 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument
1013 p_msg->accept = accept; in BTA_DmBlePasskeyReply()
1015 if (accept) { in BTA_DmBlePasskeyReply()
[all …]
/hal_espressif-3.6.0/components/bt/host/bluedroid/btc/profile/std/include/
Dbtc_gap_bt.h114 bool accept; member
129 bool accept; member
136 bool accept; member
Dbtc_gap_ble.h192 bool accept; member
197 bool accept; member
203 bool accept; member
/hal_espressif-3.6.0/components/bt/host/bluedroid/api/include/api/
Desp_gap_bt_api.h677 esp_err_t esp_bt_gap_pin_reply(esp_bd_addr_t bd_addr, bool accept, uint8_t pin_code_len, esp_bt_pin…
711 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
726 esp_err_t esp_bt_gap_ssp_confirm_reply(esp_bd_addr_t bd_addr, bool accept);
Desp_gap_ble_api.h1677 esp_err_t esp_ble_gap_security_rsp(esp_bd_addr_t bd_addr, bool accept);
1707 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
1720 esp_err_t esp_ble_confirm_reply(esp_bd_addr_t bd_addr, bool accept);
/hal_espressif-3.6.0/components/bt/host/bluedroid/stack/hid/
Dhidd_conn.c156 bool accept = TRUE; // accept by default in hidd_l2cif_connect_ind() local
177 accept = FALSE; in hidd_l2cif_connect_ind()
181 accept = FALSE; in hidd_l2cif_connect_ind()
187 accept = FALSE; in hidd_l2cif_connect_ind()
192 accept = FALSE; in hidd_l2cif_connect_ind()
196 if (!accept) { in hidd_l2cif_connect_ind()
/hal_espressif-3.6.0/
DCONTRIBUTING.rst9 …f - fixing bugs, adding features, adding documentation - are welcome. We accept contributions via …
16 …n Apache License 2.0 compatible Open Source License? If not then we unfortunately cannot accept it.
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/include/bta/
Dbta_dm_ci.h62 extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
Dbta_api.h1869 extern void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len,
1912 extern void BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept);
1924 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey);
2124 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey);
2154 extern void BTA_DmBleConfirmReply(BD_ADDR bd_addr, BOOLEAN accept);
/hal_espressif-3.6.0/examples/protocols/mqtt/tcp/
Dmqtt_tcp_example_test.py32 q,addr = s.accept()
/hal_espressif-3.6.0/components/bt/host/bluedroid/bta/dm/include/
Dbta_dm_int.h381 BOOLEAN accept; member
403 BOOLEAN accept; member
410 BOOLEAN accept; member
429 BOOLEAN accept; member
566 BOOLEAN accept; member
/hal_espressif-3.6.0/examples/bluetooth/nimble/throughput_app/
DREADME.md3 …CLI support to select GATT operation from READ/WRITE/NOTIFY. It can also accept connection paramet…
/hal_espressif-3.6.0/tools/kconfig/
Dqconf.cc299 e->accept(); in keyPressEvent()
717 ev->accept(); in keyPressEvent()
759 ev->accept(); in keyPressEvent()
904 e->accept(); in contextMenuEvent()
1714 e->accept(); in closeEvent()
1725 e->accept(); in closeEvent()
1730 e->accept(); in closeEvent()
/hal_espressif-3.6.0/tools/test_apps/protocols/pppos/
Dapp_test.py92 conn, addr = sock.accept()
/hal_espressif-3.6.0/examples/protocols/sockets/tcp_server/main/
Dtcp_server.c127 int sock = accept(listen_sock, (struct sockaddr *)&source_addr, &addr_len); in tcp_server_task()
/hal_espressif-3.6.0/examples/bluetooth/bluedroid/ble/gatt_security_server/tutorial/
DGatt_Security_Server_Example_Walkthrough.md224 …ich will reply a positive (true) security response to the peer device to accept the request or a n…
228 … /* send the positive (true) security response to the peer device to accept the security request.
229 …If not accept the security request, should send the security response with negative(false) accept
/hal_espressif-3.6.0/examples/bluetooth/bluedroid/ble_50/ble50_security_server/tutorial/
Dble50_security_server_Example_Walkthrough.md224 …ich will reply a positive (true) security response to the peer device to accept the request or a n…
228 … /* send the positive (true) security response to the peer device to accept the security request.
229 …If not accept the security request, should send the security response with negative(false) accept
/hal_espressif-3.6.0/examples/bluetooth/esp_ble_mesh/ble_mesh_coex_test/components/case/
Dwifi_unit.c89 *socket_id = accept(ls_sock, (struct sockaddr *)&sourceAddr, &addrLen); in wifi_unit_server_establish()
/hal_espressif-3.6.0/tools/test_apps/protocols/openssl/
Dapp_test.py73 self.conn, address = self.socket.accept() # accept new connection
/hal_espressif-3.6.0/examples/protocols/sockets/tcp_client/
Dexample_test.py70 conn, address = self.socket.accept() # accept new connection
/hal_espressif-3.6.0/examples/openthread/ot_cli/main/
Desp_ot_tcp_socket.c62 client_sock = accept(listen_sock, (struct sockaddr *)&source_addr, &addr_len); in tcp_socket_server_task()
/hal_espressif-3.6.0/tools/test_idf_monitor/
Drun_test_idf_monitor.py94 (clientsocket, address) = self.serversocket.accept()

123