/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_l2c.c | 37 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason); 38 static void smp_data_ind (BD_ADDR bd_addr, BT_HDR *p_buf); 76 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason) argument 83 if (memcmp(bd_addr, p_cb->pairing_bda, BD_ADDR_LEN) == 0) 86 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8) + bd_addr[3], 87 (bd_addr[4]<<8)+bd_addr[ 124 smp_data_ind(BD_ADDR bd_addr, BT_HDR *p_buf) argument [all...] |
H A D | smp_api.c | 123 ** Parameters bd_addr - peer device bd address. 128 tSMP_STATUS SMP_Pair (BD_ADDR bd_addr) argument 143 memcpy (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN); 145 if (!L2CA_ConnectFixedChnl (L2CAP_SMP_CID, bd_addr)) 163 ** Parameters bd_addr - peer device bd address. 168 BOOLEAN SMP_PairCancel (BD_ADDR bd_addr) argument 176 (!memcmp (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN)) ) 192 ** Parameters bd_addr - peer device bd address. 199 void SMP_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 204 memcmp (smp_cb.pairing_bda, bd_addr, BD_ADDR_LE 223 SMP_PasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 279 SMP_OobDataReply(BD_ADDR bd_addr, tSMP_STATUS res, UINT8 len, UINT8 *p_data) argument [all...] |
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_dev.c | 48 ** Parameters: bd_addr - BD address of the peer 59 BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, argument 67 p_dev_rec = btm_find_dev (bd_addr); 81 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 82 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr); 140 bd_addr[0], bd_addr[1], bd_addr[2], 141 bd_addr[ 171 BTM_SecDeleteDevice(BD_ADDR bd_addr) argument 202 BTM_SecReadDevName(BD_ADDR bd_addr) argument 223 btm_sec_alloc_dev(BD_ADDR bd_addr) argument 319 btm_dev_support_switch(BD_ADDR bd_addr) argument 395 btm_find_dev(BD_ADDR bd_addr) argument 422 btm_find_or_alloc_dev(BD_ADDR bd_addr) argument [all...] |
H A D | btm_ble.c | 42 extern void gatt_notify_enc_cmpl(BD_ADDR bd_addr); 55 ** Parameters: bd_addr - BD address of the peer 63 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type, argument 72 p_dev_rec = btm_find_dev (bd_addr); 90 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 91 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr); 126 p_info = BTM_InqDbRead(bd_addr); 147 ** Parameters: bd_addr - BD address of the peer 154 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALU argument 347 BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 370 BTM_BlePasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 400 BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data) argument 483 BTM_BleSetPrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout) argument 681 btm_ble_check_link_type(BD_ADDR bd_addr) argument 744 btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ) argument 773 btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types) argument 795 btm_get_local_div(BD_ADDR bd_addr, UINT16 *p_div) argument 830 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument 962 btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size) argument 983 btm_ble_read_sec_key_size(BD_ADDR bd_addr) argument 1004 btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument 1094 btm_ble_set_encryption(BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role) argument 1228 btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable) argument 1529 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data) argument 1640 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument 1761 BTM_BleVerifySignature(BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter, UINT8 *p_comp) argument [all...] |
H A D | btm_ble_int.h | 176 BD_ADDR bd_addr; member in struct:__anon1098 265 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act); 267 extern UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data); 268 extern tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role); 271 extern void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable); 278 extern void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ); 279 extern BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div); 280 extern BOOLEAN btm_ble_check_link_type (BD_ADDR bd_addr); 281 extern BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types); 284 extern void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYP [all...] |
H A D | btm_sec.c | 44 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr); 71 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, 265 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags) argument 269 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL) 855 ** Parameters: bd_addr - Address of the device for which PIN was requested 862 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 876 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0) 882 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL) 902 btsnd_hcic_pin_code_neg_reply (bd_addr); 925 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr)) 982 BTM_DeviceAuthorized(BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[]) argument 1048 BTM_SecBond(BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 1263 BTM_SecBondCancel(BD_ADDR bd_addr) argument 1389 BTM_SecGetDeviceLinkKey(BD_ADDR bd_addr, LINK_KEY link_key) argument 1428 BTM_SetEncryption(BD_ADDR bd_addr, tBTM_SEC_CBACK *p_callback, void *p_ref_data) argument 1555 BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr) argument 1603 BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument 1671 BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type) argument 1695 BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 1746 BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 1950 BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id) argument 2082 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2404 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2827 btm_sec_abort_access_req(BD_ADDR bd_addr) argument 3163 BD_ADDR bd_addr; /* peer address */ local 3948 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ; local 5454 BTM_ReadTrustedMask(BD_ADDR bd_addr) argument 5667 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument [all...] |
H A D | btm_ble_bgconn.c | 69 BOOLEAN btm_update_dev_to_white_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument 73 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr); 95 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 97 started = btsnd_hcic_ble_add_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 99 if (memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0 && 107 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 109 started = btsnd_hcic_ble_remove_from_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 119 BTM_ReadDevInfo(bd_addr, &dev_type, &addr_type); 121 started = btsnd_hcic_ble_add_white_list (addr_type, bd_addr); 123 started = btsnd_hcic_ble_remove_from_white_list (addr_type, bd_addr); 218 btm_update_bg_conn_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 *p_attr_tag) argument [all...] |
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_dm_ci.h | 48 BTA_API extern void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 62 BTA_API extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
|
H A D | bta_dm_co.h | 64 ** Parameters bd_addr - The peer device 72 BTA_API extern void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, 83 ** Parameters bd_addr - The peer device 91 BTA_API extern void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 101 ** Parameters bd_addr - The peer device 107 BTA_API extern void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ); 132 ** Parameters bd_addr - The peer device 137 BTA_API extern void bta_dm_co_rmt_oob(BD_ADDR bd_addr); 213 ** Parameters bd_addr - The peer device 224 BTA_API extern void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CA [all...] |
H A D | bta_pan_api.h | 79 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon835 88 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon836 179 BTA_API void BTA_PanOpen(BD_ADDR bd_addr, tBTA_PAN_ROLE local_role, tBTA_PAN_ROLE peer_role);
|
H A D | bta_api.h | 272 BD_ADDR bd_addr; /* BD address of device to filter. */ member in union:__anon630 409 typedef void (tBTA_DM_BLE_RSSI_CBACK) (BD_ADDR bd_addr, tBTA_DM_BLE_RSSI_ALERT_TYPE alert_type, INT8 rssi); 514 BD_ADDR bd_addr; /* BD address of local device. */ member in struct:__anon645 521 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon646 611 BD_ADDR bd_addr; /* peer address */ member in struct:__anon649 617 BD_ADDR bd_addr; /* peer address */ member in struct:__anon650 625 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon651 642 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon652 653 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon653 659 BD_ADDR bd_addr; /* B member in struct:__anon654 667 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon655 674 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon656 729 BD_ADDR bd_addr; /* peer address */ member in struct:__anon658 753 BD_ADDR bd_addr; /* peer address */ member in struct:__anon660 761 BD_ADDR bd_addr; /* peer address */ member in struct:__anon661 771 BD_ADDR bd_addr; /* peer address */ member in struct:__anon662 827 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon665 852 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon667 860 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon668 876 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon669 [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 71 BD_ADDR bd_addr; member in struct:__anon964 103 BD_ADDR bd_addr; member in struct:__anon967 124 static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr); 126 static void btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, 141 extern int btif_hh_connect(bt_bdaddr_t *bd_addr); 240 bdcpy(remote_bdaddr.address, p_search_data->inq_res.bd_addr); 292 static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state) argument 304 HAL_CBACK(bt_hal_cbacks, bond_state_changed_cb, status, bd_addr, state); 309 bdcpy(pairing_cb.bd_addr, bd_addr 353 btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, DEV_CLASS dev_class, tBT_DEVICE_TYPE device_type) argument 446 remove_hid_bond(bt_bdaddr_t *bd_addr) argument 466 btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr) argument 511 btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr) argument 626 bt_bdaddr_t bd_addr; local 706 bt_bdaddr_t bd_addr; local 770 bt_bdaddr_t bd_addr; local 808 bt_bdaddr_t bd_addr; local 1080 bt_bdaddr_t bd_addr; local 1165 bt_bdaddr_t bd_addr; local 1211 bt_bdaddr_t bd_addr; local 1777 btif_dm_create_bond(const bt_bdaddr_t *bd_addr) argument 1801 btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr) argument 1867 btif_dm_remove_bond(const bt_bdaddr_t *bd_addr) argument 1888 btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, uint8_t pin_len, bt_pin_code_t *pin_code) argument 1934 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument 2159 btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) argument 2217 bt_bdaddr_t bd_addr; local 2250 bt_bdaddr_t bd_addr; local 2331 bt_bdaddr_t bd_addr; local 2384 bt_bdaddr_t bd_addr; local 2404 bt_bdaddr_t bd_addr; local 2446 bt_bdaddr_t bd_addr; local 2466 btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type) argument 2526 bt_bdaddr_t bd_addr; local [all...] |
H A D | btif_hh.c | 153 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 158 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 279 bda = (BD_ADDR*) (&p_dev->bd_addr); 374 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) argument 379 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 395 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) argument 400 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 416 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) argument 437 btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) argument 507 btif_hh_remove_device(bt_bdaddr_t bd_addr) argument 590 btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) argument 625 btif_hh_connect(bt_bdaddr_t *bd_addr) argument 694 btif_hh_disconnect(bt_bdaddr_t *bd_addr) argument 1117 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; local 1231 connect( bt_bdaddr_t *bd_addr) argument 1284 virtual_unplug(bt_bdaddr_t *bd_addr) argument 1318 set_info(bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) argument 1371 get_idle_time(bt_bdaddr_t *bd_addr) argument 1404 set_idle_time(bt_bdaddr_t *bd_addr, uint8_t idle_time) argument 1439 get_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1472 set_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1516 get_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) argument 1562 set_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) argument 1634 send_data(bt_bdaddr_t *bd_addr, char* data) argument [all...] |
H A D | btif_gatt_util.c | 48 BD_ADDR bd_addr; member in struct:__anon976 59 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 270 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result); 272 static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr) argument 277 if (bd_addr == NULL) 282 if (p_link->in_use && (!memcmp(p_link->bd_addr, bd_addr, BD_ADDR_LEN))) 288 static BOOLEAN btif_gatt_add_encrypted_link (BD_ADDR bd_addr) argument 293 if (bd_addr == NULL) 296 if (btif_gatt_is_link_encrypted(bd_addr)) 312 btif_gatt_remove_encrypted_link(BD_ADDR bd_addr) argument 330 btif_gatt_set_encryption_cb(BD_ADDR bd_addr, tBTA_STATUS result) argument 344 btif_gatt_check_encrypted_link(BD_ADDR bd_addr) argument [all...] |
H A D | btif_sock.c | 44 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, 122 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, argument 125 if((uuid == NULL && channel <= 0) || bd_addr == NULL || sock_fd == NULL) 127 BTIF_TRACE_ERROR4("invalid parameters, bd_addr:%p, uuid:%p, channel:%d, sock_fd:%p", 128 bd_addr, uuid, channel, sock_fd); 136 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags);
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_ci.c | 46 void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, argument 55 bdcpy(p_msg->bd_addr, bd_addr); 74 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 81 bdcpy(p_msg->bd_addr, bd_addr);
|
H A D | bta_dm_api.c | 438 void BTA_DmDiscover(BD_ADDR bd_addr, tBTA_SERVICE_MASK services, argument 448 bdcpy(p_msg->bd_addr, bd_addr); 468 void BTA_DmDiscoverUUID(BD_ADDR bd_addr, tSDP_UUID *uuid, argument 476 bdcpy(p_msg->bd_addr, bd_addr); 501 BOOLEAN BTA_DmIsMaster(BD_ADDR bd_addr) argument 506 BTM_GetRole(bd_addr, &link_role); 526 void BTA_DmBond(BD_ADDR bd_addr) argument 533 bdcpy(p_msg->bd_addr, bd_add 551 BTA_DmBondCancel(BD_ADDR bd_addr) argument 576 BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) argument 608 BTA_DmLinkPolicy(BD_ADDR bd_addr, tBTA_DM_LP_MASK policy_mask, BOOLEAN set) argument 656 BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) argument 680 BTA_DmPasskeyCancel(BD_ADDR bd_addr) argument 706 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 756 BTA_DmRemoveDevice(BD_ADDR bd_addr) argument 787 BTA_DmAddDevWithName(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 839 BTA_DmAuthorizeReply(BD_ADDR bd_addr, tBTA_SERVICE_ID service, tBTA_AUTH_RESP response) argument 1254 BTA_DmAddBleKey(BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument 1290 BTA_DmAddBleDevice(BD_ADDR bd_addr, tBLE_ADDR_TYPE addr_type, tBT_DEVICE_TYPE dev_type) argument 1322 BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument 1355 BTA_DmBleSecurityGrant(BD_ADDR bd_addr, tBTA_DM_BLE_SEC_GRANT res) argument 1391 BTA_DmSetBlePrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout ) argument 1494 BTA_DmDiscoverExt(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search) argument 1596 BTA_DmBleEnableRemotePrivacy(BD_ADDR bd_addr, BOOLEAN privacy_enable) argument 1642 BTA_DmSetEncryption(BD_ADDR bd_addr, tBTA_DM_ENCRYPT_CBACK *p_callback, tBTA_DM_BLE_SEC_ACT sec_act) argument 1675 BTA_DmCloseACL(BD_ADDR bd_addr, BOOLEAN remove_dev) argument [all...] |
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_api.h | 209 bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr); 220 bt_status_t btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr); 231 bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 242 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, 254 bt_status_t btif_dm_passkey_reply( const bt_bdaddr_t *bd_addr, 266 bt_status_t btif_dm_ssp_reply( const bt_bdaddr_t *bd_addr,
|
H A D | btif_hh.h | 61 bt_bdaddr_t bd_addr; member in struct:__anon924 77 bt_bdaddr_t bd_addr; member in struct:__anon925 102 extern void btif_hh_remove_device(bt_bdaddr_t bd_addr); 104 extern bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr); 105 extern void btif_hh_disconnect(bt_bdaddr_t *bd_addr); 109 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bd_addr, tBTA_HH_ATTR_MASK attr_mask);
|
H A D | btif_gatt_util.h | 34 void btif_gatt_check_encrypted_link(BD_ADDR bd_addr); 35 void btif_gatt_remove_encrypted_link(BD_ADDR bd_addr);
|
H A D | btif_sock_rfc.h | 34 bt_status_t btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* uuid,
|
/external/qemu/hw/ |
H A D | bt.c | 85 dev->bd_addr.b[0] = bt_dev_idx & 0xff; 86 dev->bd_addr.b[1] = bt_dev_idx >> 8; 87 dev->bd_addr.b[2] = 0xd0; 88 dev->bd_addr.b[3] = 0xba; 89 dev->bd_addr.b[4] = 0xbe; 90 dev->bd_addr.b[5] = 0xba;
|
/external/bluetooth/bluedroid/stack/rfcomm/ |
H A D | port_utils.c | 63 tPORT *port_allocate_port (UINT8 dlci, BD_ADDR bd_addr) argument 82 memcpy (p_port->bd_addr, bd_addr, BD_ADDR_LEN); 89 RFCOMM_TRACE_DEBUG6("port_allocate_port:bd_addr:%02x:%02x:%02x:%02x:%02x:%02x", 90 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[ 282 port_find_mcb(BD_ADDR bd_addr) argument 382 port_find_port(UINT8 dlci, BD_ADDR bd_addr) argument [all...] |
/external/bluetooth/bluedroid/stack/include/ |
H A D | avdtc_api.h | 61 typedef void tAVDTC_CTRL_CBACK(UINT8 handle, BD_ADDR bd_addr, UINT8 event, tAVDTC_CTRL *p_data); 90 AVDT_API extern void AVDTC_DiscoverRsp(BD_ADDR bd_addr, UINT8 label, 102 AVDT_API extern void AVDTC_GetCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 113 AVDT_API extern void AVDTC_GetAllCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 223 AVDT_API extern void AVDTC_Rej(UINT8 handle, BD_ADDR bd_addr, UINT8 cmd, UINT8 label,
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_dm_co.c | 59 ** Parameters bd_addr - The peer device 67 void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, argument 86 ** Parameters bd_addr - The peer device 94 void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, argument 106 ** Parameters bd_addr - The peer device 112 void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) argument 147 ** Parameters bd_addr - The peer device 152 void bta_dm_co_rmt_oob(BD_ADDR bd_addr) argument 159 result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r); 163 bta_dm_ci_rmt_oob(result, bd_addr, p_ 333 bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument 385 bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument [all...] |