Searched refs:bd_addr (Results 1 - 25 of 157) sorted by relevance

1234567

/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_l2c.c37 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason);
38 static void smp_data_ind (BD_ADDR bd_addr, BT_HDR *p_buf);
76 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason) argument
83 if (memcmp(bd_addr, p_cb->pairing_bda, BD_ADDR_LEN) == 0)
86 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8) + bd_addr[3],
87 (bd_addr[4]<<8)+bd_addr[
124 smp_data_ind(BD_ADDR bd_addr, BT_HDR *p_buf) argument
[all...]
H A Dsmp_api.c123 ** Parameters bd_addr - peer device bd address.
128 tSMP_STATUS SMP_Pair (BD_ADDR bd_addr) argument
143 memcpy (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN);
145 if (!L2CA_ConnectFixedChnl (L2CAP_SMP_CID, bd_addr))
163 ** Parameters bd_addr - peer device bd address.
168 BOOLEAN SMP_PairCancel (BD_ADDR bd_addr) argument
176 (!memcmp (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN)) )
192 ** Parameters bd_addr - peer device bd address.
199 void SMP_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument
204 memcmp (smp_cb.pairing_bda, bd_addr, BD_ADDR_LE
223 SMP_PasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument
279 SMP_OobDataReply(BD_ADDR bd_addr, tSMP_STATUS res, UINT8 len, UINT8 *p_data) argument
[all...]
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_dev.c48 ** Parameters: bd_addr - BD address of the peer
59 BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, argument
67 p_dev_rec = btm_find_dev (bd_addr);
81 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
82 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr);
140 bd_addr[0], bd_addr[1], bd_addr[2],
141 bd_addr[
171 BTM_SecDeleteDevice(BD_ADDR bd_addr) argument
202 BTM_SecReadDevName(BD_ADDR bd_addr) argument
223 btm_sec_alloc_dev(BD_ADDR bd_addr) argument
319 btm_dev_support_switch(BD_ADDR bd_addr) argument
395 btm_find_dev(BD_ADDR bd_addr) argument
422 btm_find_or_alloc_dev(BD_ADDR bd_addr) argument
[all...]
H A Dbtm_ble.c42 extern void gatt_notify_enc_cmpl(BD_ADDR bd_addr);
55 ** Parameters: bd_addr - BD address of the peer
63 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type, argument
72 p_dev_rec = btm_find_dev (bd_addr);
90 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
91 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr);
126 p_info = BTM_InqDbRead(bd_addr);
147 ** Parameters: bd_addr - BD address of the peer
154 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALU argument
347 BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument
370 BTM_BlePasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument
400 BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data) argument
483 BTM_BleSetPrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout) argument
681 btm_ble_check_link_type(BD_ADDR bd_addr) argument
744 btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ) argument
773 btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types) argument
795 btm_get_local_div(BD_ADDR bd_addr, UINT16 *p_div) argument
830 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument
962 btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size) argument
983 btm_ble_read_sec_key_size(BD_ADDR bd_addr) argument
1004 btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument
1094 btm_ble_set_encryption(BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role) argument
1228 btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable) argument
1529 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data) argument
1640 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument
1761 BTM_BleVerifySignature(BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter, UINT8 *p_comp) argument
[all...]
H A Dbtm_ble_int.h176 BD_ADDR bd_addr; member in struct:__anon1098
265 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act);
267 extern UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data);
268 extern tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role);
271 extern void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable);
278 extern void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local );
279 extern BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div);
280 extern BOOLEAN btm_ble_check_link_type (BD_ADDR bd_addr);
281 extern BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types);
284 extern void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYP
[all...]
H A Dbtm_sec.c44 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr);
71 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
265 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags) argument
269 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
855 ** Parameters: bd_addr - Address of the device for which PIN was requested
862 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument
876 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0)
882 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL)
902 btsnd_hcic_pin_code_neg_reply (bd_addr);
925 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr))
982 BTM_DeviceAuthorized(BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[]) argument
1048 BTM_SecBond(BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument
1263 BTM_SecBondCancel(BD_ADDR bd_addr) argument
1389 BTM_SecGetDeviceLinkKey(BD_ADDR bd_addr, LINK_KEY link_key) argument
1428 BTM_SetEncryption(BD_ADDR bd_addr, tBTM_SEC_CBACK *p_callback, void *p_ref_data) argument
1555 BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr) argument
1603 BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument
1671 BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type) argument
1695 BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument
1746 BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument
1950 BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id) argument
2082 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
2404 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
2827 btm_sec_abort_access_req(BD_ADDR bd_addr) argument
3163 BD_ADDR bd_addr; /* peer address */ local
3948 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ; local
5454 BTM_ReadTrustedMask(BD_ADDR bd_addr) argument
5667 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
[all...]
H A Dbtm_ble_bgconn.c69 BOOLEAN btm_update_dev_to_white_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument
73 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
95 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr))
97 started = btsnd_hcic_ble_add_white_list (p_dev_rec->ble.ble_addr_type, bd_addr);
99 if (memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0 &&
107 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr))
109 started = btsnd_hcic_ble_remove_from_white_list (p_dev_rec->ble.ble_addr_type, bd_addr);
119 BTM_ReadDevInfo(bd_addr, &dev_type, &addr_type);
121 started = btsnd_hcic_ble_add_white_list (addr_type, bd_addr);
123 started = btsnd_hcic_ble_remove_from_white_list (addr_type, bd_addr);
218 btm_update_bg_conn_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 *p_attr_tag) argument
[all...]
/external/bluetooth/bluedroid/bta/include/
H A Dbta_dm_ci.h48 BTA_API extern void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap,
62 BTA_API extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
H A Dbta_dm_co.h64 ** Parameters bd_addr - The peer device
72 BTA_API extern void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap,
83 ** Parameters bd_addr - The peer device
91 BTA_API extern void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap,
101 ** Parameters bd_addr - The peer device
107 BTA_API extern void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade );
132 ** Parameters bd_addr - The peer device
137 BTA_API extern void bta_dm_co_rmt_oob(BD_ADDR bd_addr);
213 ** Parameters bd_addr - The peer device
224 BTA_API extern void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CA
[all...]
H A Dbta_pan_api.h79 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon835
88 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon836
179 BTA_API void BTA_PanOpen(BD_ADDR bd_addr, tBTA_PAN_ROLE local_role, tBTA_PAN_ROLE peer_role);
H A Dbta_api.h272 BD_ADDR bd_addr; /* BD address of device to filter. */ member in union:__anon630
409 typedef void (tBTA_DM_BLE_RSSI_CBACK) (BD_ADDR bd_addr, tBTA_DM_BLE_RSSI_ALERT_TYPE alert_type, INT8 rssi);
514 BD_ADDR bd_addr; /* BD address of local device. */ member in struct:__anon645
521 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon646
611 BD_ADDR bd_addr; /* peer address */ member in struct:__anon649
617 BD_ADDR bd_addr; /* peer address */ member in struct:__anon650
625 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon651
642 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon652
653 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon653
659 BD_ADDR bd_addr; /* B member in struct:__anon654
667 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon655
674 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon656
729 BD_ADDR bd_addr; /* peer address */ member in struct:__anon658
753 BD_ADDR bd_addr; /* peer address */ member in struct:__anon660
761 BD_ADDR bd_addr; /* peer address */ member in struct:__anon661
771 BD_ADDR bd_addr; /* peer address */ member in struct:__anon662
827 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon665
852 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon667
860 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon668
876 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon669
[all...]
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_dm.c71 BD_ADDR bd_addr; member in struct:__anon964
103 BD_ADDR bd_addr; member in struct:__anon967
124 static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr);
126 static void btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name,
141 extern int btif_hh_connect(bt_bdaddr_t *bd_addr);
240 bdcpy(remote_bdaddr.address, p_search_data->inq_res.bd_addr);
292 static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state) argument
304 HAL_CBACK(bt_hal_cbacks, bond_state_changed_cb, status, bd_addr, state);
309 bdcpy(pairing_cb.bd_addr, bd_addr
353 btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, DEV_CLASS dev_class, tBT_DEVICE_TYPE device_type) argument
446 remove_hid_bond(bt_bdaddr_t *bd_addr) argument
466 btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr) argument
511 btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr) argument
626 bt_bdaddr_t bd_addr; local
706 bt_bdaddr_t bd_addr; local
770 bt_bdaddr_t bd_addr; local
808 bt_bdaddr_t bd_addr; local
1080 bt_bdaddr_t bd_addr; local
1165 bt_bdaddr_t bd_addr; local
1211 bt_bdaddr_t bd_addr; local
1777 btif_dm_create_bond(const bt_bdaddr_t *bd_addr) argument
1801 btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr) argument
1867 btif_dm_remove_bond(const bt_bdaddr_t *bd_addr) argument
1888 btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, uint8_t pin_len, bt_pin_code_t *pin_code) argument
1934 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument
2159 btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) argument
2217 bt_bdaddr_t bd_addr; local
2250 bt_bdaddr_t bd_addr; local
2331 bt_bdaddr_t bd_addr; local
2384 bt_bdaddr_t bd_addr; local
2404 bt_bdaddr_t bd_addr; local
2446 bt_bdaddr_t bd_addr; local
2466 btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type) argument
2526 bt_bdaddr_t bd_addr; local
[all...]
H A Dbtif_hh.c153 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
158 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
279 bda = (BD_ADDR*) (&p_dev->bd_addr);
374 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) argument
379 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
395 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) argument
400 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
416 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) argument
437 btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) argument
507 btif_hh_remove_device(bt_bdaddr_t bd_addr) argument
590 btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) argument
625 btif_hh_connect(bt_bdaddr_t *bd_addr) argument
694 btif_hh_disconnect(bt_bdaddr_t *bd_addr) argument
1117 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; local
1231 connect( bt_bdaddr_t *bd_addr) argument
1284 virtual_unplug(bt_bdaddr_t *bd_addr) argument
1318 set_info(bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) argument
1371 get_idle_time(bt_bdaddr_t *bd_addr) argument
1404 set_idle_time(bt_bdaddr_t *bd_addr, uint8_t idle_time) argument
1439 get_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument
1472 set_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument
1516 get_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) argument
1562 set_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) argument
1634 send_data(bt_bdaddr_t *bd_addr, char* data) argument
[all...]
H A Dbtif_gatt_util.c48 BD_ADDR bd_addr; member in struct:__anon976
59 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
270 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result);
272 static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr) argument
277 if (bd_addr == NULL)
282 if (p_link->in_use && (!memcmp(p_link->bd_addr, bd_addr, BD_ADDR_LEN)))
288 static BOOLEAN btif_gatt_add_encrypted_link (BD_ADDR bd_addr) argument
293 if (bd_addr == NULL)
296 if (btif_gatt_is_link_encrypted(bd_addr))
312 btif_gatt_remove_encrypted_link(BD_ADDR bd_addr) argument
330 btif_gatt_set_encryption_cb(BD_ADDR bd_addr, tBTA_STATUS result) argument
344 btif_gatt_check_encrypted_link(BD_ADDR bd_addr) argument
[all...]
H A Dbtif_sock.c44 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type,
122 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, argument
125 if((uuid == NULL && channel <= 0) || bd_addr == NULL || sock_fd == NULL)
127 BTIF_TRACE_ERROR4("invalid parameters, bd_addr:%p, uuid:%p, channel:%d, sock_fd:%p",
128 bd_addr, uuid, channel, sock_fd);
136 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags);
/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_ci.c46 void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, argument
55 bdcpy(p_msg->bd_addr, bd_addr);
74 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument
81 bdcpy(p_msg->bd_addr, bd_addr);
H A Dbta_dm_api.c438 void BTA_DmDiscover(BD_ADDR bd_addr, tBTA_SERVICE_MASK services, argument
448 bdcpy(p_msg->bd_addr, bd_addr);
468 void BTA_DmDiscoverUUID(BD_ADDR bd_addr, tSDP_UUID *uuid, argument
476 bdcpy(p_msg->bd_addr, bd_addr);
501 BOOLEAN BTA_DmIsMaster(BD_ADDR bd_addr) argument
506 BTM_GetRole(bd_addr, &link_role);
526 void BTA_DmBond(BD_ADDR bd_addr) argument
533 bdcpy(p_msg->bd_addr, bd_add
551 BTA_DmBondCancel(BD_ADDR bd_addr) argument
576 BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) argument
608 BTA_DmLinkPolicy(BD_ADDR bd_addr, tBTA_DM_LP_MASK policy_mask, BOOLEAN set) argument
656 BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) argument
680 BTA_DmPasskeyCancel(BD_ADDR bd_addr) argument
706 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument
756 BTA_DmRemoveDevice(BD_ADDR bd_addr) argument
787 BTA_DmAddDevWithName(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument
839 BTA_DmAuthorizeReply(BD_ADDR bd_addr, tBTA_SERVICE_ID service, tBTA_AUTH_RESP response) argument
1254 BTA_DmAddBleKey(BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument
1290 BTA_DmAddBleDevice(BD_ADDR bd_addr, tBLE_ADDR_TYPE addr_type, tBT_DEVICE_TYPE dev_type) argument
1322 BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument
1355 BTA_DmBleSecurityGrant(BD_ADDR bd_addr, tBTA_DM_BLE_SEC_GRANT res) argument
1391 BTA_DmSetBlePrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout ) argument
1494 BTA_DmDiscoverExt(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search) argument
1596 BTA_DmBleEnableRemotePrivacy(BD_ADDR bd_addr, BOOLEAN privacy_enable) argument
1642 BTA_DmSetEncryption(BD_ADDR bd_addr, tBTA_DM_ENCRYPT_CBACK *p_callback, tBTA_DM_BLE_SEC_ACT sec_act) argument
1675 BTA_DmCloseACL(BD_ADDR bd_addr, BOOLEAN remove_dev) argument
[all...]
/external/bluetooth/bluedroid/btif/include/
H A Dbtif_api.h209 bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr);
220 bt_status_t btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr);
231 bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
242 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept,
254 bt_status_t btif_dm_passkey_reply( const bt_bdaddr_t *bd_addr,
266 bt_status_t btif_dm_ssp_reply( const bt_bdaddr_t *bd_addr,
H A Dbtif_hh.h61 bt_bdaddr_t bd_addr; member in struct:__anon924
77 bt_bdaddr_t bd_addr; member in struct:__anon925
102 extern void btif_hh_remove_device(bt_bdaddr_t bd_addr);
104 extern bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr);
105 extern void btif_hh_disconnect(bt_bdaddr_t *bd_addr);
109 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bd_addr, tBTA_HH_ATTR_MASK attr_mask);
H A Dbtif_gatt_util.h34 void btif_gatt_check_encrypted_link(BD_ADDR bd_addr);
35 void btif_gatt_remove_encrypted_link(BD_ADDR bd_addr);
H A Dbtif_sock_rfc.h34 bt_status_t btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* uuid,
/external/qemu/hw/
H A Dbt.c85 dev->bd_addr.b[0] = bt_dev_idx & 0xff;
86 dev->bd_addr.b[1] = bt_dev_idx >> 8;
87 dev->bd_addr.b[2] = 0xd0;
88 dev->bd_addr.b[3] = 0xba;
89 dev->bd_addr.b[4] = 0xbe;
90 dev->bd_addr.b[5] = 0xba;
/external/bluetooth/bluedroid/stack/rfcomm/
H A Dport_utils.c63 tPORT *port_allocate_port (UINT8 dlci, BD_ADDR bd_addr) argument
82 memcpy (p_port->bd_addr, bd_addr, BD_ADDR_LEN);
89 RFCOMM_TRACE_DEBUG6("port_allocate_port:bd_addr:%02x:%02x:%02x:%02x:%02x:%02x",
90 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[
282 port_find_mcb(BD_ADDR bd_addr) argument
382 port_find_port(UINT8 dlci, BD_ADDR bd_addr) argument
[all...]
/external/bluetooth/bluedroid/stack/include/
H A Davdtc_api.h61 typedef void tAVDTC_CTRL_CBACK(UINT8 handle, BD_ADDR bd_addr, UINT8 event, tAVDTC_CTRL *p_data);
90 AVDT_API extern void AVDTC_DiscoverRsp(BD_ADDR bd_addr, UINT8 label,
102 AVDT_API extern void AVDTC_GetCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap);
113 AVDT_API extern void AVDTC_GetAllCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap);
223 AVDT_API extern void AVDTC_Rej(UINT8 handle, BD_ADDR bd_addr, UINT8 cmd, UINT8 label,
/external/bluetooth/bluedroid/btif/co/
H A Dbta_dm_co.c59 ** Parameters bd_addr - The peer device
67 void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, argument
86 ** Parameters bd_addr - The peer device
94 void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, argument
106 ** Parameters bd_addr - The peer device
112 void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) argument
147 ** Parameters bd_addr - The peer device
152 void bta_dm_co_rmt_oob(BD_ADDR bd_addr) argument
159 result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r);
163 bta_dm_ci_rmt_oob(result, bd_addr, p_
333 bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument
385 bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument
[all...]

Completed in 294 milliseconds

1234567