Searched refs:bd_addr (Results 1 - 25 of 160) sorted by relevance

1234567

/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_l2c.c37 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason);
38 static void smp_data_ind (BD_ADDR bd_addr, BT_HDR *p_buf);
76 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason) argument
83 if (memcmp(bd_addr, p_cb->pairing_bda, BD_ADDR_LEN) == 0)
86 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8) + bd_addr[3],
87 (bd_addr[4]<<8)+bd_addr[
124 smp_data_ind(BD_ADDR bd_addr, BT_HDR *p_buf) argument
[all...]
H A Dsmp_api.c123 ** Parameters bd_addr - peer device bd address.
128 tSMP_STATUS SMP_Pair (BD_ADDR bd_addr) argument
143 memcpy (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN);
145 if (!L2CA_ConnectFixedChnl (L2CAP_SMP_CID, bd_addr))
163 ** Parameters bd_addr - peer device bd address.
168 BOOLEAN SMP_PairCancel (BD_ADDR bd_addr) argument
176 (!memcmp (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN)) )
192 ** Parameters bd_addr - peer device bd address.
199 void SMP_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument
204 memcmp (smp_cb.pairing_bda, bd_addr, BD_ADDR_LE
223 SMP_PasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument
279 SMP_OobDataReply(BD_ADDR bd_addr, tSMP_STATUS res, UINT8 len, UINT8 *p_data) argument
[all...]
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_dev.c48 ** Parameters: bd_addr - BD address of the peer
59 BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, argument
67 p_dev_rec = btm_find_dev (bd_addr);
81 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
82 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr);
140 bd_addr[0], bd_addr[1], bd_addr[2],
141 bd_addr[
171 BTM_SecDeleteDevice(BD_ADDR bd_addr) argument
202 BTM_SecReadDevName(BD_ADDR bd_addr) argument
223 btm_sec_alloc_dev(BD_ADDR bd_addr) argument
319 btm_dev_support_switch(BD_ADDR bd_addr) argument
395 btm_find_dev(BD_ADDR bd_addr) argument
422 btm_find_or_alloc_dev(BD_ADDR bd_addr) argument
[all...]
H A Dbtm_ble.c42 extern void gatt_notify_enc_cmpl(BD_ADDR bd_addr);
55 ** Parameters: bd_addr - BD address of the peer
63 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type, argument
72 p_dev_rec = btm_find_dev (bd_addr);
90 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
91 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr);
126 p_info = BTM_InqDbRead(bd_addr);
147 ** Parameters: bd_addr - BD address of the peer
154 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALU argument
379 BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument
402 BTM_BlePasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument
432 BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data) argument
515 BTM_BleSetPrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout) argument
715 BTM_IsBleLink(BD_ADDR bd_addr) argument
735 BTM_UseLeLink(BD_ADDR bd_addr) argument
808 btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ) argument
837 btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types) argument
859 btm_get_local_div(BD_ADDR bd_addr, UINT16 *p_div) argument
894 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument
1026 btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size) argument
1047 btm_ble_read_sec_key_size(BD_ADDR bd_addr) argument
1068 btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument
1158 btm_ble_set_encryption(BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role) argument
1304 btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable) argument
1629 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data) argument
1744 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument
1866 BTM_BleVerifySignature(BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter, UINT8 *p_comp) argument
[all...]
H A Dbtm_ble_int.h176 BD_ADDR bd_addr; member in struct:__anon1110
206 BD_ADDR bd_addr; member in struct:__anon1112
275 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act);
277 extern UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data);
278 extern tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role);
281 extern void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable);
288 extern void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local );
289 extern BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div);
290 extern BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types);
293 extern void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYP
[all...]
H A Dbtm_ble_bgconn.c69 BOOLEAN btm_add_dev_to_controller (BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument
71 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
83 if (p_dev_rec->ble.ble_addr_type == BLE_ADDR_PUBLIC || !BTM_BLE_IS_RESOLVE_BDA(bd_addr))
85 started = btsnd_hcic_ble_add_white_list (p_dev_rec->ble.ble_addr_type, bd_addr);
87 if (memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0 &&
95 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr))
97 started = btsnd_hcic_ble_remove_from_white_list (p_dev_rec->ble.ble_addr_type, bd_addr);
100 memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0)
108 BTM_ReadDevInfo(bd_addr, &dev_type, &addr_type);
111 started = btsnd_hcic_ble_add_white_list (addr_type, bd_addr);
149 btm_enq_wl_dev_operation(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument
184 btm_update_dev_to_white_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument
296 btm_update_bg_conn_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 *p_attr_tag) argument
[all...]
H A Dbtm_sec.c44 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr);
72 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
266 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags) argument
270 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
856 ** Parameters: bd_addr - Address of the device for which PIN was requested
863 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument
877 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0)
883 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL)
903 btsnd_hcic_pin_code_neg_reply (bd_addr);
926 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr))
983 BTM_DeviceAuthorized(BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[]) argument
1049 BTM_SecBond(BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument
1212 BTM_SecBondCancel(BD_ADDR bd_addr) argument
1338 BTM_SecGetDeviceLinkKey(BD_ADDR bd_addr, LINK_KEY link_key) argument
1377 BTM_SetEncryption(BD_ADDR bd_addr, tBTM_SEC_CBACK *p_callback, void *p_ref_data) argument
1504 BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr) argument
1552 BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument
1620 BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type) argument
1644 BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument
1695 BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument
1899 BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id) argument
2031 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
2353 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
2776 btm_sec_abort_access_req(BD_ADDR bd_addr) argument
3112 BD_ADDR bd_addr; /* peer address */ local
3897 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ; local
5403 BTM_ReadTrustedMask(BD_ADDR bd_addr) argument
5616 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument
[all...]
/external/bluetooth/bluedroid/bta/include/
H A Dbta_dm_ci.h48 BTA_API extern void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap,
62 BTA_API extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
H A Dbta_dm_co.h64 ** Parameters bd_addr - The peer device
72 BTA_API extern void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap,
83 ** Parameters bd_addr - The peer device
91 BTA_API extern void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap,
101 ** Parameters bd_addr - The peer device
107 BTA_API extern void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade );
132 ** Parameters bd_addr - The peer device
137 BTA_API extern void bta_dm_co_rmt_oob(BD_ADDR bd_addr);
213 ** Parameters bd_addr - The peer device
224 BTA_API extern void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CA
[all...]
H A Dbta_pan_api.h79 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon844
88 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon845
179 BTA_API void BTA_PanOpen(BD_ADDR bd_addr, tBTA_PAN_ROLE local_role, tBTA_PAN_ROLE peer_role);
H A Dbta_api.h273 BD_ADDR bd_addr; /* BD address of device to filter. */ member in union:__anon638
413 typedef void (tBTA_DM_BLE_RSSI_CBACK) (BD_ADDR bd_addr, tBTA_DM_BLE_RSSI_ALERT_TYPE alert_type, INT8 rssi);
518 BD_ADDR bd_addr; /* BD address of local device. */ member in struct:__anon653
525 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon654
615 BD_ADDR bd_addr; /* peer address */ member in struct:__anon657
621 BD_ADDR bd_addr; /* peer address */ member in struct:__anon658
629 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon659
646 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon660
657 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon661
663 BD_ADDR bd_addr; /* B member in struct:__anon662
671 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon663
678 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon664
733 BD_ADDR bd_addr; /* peer address */ member in struct:__anon666
757 BD_ADDR bd_addr; /* peer address */ member in struct:__anon668
765 BD_ADDR bd_addr; /* peer address */ member in struct:__anon669
775 BD_ADDR bd_addr; /* peer address */ member in struct:__anon670
831 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon673
856 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon675
864 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon676
880 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon677
[all...]
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_hh.c154 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
159 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
281 bda = (BD_ADDR*) (&p_dev->bd_addr);
376 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) argument
381 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
397 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) argument
402 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
418 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) argument
439 btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) argument
509 btif_hh_remove_device(bt_bdaddr_t bd_addr) argument
595 btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) argument
631 btif_hh_connect(bt_bdaddr_t *bd_addr) argument
700 btif_hh_disconnect(bt_bdaddr_t *bd_addr) argument
1140 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; local
1254 connect( bt_bdaddr_t *bd_addr) argument
1307 virtual_unplug(bt_bdaddr_t *bd_addr) argument
1341 set_info(bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) argument
1394 get_idle_time(bt_bdaddr_t *bd_addr) argument
1427 set_idle_time(bt_bdaddr_t *bd_addr, uint8_t idle_time) argument
1462 get_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument
1495 set_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument
1539 get_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) argument
1585 set_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) argument
1657 send_data(bt_bdaddr_t *bd_addr, char* data) argument
[all...]
H A Dbtif_dm.c83 BD_ADDR bd_addr; member in struct:__anon973
115 BD_ADDR bd_addr; member in struct:__anon976
141 static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr);
143 static void btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name,
159 extern int btif_hh_connect(bt_bdaddr_t *bd_addr);
259 bdcpy(remote_bdaddr.address, p_search_data->inq_res.bd_addr);
332 static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state) argument
344 HAL_CBACK(bt_hal_cbacks, bond_state_changed_cb, status, bd_addr, state);
349 bdcpy(pairing_cb.bd_addr, bd_addr
393 btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, DEV_CLASS dev_class, tBT_DEVICE_TYPE device_type) argument
496 btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr) argument
541 btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr) argument
646 bt_bdaddr_t bd_addr; local
726 bt_bdaddr_t bd_addr; local
790 bt_bdaddr_t bd_addr; local
828 bt_bdaddr_t bd_addr; local
1106 bt_bdaddr_t bd_addr; local
1176 bt_bdaddr_t bd_addr; local
1240 bt_bdaddr_t bd_addr; local
1286 bt_bdaddr_t bd_addr; local
1857 btif_dm_create_bond(const bt_bdaddr_t *bd_addr) argument
1881 btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr) argument
1947 btif_dm_remove_bond(const bt_bdaddr_t *bd_addr) argument
1968 btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, uint8_t pin_len, bt_pin_code_t *pin_code) argument
2014 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument
2239 btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) argument
2297 bt_bdaddr_t bd_addr; local
2330 bt_bdaddr_t bd_addr; local
2411 bt_bdaddr_t bd_addr; local
2464 bt_bdaddr_t bd_addr; local
2484 bt_bdaddr_t bd_addr; local
2526 bt_bdaddr_t bd_addr; local
2546 btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type) argument
2606 bt_bdaddr_t bd_addr; local
[all...]
H A Dbtif_gatt_util.c51 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
262 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result);
264 static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr) argument
266 if (bd_addr == NULL)
269 return BTA_JvIsEncrypted(bd_addr);
272 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result) argument
277 bdcpy(bda.address, bd_addr);
283 void btif_gatt_check_encrypted_link (BD_ADDR bd_addr) argument
288 bdcpy(bda.address, bd_addr);
292 && !btif_gatt_is_link_encrypted(bd_addr))
303 btif_get_device_type(BD_ADDR bd_addr, int *addr_type, int *device_type) argument
[all...]
H A Dbtif_sock.c44 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type,
122 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, argument
125 if((uuid == NULL && channel <= 0) || bd_addr == NULL || sock_fd == NULL)
127 BTIF_TRACE_ERROR4("invalid parameters, bd_addr:%p, uuid:%p, channel:%d, sock_fd:%p",
128 bd_addr, uuid, channel, sock_fd);
136 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags);
/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_ci.c46 void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, argument
55 bdcpy(p_msg->bd_addr, bd_addr);
74 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument
81 bdcpy(p_msg->bd_addr, bd_addr);
H A Dbta_dm_api.c438 void BTA_DmDiscover(BD_ADDR bd_addr, tBTA_SERVICE_MASK services, argument
448 bdcpy(p_msg->bd_addr, bd_addr);
468 void BTA_DmDiscoverUUID(BD_ADDR bd_addr, tSDP_UUID *uuid, argument
476 bdcpy(p_msg->bd_addr, bd_addr);
501 BOOLEAN BTA_DmIsMaster(BD_ADDR bd_addr) argument
506 BTM_GetRole(bd_addr, &link_role);
526 void BTA_DmBond(BD_ADDR bd_addr) argument
533 bdcpy(p_msg->bd_addr, bd_add
551 BTA_DmBondCancel(BD_ADDR bd_addr) argument
576 BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) argument
608 BTA_DmLinkPolicy(BD_ADDR bd_addr, tBTA_DM_LP_MASK policy_mask, BOOLEAN set) argument
656 BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) argument
680 BTA_DmPasskeyCancel(BD_ADDR bd_addr) argument
706 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument
756 BTA_DmRemoveDevice(BD_ADDR bd_addr) argument
787 BTA_DmAddDevWithName(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument
839 BTA_DmAuthorizeReply(BD_ADDR bd_addr, tBTA_SERVICE_ID service, tBTA_AUTH_RESP response) argument
1254 BTA_DmAddBleKey(BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument
1290 BTA_DmAddBleDevice(BD_ADDR bd_addr, tBLE_ADDR_TYPE addr_type, tBT_DEVICE_TYPE dev_type) argument
1322 BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument
1355 BTA_DmBleSecurityGrant(BD_ADDR bd_addr, tBTA_DM_BLE_SEC_GRANT res) argument
1391 BTA_DmSetBlePrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout ) argument
1614 BTA_DmDiscoverExt(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search) argument
1716 BTA_DmBleEnableRemotePrivacy(BD_ADDR bd_addr, BOOLEAN privacy_enable) argument
1762 BTA_DmSetEncryption(BD_ADDR bd_addr, tBTA_DM_ENCRYPT_CBACK *p_callback, tBTA_DM_BLE_SEC_ACT sec_act) argument
1795 BTA_DmCloseACL(BD_ADDR bd_addr, BOOLEAN remove_dev) argument
[all...]
/external/bluetooth/bluedroid/btif/include/
H A Dbtif_api.h209 bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr);
220 bt_status_t btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr);
231 bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
242 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept,
254 bt_status_t btif_dm_passkey_reply( const bt_bdaddr_t *bd_addr,
266 bt_status_t btif_dm_ssp_reply( const bt_bdaddr_t *bd_addr,
H A Dbtif_hh.h61 bt_bdaddr_t bd_addr; member in struct:__anon933
78 bt_bdaddr_t bd_addr; member in struct:__anon934
103 extern void btif_hh_remove_device(bt_bdaddr_t bd_addr);
105 extern bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr);
106 extern void btif_hh_disconnect(bt_bdaddr_t *bd_addr);
110 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bd_addr, tBTA_HH_ATTR_MASK attr_mask);
H A Dbtif_gatt_util.h37 void btif_gatt_check_encrypted_link(BD_ADDR bd_addr);
39 BOOLEAN btif_get_device_type(BD_ADDR bd_addr, int *addr_type, int *device_type);
H A Dbtif_sock_rfc.h34 bt_status_t btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* uuid,
/external/qemu/hw/
H A Dbt.c85 dev->bd_addr.b[0] = bt_dev_idx & 0xff;
86 dev->bd_addr.b[1] = bt_dev_idx >> 8;
87 dev->bd_addr.b[2] = 0xd0;
88 dev->bd_addr.b[3] = 0xba;
89 dev->bd_addr.b[4] = 0xbe;
90 dev->bd_addr.b[5] = 0xba;
/external/bluetooth/bluedroid/stack/rfcomm/
H A Dport_utils.c63 tPORT *port_allocate_port (UINT8 dlci, BD_ADDR bd_addr) argument
82 memcpy (p_port->bd_addr, bd_addr, BD_ADDR_LEN);
89 RFCOMM_TRACE_DEBUG6("port_allocate_port:bd_addr:%02x:%02x:%02x:%02x:%02x:%02x",
90 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[
282 port_find_mcb(BD_ADDR bd_addr) argument
382 port_find_port(UINT8 dlci, BD_ADDR bd_addr) argument
[all...]
/external/bluetooth/bluedroid/stack/include/
H A Davdtc_api.h61 typedef void tAVDTC_CTRL_CBACK(UINT8 handle, BD_ADDR bd_addr, UINT8 event, tAVDTC_CTRL *p_data);
90 AVDT_API extern void AVDTC_DiscoverRsp(BD_ADDR bd_addr, UINT8 label,
102 AVDT_API extern void AVDTC_GetCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap);
113 AVDT_API extern void AVDTC_GetAllCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap);
223 AVDT_API extern void AVDTC_Rej(UINT8 handle, BD_ADDR bd_addr, UINT8 cmd, UINT8 label,
/external/bluetooth/bluedroid/btif/co/
H A Dbta_dm_co.c59 ** Parameters bd_addr - The peer device
67 void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, argument
86 ** Parameters bd_addr - The peer device
94 void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, argument
106 ** Parameters bd_addr - The peer device
112 void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) argument
147 ** Parameters bd_addr - The peer device
152 void bta_dm_co_rmt_oob(BD_ADDR bd_addr) argument
159 result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r);
163 bta_dm_ci_rmt_oob(result, bd_addr, p_
333 bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument
385 bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument
[all...]

Completed in 382 milliseconds

1234567