/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_l2c.c | 37 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason); 38 static void smp_data_ind (BD_ADDR bd_addr, BT_HDR *p_buf); 76 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason) argument 83 if (memcmp(bd_addr, p_cb->pairing_bda, BD_ADDR_LEN) == 0) 86 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8) + bd_addr[3], 87 (bd_addr[4]<<8)+bd_addr[ 124 smp_data_ind(BD_ADDR bd_addr, BT_HDR *p_buf) argument [all...] |
H A D | smp_api.c | 123 ** Parameters bd_addr - peer device bd address. 128 tSMP_STATUS SMP_Pair (BD_ADDR bd_addr) argument 143 memcpy (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN); 145 if (!L2CA_ConnectFixedChnl (L2CAP_SMP_CID, bd_addr)) 163 ** Parameters bd_addr - peer device bd address. 168 BOOLEAN SMP_PairCancel (BD_ADDR bd_addr) argument 176 (!memcmp (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN)) ) 192 ** Parameters bd_addr - peer device bd address. 199 void SMP_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 204 memcmp (smp_cb.pairing_bda, bd_addr, BD_ADDR_LE 223 SMP_PasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 279 SMP_OobDataReply(BD_ADDR bd_addr, tSMP_STATUS res, UINT8 len, UINT8 *p_data) argument [all...] |
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_dev.c | 48 ** Parameters: bd_addr - BD address of the peer 59 BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, argument 67 p_dev_rec = btm_find_dev (bd_addr); 81 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 82 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr); 140 bd_addr[0], bd_addr[1], bd_addr[2], 141 bd_addr[ 171 BTM_SecDeleteDevice(BD_ADDR bd_addr) argument 202 BTM_SecReadDevName(BD_ADDR bd_addr) argument 223 btm_sec_alloc_dev(BD_ADDR bd_addr) argument 319 btm_dev_support_switch(BD_ADDR bd_addr) argument 395 btm_find_dev(BD_ADDR bd_addr) argument 422 btm_find_or_alloc_dev(BD_ADDR bd_addr) argument [all...] |
H A D | btm_ble.c | 42 extern void gatt_notify_enc_cmpl(BD_ADDR bd_addr); 55 ** Parameters: bd_addr - BD address of the peer 63 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type, argument 72 p_dev_rec = btm_find_dev (bd_addr); 90 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 91 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr); 126 p_info = BTM_InqDbRead(bd_addr); 147 ** Parameters: bd_addr - BD address of the peer 154 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALU argument 379 BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 402 BTM_BlePasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 432 BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data) argument 515 BTM_BleSetPrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout) argument 715 BTM_IsBleLink(BD_ADDR bd_addr) argument 735 BTM_UseLeLink(BD_ADDR bd_addr) argument 808 btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ) argument 837 btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types) argument 859 btm_get_local_div(BD_ADDR bd_addr, UINT16 *p_div) argument 894 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument 1026 btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size) argument 1047 btm_ble_read_sec_key_size(BD_ADDR bd_addr) argument 1068 btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument 1158 btm_ble_set_encryption(BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role) argument 1304 btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable) argument 1629 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data) argument 1744 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument 1866 BTM_BleVerifySignature(BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter, UINT8 *p_comp) argument [all...] |
H A D | btm_ble_int.h | 176 BD_ADDR bd_addr; member in struct:__anon1110 206 BD_ADDR bd_addr; member in struct:__anon1112 275 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act); 277 extern UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data); 278 extern tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role); 281 extern void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable); 288 extern void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ); 289 extern BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div); 290 extern BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types); 293 extern void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYP [all...] |
H A D | btm_ble_bgconn.c | 69 BOOLEAN btm_add_dev_to_controller (BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument 71 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr); 83 if (p_dev_rec->ble.ble_addr_type == BLE_ADDR_PUBLIC || !BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 85 started = btsnd_hcic_ble_add_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 87 if (memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0 && 95 if (!BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 97 started = btsnd_hcic_ble_remove_from_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 100 memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0) 108 BTM_ReadDevInfo(bd_addr, &dev_type, &addr_type); 111 started = btsnd_hcic_ble_add_white_list (addr_type, bd_addr); 149 btm_enq_wl_dev_operation(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument 184 btm_update_dev_to_white_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 attr) argument 296 btm_update_bg_conn_list(BOOLEAN to_add, BD_ADDR bd_addr, UINT8 *p_attr_tag) argument [all...] |
H A D | btm_sec.c | 44 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr); 72 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, 266 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags) argument 270 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL) 856 ** Parameters: bd_addr - Address of the device for which PIN was requested 863 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 877 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0) 883 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL) 903 btsnd_hcic_pin_code_neg_reply (bd_addr); 926 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr)) 983 BTM_DeviceAuthorized(BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[]) argument 1049 BTM_SecBond(BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 1212 BTM_SecBondCancel(BD_ADDR bd_addr) argument 1338 BTM_SecGetDeviceLinkKey(BD_ADDR bd_addr, LINK_KEY link_key) argument 1377 BTM_SetEncryption(BD_ADDR bd_addr, tBTM_SEC_CBACK *p_callback, void *p_ref_data) argument 1504 BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr) argument 1552 BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument 1620 BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type) argument 1644 BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 1695 BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 1899 BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id) argument 2031 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2353 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2776 btm_sec_abort_access_req(BD_ADDR bd_addr) argument 3112 BD_ADDR bd_addr; /* peer address */ local 3897 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ; local 5403 BTM_ReadTrustedMask(BD_ADDR bd_addr) argument 5616 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument [all...] |
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_dm_ci.h | 48 BTA_API extern void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 62 BTA_API extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
|
H A D | bta_dm_co.h | 64 ** Parameters bd_addr - The peer device 72 BTA_API extern void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, 83 ** Parameters bd_addr - The peer device 91 BTA_API extern void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 101 ** Parameters bd_addr - The peer device 107 BTA_API extern void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ); 132 ** Parameters bd_addr - The peer device 137 BTA_API extern void bta_dm_co_rmt_oob(BD_ADDR bd_addr); 213 ** Parameters bd_addr - The peer device 224 BTA_API extern void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CA [all...] |
H A D | bta_pan_api.h | 79 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon844 88 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon845 179 BTA_API void BTA_PanOpen(BD_ADDR bd_addr, tBTA_PAN_ROLE local_role, tBTA_PAN_ROLE peer_role);
|
H A D | bta_api.h | 273 BD_ADDR bd_addr; /* BD address of device to filter. */ member in union:__anon638 413 typedef void (tBTA_DM_BLE_RSSI_CBACK) (BD_ADDR bd_addr, tBTA_DM_BLE_RSSI_ALERT_TYPE alert_type, INT8 rssi); 518 BD_ADDR bd_addr; /* BD address of local device. */ member in struct:__anon653 525 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon654 615 BD_ADDR bd_addr; /* peer address */ member in struct:__anon657 621 BD_ADDR bd_addr; /* peer address */ member in struct:__anon658 629 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon659 646 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon660 657 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon661 663 BD_ADDR bd_addr; /* B member in struct:__anon662 671 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon663 678 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon664 733 BD_ADDR bd_addr; /* peer address */ member in struct:__anon666 757 BD_ADDR bd_addr; /* peer address */ member in struct:__anon668 765 BD_ADDR bd_addr; /* peer address */ member in struct:__anon669 775 BD_ADDR bd_addr; /* peer address */ member in struct:__anon670 831 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon673 856 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon675 864 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon676 880 BD_ADDR bd_addr; /* BD address peer device. */ member in struct:__anon677 [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_hh.c | 154 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 159 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 281 bda = (BD_ADDR*) (&p_dev->bd_addr); 376 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) argument 381 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 397 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) argument 402 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 418 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) argument 439 btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) argument 509 btif_hh_remove_device(bt_bdaddr_t bd_addr) argument 595 btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) argument 631 btif_hh_connect(bt_bdaddr_t *bd_addr) argument 700 btif_hh_disconnect(bt_bdaddr_t *bd_addr) argument 1140 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; local 1254 connect( bt_bdaddr_t *bd_addr) argument 1307 virtual_unplug(bt_bdaddr_t *bd_addr) argument 1341 set_info(bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) argument 1394 get_idle_time(bt_bdaddr_t *bd_addr) argument 1427 set_idle_time(bt_bdaddr_t *bd_addr, uint8_t idle_time) argument 1462 get_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1495 set_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1539 get_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) argument 1585 set_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) argument 1657 send_data(bt_bdaddr_t *bd_addr, char* data) argument [all...] |
H A D | btif_dm.c | 83 BD_ADDR bd_addr; member in struct:__anon973 115 BD_ADDR bd_addr; member in struct:__anon976 141 static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr); 143 static void btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, 159 extern int btif_hh_connect(bt_bdaddr_t *bd_addr); 259 bdcpy(remote_bdaddr.address, p_search_data->inq_res.bd_addr); 332 static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state) argument 344 HAL_CBACK(bt_hal_cbacks, bond_state_changed_cb, status, bd_addr, state); 349 bdcpy(pairing_cb.bd_addr, bd_addr 393 btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, DEV_CLASS dev_class, tBT_DEVICE_TYPE device_type) argument 496 btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr) argument 541 btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr) argument 646 bt_bdaddr_t bd_addr; local 726 bt_bdaddr_t bd_addr; local 790 bt_bdaddr_t bd_addr; local 828 bt_bdaddr_t bd_addr; local 1106 bt_bdaddr_t bd_addr; local 1176 bt_bdaddr_t bd_addr; local 1240 bt_bdaddr_t bd_addr; local 1286 bt_bdaddr_t bd_addr; local 1857 btif_dm_create_bond(const bt_bdaddr_t *bd_addr) argument 1881 btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr) argument 1947 btif_dm_remove_bond(const bt_bdaddr_t *bd_addr) argument 1968 btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, uint8_t pin_len, bt_pin_code_t *pin_code) argument 2014 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument 2239 btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) argument 2297 bt_bdaddr_t bd_addr; local 2330 bt_bdaddr_t bd_addr; local 2411 bt_bdaddr_t bd_addr; local 2464 bt_bdaddr_t bd_addr; local 2484 bt_bdaddr_t bd_addr; local 2526 bt_bdaddr_t bd_addr; local 2546 btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type) argument 2606 bt_bdaddr_t bd_addr; local [all...] |
H A D | btif_gatt_util.c | 51 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 262 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result); 264 static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr) argument 266 if (bd_addr == NULL) 269 return BTA_JvIsEncrypted(bd_addr); 272 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result) argument 277 bdcpy(bda.address, bd_addr); 283 void btif_gatt_check_encrypted_link (BD_ADDR bd_addr) argument 288 bdcpy(bda.address, bd_addr); 292 && !btif_gatt_is_link_encrypted(bd_addr)) 303 btif_get_device_type(BD_ADDR bd_addr, int *addr_type, int *device_type) argument [all...] |
H A D | btif_sock.c | 44 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, 122 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, argument 125 if((uuid == NULL && channel <= 0) || bd_addr == NULL || sock_fd == NULL) 127 BTIF_TRACE_ERROR4("invalid parameters, bd_addr:%p, uuid:%p, channel:%d, sock_fd:%p", 128 bd_addr, uuid, channel, sock_fd); 136 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags);
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_ci.c | 46 void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, argument 55 bdcpy(p_msg->bd_addr, bd_addr); 74 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 81 bdcpy(p_msg->bd_addr, bd_addr);
|
H A D | bta_dm_api.c | 438 void BTA_DmDiscover(BD_ADDR bd_addr, tBTA_SERVICE_MASK services, argument 448 bdcpy(p_msg->bd_addr, bd_addr); 468 void BTA_DmDiscoverUUID(BD_ADDR bd_addr, tSDP_UUID *uuid, argument 476 bdcpy(p_msg->bd_addr, bd_addr); 501 BOOLEAN BTA_DmIsMaster(BD_ADDR bd_addr) argument 506 BTM_GetRole(bd_addr, &link_role); 526 void BTA_DmBond(BD_ADDR bd_addr) argument 533 bdcpy(p_msg->bd_addr, bd_add 551 BTA_DmBondCancel(BD_ADDR bd_addr) argument 576 BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) argument 608 BTA_DmLinkPolicy(BD_ADDR bd_addr, tBTA_DM_LP_MASK policy_mask, BOOLEAN set) argument 656 BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) argument 680 BTA_DmPasskeyCancel(BD_ADDR bd_addr) argument 706 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 756 BTA_DmRemoveDevice(BD_ADDR bd_addr) argument 787 BTA_DmAddDevWithName(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 839 BTA_DmAuthorizeReply(BD_ADDR bd_addr, tBTA_SERVICE_ID service, tBTA_AUTH_RESP response) argument 1254 BTA_DmAddBleKey(BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument 1290 BTA_DmAddBleDevice(BD_ADDR bd_addr, tBLE_ADDR_TYPE addr_type, tBT_DEVICE_TYPE dev_type) argument 1322 BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument 1355 BTA_DmBleSecurityGrant(BD_ADDR bd_addr, tBTA_DM_BLE_SEC_GRANT res) argument 1391 BTA_DmSetBlePrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout ) argument 1614 BTA_DmDiscoverExt(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search) argument 1716 BTA_DmBleEnableRemotePrivacy(BD_ADDR bd_addr, BOOLEAN privacy_enable) argument 1762 BTA_DmSetEncryption(BD_ADDR bd_addr, tBTA_DM_ENCRYPT_CBACK *p_callback, tBTA_DM_BLE_SEC_ACT sec_act) argument 1795 BTA_DmCloseACL(BD_ADDR bd_addr, BOOLEAN remove_dev) argument [all...] |
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_api.h | 209 bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr); 220 bt_status_t btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr); 231 bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 242 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, 254 bt_status_t btif_dm_passkey_reply( const bt_bdaddr_t *bd_addr, 266 bt_status_t btif_dm_ssp_reply( const bt_bdaddr_t *bd_addr,
|
H A D | btif_hh.h | 61 bt_bdaddr_t bd_addr; member in struct:__anon933 78 bt_bdaddr_t bd_addr; member in struct:__anon934 103 extern void btif_hh_remove_device(bt_bdaddr_t bd_addr); 105 extern bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr); 106 extern void btif_hh_disconnect(bt_bdaddr_t *bd_addr); 110 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bd_addr, tBTA_HH_ATTR_MASK attr_mask);
|
H A D | btif_gatt_util.h | 37 void btif_gatt_check_encrypted_link(BD_ADDR bd_addr); 39 BOOLEAN btif_get_device_type(BD_ADDR bd_addr, int *addr_type, int *device_type);
|
H A D | btif_sock_rfc.h | 34 bt_status_t btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* uuid,
|
/external/qemu/hw/ |
H A D | bt.c | 85 dev->bd_addr.b[0] = bt_dev_idx & 0xff; 86 dev->bd_addr.b[1] = bt_dev_idx >> 8; 87 dev->bd_addr.b[2] = 0xd0; 88 dev->bd_addr.b[3] = 0xba; 89 dev->bd_addr.b[4] = 0xbe; 90 dev->bd_addr.b[5] = 0xba;
|
/external/bluetooth/bluedroid/stack/rfcomm/ |
H A D | port_utils.c | 63 tPORT *port_allocate_port (UINT8 dlci, BD_ADDR bd_addr) argument 82 memcpy (p_port->bd_addr, bd_addr, BD_ADDR_LEN); 89 RFCOMM_TRACE_DEBUG6("port_allocate_port:bd_addr:%02x:%02x:%02x:%02x:%02x:%02x", 90 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[ 282 port_find_mcb(BD_ADDR bd_addr) argument 382 port_find_port(UINT8 dlci, BD_ADDR bd_addr) argument [all...] |
/external/bluetooth/bluedroid/stack/include/ |
H A D | avdtc_api.h | 61 typedef void tAVDTC_CTRL_CBACK(UINT8 handle, BD_ADDR bd_addr, UINT8 event, tAVDTC_CTRL *p_data); 90 AVDT_API extern void AVDTC_DiscoverRsp(BD_ADDR bd_addr, UINT8 label, 102 AVDT_API extern void AVDTC_GetCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 113 AVDT_API extern void AVDTC_GetAllCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 223 AVDT_API extern void AVDTC_Rej(UINT8 handle, BD_ADDR bd_addr, UINT8 cmd, UINT8 label,
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_dm_co.c | 59 ** Parameters bd_addr - The peer device 67 void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, argument 86 ** Parameters bd_addr - The peer device 94 void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, argument 106 ** Parameters bd_addr - The peer device 112 void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) argument 147 ** Parameters bd_addr - The peer device 152 void bta_dm_co_rmt_oob(BD_ADDR bd_addr) argument 159 result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r); 163 bta_dm_ci_rmt_oob(result, bd_addr, p_ 333 bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument 385 bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument [all...] |