/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_l2c.c | 37 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason, tBT_TRANSPORT transport); 38 static void smp_data_ind (BD_ADDR bd_addr, BT_HDR *p_buf); 77 static void smp_connect_cback (BD_ADDR bd_addr, BOOLEAN connected, UINT16 reason, argument 91 if (memcmp(bd_addr, p_cb->pairing_bda, BD_ADDR_LEN) == 0) 94 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8) + bd_addr[3], 95 (bd_addr[4]<<8)+bd_addr[ 132 smp_data_ind(BD_ADDR bd_addr, BT_HDR *p_buf) argument [all...] |
H A D | smp_api.c | 124 ** Parameters bd_addr - peer device bd address. 129 tSMP_STATUS SMP_Pair (BD_ADDR bd_addr) argument 144 memcpy (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN); 146 if (!L2CA_ConnectFixedChnl (L2CAP_SMP_CID, bd_addr)) 164 ** Parameters bd_addr - peer device bd address. 169 BOOLEAN SMP_PairCancel (BD_ADDR bd_addr) argument 177 (!memcmp (p_cb->pairing_bda, bd_addr, BD_ADDR_LEN)) ) 193 ** Parameters bd_addr - peer device bd address. 200 void SMP_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 205 memcmp (smp_cb.pairing_bda, bd_addr, BD_ADDR_LE 227 SMP_PasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 283 SMP_OobDataReply(BD_ADDR bd_addr, tSMP_STATUS res, UINT8 len, UINT8 *p_data) argument [all...] |
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_dm_ci.h | 48 BTA_API extern void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 62 BTA_API extern void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr,
|
H A D | bta_dm_co.h | 64 ** Parameters bd_addr - The peer device 72 BTA_API extern void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, 83 ** Parameters bd_addr - The peer device 91 BTA_API extern void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 101 ** Parameters bd_addr - The peer device 107 BTA_API extern void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ); 132 ** Parameters bd_addr - The peer device 137 BTA_API extern void bta_dm_co_rmt_oob(BD_ADDR bd_addr); 213 ** Parameters bd_addr - The peer device 224 BTA_API extern void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CA [all...] |
H A D | bta_pan_api.h | 79 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon914 88 BD_ADDR bd_addr; /* BD address of peer device. */ member in struct:__anon915 179 BTA_API void BTA_PanOpen(BD_ADDR bd_addr, tBTA_PAN_ROLE local_role, tBTA_PAN_ROLE peer_role);
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_dev.c | 50 ** Parameters: bd_addr - BD address of the peer 61 BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, argument 70 p_dev_rec = btm_find_dev (bd_addr); 84 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 85 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_BR_EDR); 143 bd_addr[0], bd_addr[1], bd_addr[2], 144 bd_addr[ 174 BTM_SecDeleteDevice(BD_ADDR bd_addr) argument 208 BTM_SecReadDevName(BD_ADDR bd_addr) argument 229 btm_sec_alloc_dev(BD_ADDR bd_addr) argument 362 btm_dev_support_switch(BD_ADDR bd_addr) argument 442 btm_find_dev(BD_ADDR bd_addr) argument 469 btm_find_or_alloc_dev(BD_ADDR bd_addr) argument [all...] |
H A D | btm_ble.c | 48 extern void gatt_notify_enc_cmpl(BD_ADDR bd_addr); 60 ** Parameters: bd_addr - BD address of the peer 68 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type, argument 76 p_dev_rec = btm_find_dev (bd_addr); 94 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN); 95 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_BR_EDR); 96 p_dev_rec->ble_hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_LE); 131 p_info = BTM_InqDbRead(bd_addr); 151 ** Parameters: bd_addr 158 BTM_SecAddBleKey(BD_ADDR bd_addr, tBTM_LE_KEY_VALUE *p_le_key, tBTM_LE_KEY_TYPE key_type) argument 390 BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res) argument 413 BTM_BlePasskeyReply(BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 443 BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data) argument 526 BTM_BleSetPrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout) argument 714 BTM_UseLeLink(BD_ADDR bd_addr) argument 789 btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ) argument 818 btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types) argument 840 btm_get_local_div(BD_ADDR bd_addr, UINT16 *p_div) argument 876 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument 1008 btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size) argument 1029 btm_ble_read_sec_key_size(BD_ADDR bd_addr) argument 1050 btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument 1140 btm_ble_set_encryption(BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role) argument 1294 btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable) argument 1729 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data) argument 1844 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument 1966 BTM_BleVerifySignature(BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter, UINT8 *p_comp) argument [all...] |
H A D | btm_ble_bgconn.c | 70 BOOLEAN btm_add_dev_to_controller (BOOLEAN to_add, BD_ADDR bd_addr) argument 72 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr); 84 if (p_dev_rec->ble.ble_addr_type == BLE_ADDR_PUBLIC || !BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 90 started = btsnd_hcic_ble_add_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 92 if (memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0 && 101 if (p_dev_rec->ble.ble_addr_type == BLE_ADDR_PUBLIC || !BTM_BLE_IS_RESOLVE_BDA(bd_addr)) 103 started = btsnd_hcic_ble_remove_from_white_list (p_dev_rec->ble.ble_addr_type, bd_addr); 106 memcmp(p_dev_rec->ble.static_addr, bd_addr, BD_ADDR_LEN) != 0) 114 BTM_ReadDevInfo(bd_addr, &dev_type, &addr_type); 117 started = btsnd_hcic_ble_add_white_list (addr_type, bd_addr); 155 btm_enq_wl_dev_operation(BOOLEAN to_add, BD_ADDR bd_addr) argument 188 btm_update_dev_to_white_list(BOOLEAN to_add, BD_ADDR bd_addr) argument 304 btm_update_bg_conn_list(BOOLEAN to_add, BD_ADDR bd_addr) argument [all...] |
H A D | btm_sec.c | 45 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr); 73 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, 346 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags) argument 350 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL) 368 BOOLEAN BTM_GetSecurityFlagsByTransport (BD_ADDR bd_addr, UINT8 * p_sec_flags, argument 373 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL) 971 ** Parameters: bd_addr - Address of the device for which PIN was requested 978 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 992 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0) 998 if ((p_dev_rec = btm_find_dev (bd_addr)) 1099 BTM_DeviceAuthorized(BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[]) argument 1161 btm_sec_bond_by_transport(BD_ADDR bd_addr, tBT_TRANSPORT transport, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 1343 BTM_SecBondByTransport(BD_ADDR bd_addr, tBT_TRANSPORT transport, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 1376 BTM_SecBond(BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) argument 1396 BTM_SecBondCancel(BD_ADDR bd_addr) argument 1517 BTM_SecGetDeviceLinkKey(BD_ADDR bd_addr, LINK_KEY link_key) argument 1558 BTM_SetEncryption(BD_ADDR bd_addr, tBT_TRANSPORT transport, tBTM_SEC_CBACK *p_callback, void *p_ref_data) argument 1692 BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr) argument 1740 BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument 1808 BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type) argument 1832 BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 1883 BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 2087 BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id) argument 2227 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2553 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2984 btm_sec_abort_access_req(BD_ADDR bd_addr) argument 3327 BD_ADDR bd_addr; /* peer address */ local 4119 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ; local 5692 BTM_ReadTrustedMask(BD_ADDR bd_addr) argument 5906 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument [all...] |
H A D | btm_ble_int.h | 194 BD_ADDR bd_addr; member in struct:__anon1234 255 BD_ADDR bd_addr; member in struct:__anon1236 341 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act); 343 extern UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data); 344 extern tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role); 347 extern void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable); 354 extern void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local ); 355 extern BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div); 356 extern BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types); 361 extern void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYP [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_hh.c | 154 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 159 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 296 bda = (BD_ADDR*) (&p_dev->bd_addr); 367 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) argument 372 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 388 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) argument 393 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 409 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) argument 430 btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) argument 500 btif_hh_remove_device(bt_bdaddr_t bd_addr) argument 584 btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) argument 620 btif_hh_connect(bt_bdaddr_t *bd_addr) argument 689 btif_hh_disconnect(bt_bdaddr_t *bd_addr) argument 1135 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; local 1249 connect( bt_bdaddr_t *bd_addr) argument 1302 virtual_unplug(bt_bdaddr_t *bd_addr) argument 1336 set_info(bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) argument 1390 get_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1425 set_protocol(bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) argument 1469 get_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) argument 1515 set_report(bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) argument 1586 send_data(bt_bdaddr_t *bd_addr, char* data) argument [all...] |
H A D | btif_dm.c | 61 BOOLEAN blacklistPairingRetries(BD_ADDR bd_addr) argument 67 if (blacklist_pairing_retries[i][0] == bd_addr[0] && 68 blacklist_pairing_retries[i][1] == bd_addr[1] && 69 blacklist_pairing_retries[i][2] == bd_addr[2]) 122 BD_ADDR bd_addr; member in struct:__anon1056 157 BD_ADDR bd_addr; member in struct:__anon1059 213 static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr, tBTA_TRANSPORT transport); 215 static void btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, 238 extern int btif_hh_connect(bt_bdaddr_t *bd_addr); 345 bdcpy(remote_bdaddr.address, p_search_data->inq_res.bd_addr); 473 bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state) argument 534 btif_update_remote_properties(BD_ADDR bd_addr, BD_NAME bd_name, DEV_CLASS dev_class, tBT_DEVICE_TYPE device_type) argument 629 btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr, tBTA_TRANSPORT transport) argument 688 btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr) argument 713 btif_dm_get_connection_state(const bt_bdaddr_t *bd_addr) argument 827 bt_bdaddr_t bd_addr; local 912 bt_bdaddr_t bd_addr; local 981 bt_bdaddr_t bd_addr; local 1024 bt_bdaddr_t bd_addr; local 1077 bt_bdaddr_t bd_addr; local 1382 bt_bdaddr_t bd_addr; local 1452 bt_bdaddr_t bd_addr; local 1516 bt_bdaddr_t bd_addr; local 1562 bt_bdaddr_t bd_addr; local 2268 btif_dm_create_bond(const bt_bdaddr_t *bd_addr, int transport) argument 2296 btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr) argument 2385 btif_dm_remove_bond(const bt_bdaddr_t *bd_addr) argument 2406 btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, uint8_t pin_len, bt_pin_code_t *pin_code) argument 2453 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument 2605 btif_dm_proc_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_AUTH_REQ *p_auth_req, BOOLEAN is_orig) argument 2648 btif_dm_proc_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument 2737 btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) argument 2795 bt_bdaddr_t bd_addr; local 2833 bt_bdaddr_t bd_addr; local 2922 bt_bdaddr_t bd_addr; local 2975 bt_bdaddr_t bd_addr; local 2995 bt_bdaddr_t bd_addr; local 3044 bt_bdaddr_t bd_addr; local 3070 btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type) argument 3130 bt_bdaddr_t bd_addr; local [all...] |
H A D | bluetooth.c | 268 static int create_bond(const bt_bdaddr_t *bd_addr, int transport) argument 274 return btif_dm_create_bond(bd_addr, transport); 277 static int cancel_bond(const bt_bdaddr_t *bd_addr) argument 283 return btif_dm_cancel_bond(bd_addr); 286 static int remove_bond(const bt_bdaddr_t *bd_addr) argument 292 return btif_dm_remove_bond(bd_addr); 295 static int get_connection_state(const bt_bdaddr_t *bd_addr) argument 301 return btif_dm_get_connection_state(bd_addr); 304 static int pin_reply(const bt_bdaddr_t *bd_addr, uint8_t accept, argument 311 return btif_dm_pin_reply(bd_addr, accep 314 ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument [all...] |
H A D | btif_hf.c | 195 static BOOLEAN is_connected(bt_bdaddr_t *bd_addr) argument 202 ((bd_addr == NULL) || (bdcmp(bd_addr->address, 218 static int btif_hf_idx_by_bdaddr(bt_bdaddr_t *bd_addr) argument 223 if ((bdcmp(bd_addr->address, 412 p_data->open.bd_addr); 735 static bt_status_t connect_int(bt_bdaddr_t *bd_addr, uint16_t uuid) argument 751 if (!is_connected(bd_addr)) 754 bdcpy(btif_hf_cb[i].connected_bda.address, bd_addr->address); 764 static bt_status_t connect( bt_bdaddr_t *bd_addr ) 855 start_voice_recognition(bt_bdaddr_t *bd_addr) argument 890 stop_voice_recognition(bt_bdaddr_t *bd_addr) argument 925 volume_control(bthf_volume_type_t type, int volume, bt_bdaddr_t *bd_addr) argument 986 cops_response(const char *cops, bt_bdaddr_t *bd_addr) argument 1015 cind_response(int svc, int num_active, int num_held, bthf_call_state_t call_setup_state, int signal, int roam, int batt_chg, bt_bdaddr_t *bd_addr) argument 1058 formatted_at_response(const char *rsp, bt_bdaddr_t *bd_addr) argument 1086 at_response(bthf_at_response_t response_code, int error_code, bt_bdaddr_t *bd_addr) argument 1115 clcc_response(int index, bthf_call_direction_t dir, bthf_call_state_t state, bthf_call_mode_t mode, bthf_call_mpty_type_t mpty, const char *number, bthf_call_addrtype_t type, bt_bdaddr_t *bd_addr) argument [all...] |
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_ci.c | 46 void bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, argument 55 bdcpy(p_msg->bd_addr, bd_addr); 74 void bta_dm_ci_rmt_oob(BOOLEAN accept, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 81 bdcpy(p_msg->bd_addr, bd_addr);
|
H A D | bta_dm_api.c | 430 void BTA_DmDiscover(BD_ADDR bd_addr, tBTA_SERVICE_MASK services, argument 440 bdcpy(p_msg->bd_addr, bd_addr); 460 void BTA_DmDiscoverUUID(BD_ADDR bd_addr, tSDP_UUID *uuid, argument 468 bdcpy(p_msg->bd_addr, bd_addr); 493 BOOLEAN BTA_DmIsMaster(BD_ADDR bd_addr) argument 498 BTM_GetRole(bd_addr, &link_role); 518 void BTA_DmBond(BD_ADDR bd_addr) argument 520 BTA_DmBondByTransport (bd_addr, BTA_TRANSPORT_UNKNOW 534 BTA_DmBondByTransport(BD_ADDR bd_addr, tBTA_TRANSPORT transport) argument 560 BTA_DmBondCancel(BD_ADDR bd_addr) argument 585 BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) argument 617 BTA_DmLinkPolicy(BD_ADDR bd_addr, tBTA_DM_LP_MASK policy_mask, BOOLEAN set) argument 665 BTA_DmConfirm(BD_ADDR bd_addr, BOOLEAN accept) argument 689 BTA_DmPasskeyCancel(BD_ADDR bd_addr) argument 715 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 765 BTA_DmRemoveDevice(BD_ADDR bd_addr) argument 796 BTA_DmAddDevWithName(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap) argument 848 BTA_DmAuthorizeReply(BD_ADDR bd_addr, tBTA_SERVICE_ID service, tBTA_AUTH_RESP response) argument 1279 BTA_DmAddBleKey(BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument 1315 BTA_DmAddBleDevice(BD_ADDR bd_addr, tBLE_ADDR_TYPE addr_type, tBT_DEVICE_TYPE dev_type) argument 1347 BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument 1380 BTA_DmBleSecurityGrant(BD_ADDR bd_addr, tBTA_DM_BLE_SEC_GRANT res) argument 1416 BTA_DmSetBlePrefConnParams(BD_ADDR bd_addr, UINT16 min_conn_int, UINT16 max_conn_int, UINT16 slave_latency, UINT16 supervision_tout ) argument 1804 bta_dm_discover_send_msg(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search, tBTA_TRANSPORT transport) argument 1861 BTA_DmDiscoverByTransport(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search, tBTA_TRANSPORT transport) argument 1888 BTA_DmDiscoverExt(BD_ADDR bd_addr, tBTA_SERVICE_MASK_EXT *p_services, tBTA_DM_SEARCH_CBACK *p_cback, BOOLEAN sdp_search) argument 1966 BTA_DmBleEnableRemotePrivacy(BD_ADDR bd_addr, BOOLEAN privacy_enable) argument 2416 BTA_DmBleUpdateConnectionParams(BD_ADDR bd_addr, UINT16 min_int, UINT16 max_int, UINT16 latency, UINT16 timeout) argument 2459 BTA_DmSetEncryption(BD_ADDR bd_addr, tBTA_TRANSPORT transport, tBTA_DM_ENCRYPT_CBACK *p_callback, tBTA_DM_BLE_SEC_ACT sec_act) argument 2493 BTA_DmCloseACL(BD_ADDR bd_addr, BOOLEAN remove_dev, tBTA_TRANSPORT transport) argument [all...] |
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_hh.h | 61 bt_bdaddr_t bd_addr; member in struct:__anon1013 77 bt_bdaddr_t bd_addr; member in struct:__anon1014 102 extern void btif_hh_remove_device(bt_bdaddr_t bd_addr); 104 extern bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr); 105 extern void btif_hh_disconnect(bt_bdaddr_t *bd_addr); 109 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bd_addr, tBTA_HH_ATTR_MASK attr_mask);
|
H A D | btif_api.h | 209 bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr, int transport); 220 bt_status_t btif_dm_cancel_bond(const bt_bdaddr_t *bd_addr); 231 bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 242 uint16_t btif_dm_get_connection_state(const bt_bdaddr_t *bd_addr); 253 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, 265 bt_status_t btif_dm_passkey_reply( const bt_bdaddr_t *bd_addr, 277 bt_status_t btif_dm_ssp_reply( const bt_bdaddr_t *bd_addr,
|
H A D | btif_sock_rfc.h | 34 bt_status_t btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* uuid,
|
H A D | btif_dm.h | 41 void btif_dm_proc_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, 46 void btif_dm_proc_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, 57 BOOLEAN btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r); 133 void btif_dm_update_ble_remote_properties( BD_ADDR bd_addr, BD_NAME bd_name,
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_dm_co.c | 70 ** Parameters bd_addr - The peer device 78 void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, argument 81 UNUSED(bd_addr); 85 btif_dm_proc_io_req(bd_addr, p_io_cap, p_oob_data, p_auth_req, is_orig); 99 ** Parameters bd_addr - The peer device 107 void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, argument 110 btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); 120 ** Parameters bd_addr - The peer device 126 void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) argument 128 UNUSED(bd_addr); 168 bta_dm_co_rmt_oob(BD_ADDR bd_addr) argument 349 bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument 402 bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) argument [all...] |
/external/bluetooth/bluedroid/bta/mce/ |
H A D | bta_mce_api.c | 97 tBTA_MCE_STATUS BTA_MceGetRemoteMasInstances(BD_ADDR bd_addr) argument 106 bdcpy(p_msg->bd_addr, bd_addr);
|
/external/bluetooth/bluedroid/stack/rfcomm/ |
H A D | port_utils.c | 63 tPORT *port_allocate_port (UINT8 dlci, BD_ADDR bd_addr) argument 82 memcpy (p_port->bd_addr, bd_addr, BD_ADDR_LEN); 89 RFCOMM_TRACE_DEBUG("port_allocate_port:bd_addr:%02x:%02x:%02x:%02x:%02x:%02x", 90 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[ 282 port_find_mcb(BD_ADDR bd_addr) argument 382 port_find_port(UINT8 dlci, BD_ADDR bd_addr) argument [all...] |
/external/bluetooth/bluedroid/stack/include/ |
H A D | avdtc_api.h | 61 typedef void tAVDTC_CTRL_CBACK(UINT8 handle, BD_ADDR bd_addr, UINT8 event, tAVDTC_CTRL *p_data); 90 AVDT_API extern void AVDTC_DiscoverRsp(BD_ADDR bd_addr, UINT8 label, 102 AVDT_API extern void AVDTC_GetCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 113 AVDT_API extern void AVDTC_GetAllCapRsp(BD_ADDR bd_addr, UINT8 label, tAVDT_CFG *p_cap); 223 AVDT_API extern void AVDTC_Rej(UINT8 handle, BD_ADDR bd_addr, UINT8 cmd, UINT8 label,
|
/external/bluetooth/bluedroid/stack/mcap/ |
H A D | mca_l2c.c | 73 static void mca_sec_check_complete_term (BD_ADDR bd_addr, tBT_TRANSPORT transport, void *p_ref_data, UINT8 res) argument 94 L2CA_ErtmConnectRsp (bd_addr, p_tbl->id, p_tbl->lcid, L2CAP_CONN_OK, L2CAP_CONN_OK, &ertm_info); 105 L2CA_ConnectRsp (bd_addr, p_tbl->id, p_tbl->lcid, L2CAP_CONN_SECURITY_BLOCK, L2CAP_CONN_OK); 120 static void mca_sec_check_complete_orig (BD_ADDR bd_addr, tBT_TRANSPORT transport, void *p_ref_data, UINT8 res) argument 124 UNUSED(bd_addr); 153 void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument 166 if ((p_ccb = mca_ccb_by_bd(handle, bd_addr)) == NULL) 169 if ((p_ccb = mca_ccb_alloc(handle, bd_addr)) != NULL) 178 rc = btm_sec_mx_access_request (bd_addr, psm, FALSE, BTM_SEC_PROTO_MCA, 0, 203 L2CA_ErtmConnectRsp (bd_addr, i 229 mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument 563 mca_l2c_open_req(BD_ADDR bd_addr, UINT16 psm, const tMCA_CHNL_CFG *p_chnl_cfg) argument [all...] |