/system/bt/stack/pan/ |
H A D | pan_utils.c | 61 UINT32 pan_register_with_sdp (UINT16 uuid, UINT8 sec_mask, char *p_name, char *p_desc) argument 99 (UINT8) (strlen(p_name) + 1), (UINT8 *)p_name); 130 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_NAP, 132 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_NAP, 142 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_GN, 144 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_GN, 154 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_PANU, 156 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_PANU,
|
/system/bt/stack/btm/ |
H A D | btm_dev.c | 219 char *p_name = NULL; local 223 p_name = (char *)p_srec->sec_bd_name; 225 return(p_name);
|
H A D | btm_devctl.c | 441 tBTM_STATUS BTM_SetLocalDeviceName (char *p_name) argument 445 if (!p_name || !p_name[0] || (strlen ((char *)p_name) > BD_NAME_LEN)) 454 if (p != (UINT8 *)p_name) 456 BCM_STRNCPY_S(btm_cb.cfg.bd_name, sizeof(btm_cb.cfg.bd_name), p_name, BTM_MAX_LOC_BD_NAME_LEN); 460 p = (UINT8 *)p_name; 478 ** If success, BTM_SUCCESS is returned and p_name points stored 481 ** is returned and p_name is set to NULL 484 tBTM_STATUS BTM_ReadLocalDeviceName (char **p_name) argument [all...] |
H A D | btm_ble_gap.c | 2016 void btm_ble_read_remote_name_cmpl(BOOLEAN status, BD_ADDR bda, UINT16 length, char *p_name) argument 2026 memcpy((UINT8*)bd_name, p_name, length); 2034 btm_sec_rmt_name_request_complete (bda, (UINT8 *)p_name, hci_status);
|
H A D | btm_sec.c | 93 static BOOLEAN btm_sec_set_security_level ( CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, 465 ** p_name - Name of the service relevant only if 477 BOOLEAN BTM_SetSecurityLevel (BOOLEAN is_originator, char *p_name, UINT8 service_id, argument 489 return(btm_sec_set_security_level (conn_type, p_name, service_id, 492 return(btm_sec_set_security_level (is_originator, p_name, service_id, 504 ** p_name - Name of the service relevant only if 516 static BOOLEAN btm_sec_set_security_level (CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, argument 562 (!strncmp (p_name, (char *) p_srec->orig_service_name, 564 !strncmp (p_name, (char *) p_srec->term_service_name, 607 BCM_STRNCPY_S ((char *)p_srec->orig_service_name, sizeof(p_srec->orig_service_name), p_name, BTM_SEC_SERVICE_NAME_LE [all...] |
/system/bt/stack/gap/ |
H A D | gap_ble.c | 545 void gap_ble_cl_op_cmpl(tGAP_CLCB *p_clcb, BOOLEAN status, UINT16 len, UINT8 *p_name) argument 558 (* p_cback)(status, p_clcb->bda, len, (char *)p_name);
|
/system/bt/bta/ag/ |
H A D | bta_ag_int.h | 165 char p_name[2][BTA_SERVICE_NAME_LEN+1]; member in struct:__anon17
|
/system/bt/bta/dm/ |
H A D | bta_dm_api.c | 176 void BTA_DmSetDeviceName(char *p_name) argument 185 BCM_STRNCPY_S((char*)p_msg->name, sizeof(p_msg->name), p_name, BD_NAME_LEN-1);
|
H A D | bta_dm_act.c | 876 char *p_name; local 889 p_name = BTM_SecReadDevName(p_data->bond.bd_addr); 890 if (p_name != NULL) 892 memcpy(sec_event.auth_cmpl.bd_name, p_name, (BD_NAME_LEN-1)); 3061 static void bta_dm_local_name_cback(UINT8 *p_name) argument 3064 UNUSED(p_name); 3736 char *p_name = (char *)bta_dm_search_cb.peer_name; local 3740 if (*p_name == '\0') 3742 p_name = p_temp; 3744 return p_name; 4410 char *p_name = NULL; local [all...] |