Searched defs:p_name (Results 1 - 9 of 9) sorted by relevance

/system/bt/stack/pan/
H A Dpan_utils.c61 UINT32 pan_register_with_sdp (UINT16 uuid, UINT8 sec_mask, char *p_name, char *p_desc) argument
99 (UINT8) (strlen(p_name) + 1), (UINT8 *)p_name);
130 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_NAP,
132 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_NAP,
142 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_GN,
144 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_GN,
154 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_PANU,
156 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_PANU,
/system/bt/stack/btm/
H A Dbtm_dev.c219 char *p_name = NULL; local
223 p_name = (char *)p_srec->sec_bd_name;
225 return(p_name);
H A Dbtm_devctl.c441 tBTM_STATUS BTM_SetLocalDeviceName (char *p_name) argument
445 if (!p_name || !p_name[0] || (strlen ((char *)p_name) > BD_NAME_LEN))
454 if (p != (UINT8 *)p_name)
456 BCM_STRNCPY_S(btm_cb.cfg.bd_name, sizeof(btm_cb.cfg.bd_name), p_name, BTM_MAX_LOC_BD_NAME_LEN);
460 p = (UINT8 *)p_name;
478 ** If success, BTM_SUCCESS is returned and p_name points stored
481 ** is returned and p_name is set to NULL
484 tBTM_STATUS BTM_ReadLocalDeviceName (char **p_name) argument
[all...]
H A Dbtm_ble_gap.c2016 void btm_ble_read_remote_name_cmpl(BOOLEAN status, BD_ADDR bda, UINT16 length, char *p_name) argument
2026 memcpy((UINT8*)bd_name, p_name, length);
2034 btm_sec_rmt_name_request_complete (bda, (UINT8 *)p_name, hci_status);
H A Dbtm_sec.c93 static BOOLEAN btm_sec_set_security_level ( CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id,
465 ** p_name - Name of the service relevant only if
477 BOOLEAN BTM_SetSecurityLevel (BOOLEAN is_originator, char *p_name, UINT8 service_id, argument
489 return(btm_sec_set_security_level (conn_type, p_name, service_id,
492 return(btm_sec_set_security_level (is_originator, p_name, service_id,
504 ** p_name - Name of the service relevant only if
516 static BOOLEAN btm_sec_set_security_level (CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, argument
562 (!strncmp (p_name, (char *) p_srec->orig_service_name,
564 !strncmp (p_name, (char *) p_srec->term_service_name,
607 BCM_STRNCPY_S ((char *)p_srec->orig_service_name, sizeof(p_srec->orig_service_name), p_name, BTM_SEC_SERVICE_NAME_LE
[all...]
/system/bt/stack/gap/
H A Dgap_ble.c545 void gap_ble_cl_op_cmpl(tGAP_CLCB *p_clcb, BOOLEAN status, UINT16 len, UINT8 *p_name) argument
558 (* p_cback)(status, p_clcb->bda, len, (char *)p_name);
/system/bt/bta/ag/
H A Dbta_ag_int.h165 char p_name[2][BTA_SERVICE_NAME_LEN+1]; member in struct:__anon17
/system/bt/bta/dm/
H A Dbta_dm_api.c176 void BTA_DmSetDeviceName(char *p_name) argument
185 BCM_STRNCPY_S((char*)p_msg->name, sizeof(p_msg->name), p_name, BD_NAME_LEN-1);
H A Dbta_dm_act.c876 char *p_name; local
889 p_name = BTM_SecReadDevName(p_data->bond.bd_addr);
890 if (p_name != NULL)
892 memcpy(sec_event.auth_cmpl.bd_name, p_name, (BD_NAME_LEN-1));
3061 static void bta_dm_local_name_cback(UINT8 *p_name) argument
3064 UNUSED(p_name);
3736 char *p_name = (char *)bta_dm_search_cb.peer_name; local
3740 if (*p_name == '\0')
3742 p_name = p_temp;
3744 return p_name;
4410 char *p_name = NULL; local
[all...]

Completed in 260 milliseconds