Searched defs:p_name (Results 1 - 9 of 9) sorted by relevance
/system/bt/stack/pan/ |
H A D | pan_utils.c | 61 UINT32 pan_register_with_sdp (UINT16 uuid, UINT8 sec_mask, char *p_name, char *p_desc) argument 97 (UINT8) (strlen(p_name) + 1), (UINT8 *)p_name); 128 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_NAP, 130 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_NAP, 140 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_GN, 142 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_GN, 152 if ((!BTM_SetSecurityLevel (TRUE, p_name, BTM_SEC_SERVICE_BNEP_PANU, 154 || (!BTM_SetSecurityLevel (FALSE, p_name, BTM_SEC_SERVICE_BNEP_PANU,
|
/system/bt/stack/btm/ |
H A D | btm_dev.c | 222 char *p_name = NULL; local 226 p_name = (char *)p_srec->sec_bd_name; 228 return(p_name);
|
H A D | btm_devctl.c | 444 tBTM_STATUS BTM_SetLocalDeviceName (char *p_name) argument 448 if (!p_name || !p_name[0] || (strlen ((char *)p_name) > BD_NAME_LEN)) 457 if (p != (UINT8 *)p_name) 458 strlcpy(btm_cb.cfg.bd_name, p_name, BTM_MAX_LOC_BD_NAME_LEN); 460 p = (UINT8 *)p_name; 478 ** If success, BTM_SUCCESS is returned and p_name points stored 481 ** is returned and p_name is set to NULL 484 tBTM_STATUS BTM_ReadLocalDeviceName (char **p_name) argument [all...] |
H A D | btm_ble_gap.c | 2038 void btm_ble_read_remote_name_cmpl(BOOLEAN status, BD_ADDR bda, UINT16 length, char *p_name) argument 2048 memcpy((UINT8*)bd_name, p_name, length); 2056 btm_sec_rmt_name_request_complete (bda, (UINT8 *)p_name, hci_status);
|
H A D | btm_sec.c | 96 static BOOLEAN btm_sec_set_security_level ( CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, 466 ** p_name - Name of the service relevant only if 478 BOOLEAN BTM_SetSecurityLevel (BOOLEAN is_originator, char *p_name, UINT8 service_id, argument 490 return(btm_sec_set_security_level (conn_type, p_name, service_id, 493 return(btm_sec_set_security_level (is_originator, p_name, service_id, 505 ** p_name - Name of the service relevant only if 517 static BOOLEAN btm_sec_set_security_level (CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, argument 562 p_name && 563 (!strncmp (p_name, (char *) p_srec->orig_service_name, 565 !strncmp (p_name, (cha [all...] |
/system/bt/stack/gap/ |
H A D | gap_ble.c | 545 void gap_ble_cl_op_cmpl(tGAP_CLCB *p_clcb, BOOLEAN status, UINT16 len, UINT8 *p_name) argument 558 (* p_cback)(status, p_clcb->bda, len, (char *)p_name);
|
/system/bt/bta/ag/ |
H A D | bta_ag_int.h | 153 char p_name[2][BTA_SERVICE_NAME_LEN+1]; member in struct:__anon15
|
/system/bt/bta/dm/ |
H A D | bta_dm_api.c | 159 void BTA_DmSetDeviceName(char *p_name) argument 165 strlcpy((char*)p_msg->name, p_name, BD_NAME_LEN);
|
H A D | bta_dm_act.c | 941 char *p_name; local 954 p_name = BTM_SecReadDevName(p_data->bond.bd_addr); 955 if (p_name != NULL) 957 memcpy(sec_event.auth_cmpl.bd_name, p_name, (BD_NAME_LEN-1)); 2986 static void bta_dm_local_name_cback(UINT8 *p_name) argument 2989 UNUSED(p_name); 3631 char *p_name = (char *)bta_dm_search_cb.peer_name; local 3635 if (*p_name == '\0') 3637 p_name = p_temp; 3639 return p_name; 4325 char *p_name = NULL; local [all...] |
Completed in 681 milliseconds