/system/bt/include/hardware/ |
H A D | bt_mce.h | 27 char* p_name; member in struct:__anon787
|
/system/bt/stack/pan/ |
H A D | pan_utils.cc | 65 const char* p_name, const char* p_desc) { 96 (uint8_t)(strlen(p_name) + 1), (uint8_t*)p_name); 128 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_NAP, sec_mask, 131 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_NAP, 140 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 143 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 152 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_PANU, 155 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_PANU, 64 pan_register_with_sdp(uint16_t uuid, uint8_t sec_mask, const char* p_name, const char* p_desc) argument
|
/system/nfc/src/nfc/llcp/ |
H A D | llcp_sdp.cc | 103 static void llcp_sdp_add_sdreq(uint8_t tid, char* p_name) { argument 105 uint16_t name_len = (uint16_t)strlen(p_name); 113 ARRAY_TO_BE_STREAM(p, p_name, name_len); 128 tLLCP_STATUS llcp_sdp_send_sdreq(uint8_t tid, char* p_name) { argument 134 << StringPrintf("tid=0x%x, ServiceName=%s", tid, p_name); 151 name_len = (uint16_t)strlen(p_name); 157 llcp_sdp_add_sdreq(tid, p_name); 170 llcp_sdp_add_sdreq(tid, p_name); 293 uint8_t llcp_sdp_get_sap_by_name(char* p_name, uint8_t length) { argument 302 (!strncmp((char*)p_app_cb->p_service_name, p_name, lengt [all...] |
H A D | llcp_api.cc | 1464 tLLCP_STATUS LLCP_DiscoverService(char* p_name, tLLCP_SDP_CBACK* p_cback, argument 1469 DLOG_IF(INFO, nfc_debug_enabled) << StringPrintf("Service Name:%s", p_name); 1494 status = llcp_sdp_send_sdreq(llcp_cb.sdp_cb.transac[i].tid, p_name);
|
/system/bt/bta/include/ |
H A D | bta_hd_api.h | 55 char* p_name; member in struct:__anon319
|
/system/bt/stack/btm/ |
H A D | btm_dev.cc | 209 char* p_name = NULL; local 213 if (p_srec != NULL) p_name = (char*)p_srec->sec_bd_name; 215 return (p_name);
|
H A D | btm_devctl.cc | 424 tBTM_STATUS BTM_SetLocalDeviceName(char* p_name) { argument 427 if (!p_name || !p_name[0] || (strlen((char*)p_name) > BD_NAME_LEN)) 433 if (p != (uint8_t*)p_name) 434 strlcpy(btm_cb.cfg.bd_name, p_name, BTM_MAX_LOC_BD_NAME_LEN); 447 * If success, BTM_SUCCESS is returned and p_name points stored 450 * is returned and p_name is set to NULL 453 tBTM_STATUS BTM_ReadLocalDeviceName(char** p_name) { argument 454 *p_name [all...] |
H A D | btm_ble_gap.cc | 1438 uint16_t length, char* p_name) { 1446 memcpy((uint8_t*)bd_name, p_name, length); 1453 btm_sec_rmt_name_request_complete(&bda, (uint8_t*)p_name, hci_status); 1437 btm_ble_read_remote_name_cmpl(bool status, const RawAddress& bda, uint16_t length, char* p_name) argument
|
H A D | btm_sec.cc | 92 const char* p_name, uint8_t service_id, 440 * p_name - Name of the service relevant only if 453 bool BTM_SetSecurityLevel(bool is_originator, const char* p_name, argument 456 return (btm_sec_set_security_level(is_originator, p_name, service_id, 467 * p_name - Name of the service relevant only if 481 const char* p_name, uint8_t service_id, 504 service_id == p_srec->service_id && p_name && 505 (!strncmp(p_name, (char*)p_srec->orig_service_name, 508 !strncmp(p_name, (char*)p_srec->term_service_name, 548 strlcpy((char*)p_srec->orig_service_name, p_name, 480 btm_sec_set_security_level(CONNECTION_TYPE conn_type, const char* p_name, uint8_t service_id, uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, uint32_t mx_chan_id) argument [all...] |
/system/bt/stack/gap/ |
H A D | gap_ble.cc | 263 void cl_op_cmpl(tGAP_CLCB& clcb, bool status, uint16_t len, uint8_t* p_name) { argument 274 (*p_cback)(status, clcb.bda, len, (char*)p_name);
|
/system/bt/stack/hid/ |
H A D | hidd_api.cc | 181 tHID_STATUS HID_DevAddRecord(uint32_t handle, char* p_name, char* p_description, argument 233 const char* srv_name = p_name;
|
/system/bt/bta/dm/ |
H A D | bta_dm_api.cc | 98 void BTA_DmSetDeviceName(char* p_name) { argument 100 strlcpy((char*)name.data(), p_name, BD_NAME_LEN);
|
H A D | bta_dm_act.cc | 79 static void bta_dm_local_name_cback(void* p_name); 801 char* p_name; local 811 p_name = BTM_SecReadDevName(bd_addr); 812 if (p_name != NULL) { 813 memcpy(sec_event.auth_cmpl.bd_name, p_name, (BD_NAME_LEN - 1)); 2625 static void bta_dm_local_name_cback(UNUSED_ATTR void* p_name) { argument 3166 char* p_name = (char*)bta_dm_search_cb.peer_name; local 3170 if (*p_name == '\0') { 3172 if (p_temp != NULL) p_name = p_temp; 3175 return p_name; 3759 char* p_name = NULL; local [all...] |
/system/bt/bta/ag/ |
H A D | bta_ag_int.h | 119 char p_name[2][BTA_SERVICE_NAME_LEN + 1]; member in struct:__anon20
|