Searched defs:p_name (Results 1 - 14 of 14) sorted by relevance

/system/bt/include/hardware/
H A Dbt_mce.h27 char* p_name; member in struct:__anon787
/system/bt/stack/pan/
H A Dpan_utils.cc65 const char* p_name, const char* p_desc) {
96 (uint8_t)(strlen(p_name) + 1), (uint8_t*)p_name);
128 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_NAP, sec_mask,
131 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_NAP,
140 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask,
143 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask,
152 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_PANU,
155 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_PANU,
64 pan_register_with_sdp(uint16_t uuid, uint8_t sec_mask, const char* p_name, const char* p_desc) argument
/system/nfc/src/nfc/llcp/
H A Dllcp_sdp.cc103 static void llcp_sdp_add_sdreq(uint8_t tid, char* p_name) { argument
105 uint16_t name_len = (uint16_t)strlen(p_name);
113 ARRAY_TO_BE_STREAM(p, p_name, name_len);
128 tLLCP_STATUS llcp_sdp_send_sdreq(uint8_t tid, char* p_name) { argument
134 << StringPrintf("tid=0x%x, ServiceName=%s", tid, p_name);
151 name_len = (uint16_t)strlen(p_name);
157 llcp_sdp_add_sdreq(tid, p_name);
170 llcp_sdp_add_sdreq(tid, p_name);
293 uint8_t llcp_sdp_get_sap_by_name(char* p_name, uint8_t length) { argument
302 (!strncmp((char*)p_app_cb->p_service_name, p_name, lengt
[all...]
H A Dllcp_api.cc1464 tLLCP_STATUS LLCP_DiscoverService(char* p_name, tLLCP_SDP_CBACK* p_cback, argument
1469 DLOG_IF(INFO, nfc_debug_enabled) << StringPrintf("Service Name:%s", p_name);
1494 status = llcp_sdp_send_sdreq(llcp_cb.sdp_cb.transac[i].tid, p_name);
/system/bt/bta/include/
H A Dbta_hd_api.h55 char* p_name; member in struct:__anon319
/system/bt/stack/btm/
H A Dbtm_dev.cc209 char* p_name = NULL; local
213 if (p_srec != NULL) p_name = (char*)p_srec->sec_bd_name;
215 return (p_name);
H A Dbtm_devctl.cc424 tBTM_STATUS BTM_SetLocalDeviceName(char* p_name) { argument
427 if (!p_name || !p_name[0] || (strlen((char*)p_name) > BD_NAME_LEN))
433 if (p != (uint8_t*)p_name)
434 strlcpy(btm_cb.cfg.bd_name, p_name, BTM_MAX_LOC_BD_NAME_LEN);
447 * If success, BTM_SUCCESS is returned and p_name points stored
450 * is returned and p_name is set to NULL
453 tBTM_STATUS BTM_ReadLocalDeviceName(char** p_name) { argument
454 *p_name
[all...]
H A Dbtm_ble_gap.cc1438 uint16_t length, char* p_name) {
1446 memcpy((uint8_t*)bd_name, p_name, length);
1453 btm_sec_rmt_name_request_complete(&bda, (uint8_t*)p_name, hci_status);
1437 btm_ble_read_remote_name_cmpl(bool status, const RawAddress& bda, uint16_t length, char* p_name) argument
H A Dbtm_sec.cc92 const char* p_name, uint8_t service_id,
440 * p_name - Name of the service relevant only if
453 bool BTM_SetSecurityLevel(bool is_originator, const char* p_name, argument
456 return (btm_sec_set_security_level(is_originator, p_name, service_id,
467 * p_name - Name of the service relevant only if
481 const char* p_name, uint8_t service_id,
504 service_id == p_srec->service_id && p_name &&
505 (!strncmp(p_name, (char*)p_srec->orig_service_name,
508 !strncmp(p_name, (char*)p_srec->term_service_name,
548 strlcpy((char*)p_srec->orig_service_name, p_name,
480 btm_sec_set_security_level(CONNECTION_TYPE conn_type, const char* p_name, uint8_t service_id, uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, uint32_t mx_chan_id) argument
[all...]
/system/bt/stack/gap/
H A Dgap_ble.cc263 void cl_op_cmpl(tGAP_CLCB& clcb, bool status, uint16_t len, uint8_t* p_name) { argument
274 (*p_cback)(status, clcb.bda, len, (char*)p_name);
/system/bt/stack/hid/
H A Dhidd_api.cc181 tHID_STATUS HID_DevAddRecord(uint32_t handle, char* p_name, char* p_description, argument
233 const char* srv_name = p_name;
/system/bt/bta/dm/
H A Dbta_dm_api.cc98 void BTA_DmSetDeviceName(char* p_name) { argument
100 strlcpy((char*)name.data(), p_name, BD_NAME_LEN);
H A Dbta_dm_act.cc79 static void bta_dm_local_name_cback(void* p_name);
801 char* p_name; local
811 p_name = BTM_SecReadDevName(bd_addr);
812 if (p_name != NULL) {
813 memcpy(sec_event.auth_cmpl.bd_name, p_name, (BD_NAME_LEN - 1));
2625 static void bta_dm_local_name_cback(UNUSED_ATTR void* p_name) { argument
3166 char* p_name = (char*)bta_dm_search_cb.peer_name; local
3170 if (*p_name == '\0') {
3172 if (p_temp != NULL) p_name = p_temp;
3175 return p_name;
3759 char* p_name = NULL; local
[all...]
/system/bt/bta/ag/
H A Dbta_ag_int.h119 char p_name[2][BTA_SERVICE_NAME_LEN + 1]; member in struct:__anon20

Completed in 8825 milliseconds