Lines Matching full:bd_addr
37 extern void smp_link_encrypted(BD_ADDR bda, UINT8 encr_enable);
38 extern BOOLEAN smp_proc_ltk_request(BD_ADDR bda);
54 ** Parameters: bd_addr - BD address of the peer
62 BOOLEAN BTM_SecAddBleDevice (BD_ADDR bd_addr, BD_NAME bd_name, tBT_DEVICE_TYPE dev_type,
71 p_dev_rec = btm_find_dev (bd_addr);
89 memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
90 p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr);
125 p_info = BTM_InqDbRead(bd_addr);
146 ** Parameters: bd_addr - BD address of the peer
153 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALUE *p_le_key, tBTM_LE_KEY_TYPE key_type)
158 p_dev_rec = btm_find_dev (bd_addr);
165 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8)+bd_addr[3],
166 (bd_addr[4]<<8)+bd_addr[5], key_type);
171 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8)+bd_addr[3],
172 (bd_addr[4]<<8)+bd_addr[5], key_type);
178 btm_sec_save_le_key (bd_addr, key_type, p_le_key, FALSE);
292 void BTM_ReadConnectionAddr (BD_ADDR conn_addr)
313 ** Parameters bd_addr - peer device bd address.
320 void BTM_SecurityGrant(BD_ADDR bd_addr, UINT8 res)
325 SMP_SecurityGrant(bd_addr, res_smp);
336 ** Parameters: bd_addr - Address of the device for which passkey was requested
343 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey)
346 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
351 SMP_PasskeyReply(bd_addr, res_smp, passkey);
362 ** Parameters: bd_addr - Address of the peer device
367 void BTM_BleOobDataReply(BD_ADDR bd_addr, UINT8 res, UINT8 len, UINT8 *p_data)
371 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
375 SMP_OobDataReply(bd_addr, res_smp, len, p_data);
430 ** Parameters: bd_addr - BD address of the peripheral
441 void BTM_BleSetPrefConnParams (BD_ADDR bd_addr,
446 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
509 void BTM_ReadDevInfo (BD_ADDR remote_bda, tBT_DEVICE_TYPE *p_dev_type, tBLE_ADDR_TYPE *p_addr_type)
593 BOOLEAN btm_ble_check_link_type (BD_ADDR bd_addr)
597 if ((p = btm_bda_to_acl(bd_addr)) != NULL)
656 void btm_ble_increment_sign_ctr(BD_ADDR bd_addr, BOOLEAN is_local )
662 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
685 BOOLEAN btm_ble_get_enc_key_type(BD_ADDR bd_addr, UINT8 *p_key_types)
691 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
707 BOOLEAN btm_get_local_div (BD_ADDR bd_addr, UINT16 *p_div)
713 BTM_TRACE_DEBUG6("bd_addr:%02x-%02x-%02x-%02x-%02x-%02x",
714 bd_addr[0],bd_addr[1],
715 bd_addr[2],bd_addr[3],
716 bd_addr[4],bd_addr[5]);
718 p_dev_rec = btm_find_dev (bd_addr);
742 void btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys,
751 BTM_TRACE_DEBUG6("bd_addr:%02x-%02x-%02x-%02x-%02x-%02x",
752 bd_addr[0],bd_addr[1],
753 bd_addr[2],bd_addr[3],
754 bd_addr[4],bd_addr[5]);
756 if ((p_rec = btm_find_dev (bd_addr)) != NULL && p_keys)
833 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8)+bd_addr[3],
834 (bd_addr[4]<<8)+bd_addr[5]);
843 (*btm_cb.api.p_le_callback) (BTM_LE_KEY_EVT, bd_addr, &cb_data);
849 (bd_addr[0]<<24)+(bd_addr[1]<<16)+(bd_addr[2]<<8)+bd_addr[3],
850 (bd_addr[4]<<8)+bd_addr[5]);
867 void btm_ble_update_sec_key_size(BD_ADDR bd_addr, UINT8 enc_key_size)
873 if ((p_rec = btm_find_dev (bd_addr)) != NULL )
888 UINT8 btm_ble_read_sec_key_size(BD_ADDR bd_addr)
892 if ((p_rec = btm_find_dev (bd_addr)) != NULL )
909 void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act)
911 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
997 tBTM_STATUS btm_ble_set_encryption (BD_ADDR bd_addr, void *p_ref_data, UINT8 link_role)
1001 tBTM_SEC_DEV_REC *p_rec = btm_find_dev (bd_addr);
1021 btm_ble_start_encrypt(bd_addr, FALSE, NULL);
1031 if (SMP_Pair(bd_addr) == SMP_STARTED)
1068 if (!smp_proc_ltk_request(p_dev_rec->bd_addr))
1069 btm_ble_ltk_request_reply(p_dev_rec->bd_addr, FALSE, dummy_stk);
1084 BOOLEAN btm_ble_start_encrypt(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk)
1123 void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable)
1125 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
1129 smp_link_encrypted(bd_addr, encr_enable);
1201 btm_ble_link_encrypted(p_dev_rec->bd_addr, 0);
1217 void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk)
1263 callback_rc = (*btm_cb.api.p_le_callback) (BTM_LE_IO_REQ_EVT, p_dev_rec->bd_addr, (tBTM_LE_EVT_DATA *)p_data);
1314 UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data)
1316 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
1339 (*btm_cb.api.p_le_callback) (event, bd_addr, (tBTM_LE_EVT_DATA *)p_data);
1368 btm_remove_acl(bd_addr);
1378 btm_remove_acl(bd_addr);
1420 ** Parameter bd_addr: target device the data to be signed for.
1429 BOOLEAN BTM_BleDataSignature (BD_ADDR bd_addr, UINT8 *p_text, UINT16 len,
1434 tBTM_SEC_DEV_REC *p_rec = btm_find_dev (bd_addr);
1476 if (btm_get_local_div(bd_addr, &div))
1510 btm_ble_increment_sign_ctr(bd_addr, TRUE);
1541 ** Parameter bd_addr: target device the data to be signed for.
1550 BOOLEAN BTM_BleVerifySignature (BD_ADDR bd_addr, UINT8 *p_orig, UINT16 len, UINT32 counter,
1555 tBTM_SEC_DEV_REC *p_rec = btm_find_dev (bd_addr);
1578 btm_ble_increment_sign_ctr(bd_addr, FALSE);