Lines Matching full:bd_addr
44 BOOLEAN (APPL_AUTH_WRITE_EXCEPTION)(BD_ADDR bd_addr);
71 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
265 BOOLEAN BTM_GetSecurityFlags (BD_ADDR bd_addr, UINT8 * p_sec_flags)
269 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
822 ** Parameters: bd_addr - Address of the device for which PIN was requested
829 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[])
843 if (memcmp (bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) != 0)
849 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL)
869 btsnd_hcic_pin_code_neg_reply (bd_addr);
892 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr))
918 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
934 btsnd_hcic_pin_code_req_reply (bd_addr, pin_len, p_pin);
945 ** Parameters: bd_addr - Address of the device for which PIN was requested
949 void BTM_DeviceAuthorized (BD_ADDR bd_addr, UINT8 res, UINT32 trusted_mask[])
953 if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL)
956 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[5]);
997 ** Parameters: bd_addr - Address of the device to bond
1004 tBTM_STATUS BTM_SecBond (BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[])
1013 bd_addr[0], bd_addr[1], bd_addr[2], bd_addr[3], bd_addr[4], bd_addr[5]);
1023 p_dev_rec = btm_find_or_alloc_dev (bd_addr);
1028 p = btm_bda_to_acl(bd_addr);
1073 if ((BTM_DeleteStoredLinkKey (bd_addr, NULL)) != BTM_SUCCESS)
1083 memcpy (btm_cb.pairing_bda, bd_addr, BD_ADDR_LEN);
1106 if (SMP_Pair(p_dev_rec->bd_addr) == SMP_STARTED)
1156 l2cu_update_lcb_4_bonding (bd_addr, TRUE);
1176 BTM_ReadRemoteDeviceName(bd_addr, NULL);
1206 ** Parameters: bd_addr - Address of the peer device
1209 tBTM_STATUS BTM_SecBondCancel (BD_ADDR bd_addr)
1219 if (((p_dev_rec = btm_find_dev (bd_addr)) == NULL)
1220 || (memcmp (btm_cb.pairing_bda, bd_addr, BD_ADDR_LEN) != 0) )
1224 p = btm_bda_to_acl(bd_addr);
1229 if (SMP_PairCancel(bd_addr))
1264 l2cu_update_lcb_4_bonding(bd_addr, FALSE);
1273 if (btsnd_hcic_create_conn_cancel(bd_addr))
1326 ** Parameters: bd_addr - Address of the device
1330 tBTM_STATUS BTM_SecGetDeviceLinkKey (BD_ADDR bd_addr, LINK_KEY link_key)
1334 if (((p_dev_rec = btm_find_dev (bd_addr
1353 ** Parameters: bd_addr - Address of the peer device
1369 tBTM_STATUS BTM_SetEncryption (BD_ADDR bd_addr, tBTM_SEC_CBACK *p_callback,
1377 p = btm_bda_to_acl(bd_addr);
1380 p_dev_rec = btm_find_dev (bd_addr);
1387 (*p_callback) (bd_addr, p_ref_data, BTM_WRONG_MODE);
1403 (*p_callback) (bd_addr, p_ref_data, BTM_SUCCESS);
1414 (*p_callback) (bd_addr, p_ref_data, BTM_BUSY);
1430 rc = btm_ble_set_encryption(bd_addr, p_ref_data, p->link_role);
1442 (*p_callback) (bd_addr, p_dev_rec->p_ref_data, rc);
1491 ** bd_addr - Address of the peer device
1494 void BTM_ConfirmReqReply(tBTM_STATUS res, BD_ADDR bd_addr)
1503 || (memcmp (btm_cb.pairing_bda, bd_addr, BD_ADDR_LEN) != 0) )
1514 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
1518 btsnd_hcic_user_conf_reply (bd_addr, TRUE);
1524 btsnd_hcic_user_conf_reply (bd_addr, FALSE);
1536 ** bd_addr - Address of the peer device
1542 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey)
1550 || (memcmp (btm_cb.pairing_bda, bd_addr, BD_ADDR_LEN) != 0) )
1558 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
1565 BTM_SecBondCancel(bd_addr);
1585 btsnd_hcic_user_passkey_neg_reply (bd_addr);
1590 btsnd_hcic_user_passkey_reply (bd_addr, passkey);
1605 ** Parameters: bd_addr - Address of the peer device
1610 void BTM_SendKeypressNotif(BD_ADDR bd_addr, tBTM_SP_KEY_TYPE type)
1614 btsnd_hcic_send_keypress_notif (bd_addr, type);
1628 ** Parameters: bd_addr - Address of the peer device
1634 void BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req)
1640 || (memcmp (btm_cb.pairing_bda, bd_addr, BD_ADDR_LEN) != 0) )
1651 btsnd_hcic_io_cap_req_reply (bd_addr, io_cap, oob, auth_req);
1680 ** Parameters: bd_addr - Address of the peer device
1685 void BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, BT_OCTET16 r)
1700 btsnd_hcic_rem_oob_neg_reply (bd_addr);
1705 btsnd_hcic_rem_oob_reply (bd_addr, c, r);
1835 p_ret = p; /* the location for bd_addr */
1889 void BTM_SetOutService(BD_ADDR bd_addr, UINT8 service_id, UINT32 mx_chan_id)
1896 p_dev_rec = btm_find_dev (bd_addr);
1950 memcpy (evt_data.bd_addr, p_dev_rec->bd_addr, BD_ADDR_LEN);
1977 ** Parameters: bd_addr - Address of the peer device
1991 tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm, UINT16 handle,
2019 p_dev_rec = btm_find_or_alloc_dev (bd_addr);
2031 (*p_callback) (bd_addr, p_ref_data, BTM_MODE_UNSUPPORTED);
2039 (*p_callback) (bd_addr, p_ref_data, BTM_SUCCESS_NO_SECURITY);
2073 (*p_callback) (bd_addr, (void *)p_ref_data, BTM_SUCCESS);
2121 (*p_callback) (bd_addr, (void *)p_ref_data, BTM_SUCCESS);
2214 (*p_callback) (bd_addr, p_ref_data, BTM_SUCCESS);
2229 (*p_callback) (bd_addr, p_ref_data, BTM_SUCCESS);
2251 (*p_callback) (bd_addr, p_ref_data, rc);
2277 (*p_callback) (bd_addr, p_dev_rec->p_ref_data, (UINT8)rc);
2291 ** Parameters: bd_addr - Address of the peer device
2306 tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
2317 p_dev_rec = btm_find_or_alloc_dev (bd_addr);
2326 (*p_callback) (bd_addr, p_ref_data, BTM_MODE_UNSUPPORTED);
2340 btm_sec_queue_mx_request (bd_addr, psm, is_originator, mx_proto_id, mx_chan_id, p_callback, p_ref_data);
2375 (*p_callback) (bd_addr, p_ref_data, (UINT8)rc);
2577 if (btm_bda_to_acl(p_e->bd_addr) != NULL)
2582 btm_sec_mx_access_request (p_e->bd_addr, p_e->psm, p_e->is_orig,
2689 ** Parameters: bd_addr - Address of the peer device
2694 void btm_sec_abort_access_req (BD_ADDR bd_addr)
2696 tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr);
2702 (*btm_cb.api.p_abort_callback)(bd_addr, p_dev_rec->dev_class, p_dev_rec->sec_bd_name);
2727 if ((p_lcb = l2cu_allocate_lcb (p_dev_rec->bd_addr, TRUE)) == NULL)
2730 p_dev_rec->bd_addr[0], p_dev_rec->bd_addr[1], p_dev_rec->bd_addr[2],
2731 p_dev_rec->bd_addr[3], p_dev_rec->bd_addr[4], p_dev_rec->bd_addr[5]);
2742 p_dev_rec->bd_addr[0], p_dev_rec->bd_addr[1], p_dev_rec->bd_addr[2],
2743 p_dev_rec->bd_addr[3], p_dev_rec->bd_addr[4], p_dev_rec->bd_addr[5]);
2754 p_dev_rec->bd_addr[0], p_dev_rec->bd_addr[1], p_dev_rec->bd_addr[2],
2755 p_dev_rec->bd_addr[3], p_dev_rec->bd_addr[4], p_dev_rec->bd_addr[5]);
2799 p_bd_addr = p_dev_rec->bd_addr;
2883 (*btm_cb.api.p_pin_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class, p_bd_name);
2901 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
2936 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
2967 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
3024 BD_ADDR bd_addr; /* peer address */
3027 STREAM_TO_BDADDR (bd_addr, p);
3028 p_dev_rec = btm_find_or_alloc_dev (bd_addr);
3063 STREAM_TO_BDADDR (evt_data.bd_addr, p);
3074 p_dev_rec = btm_find_or_alloc_dev (evt_data.bd_addr);
3094 Event uninit_use_in_call: Using uninitialized element of array "evt_data.bd_addr" in call to function "memcmp"
3095 False-positive: evt_data.bd_addr is set at the beginning with: STREAM_TO_BDADDR (evt_data.bd_addr, p);
3097 if (memcmp (evt_data.bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN))
3121 Event uninit_use_in_call: Using uninitialized element of array "evt_data.bd_addr" in call to function "memcmp"
3122 False-positive: evt_data.bd_addr is set at the beginning with: STREAM_TO_BDADDR (evt_data.bd_addr, p);
3124 btsnd_hcic_io_cap_req_neg_reply(evt_data.bd_addr, err_code);
3142 l2c_pin_code_request (evt_data.bd_addr);
3144 memcpy (btm_cb.pairing_bda, evt_data.bd_addr, BD_ADDR_LEN);
3147 Event uninit_use_in_call: Using uninitialized element of array "evt_data.bd_addr" in call to function "memcmp"
3148 False-positive: False-positive: evt_data.bd_addr is set at the beginning with: STREAM_TO_BDADDR (evt_data.bd_addr, p);
3150 if (!memcmp (evt_data.bd_addr, btm_cb.connecting_bda, BD_ADDR_LEN))
3189 btsnd_hcic_io_cap_req_reply(evt_data.bd_addr, evt_data.io_cap,
3209 STREAM_TO_BDADDR (evt_data.bd_addr, p);
3215 p_dev_rec = btm_find_or_alloc_dev (evt_data.bd_addr);
3220 memcpy (btm_cb.pairing_bda, evt_data.bd_addr, BD_ADDR_LEN);
3232 l2c_pin_code_request (evt_data.bd_addr);
3237 Event uninit_use_in_call: Using uninitialized element of array "evt_data.bd_addr" in call to function "memcmp"
3238 FALSE-POSITIVE error from Coverity test-tool. evt_data.bd_addr is set at the beginning with: STREAM_TO_BDADDR (evt_data.bd_addr, p);
3240 if (!memcmp (evt_data.bd_addr, btm_cb.connecting_bda, BD_ADDR_LEN))
3274 UINT8 *p_bda = evt_data.cfm_req.bd_addr;
3277 /* All events start with bd_addr */
3288 memcpy (evt_data.cfm_req.bd_addr, p_dev_rec->bd_addr, BD_ADDR_LEN);
3417 p_bda = evt_data.bd_addr;
3444 STREAM_TO_BDADDR (evt_data.bd_addr, p);
3446 if ((p_dev_rec = btm_find_dev (evt_data.bd_addr)) == NULL)
3449 (evt_data.bd_addr[0]<<24) + (evt_data.bd_addr[1]<<16) + (evt_data.bd_addr[2]<<8) + evt_data.bd_addr[3],
3450 (evt_data.bd_addr[4] << 8) + evt_data.bd_addr[5]);
3473 else if (memcmp (btm_cb.pairing_bda, evt_data.bd_addr, BD_ADDR_LEN) == 0)
3489 memcpy (evt_data.bd_addr, p_dev_rec->bd_addr, BD_ADDR_LEN);
3521 p_bda = evt_data.bd_addr;
3531 memcpy (evt_data.bd_addr, p_dev_rec->bd_addr, BD_ADDR_LEN);
3645 (p_dev_rec->bd_addr[2]<<24)+(p_dev_rec->bd_addr[3]<<16)+(p_dev_rec->bd_addr[4]<<8)+p_dev_rec->bd_addr[5],
3688 && (memcmp (p_dev_rec->bd_addr, btm_cb.pairing_bda, BD_ADDR_LEN) == 0) )
3698 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
3723 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
3766 BTM_DeleteStoredLinkKey (bd_addr, NULL); */
3808 UINT8 bd_addr[BD_ADDR_LEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff} ;
3818 (btm_cb.mkey_cback)(bd_addr, status, key_flg );
3820 (btm_cb.mkey_cback)(p_dev_rec->bd_addr, status, key_flg );
3866 btm_ble_link_encrypted(p_dev_rec->bd_addr, encr_enable);
3881 l2cu_resubmit_pending_sec_req (p_dev_rec->bd_addr);
3913 BOOLEAN btm_sec_create_conn (BD_ADDR bda, UINT16 packet_types,
3919 memcpy (btm_cb.connecting_bda, p_dev_rec->bd_addr, BD_ADDR_LEN);
3959 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
4022 && (memcmp (btm_cb.pairing_bda, p_dev_rec->bd_addr, BD_ADDR_LEN) == 0)
4043 BTM_ReadRemoteDeviceName(p_dev_rec->bd_addr, NULL);
4052 l2cu_update_lcb_4_bonding(p_dev_rec->bd_addr, TRUE);
4123 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
4143 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
4178 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
4187 l2cu_update_lcb_4_bonding (p_dev_rec->bd_addr, TRUE);
4306 && (memcmp (btm_cb.pairing_bda, p_dev_rec->bd_addr, BD_ADDR_LEN) == 0)
4350 p_dev_rec->security_required, btm_pair_state_descr(btm_cb.pairing_state), reason, (p_dev_rec->bd_addr[0]<<8)+p_dev_rec->bd_addr[1],
4351 (p_dev_rec->bd_addr[2]<<24)+(p_dev_rec->bd_addr[3]<<16)+(p_dev_rec->bd_addr[4]<<8)+p_dev_rec->bd_addr[5], p_dev_rec->sec_bd_name);
4357 && (memcmp (btm_cb.pairing_bda, p_dev_rec->bd_addr, BD_ADDR_LEN) == 0))
4375 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
4463 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
4576 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
4637 (*btm_cb.api.p_auth_complete_callback) (p_dev_rec->bd_addr,
4803 if (!btsnd_hcic_rmt_name_req (p_dev_rec->bd_addr,
4841 if ((p_inq_info = BTM_InqDbRead(p_dev_rec->bd_addr)) == NULL)
4983 if ((btm_initiate_rem_name (p_dev_rec->bd_addr, NULL, BTM_RMT_NAME_SEC,
5063 result = (*btm_cb.api.p_authorize_callback) (p_dev_rec->bd_addr,
5256 (*btm_cb.api.p_link_key_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class,
5267 ** Parameters: bd_addr - Address of the device
5273 UINT32 * BTM_ReadTrustedMask (BD_ADDR bd_addr)
5277 if ((p_dev_rec = btm_find_dev (bd_addr)) != NULL)
5473 (*p_callback) (p_dev_rec->bd_addr, p_dev_rec->p_ref_data, res);
5486 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
5503 memcpy (p_e->bd_addr, bd_addr, BD_ADDR_LEN);
5531 if(!(APPL_AUTH_WRITE_EXCEPTION)(p_dev_rec->bd_addr))
5543 BTM_PINCodeReply (p_dev_rec->bd_addr, BTM_SUCCESS, btm_cb.pin_code_len, btm_cb.pin_code, p_dev_rec->trusted_mask);
5551 if (btm_bda_to_acl(p_dev_rec->bd_addr) == NULL)
5553 (btm_cb.api.p_pin_callback) (p_dev_rec->bd_addr, p_dev_rec->dev_class, p_dev_rec->sec_bd_name);
5583 gatt_delete_dev_from_srv_chg_clt_list(p_dev_rec->bd_addr);
5596 BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda)