Searched refs:bond (Results 1 – 15 of 15) sorted by relevance
66 void bond(struct bt_conn *conn);
35 bond(conn); in server_round_0()
184 void bond(struct bt_conn *conn) in bond() function
471 forever resolve addresses from that IRK, even if that bond has been483 bond. However, this naturally limits advertisements from that identity588 peer where an unauthenticated bond already exists.591 to replace the existing bond. When this option is disabled in order592 to create a new bond the old bond has to be explicitly deleted with596 bool "Delete bond with same peer with other local identity when bonding"598 When a bond is about to complete, find any other bond with the same599 peer address (or IRK) and `bt_unpair` that bond before the event620 bond database and the Controller Resolve List. The implementation637 peer where an unauthenticated bond already exists on other local
22 necessary to bond with the set members. If you need to bond with multiple
225 bool bond = !atomic_test_bit(conn->flags, BT_CONN_BR_NOBOND); in ssp_pairing_complete() local231 listener->pairing_complete(conn, bond); in ssp_pairing_complete()
879 Bluetooth: Possible to overwrite an existing bond during keys880 distribution phase when the identity address of the bond is known883 check for an existing bond with the same identity address.This means
699 * :github:`3221` - re-pairing with no-bond legacy pairing results in using all zeros LTK
39 * :github:`24086` - Bluetooth: SMP: Existing bond deleted on pairing failure
1050 * :github:`24086` - Bluetooth: SMP: Existing bond deleted on pairing failure
1233 * :github:`15570` - Unbonded peripheral gets 'Tx Buffer Overflow' when erasing bond on master
1918 * :github:`15570` - Unbonded peripheral gets 'Tx Buffer Overflow' when erasing bond on master
1711 * :github:`35999` - Unexpected Bluetooth disconnection and removal of bond
248 * Fixed a bonding issue where the local bond data was not being updated after
435 unauthorized bond overrides with multiple identities.