Searched refs:bond (Results 1 – 15 of 15) sorted by relevance
66 void bond(struct bt_conn *conn);
35 bond(conn); in server_round_0()
177 void bond(struct bt_conn *conn) in bond() function
22 necessary to bond with the set members. If you need to bond with multiple
420 forever resolve addresses from that IRK, even if that bond has been432 bond. However, this naturally limits advertisements from that identity524 peer where an unauthenticated bond already exists.527 to replace the existing bond. When this option is disabled in order528 to create a new bond the old bond has to be explicitly deleted with532 bool "Delete bond with same peer with other local identity when bonding"534 When a bond is about to complete, find any other bond with the same535 peer address (or IRK) and `bt_unpair` that bond before the event556 bond database and the Controller Resolve List. The implementation573 peer where an unauthenticated bond already exists on other local
217 bool bond = !atomic_test_bit(conn->flags, BT_CONN_BR_NOBOND); in ssp_pairing_complete() local223 listener->pairing_complete(conn, bond); in ssp_pairing_complete()
965 Bluetooth: Possible to overwrite an existing bond during keys966 distribution phase when the identity address of the bond is known969 check for an existing bond with the same identity address.This means
699 * :github:`3221` - re-pairing with no-bond legacy pairing results in using all zeros LTK
39 * :github:`24086` - Bluetooth: SMP: Existing bond deleted on pairing failure
1050 * :github:`24086` - Bluetooth: SMP: Existing bond deleted on pairing failure
1233 * :github:`15570` - Unbonded peripheral gets 'Tx Buffer Overflow' when erasing bond on master
1918 * :github:`15570` - Unbonded peripheral gets 'Tx Buffer Overflow' when erasing bond on master
1711 * :github:`35999` - Unexpected Bluetooth disconnection and removal of bond
248 * Fixed a bonding issue where the local bond data was not being updated after
435 unauthorized bond overrides with multiple identities.