Lines Matching refs:flags
242 static rfc_slot_t* alloc_rfc_slot(const bt_bdaddr_t *addr, const char* name, const uint8_t* uuid, int channel, int flags, BOOLEAN server)
245 if(flags & BTSOCK_FLAG_ENCRYPT)
247 if(flags & BTSOCK_FLAG_AUTH)
314 int* sock_fd, int flags)
339 rfc_slot_t* rs = alloc_rfc_slot(NULL, service_name, service_uuid, channel, flags, TRUE);
358 int channel, int* sock_fd, int flags)
371 rfc_slot_t* rs = alloc_rfc_slot(bd_addr, NULL, service_uuid, channel, flags, FALSE);
888 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id)
894 APPL_TRACE_DEBUG("rfc slot id:%d, fd:%d, flags:%x", rs->id, fd, flags);
896 if(flags & SOCK_THREAD_FD_RD)
905 if(!(flags & SOCK_THREAD_FD_EXCEPTION) ||
924 if(flags & SOCK_THREAD_FD_WR)
935 if(need_close || (flags & SOCK_THREAD_FD_EXCEPTION))
941 APPL_TRACE_DEBUG("SOCK_THREAD_FD_EXCEPTION, cleanup, flags:%x, need_close:%d, pending size:%d",
942 flags, need_close, size);
946 APPL_TRACE_DEBUG("SOCK_THREAD_FD_EXCEPTION, cleanup pending, flags:%x, need_close:%d, pending size:%d",
947 flags, need_close, size);