Lines Matching refs:psm

58 static tBTM_SEC_SERV_REC *btm_sec_find_first_serv (BOOLEAN is_originator, UINT16 psm);
60 static tBTM_SEC_SERV_REC *btm_sec_find_mx_serv (UINT8 is_originator, UINT16 psm,
79 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
94 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
101 static BOOLEAN btm_sec_is_serv_level0 (UINT16 psm);
470 ** psm - L2CAP PSM
478 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
490 sec_level, psm, mx_proto_id, mx_chan_id));
493 sec_level, psm, mx_proto_id, mx_chan_id));
509 ** psm - L2CAP PSM
517 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
547 /* See if the record can be reused (same service name, psm, mx_proto_id,
559 if (p_srec->psm == psm &&
567 if (p_srec->psm == psm &&
599 p_srec->psm = psm;
702 BTM_TRACE_API("BTM_SEC_REG[%d]: id %d, conn_type 0x%x, psm 0x%04x, proto_id %d, chan_id %d",
703 index, service_id, conn_type, psm, mx_proto_id, mx_chan_id);
715 BTM_TRACE_API("BTM_SEC_REG[%d]: id %d, is_orig %d, psm 0x%04x, proto_id %d, chan_id %d",
716 index, service_id, is_originator, psm, mx_proto_id, mx_chan_id);
755 if ((p_srec->security_flags & BTM_SEC_IN_USE) && (p_srec->psm != BT_PSM_SDP) &&
775 ** All service records with the specified psm are removed.
778 ** The given psm must be a virtual psm.
786 UINT8 btm_sec_clr_service_by_psm (UINT16 psm)
795 if ((p_srec->security_flags & BTM_SEC_IN_USE) && (p_srec->psm == psm) )
802 BTM_TRACE_API("btm_sec_clr_service_by_psm psm:0x%x num_freed:%d", psm, num_freed);
1990 BTM_TRACE_API("BTM_SetOutService p_out_serv id %d, psm 0x%04x, proto_id %d, chan_id %d",
1991 p_serv_rec->service_id, p_serv_rec->psm, p_serv_rec->mx_proto_id, p_serv_rec->orig_mx_chan_id);
2108 ** psm - L2CAP PSM
2127 tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm, UINT16 handle,
2161 p_serv_rec = btm_sec_find_first_serv (conn_type, psm);
2166 BTM_TRACE_WARNING ("%s() PSM: %d no application registerd", __func__, psm);
2172 if ((btm_sec_is_serv_level0(psm)) && (!btm_cb.devcb.secure_connections_only))
2245 BTM_TRACE_DEBUG("%s: security_required 0x%04x, is_originator 0x%02x, psm 0x%04x",
2246 __FUNCTION__, security_required, is_originator, psm);
2271 psm, btm_pair_state_descr(btm_cb.pairing_state), btm_cb.security_mode, p_dev_rec->sm4);
2391 BTM_TRACE_EVENT ("Security Manager: l2cap_access_req PSM:%d postponed for multiplexer", psm);
2410 !BTM_SEC_IS_SM4(p_dev_rec->sm4)) && (psm >= 0x1001))
2412 BTM_TRACE_EVENT ("dynamic PSM:0x%x in legacy mode - postponed for upper layer", psm);
2480 __func__, psm, handle, p_dev_rec->sec_state, p_dev_rec->sec_flags,
2501 ** psm - L2CAP PSM
2515 tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
2530 p_serv_rec = btm_sec_find_mx_serv (is_originator, psm, mx_proto_id, mx_chan_id);
2539 psm, mx_proto_id, mx_chan_id);
2543 if ((btm_cb.security_mode == BTM_SEC_MODE_SC) && (!btm_sec_is_serv_level0(psm)))
2558 psm, mx_proto_id, mx_chan_id, btm_pair_state_descr(btm_cb.pairing_state));
2628 btm_sec_queue_mx_request (bd_addr, psm, is_originator, mx_proto_id,
2907 if (p_e->psm != 0)
2910 __FUNCTION__, p_e->psm, p_e->is_orig,
2913 btm_sec_mx_access_request (p_e->bd_addr, p_e->psm, p_e->is_orig,
3417 BTM_TRACE_EVENT("%s: cur_service psm: 0x%04x, security_flags: 0x%04x",
3418 __FUNCTION__, p_dev_rec->p_cur_service->psm,
5706 static tBTM_SEC_SERV_REC *btm_sec_find_first_serv (CONNECTION_TYPE conn_type, UINT16 psm)
5722 if (is_originator && btm_cb.p_out_serv && btm_cb.p_out_serv->psm == psm)
5732 if ( (p_serv_rec->security_flags & BTM_SEC_IN_USE) && (p_serv_rec->psm == psm) )
5757 && (p_serv_rec->psm == p_cur->psm) )
5779 static tBTM_SEC_SERV_REC *btm_sec_find_mx_serv (UINT8 is_originator, UINT16 psm,
5787 if (is_originator && p_out_serv && p_out_serv->psm == psm
5800 && (p_serv_rec->psm == psm)
6044 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
6052 p_e->psm = psm;
6063 __func__, psm, is_orig, mx_proto_id, mx_chan_id);
6162 p_e->psm = 0; /* if PSM 0, encryption request */
6263 static BOOLEAN btm_sec_is_serv_level0(UINT16 psm)
6265 if (psm == BT_PSM_SDP)
6267 BTM_TRACE_DEBUG("%s: PSM: 0x%04x -> mode 4 level 0 service", __FUNCTION__, psm);
6294 if (memcmp(p_e->bd_addr, p_dev_rec->bd_addr, BD_ADDR_LEN) == 0 && p_e->psm == 0