/system/bt/bta/pan/ |
H A D | bta_pan_api.c | 103 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info, argument 110 p_buf->role = role; 112 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) { 122 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) { 132 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) { 201 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info, argument 204 UNUSED(role);
|
H A D | bta_pan_act.c | 370 status = PAN_SetRole(p_data->api_set_role.role, sec, 375 set_role.role = p_data->api_set_role.role; 378 if(p_data->api_set_role.role & PAN_ROLE_NAP_SERVER ) 383 if(p_data->api_set_role.role & PAN_ROLE_GN_SERVER ) 388 if(p_data->api_set_role.role & PAN_ROLE_CLIENT ) 567 If there are, provide a special app_id to dm to enforce master role only. */
|
H A D | bta_pan_int.h | 89 tBTA_PAN_ROLE role; member in struct:__anon533 104 tBTA_PAN_ROLE local_role; /* local role */ 105 tBTA_PAN_ROLE peer_role; /* peer role */ 149 tBTA_PAN_ROLE local_role; /* local role */ 150 tBTA_PAN_ROLE peer_role; /* peer role */
|
/system/bt/stack/pan/ |
H A D | pan_api.c | 46 ** should set the PAN role explicitly. 115 ** profile role. This should be called after PAN_Register. 116 ** This can be called any time to change the PAN role 118 ** Parameters: role - is bit map of roles to be active 119 ** PAN_ROLE_CLIENT is for PANU role 120 ** PAN_ROLE_GN_SERVER is for GN role 121 ** PAN_ROLE_NAP_SERVER is for NAP role 125 ** p_user_name - Service name for PANU role 126 ** p_gn_name - Service name for GN role 127 ** p_nap_name - Service name for NAP role 134 PAN_SetRole(UINT8 role, UINT8 *sec_mask, char *p_user_name, char *p_gn_name, char *p_nap_name) argument [all...] |
H A D | pan_int.h | 31 ** This role is used to shutdown the profile. Used internally 72 UINT8 role; member in struct:__anon1250
|
/system/bt/bta/include/ |
H A D | bta_pan_api.h | 62 char *p_srv_name; /* service name for the PAN role */ 64 tBTA_SEC sec_mask; /* security setting for the role */ 72 tBTA_PAN_STATUS status; /* status of set role event */ 73 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon485 91 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */ 92 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */ 163 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info,
|
H A D | bta_jv_api.h | 537 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 557 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 601 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 621 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 730 tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, 761 tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session,
|
/system/bt/bta/jv/ |
H A D | bta_jv_api.c | 309 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 323 p_msg->role = role; 362 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 377 p_msg->role = role; 471 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 485 p_msg->role = role; 522 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 770 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument 845 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument [all...] |
H A D | bta_jv_int.h | 168 tBTA_JV_ROLE role; member in struct:__anon503 189 tBTA_JV_ROLE role; member in struct:__anon505 253 tBTA_JV_ROLE role; member in struct:__anon511 265 tBTA_JV_ROLE role; member in struct:__anon512
|
/system/bt/stack/include/ |
H A D | avct_api.h | 66 /* Connection role. */ 70 /* Control role. */ 116 UINT8 role; /* Initiator/acceptor role */ member in struct:__anon929 117 UINT8 control; /* Control role (Control/Target) */ 166 ** the p_cc->role parameter. When this function is called to 200 ** the p_cc->role parameter. When this function is called to 210 extern UINT16 AVCT_CreateBrowse(UINT8 handle, UINT8 role);
|
/system/bt/stack/avct/ |
H A D | avct_api.c | 123 ** the p_cc->role parameter. When this function is called to 139 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); 152 if (p_cc->role == AVCT_INT) 227 ** the role parameter. When this function is called to 237 UINT16 AVCT_CreateBrowse (UINT8 handle, UINT8 role) argument 245 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); 262 if (role == AVCT_INT) 296 UNUSED(role);
|
H A D | avct_lcb_act.c | 247 else if ((p_ccb->p_lcb == NULL) && (p_ccb->cc.role == AVCT_ACP) && 314 if (p_ccb->cc.role == AVCT_INT) 361 if (p_ccb->cc.role == AVCT_INT)
|
/system/bt/stack/smp/ |
H A D | smp_br_main.c | 338 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role]; 348 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master", 366 state_table = smp_br_state_table[curr_state][p_cb->role];
|
H A D | smp_act.c | 108 SMP_TRACE_DEBUG("%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x", 109 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key); 121 if (p_cb->role == HCI_ROLE_SLAVE) 570 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) 593 if (p_cb->role == HCI_ROLE_SLAVE) 845 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE) 853 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) 877 if (p_cb->role == HCI_ROLE_SLAVE) 933 if (p_cb->role == HCI_ROLE_MASTER) 949 if (p_cb->role [all...] |
H A D | smp_l2c.c | 117 p_cb->role = L2CA_GetBleConnRole(bd_addr); 169 p_cb->role = L2CA_GetBleConnRole(bd_addr); 319 p_cb->role = HCI_ROLE_SLAVE;
|
H A D | smp_utils.c | 1211 if (p_cb->role == HCI_ROLE_MASTER) 1213 model = smp_association_table[p_cb->role][p_cb->peer_io_caps] 1218 model = smp_association_table[p_cb->role][p_cb->local_io_capability] 1249 if (p_cb->role == HCI_ROLE_MASTER) 1251 model = smp_association_table_sc[p_cb->role][p_cb->peer_io_caps] 1256 model = smp_association_table_sc[p_cb->role][p_cb->local_io_capability] 1477 if (p_cb->role == HCI_ROLE_MASTER)
|
/system/bt/bta/ag/ |
H A D | bta_ag_sdp.c | 81 if (p_scb->role == BTA_AG_ACP) 318 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) 348 if (p_scb->role == BTA_AG_INT) 414 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT) 424 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP) 433 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
|
/system/bt/bta/av/ |
H A D | bta_av_aact.c | 323 /* if start failed, clear role */ 324 p_scb->role &= ~BTA_AV_ROLE_START_INT; 352 (p_scb->use_rc == TRUE || (p_scb->role & BTA_AV_ROLE_AD_ACP))) 761 ** Description Switch role was not started and a timer was started. 762 ** another attempt to switch role now - still opening. 816 ** Description Handle the role changed event 828 APPL_TRACE_DEBUG("bta_av_role_res q_tag:%d, wait:x%x, role:x%x", p_scb->q_tag, p_scb->wait, p_scb->role); 829 if (p_scb->role & BTA_AV_ROLE_START_INT) 839 p_scb->role 1051 UINT8 role = BTA_AV_ROLE_AD_INT; local [all...] |
H A D | bta_av_main.c | 63 /* the delay time in milliseconds to retry role switch */ 401 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role); 690 /* if the AV and AVK are both supported, it cannot support the CT role */ 847 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */ 906 ** Description Receives the role change event from dm 922 /* loop through all the SCBs to find matching peer addresses and report the role change event */ 945 /* restore role switch policy, if role switch failed */ 953 /* if BTA_AvOpen() was called for other device, which caused the role switc 1050 UINT8 role; local 1100 UINT8 role; local [all...] |
/system/bt/bta/hf_client/ |
H A D | bta_hf_client_act.c | 194 /* set role */ 195 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_INT; 270 /* set role */ 271 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP; 326 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP; 396 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP;
|
H A D | bta_hf_client_sdp.c | 59 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_ACP) 236 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_INT) 310 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_INT)
|
/system/bt/stack/avdt/ |
H A D | avdt_ad.c | 386 /* use err_param to indicate the role of connection. 537 void avdt_ad_open_req(UINT8 type, tAVDT_CCB *p_ccb, tAVDT_SCB *p_scb, UINT8 role) argument 550 AVDT_TRACE_DEBUG("avdt_ad_open_req: type: %d, role: %d, tcid:%d", 551 type, role, p_tbl->tcid); 573 if (role == AVDT_ACP)
|
H A D | avdt_scb_act.c | 58 ** role when the stream is closed. 94 p_scb->role = AVDT_CLOSE_ACP; 127 p_scb->role = AVDT_CLOSE_ACP; 229 p_scb->role = AVDT_OPEN_INT; 1027 if ((p_scb->role == AVDT_CLOSE_INT) || (p_scb->role == AVDT_OPEN_INT)) 1032 event = (p_scb->role == AVDT_CLOSE_INT) ? AVDT_CLOSE_CFM_EVT : AVDT_CLOSE_IND_EVT; 1033 p_scb->role = AVDT_CLOSE_ACP; 1154 UINT8 role; local 1159 event = (p_scb->role [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.c | 600 BOOLEAN bta_gattc_check_bg_conn (tBTA_GATTC_IF client_if, BD_ADDR remote_bda, UINT8 role) argument 613 role == HCI_ROLE_MASTER) 617 role == HCI_ROLE_SLAVE) 763 if (p_msg->int_conn.role == HCI_ROLE_SLAVE) 772 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */ 775 p_msg->int_conn.role))
|
/system/bt/btif/src/ |
H A D | btif_sock_rfc.c | 90 int role; member in struct:__anon688 245 accept_rs->role = srv_rs->role; 340 tBTA_JV_STATUS ret = BTA_JvRfcommConnect(slot->security, slot->role, slot->scn, slot->addr.address, rfcomm_cback, (void *)(uintptr_t)slot->id); 653 BTA_JvRfcommStartServer(rs->security, rs->role, rs->scn, MAX_RFC_SESSION, 676 BTA_JvRfcommStartServer(slot->security, slot->role, slot->scn, MAX_RFC_SESSION, rfcomm_cback, (void *)(uintptr_t)slot->id); 692 if (BTA_JvRfcommConnect(slot->security, slot->role, p_data->disc_comp.scn, slot->addr.address, rfcomm_cback, (void *)(uintptr_t)slot->id) == BTA_JV_SUCCESS) {
|