Searched refs:role (Results 1 - 25 of 53) sorted by relevance

123

/system/bt/bta/pan/
H A Dbta_pan_api.c103 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info, argument
110 p_buf->role = role;
112 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) {
122 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) {
132 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) {
201 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info, argument
204 UNUSED(role);
H A Dbta_pan_act.c370 status = PAN_SetRole(p_data->api_set_role.role, sec,
375 set_role.role = p_data->api_set_role.role;
378 if(p_data->api_set_role.role & PAN_ROLE_NAP_SERVER )
383 if(p_data->api_set_role.role & PAN_ROLE_GN_SERVER )
388 if(p_data->api_set_role.role & PAN_ROLE_CLIENT )
567 If there are, provide a special app_id to dm to enforce master role only. */
H A Dbta_pan_int.h89 tBTA_PAN_ROLE role; member in struct:__anon533
104 tBTA_PAN_ROLE local_role; /* local role */
105 tBTA_PAN_ROLE peer_role; /* peer role */
149 tBTA_PAN_ROLE local_role; /* local role */
150 tBTA_PAN_ROLE peer_role; /* peer role */
/system/bt/stack/pan/
H A Dpan_api.c46 ** should set the PAN role explicitly.
115 ** profile role. This should be called after PAN_Register.
116 ** This can be called any time to change the PAN role
118 ** Parameters: role - is bit map of roles to be active
119 ** PAN_ROLE_CLIENT is for PANU role
120 ** PAN_ROLE_GN_SERVER is for GN role
121 ** PAN_ROLE_NAP_SERVER is for NAP role
125 ** p_user_name - Service name for PANU role
126 ** p_gn_name - Service name for GN role
127 ** p_nap_name - Service name for NAP role
134 PAN_SetRole(UINT8 role, UINT8 *sec_mask, char *p_user_name, char *p_gn_name, char *p_nap_name) argument
[all...]
H A Dpan_int.h31 ** This role is used to shutdown the profile. Used internally
72 UINT8 role; member in struct:__anon1250
/system/bt/bta/include/
H A Dbta_pan_api.h62 char *p_srv_name; /* service name for the PAN role */
64 tBTA_SEC sec_mask; /* security setting for the role */
72 tBTA_PAN_STATUS status; /* status of set role event */
73 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon485
91 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */
92 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */
163 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info,
H A Dbta_jv_api.h537 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
557 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role,
601 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role,
621 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
730 tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr,
761 tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session,
/system/bt/bta/jv/
H A Dbta_jv_api.c309 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument
323 p_msg->role = role;
362 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument
377 p_msg->role = role;
471 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument
485 p_msg->role = role;
522 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument
770 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument
845 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument
[all...]
H A Dbta_jv_int.h168 tBTA_JV_ROLE role; member in struct:__anon503
189 tBTA_JV_ROLE role; member in struct:__anon505
253 tBTA_JV_ROLE role; member in struct:__anon511
265 tBTA_JV_ROLE role; member in struct:__anon512
/system/bt/stack/include/
H A Davct_api.h66 /* Connection role. */
70 /* Control role. */
116 UINT8 role; /* Initiator/acceptor role */ member in struct:__anon929
117 UINT8 control; /* Control role (Control/Target) */
166 ** the p_cc->role parameter. When this function is called to
200 ** the p_cc->role parameter. When this function is called to
210 extern UINT16 AVCT_CreateBrowse(UINT8 handle, UINT8 role);
/system/bt/stack/avct/
H A Davct_api.c123 ** the p_cc->role parameter. When this function is called to
139 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control);
152 if (p_cc->role == AVCT_INT)
227 ** the role parameter. When this function is called to
237 UINT16 AVCT_CreateBrowse (UINT8 handle, UINT8 role) argument
245 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role);
262 if (role == AVCT_INT)
296 UNUSED(role);
H A Davct_lcb_act.c247 else if ((p_ccb->p_lcb == NULL) && (p_ccb->cc.role == AVCT_ACP) &&
314 if (p_ccb->cc.role == AVCT_INT)
361 if (p_ccb->cc.role == AVCT_INT)
/system/bt/stack/smp/
H A Dsmp_br_main.c338 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role];
348 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master",
366 state_table = smp_br_state_table[curr_state][p_cb->role];
H A Dsmp_act.c108 SMP_TRACE_DEBUG("%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x",
109 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key);
121 if (p_cb->role == HCI_ROLE_SLAVE)
570 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
593 if (p_cb->role == HCI_ROLE_SLAVE)
845 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE)
853 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
877 if (p_cb->role == HCI_ROLE_SLAVE)
933 if (p_cb->role == HCI_ROLE_MASTER)
949 if (p_cb->role
[all...]
H A Dsmp_l2c.c117 p_cb->role = L2CA_GetBleConnRole(bd_addr);
169 p_cb->role = L2CA_GetBleConnRole(bd_addr);
319 p_cb->role = HCI_ROLE_SLAVE;
H A Dsmp_utils.c1211 if (p_cb->role == HCI_ROLE_MASTER)
1213 model = smp_association_table[p_cb->role][p_cb->peer_io_caps]
1218 model = smp_association_table[p_cb->role][p_cb->local_io_capability]
1249 if (p_cb->role == HCI_ROLE_MASTER)
1251 model = smp_association_table_sc[p_cb->role][p_cb->peer_io_caps]
1256 model = smp_association_table_sc[p_cb->role][p_cb->local_io_capability]
1477 if (p_cb->role == HCI_ROLE_MASTER)
/system/bt/bta/ag/
H A Dbta_ag_sdp.c81 if (p_scb->role == BTA_AG_ACP)
318 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
348 if (p_scb->role == BTA_AG_INT)
414 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
424 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP)
433 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
/system/bt/bta/av/
H A Dbta_av_aact.c323 /* if start failed, clear role */
324 p_scb->role &= ~BTA_AV_ROLE_START_INT;
352 (p_scb->use_rc == TRUE || (p_scb->role & BTA_AV_ROLE_AD_ACP)))
761 ** Description Switch role was not started and a timer was started.
762 ** another attempt to switch role now - still opening.
816 ** Description Handle the role changed event
828 APPL_TRACE_DEBUG("bta_av_role_res q_tag:%d, wait:x%x, role:x%x", p_scb->q_tag, p_scb->wait, p_scb->role);
829 if (p_scb->role & BTA_AV_ROLE_START_INT)
839 p_scb->role
1051 UINT8 role = BTA_AV_ROLE_AD_INT; local
[all...]
H A Dbta_av_main.c63 /* the delay time in milliseconds to retry role switch */
401 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role);
690 /* if the AV and AVK are both supported, it cannot support the CT role */
847 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */
906 ** Description Receives the role change event from dm
922 /* loop through all the SCBs to find matching peer addresses and report the role change event */
945 /* restore role switch policy, if role switch failed */
953 /* if BTA_AvOpen() was called for other device, which caused the role switc
1050 UINT8 role; local
1100 UINT8 role; local
[all...]
/system/bt/bta/hf_client/
H A Dbta_hf_client_act.c194 /* set role */
195 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_INT;
270 /* set role */
271 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP;
326 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP;
396 bta_hf_client_cb.scb.role = BTA_HF_CLIENT_ACP;
H A Dbta_hf_client_sdp.c59 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_ACP)
236 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_INT)
310 if (bta_hf_client_cb.scb.role == BTA_HF_CLIENT_INT)
/system/bt/stack/avdt/
H A Davdt_ad.c386 /* use err_param to indicate the role of connection.
537 void avdt_ad_open_req(UINT8 type, tAVDT_CCB *p_ccb, tAVDT_SCB *p_scb, UINT8 role) argument
550 AVDT_TRACE_DEBUG("avdt_ad_open_req: type: %d, role: %d, tcid:%d",
551 type, role, p_tbl->tcid);
573 if (role == AVDT_ACP)
H A Davdt_scb_act.c58 ** role when the stream is closed.
94 p_scb->role = AVDT_CLOSE_ACP;
127 p_scb->role = AVDT_CLOSE_ACP;
229 p_scb->role = AVDT_OPEN_INT;
1027 if ((p_scb->role == AVDT_CLOSE_INT) || (p_scb->role == AVDT_OPEN_INT))
1032 event = (p_scb->role == AVDT_CLOSE_INT) ? AVDT_CLOSE_CFM_EVT : AVDT_CLOSE_IND_EVT;
1033 p_scb->role = AVDT_CLOSE_ACP;
1154 UINT8 role; local
1159 event = (p_scb->role
[all...]
/system/bt/bta/gatt/
H A Dbta_gattc_utils.c600 BOOLEAN bta_gattc_check_bg_conn (tBTA_GATTC_IF client_if, BD_ADDR remote_bda, UINT8 role) argument
613 role == HCI_ROLE_MASTER)
617 role == HCI_ROLE_SLAVE)
763 if (p_msg->int_conn.role == HCI_ROLE_SLAVE)
772 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */
775 p_msg->int_conn.role))
/system/bt/btif/src/
H A Dbtif_sock_rfc.c90 int role; member in struct:__anon688
245 accept_rs->role = srv_rs->role;
340 tBTA_JV_STATUS ret = BTA_JvRfcommConnect(slot->security, slot->role, slot->scn, slot->addr.address, rfcomm_cback, (void *)(uintptr_t)slot->id);
653 BTA_JvRfcommStartServer(rs->security, rs->role, rs->scn, MAX_RFC_SESSION,
676 BTA_JvRfcommStartServer(slot->security, slot->role, slot->scn, MAX_RFC_SESSION, rfcomm_cback, (void *)(uintptr_t)slot->id);
692 if (BTA_JvRfcommConnect(slot->security, slot->role, p_data->disc_comp.scn, slot->addr.address, rfcomm_cback, (void *)(uintptr_t)slot->id) == BTA_JV_SUCCESS) {

Completed in 453 milliseconds

123