/system/bt/bta/hf_client/ |
H A D | bta_hf_client_api.cc | 52 tBTA_STATUS BTA_HfClientEnable(tBTA_HF_CLIENT_CBACK* p_cback, tBTA_SEC sec_mask, argument 55 return bta_hf_client_api_enable(p_cback, sec_mask, features, p_service_name); 79 void BTA_HfClientOpen(BD_ADDR bd_addr, tBTA_SEC sec_mask, uint16_t* p_handle) { argument 92 p_buf->sec_mask = sec_mask;
|
/system/bt/bta/ag/ |
H A D | bta_ag_api.cc | 105 void BTA_AgRegister(tBTA_SERVICE_MASK services, tBTA_SEC sec_mask, argument 113 p_buf->sec_mask = sec_mask; 158 void BTA_AgOpen(uint16_t handle, BD_ADDR bd_addr, tBTA_SEC sec_mask, argument 167 p_buf->sec_mask = sec_mask;
|
/system/bt/bta/include/ |
H A D | bta_ar_api.h | 100 extern void bta_ar_reg_avct(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask,
|
H A D | bta_jv_api.h | 521 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 543 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, 591 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, 614 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 729 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 761 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
|
H A D | bta_pan_api.h | 60 tBTA_SEC sec_mask; /* security setting for the role */ member in struct:__anon468
|
H A D | bta_hf_client_api.h | 276 tBTA_STATUS BTA_HfClientEnable(tBTA_HF_CLIENT_CBACK* p_cback, tBTA_SEC sec_mask, 306 void BTA_HfClientOpen(BD_ADDR bd_addr, tBTA_SEC sec_mask, uint16_t* p_handle);
|
H A D | bta_hl_api.h | 289 tBTA_SEC sec_mask; /* security mask for accepting conenction*/ member in struct:__anon404 301 tBTA_SEC sec_mask; /* security mask for initiating connection*/ member in struct:__anon405 309 tBTA_SEC sec_mask; /* security mask for initiating connection*/ member in struct:__anon406
|
/system/bt/bta/hl/ |
H A D | bta_hl_api.cc | 113 p_buf->sec_mask = 114 (p_reg_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 157 p_buf->sec_mask = 158 (p_reg_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 228 p_buf->sec_mask = 229 (p_open_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 282 p_buf->sec_mask = 283 (p_open_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT);
|
/system/bt/stack/pan/ |
H A D | pan_utils.cc | 63 uint32_t pan_register_with_sdp(uint16_t uuid, uint8_t sec_mask, argument 102 if (sec_mask) { 127 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_NAP, sec_mask, 131 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP, 139 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 142 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 152 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP, 155 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP,
|
H A D | pan_int.h | 117 extern uint32_t pan_register_with_sdp(uint16_t uuid, uint8_t sec_mask,
|
/system/bt/bta/jv/ |
H A D | bta_jv_api.cc | 301 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 314 p_msg->sec_mask = sec_mask; 354 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, argument 369 p_msg->sec_mask = sec_mask; 463 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, argument 478 p_msg->sec_mask = sec_mask; 517 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROL argument 765 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint8_t remote_scn, BD_ADDR peer_bd_addr, tBTA_JV_RFCOMM_CBACK* p_cback, uint32_t rfcomm_slot_id) argument 838 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint8_t local_scn, uint8_t max_session, tBTA_JV_RFCOMM_CBACK* p_cback, uint32_t rfcomm_slot_id) argument [all...] |
H A D | bta_jv_int.h | 159 tBTA_SEC sec_mask; member in struct:__anon487 179 tBTA_SEC sec_mask; member in struct:__anon489 238 tBTA_SEC sec_mask; member in struct:__anon495 249 tBTA_SEC sec_mask; member in struct:__anon496
|
/system/bt/bta/hh/ |
H A D | bta_hh_api.cc | 62 void BTA_HhEnable(tBTA_SEC sec_mask, tBTA_HH_CBACK* p_cback) { argument 66 LOG_INFO(LOG_TAG, "%s sec_mask:0x%x p_cback:%p", __func__, sec_mask, p_cback); 73 p_buf->sec_mask = sec_mask; 125 void BTA_HhOpen(BD_ADDR dev_bda, tBTA_HH_PROTO_MODE mode, tBTA_SEC sec_mask) { argument 131 p_buf->sec_mask = sec_mask;
|
H A D | bta_hh_int.h | 111 uint8_t sec_mask; member in struct:__anon201 119 uint8_t sec_mask; member in struct:__anon202 225 uint8_t sec_mask; /* security mask */ member in struct:__anon210
|
/system/bt/bta/pan/ |
H A D | bta_pan_api.cc | 111 p_buf->user_sec_mask = p_user_info->sec_mask; 119 p_buf->gn_sec_mask = p_gn_info->sec_mask; 127 p_buf->nap_sec_mask = p_nap_info->sec_mask;
|
H A D | bta_pan_int.h | 123 tBTA_SEC sec_mask; /* Security mask */ member in struct:__anon522
|
/system/bt/stack/avct/ |
H A D | avct_api.cc | 55 uint8_t sec_mask) { 62 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_PSM, 0, 64 BTM_SetSecurityLevel(false, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_PSM, 0, 75 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_BR_PSM, 77 BTM_SetSecurityLevel(false, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_BR_PSM, 54 AVCT_Register(uint16_t mtu, UNUSED_ATTR uint16_t mtu_br, uint8_t sec_mask) argument
|
/system/bt/stack/include/ |
H A D | avct_api.h | 139 extern void AVCT_Register(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask);
|
H A D | mca_api.h | 107 uint16_t sec_mask; /* Security mask for BTM_SetSecurityLevel() */ member in struct:__anon1165 336 uint16_t ctrl_psm, uint16_t sec_mask); 529 uint16_t ctrl_psm, uint16_t sec_mask);
|
H A D | pan_api.h | 244 * sec_mask - Security mask for different roles 258 extern tPAN_RESULT PAN_SetRole(uint8_t role, uint8_t* sec_mask,
|
/system/bt/bta/av/ |
H A D | bta_av_api.cc | 59 void BTA_AvEnable(tBTA_SEC sec_mask, tBTA_AV_FEAT features, argument 70 p_buf->sec_mask = sec_mask; 155 tBTA_SEC sec_mask, uint16_t uuid) { 163 p_buf->sec_mask = sec_mask; 154 BTA_AvOpen(BD_ADDR bd_addr, tBTA_AV_HNDL handle, bool use_rc, tBTA_SEC sec_mask, uint16_t uuid) argument
|
H A D | bta_av_main.cc | 235 bta_av_cb.sec_mask = p_data->api_enable.sec_mask; 457 reg.sec_mask = bta_av_cb.sec_mask; 469 bta_av_cb.sec_mask, BTA_ID_AV); 472 (uint8_t)(bta_av_cb.sec_mask & (~BTA_SEC_AUTHORIZE)), 631 bta_av_cb.sec_mask, BTA_ID_AV); 635 (uint8_t)(bta_av_cb.sec_mask & (~BTA_SEC_AUTHORIZE)),
|
/system/bt/bta/ar/ |
H A D | bta_ar.cc | 180 void bta_ar_reg_avct(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask, argument 186 AVCT_Register(mtu, mtu_br, sec_mask);
|
/system/bt/btif/include/ |
H A D | btif_hl.h | 159 tBTA_SEC sec_mask; member in struct:__anon587 191 tBTA_SEC sec_mask; member in struct:__anon589 226 uint16_t sec_mask; /* Security mask for BTM_SetSecurityLevel() */ member in struct:__anon591
|
/system/bt/stack/mcap/ |
H A D | mca_api.cc | 144 p_reg->sec_mask, p_reg->ctrl_psm, 153 p_reg->sec_mask, p_reg->data_psm, 306 uint16_t ctrl_psm, uint16_t sec_mask) { 325 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_MCAP_CTRL, sec_mask, 332 p_ccb->sec_mask = sec_mask; 682 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_MCAP_DATA, p_ccb->sec_mask, 305 MCA_ConnectReq(tMCA_HANDLE handle, BD_ADDR bd_addr, uint16_t ctrl_psm, uint16_t sec_mask) argument
|