/system/bt/bta/hf_client/ |
H A D | bta_hf_client_api.cc | 52 tBTA_STATUS BTA_HfClientEnable(tBTA_HF_CLIENT_CBACK* p_cback, tBTA_SEC sec_mask, argument 55 return bta_hf_client_api_enable(p_cback, sec_mask, features, p_service_name); 79 void BTA_HfClientOpen(const RawAddress& bd_addr, tBTA_SEC sec_mask, argument 93 p_buf->sec_mask = sec_mask;
|
/system/bt/bta/ag/ |
H A D | bta_ag_api.cc | 105 void BTA_AgRegister(tBTA_SERVICE_MASK services, tBTA_SEC sec_mask, argument 113 p_buf->sec_mask = sec_mask; 158 void BTA_AgOpen(uint16_t handle, const RawAddress& bd_addr, tBTA_SEC sec_mask, argument 167 p_buf->sec_mask = sec_mask;
|
/system/bt/bta/include/ |
H A D | bta_ar_api.h | 100 extern void bta_ar_reg_avct(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask,
|
H A D | bta_jv_api.h | 521 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 545 int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 590 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, 613 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 728 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 761 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
|
H A D | bta_pan_api.h | 60 tBTA_SEC sec_mask; /* security setting for the role */ member in struct:__anon465
|
H A D | bta_hf_client_api.h | 276 tBTA_STATUS BTA_HfClientEnable(tBTA_HF_CLIENT_CBACK* p_cback, tBTA_SEC sec_mask, 306 void BTA_HfClientOpen(const RawAddress& bd_addr, tBTA_SEC sec_mask,
|
H A D | bta_hl_api.h | 289 tBTA_SEC sec_mask; /* security mask for accepting conenction*/ member in struct:__anon401 301 tBTA_SEC sec_mask; /* security mask for initiating connection*/ member in struct:__anon402 309 tBTA_SEC sec_mask; /* security mask for initiating connection*/ member in struct:__anon403
|
/system/bt/bta/hl/ |
H A D | bta_hl_api.cc | 113 p_buf->sec_mask = 114 (p_reg_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 157 p_buf->sec_mask = 158 (p_reg_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 228 p_buf->sec_mask = 229 (p_open_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT); 282 p_buf->sec_mask = 283 (p_open_param->sec_mask | BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT);
|
/system/bt/stack/pan/ |
H A D | pan_utils.cc | 64 uint32_t pan_register_with_sdp(uint16_t uuid, uint8_t sec_mask, argument 103 if (sec_mask) { 128 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_NAP, sec_mask, 132 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP, 140 if ((!BTM_SetSecurityLevel(true, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 143 (!BTM_SetSecurityLevel(false, p_name, BTM_SEC_SERVICE_BNEP_GN, sec_mask, 153 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP, 156 sec_mask, BT_PSM_BNEP, BTM_SEC_PROTO_BNEP,
|
/system/bt/tools/mcap_tool/ |
H A D | mcap_test_app.h | 50 * @param sec_mask Security Mask 54 bool Register(uint16_t ctrl_psm, uint16_t data_psm, uint16_t sec_mask, 70 * @param sec_mask Security mask 74 uint16_t sec_mask);
|
H A D | mcap_test_mcl.h | 38 * @param sec_mask Security mask 41 bool Connect(uint16_t ctrl_psm, uint16_t sec_mask);
|
H A D | mcap_test_app.cc | 114 uint16_t sec_mask, tMCA_CTRL_CBACK* callback) { 122 _mca_reg.sec_mask = sec_mask; 136 uint16_t sec_mask) { 151 return mcap_mcl->Connect(ctrl_psm, sec_mask); 113 Register(uint16_t ctrl_psm, uint16_t data_psm, uint16_t sec_mask, tMCA_CTRL_CBACK* callback) argument 135 ConnectMcl(const RawAddress& bd_addr, uint16_t ctrl_psm, uint16_t sec_mask) argument
|
/system/bt/bta/jv/ |
H A D | bta_jv_api.cc | 301 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 315 p_msg->sec_mask = sec_mask; 356 int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 368 p_msg->sec_mask = sec_mask; 462 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, argument 477 p_msg->sec_mask = sec_mask; 516 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROL argument 355 BTA_JvL2capConnect( int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, const tL2CAP_ERTM_INFO* ertm_info, uint16_t remote_psm, uint16_t rx_mtu, tL2CAP_CFG_INFO* cfg, const RawAddress& peer_bd_addr, tBTA_JV_L2CAP_CBACK* p_cback, uint32_t l2cap_socket_id) argument 764 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint8_t remote_scn, const RawAddress& peer_bd_addr, tBTA_JV_RFCOMM_CBACK* p_cback, uint32_t rfcomm_slot_id) argument 838 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint8_t local_scn, uint8_t max_session, tBTA_JV_RFCOMM_CBACK* p_cback, uint32_t rfcomm_slot_id) argument [all...] |
H A D | bta_jv_int.h | 159 tBTA_SEC sec_mask; member in struct:__anon484 179 tBTA_SEC sec_mask; member in struct:__anon486 238 tBTA_SEC sec_mask; member in struct:__anon492 249 tBTA_SEC sec_mask; member in struct:__anon493
|
/system/bt/bta/hh/ |
H A D | bta_hh_api.cc | 62 void BTA_HhEnable(tBTA_SEC sec_mask, tBTA_HH_CBACK* p_cback) { argument 66 LOG_INFO(LOG_TAG, "%s sec_mask:0x%x p_cback:%p", __func__, sec_mask, p_cback); 73 p_buf->sec_mask = sec_mask; 126 tBTA_SEC sec_mask) { 132 p_buf->sec_mask = sec_mask; 125 BTA_HhOpen(const RawAddress& dev_bda, tBTA_HH_PROTO_MODE mode, tBTA_SEC sec_mask) argument
|
H A D | bta_hh_int.h | 111 uint8_t sec_mask; member in struct:__anon198 119 uint8_t sec_mask; member in struct:__anon199 225 uint8_t sec_mask; /* security mask */ member in struct:__anon207
|
/system/bt/bta/pan/ |
H A D | bta_pan_api.cc | 111 p_buf->user_sec_mask = p_user_info->sec_mask; 119 p_buf->gn_sec_mask = p_gn_info->sec_mask; 127 p_buf->nap_sec_mask = p_nap_info->sec_mask;
|
H A D | bta_pan_int.h | 123 tBTA_SEC sec_mask; /* Security mask */ member in struct:__anon519
|
/system/bt/stack/avct/ |
H A D | avct_api.cc | 55 uint8_t sec_mask) { 62 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_PSM, 0, 64 BTM_SetSecurityLevel(false, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_PSM, 0, 75 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_BR_PSM, 77 BTM_SetSecurityLevel(false, "", BTM_SEC_SERVICE_AVCTP, sec_mask, AVCT_BR_PSM, 54 AVCT_Register(uint16_t mtu, UNUSED_ATTR uint16_t mtu_br, uint8_t sec_mask) argument
|
/system/bt/stack/include/ |
H A D | avct_api.h | 139 extern void AVCT_Register(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask);
|
H A D | mca_api.h | 107 uint16_t sec_mask; /* Security mask for BTM_SetSecurityLevel() */ member in struct:__anon1154 336 uint16_t ctrl_psm, uint16_t sec_mask); 529 uint16_t ctrl_psm, uint16_t sec_mask);
|
/system/bt/bta/av/ |
H A D | bta_av_api.cc | 59 void BTA_AvEnable(tBTA_SEC sec_mask, tBTA_AV_FEAT features, argument 70 p_buf->sec_mask = sec_mask; 155 tBTA_SEC sec_mask, uint16_t uuid) { 163 p_buf->sec_mask = sec_mask; 154 BTA_AvOpen(const RawAddress& bd_addr, tBTA_AV_HNDL handle, bool use_rc, tBTA_SEC sec_mask, uint16_t uuid) argument
|
/system/bt/bta/ar/ |
H A D | bta_ar.cc | 180 void bta_ar_reg_avct(uint16_t mtu, uint16_t mtu_br, uint8_t sec_mask, argument 186 AVCT_Register(mtu, mtu_br, sec_mask);
|
/system/bt/btif/include/ |
H A D | btif_hl.h | 159 tBTA_SEC sec_mask; member in struct:__anon583 191 tBTA_SEC sec_mask; member in struct:__anon585 226 uint16_t sec_mask; /* Security mask for BTM_SetSecurityLevel() */ member in struct:__anon587
|
/system/bt/stack/mcap/ |
H A D | mca_api.cc | 144 p_reg->sec_mask, p_reg->ctrl_psm, 153 p_reg->sec_mask, p_reg->data_psm, 306 uint16_t ctrl_psm, uint16_t sec_mask) { 325 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_MCAP_CTRL, sec_mask, 332 p_ccb->sec_mask = sec_mask; 685 BTM_SetSecurityLevel(true, "", BTM_SEC_SERVICE_MCAP_DATA, p_ccb->sec_mask, 305 MCA_ConnectReq(tMCA_HANDLE handle, const RawAddress& bd_addr, uint16_t ctrl_psm, uint16_t sec_mask) argument
|