/system/bt/bta/pan/ |
H A D | bta_pan_api.cc | 97 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info, argument 104 p_buf->role = role; 106 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) { 114 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) { 122 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) { 182 void BTA_PanSetRole(UNUSED_ATTR tBTA_PAN_ROLE role, argument
|
H A D | bta_pan_int.h | 75 tBTA_PAN_ROLE role; member in struct:__anon459 88 tBTA_PAN_ROLE local_role; /* local role */ 89 tBTA_PAN_ROLE peer_role; /* peer role */ 127 tBTA_PAN_ROLE local_role; /* local role */ 128 tBTA_PAN_ROLE peer_role; /* peer role */
|
/system/bt/bta/include/ |
H A D | bta_pan_api.h | 58 const char* p_srv_name; /* service name for the PAN role */ 60 tBTA_SEC sec_mask; /* security setting for the role */ 66 tBTA_PAN_STATUS status; /* status of set role event */ 67 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon432 82 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */ 83 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */ 148 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info,
|
/system/bt/stack/avct/ |
H A D | avct_api.cc | 121 * the p_cc->role parameter. When this function is called to 138 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); 149 if (p_cc->role == AVCT_INT) { 222 * the role parameter. When this function is called to 233 uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role) { argument 239 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); 253 if (role == AVCT_INT) {
|
/system/bt/stack/avdt/ |
H A D | avdt_ad.cc | 366 /* use err_param to indicate the role of connection. 514 uint8_t role) { 525 AVDT_TRACE_DEBUG("avdt_ad_open_req: type: %d, role: %d, tcid:%d", type, role, 546 if (role == AVDT_ACP) { 513 avdt_ad_open_req(uint8_t type, AvdtpCcb* p_ccb, AvdtpScb* p_scb, uint8_t role) argument
|
H A D | avdt_scb_act.cc | 82 p_scb->role = AVDT_CLOSE_ACP; 112 p_scb->role = AVDT_CLOSE_ACP; 205 p_scb->role = AVDT_OPEN_INT; 718 if ((p_scb->role == AVDT_CLOSE_INT) || (p_scb->role == AVDT_OPEN_INT)) { 723 (p_scb->role == AVDT_CLOSE_INT) ? AVDT_CLOSE_CFM_EVT : AVDT_CLOSE_IND_EVT; 724 p_scb->role = AVDT_CLOSE_ACP; 836 uint8_t role; local 841 (p_scb->role == AVDT_OPEN_INT) ? AVDT_OPEN_CFM_EVT : AVDT_OPEN_IND_EVT; 849 role [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.cc | 466 uint8_t role) { 475 role == HCI_ROLE_MASTER) 609 if (p_msg->int_conn.role == HCI_ROLE_SLAVE) 618 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */ 621 p_msg->int_conn.role)) { 465 bta_gattc_check_bg_conn(tGATT_IF client_if, const RawAddress& remote_bda, uint8_t role) argument
|
H A D | bta_gattc_int.h | 168 uint8_t role; member in struct:__anon113 410 const RawAddress& remote_bda, uint8_t role);
|
/system/bt/stack/include/ |
H A D | avct_api.h | 68 /* Connection role. */ 72 /* Control role. */ 117 uint8_t role; /* Initiator/acceptor role */ member in struct:__anon1024 118 uint8_t control; /* Control role (Control/Target) */ 163 * the p_cc->role parameter. When this function is called to 198 * the p_cc->role parameter. When this function is called to 209 extern uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role);
|
/system/bt/stack/pan/ |
H A D | pan_api.cc | 48 * should set the PAN role explicitly. 109 * profile role. This should be called after PAN_Register. 110 * This can be called any time to change the PAN role 112 * Parameters: role - is bit map of roles to be active 113 * PAN_ROLE_CLIENT is for PANU role 114 * PAN_ROLE_GN_SERVER is for GN role 115 * PAN_ROLE_NAP_SERVER is for NAP role 120 * p_user_name - Service name for PANU role 121 * p_gn_name - Service name for GN role 122 * p_nap_name - Service name for NAP role 129 PAN_SetRole(uint8_t role, uint8_t* sec_mask, const char* p_user_name, const char* p_gn_name, const char* p_nap_name) argument [all...] |
H A D | pan_int.h | 31 * This role is used to shutdown the profile. Used internally 69 uint8_t role; member in struct:__anon1307
|
/system/bt/bta/jv/ |
H A D | bta_jv_api.cc | 264 void BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 275 Bind(&bta_jv_l2cap_connect, conn_type, sec_mask, role, 333 void BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 343 Bind(&bta_jv_l2cap_start_server, conn_type, sec_mask, role, 535 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 545 Bind(&bta_jv_rfcomm_connect, sec_mask, role, remote_scn, 590 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 606 Bind(&bta_jv_rfcomm_start_server, sec_mask, role, local_scn,
|
H A D | bta_jv_act.cc | 906 void bta_jv_l2cap_connect(int32_t type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 930 /* TODO: DM role manager 931 L2CA_SetDesireRole(role); 1059 tBTA_JV_ROLE role, uint16_t local_psm, 1087 /* TODO DM role manager 1088 L2CA_SetDesireRole(role); 1329 void bta_jv_rfcomm_connect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 1337 /* TODO DM role manager 1338 L2CA_SetDesireRole(role); 1628 void bta_jv_rfcomm_start_server(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 1058 bta_jv_l2cap_start_server(int32_t type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint16_t local_psm, uint16_t rx_mtu, std::unique_ptr<tL2CAP_CFG_INFO> cfg_param, std::unique_ptr<tL2CAP_ERTM_INFO> ertm_info, tBTA_JV_L2CAP_CBACK* p_cback, uint32_t l2cap_socket_id) argument [all...] |
/system/bt/bta/hf_client/ |
H A D | bta_hf_client_int.h | 35 /* profile role for connection */ 173 uint8_t role; /* initiator/acceptor role */ member in struct:__anon160
|
/system/bt/btif/src/ |
H A D | btif_sock_rfc.cc | 98 int role; member in struct:__anon605 251 accept_rs->role = srv_rs->role; 355 BTA_JvRfcommConnect(slot->security, slot->role, slot->scn, slot->addr, 666 BTA_JvRfcommStartServer(rs->security, rs->role, rs->scn, 689 BTA_JvRfcommStartServer(slot->security, slot->role, slot->scn, 706 if (BTA_JvRfcommConnect(slot->security, slot->role,
|
/system/bt/stack/l2cap/ |
H A D | l2c_ble.cc | 177 << " not LE, link role " << p_lcb->link_role; 195 * Description This function returns the connection role. 197 * Returns link role. 201 uint8_t role = HCI_ROLE_UNKNOWN; local 206 if (p_lcb != NULL) role = p_lcb->link_role; 208 return role; 437 void l2cble_conn_comp(uint16_t handle, uint8_t role, const RawAddress& bda, argument 440 btm_ble_update_link_topology_mask(role, true); 442 if (role == HCI_ROLE_MASTER) {
|
/system/bt/vendor_libs/test_vendor_lib/src/ |
H A D | event_packet.cc | 317 uint8_t status, uint16_t handle, uint8_t role, uint8_t peer_address_type, 326 CHECK(evt_ptr->AddPayloadOctets1(role)); 316 CreateLeConnectionCompleteEvent( uint8_t status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const BtAddress& peer, uint16_t interval, uint16_t latency, uint16_t supervision_timeout) argument
|
/system/bt/bta/ag/ |
H A D | bta_ag_int.h | 52 /* profile role for connection */ 222 uint8_t role; /* initiator/acceptor role */ member in struct:tBTA_AG_SCB
|
/system/bt/bta/av/ |
H A D | bta_av_act.cc | 305 uint8_t bta_av_rc_create(tBTA_AV_CB* p_cb, uint8_t role, uint8_t shdl, argument 321 if (role == AVCT_INT) { 335 ccb.conn = role; 364 "%s: create %d, role: %d, shdl:%d, rc_handle:%d, lidx:%d, status:0x%x", 365 __func__, i, role, shdl, p_rcb->handle, lidx, p_rcb->status); 1255 * restore the switch role in default link policy */ 1257 /* allow role switch, if this is the last connection */ 1789 /* check peer version and whether support CT and TG role */ 1795 * TG role
|
H A D | bta_av_main.cc | 63 /* the delay time in milliseconds to retry role switch */ 432 APPL_TRACE_DEBUG("%s: scb hndl x%x, role x%x", __func__, p_scb->hndl, 433 p_scb->role); 545 /* For the Audio Sink role we support additional TG to support 681 /* if the AV and AVK are both supported, it cannot support the CT role 823 (((p_scb->role & BTA_AV_ROLE_AD_ACP) == 0) || // Outgoing connection or 844 "%s: peer %s channel:%d bta_av_cb.audio_open_cnt:%d role:0x%x " 847 bta_av_cb.audio_open_cnt, p_scb->role, bta_av_cb.features, 885 * Description Receives the role change event from dm 905 * role chang 1084 uint8_t role; local [all...] |
H A D | bta_av_aact.cc | 297 LOG_ERROR(LOG_TAG, "%s: peer %s role:0x%x channel:%d handle:0x%x", __func__, 298 p_scb->PeerAddress().ToString().c_str(), p_scb->role, p_scb->chnl, 301 /* if start failed, clear role */ 302 p_scb->role &= ~BTA_AV_ROLE_START_INT; 331 (p_scb->use_rc || (p_scb->role & BTA_AV_ROLE_AD_ACP))) { 622 * Description Switch role was not started and a timer was started. 623 * another attempt to switch role now - still opening. 652 APPL_TRACE_ERROR("%s: peer %s role switch failed (wait=0x%x)", __func__, 672 * Description Handle the role changed event 681 APPL_TRACE_DEBUG("%s: peer %s q_tag:%d, wait:0x%x, role 893 uint8_t role = BTA_AV_ROLE_AD_INT; local [all...] |
/system/bt/stack/btu/ |
H A D | btu_hcif.cc | 1263 uint8_t role; local 1267 STREAM_TO_UINT8(role, p); 1270 l2c_link_role_changed(&bda, role, status); 1271 btm_acl_role_changed(status, &bda, role);
|
/system/bt/stack/hcic/ |
H A D | hcicmds.cc | 178 void btsnd_hcic_accept_conn(const RawAddress& dest, uint8_t role) { argument 188 UINT8_TO_STREAM(pp, role); 612 void btsnd_hcic_switch_role(const RawAddress& bd_addr, uint8_t role) { argument 623 UINT8_TO_STREAM(pp, role);
|
/system/bt/stack/btm/ |
H A D | btm_ble.cc | 1556 /* if salve role then fall through to call SMP_Pair below which will send a 1862 uint8_t role, tBLE_ADDR_TYPE addr_type, 1901 if (role == HCI_ROLE_MASTER) p_dev_rec->role_master = true; 1927 uint8_t role, status, bda_type; local 1935 STREAM_TO_UINT8(role, p); 1976 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, 1979 l2cble_conn_comp(handle, role, bda, bda_type, conn_interval, conn_latency, 1992 role = HCI_ROLE_UNKNOWN; 2006 btm_ble_update_mode_operation(role, &bda, status); 2008 if (role 1861 btm_ble_connected(const RawAddress& bda, uint16_t handle, uint8_t enc_mode, uint8_t role, tBLE_ADDR_TYPE addr_type, UNUSED_ATTR bool addr_matched) argument [all...] |
/system/bt/stack/smp/ |
H A D | smp_int.h | 271 uint8_t role; member in struct:__anon1346
|