/system/bt/bta/pan/ |
H A D | bta_pan_api.cc | 97 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info, argument 104 p_buf->role = role; 106 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) { 114 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) { 122 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) { 182 void BTA_PanSetRole(UNUSED_ATTR tBTA_PAN_ROLE role, argument
|
H A D | bta_pan_act.cc | 359 p_data->api_set_role.role, sec, p_data->api_set_role.user_name, 362 bta_pan.set_role.role = p_data->api_set_role.role; 364 if (p_data->api_set_role.role & PAN_ROLE_NAP_SERVER) 369 if (p_data->api_set_role.role & PAN_ROLE_GN_SERVER) 374 if (p_data->api_set_role.role & PAN_ROLE_CLIENT) 525 If there are, provide a special app_id to dm to enforce master role only.
|
H A D | bta_pan_int.h | 75 tBTA_PAN_ROLE role; member in struct:__anon459 88 tBTA_PAN_ROLE local_role; /* local role */ 89 tBTA_PAN_ROLE peer_role; /* peer role */ 127 tBTA_PAN_ROLE local_role; /* local role */ 128 tBTA_PAN_ROLE peer_role; /* peer role */
|
/system/bt/stack/pan/ |
H A D | pan_api.cc | 48 * should set the PAN role explicitly. 109 * profile role. This should be called after PAN_Register. 110 * This can be called any time to change the PAN role 112 * Parameters: role - is bit map of roles to be active 113 * PAN_ROLE_CLIENT is for PANU role 114 * PAN_ROLE_GN_SERVER is for GN role 115 * PAN_ROLE_NAP_SERVER is for NAP role 120 * p_user_name - Service name for PANU role 121 * p_gn_name - Service name for GN role 122 * p_nap_name - Service name for NAP role 129 PAN_SetRole(uint8_t role, uint8_t* sec_mask, const char* p_user_name, const char* p_gn_name, const char* p_nap_name) argument [all...] |
H A D | pan_int.h | 31 * This role is used to shutdown the profile. Used internally 69 uint8_t role; member in struct:__anon1307
|
H A D | pan_main.cc | 82 * remote_uuid - UUID of the source role (peer device role) 83 * local_uuid - UUID of the destination role (local device 84 * role) 85 * is_role_change - Flag to indicate that it is a role change 93 /* If we are in GN or NAP role and have one or more active connections and the 94 * received connection is for user role reject it. If we are in user role with 115 "%s - handle %d, current role %d, dst uuid 0x%x, src uuid 0x%x, role " [all...] |
/system/bt/bta/include/ |
H A D | bta_pan_api.h | 58 const char* p_srv_name; /* service name for the PAN role */ 60 tBTA_SEC sec_mask; /* security setting for the role */ 66 tBTA_PAN_STATUS status; /* status of set role event */ 67 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon432 82 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */ 83 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */ 148 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info,
|
H A D | bta_jv_api.h | 532 void BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 578 void BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 704 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 737 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
|
/system/bt/stack/include/ |
H A D | avct_api.h | 68 /* Connection role. */ 72 /* Control role. */ 117 uint8_t role; /* Initiator/acceptor role */ member in struct:__anon1024 118 uint8_t control; /* Control role (Control/Target) */ 163 * the p_cc->role parameter. When this function is called to 198 * the p_cc->role parameter. When this function is called to 209 extern uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role);
|
H A D | pan_api.h | 47 #define PAN_ROLE_CLIENT 0x01 /* PANU role */ 48 #define PAN_ROLE_GN_SERVER 0x02 /* GN role */ 49 #define PAN_ROLE_NAP_SERVER 0x04 /* NAP role */ 193 char* user_service_name; /* Service name for PANU role */ 194 char* gn_service_name; /* Service name for GN role */ 195 char* nap_service_name; /* Service name for NAP role */ 209 * should set the PAN role explicitly. 238 * profile role. This should be called after PAN_Register. 239 * This can be called any time to change the PAN role 241 * Parameters: role [all...] |
/system/bt/stack/smp/ |
H A D | smp_br_main.cc | 306 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role]; 314 if (p_cb->role > HCI_ROLE_SLAVE) { 315 SMP_TRACE_ERROR("%s: invalid role %d", __func__, p_cb->role); 321 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master", 335 state_table = smp_br_state_table[curr_state][p_cb->role];
|
H A D | smp_act.cc | 68 "%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x", 69 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key); 78 } else if (p_cb->role == HCI_ROLE_SLAVE) { 509 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) 531 if (p_cb->role == HCI_ROLE_SLAVE) { 774 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE) { 782 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) 806 if (p_cb->role == HCI_ROLE_SLAVE) { 853 if (p_cb->role == HCI_ROLE_MASTER) { 874 if (p_cb->role [all...] |
H A D | smp_l2c.cc | 111 p_cb->role = L2CA_GetBleConnRole(bd_addr); 160 p_cb->role = L2CA_GetBleConnRole(bd_addr); 298 p_cb->role = HCI_ROLE_SLAVE;
|
H A D | smp_main.cc | 959 if (p_cb->role >= 2) { 960 SMP_TRACE_DEBUG("Invalid role: %d", p_cb->role); 965 tSMP_ENTRY_TBL entry_table = smp_entry_table[p_cb->role]; 974 (p_cb->role == 0x01) ? "Slave" : "Master", 988 state_table = smp_state_table[curr_state][p_cb->role];
|
/system/bt/bta/jv/ |
H A D | bta_jv_int.h | 154 tBTA_JV_ROLE role, uint16_t remote_psm, 163 int32_t type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint16_t local_psm, 171 extern void bta_jv_rfcomm_connect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 177 extern void bta_jv_rfcomm_start_server(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
|
H A D | bta_jv_api.cc | 264 void BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 275 Bind(&bta_jv_l2cap_connect, conn_type, sec_mask, role, 333 void BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 343 Bind(&bta_jv_l2cap_start_server, conn_type, sec_mask, role, 535 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 545 Bind(&bta_jv_rfcomm_connect, sec_mask, role, remote_scn, 590 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 606 Bind(&bta_jv_rfcomm_start_server, sec_mask, role, local_scn,
|
/system/bt/stack/avct/ |
H A D | avct_api.cc | 121 * the p_cc->role parameter. When this function is called to 138 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); 149 if (p_cc->role == AVCT_INT) { 222 * the role parameter. When this function is called to 233 uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role) { argument 239 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); 253 if (role == AVCT_INT) {
|
/system/bt/stack/avdt/ |
H A D | avdt_scb_act.cc | 82 p_scb->role = AVDT_CLOSE_ACP; 112 p_scb->role = AVDT_CLOSE_ACP; 205 p_scb->role = AVDT_OPEN_INT; 718 if ((p_scb->role == AVDT_CLOSE_INT) || (p_scb->role == AVDT_OPEN_INT)) { 723 (p_scb->role == AVDT_CLOSE_INT) ? AVDT_CLOSE_CFM_EVT : AVDT_CLOSE_IND_EVT; 724 p_scb->role = AVDT_CLOSE_ACP; 836 uint8_t role; local 841 (p_scb->role == AVDT_OPEN_INT) ? AVDT_OPEN_CFM_EVT : AVDT_OPEN_IND_EVT; 849 role [all...] |
/system/bt/bta/ag/ |
H A D | bta_ag_sdp.cc | 84 if (p_scb->role == BTA_AG_ACP) { 304 } else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { 330 if (p_scb->role == BTA_AG_INT) { 431 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { 440 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP) { 448 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) {
|
/system/bt/bta/hf_client/ |
H A D | bta_hf_client_act.cc | 115 /* set role */ 116 client_cb->role = BTA_HF_CLIENT_INT; 172 /* set role */ 173 client_cb->role = BTA_HF_CLIENT_ACP; 229 client_cb->role = BTA_HF_CLIENT_ACP;
|
H A D | bta_hf_client_sdp.cc | 64 if (client_cb->role == BTA_HF_CLIENT_ACP) 236 if (client_cb->role == BTA_HF_CLIENT_INT) { 302 if (client_cb->role == BTA_HF_CLIENT_INT) {
|
/system/bt/bta/av/ |
H A D | bta_av_aact.cc | 297 LOG_ERROR(LOG_TAG, "%s: peer %s role:0x%x channel:%d handle:0x%x", __func__, 298 p_scb->PeerAddress().ToString().c_str(), p_scb->role, p_scb->chnl, 301 /* if start failed, clear role */ 302 p_scb->role &= ~BTA_AV_ROLE_START_INT; 331 (p_scb->use_rc || (p_scb->role & BTA_AV_ROLE_AD_ACP))) { 622 * Description Switch role was not started and a timer was started. 623 * another attempt to switch role now - still opening. 652 APPL_TRACE_ERROR("%s: peer %s role switch failed (wait=0x%x)", __func__, 672 * Description Handle the role changed event 681 APPL_TRACE_DEBUG("%s: peer %s q_tag:%d, wait:0x%x, role 893 uint8_t role = BTA_AV_ROLE_AD_INT; local [all...] |
H A D | bta_av_main.cc | 63 /* the delay time in milliseconds to retry role switch */ 432 APPL_TRACE_DEBUG("%s: scb hndl x%x, role x%x", __func__, p_scb->hndl, 433 p_scb->role); 545 /* For the Audio Sink role we support additional TG to support 681 /* if the AV and AVK are both supported, it cannot support the CT role 823 (((p_scb->role & BTA_AV_ROLE_AD_ACP) == 0) || // Outgoing connection or 844 "%s: peer %s channel:%d bta_av_cb.audio_open_cnt:%d role:0x%x " 847 bta_av_cb.audio_open_cnt, p_scb->role, bta_av_cb.features, 885 * Description Receives the role change event from dm 905 * role chang 1084 uint8_t role; local [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.cc | 466 uint8_t role) { 475 role == HCI_ROLE_MASTER) 609 if (p_msg->int_conn.role == HCI_ROLE_SLAVE) 618 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */ 621 p_msg->int_conn.role)) { 465 bta_gattc_check_bg_conn(tGATT_IF client_if, const RawAddress& remote_bda, uint8_t role) argument
|
/system/bt/stack/btm/ |
H A D | btm_ble_int.h | 63 uint8_t enc_mode, uint8_t role, 148 extern void btm_ble_update_link_topology_mask(uint8_t role, bool increase);
|