/system/bt/stack/pan/ |
D | pan_api.cc | 129 tPAN_RESULT PAN_SetRole(uint8_t role, uint8_t* sec_mask, in PAN_SetRole() argument 138 if ((!(role & in PAN_SetRole() 140 role != PAN_ROLE_INACTIVE) { in PAN_SetRole() 141 PAN_TRACE_ERROR("PAN role %d is invalid", role); in PAN_SetRole() 146 if (pan_cb.role == role) { in PAN_SetRole() 147 PAN_TRACE_EVENT("PAN role already was set to: %d", role); in PAN_SetRole() 157 PAN_TRACE_API("PAN_SetRole() called with role 0x%x", role); in PAN_SetRole() 159 if (role & PAN_ROLE_NAP_SERVER) { in PAN_SetRole() 176 else if (pan_cb.role & PAN_ROLE_NAP_SERVER) { in PAN_SetRole() 186 if (role & PAN_ROLE_GN_SERVER) { in PAN_SetRole() [all …]
|
/system/bt/bta/pan/ |
D | bta_pan_api.cc | 97 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info, in BTA_PanSetRole() argument 104 p_buf->role = role; in BTA_PanSetRole() 106 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) { in BTA_PanSetRole() 114 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) { in BTA_PanSetRole() 122 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) { in BTA_PanSetRole() 182 void BTA_PanSetRole(UNUSED_ATTR tBTA_PAN_ROLE role, in BTA_PanSetRole() argument
|
/system/bt/stack/btm/ |
D | btm_ble_connection_establishment.cc | 111 uint8_t role, status, bda_type; in btm_ble_conn_complete() local 119 STREAM_TO_UINT8(role, p); in btm_ble_conn_complete() 177 if (role == HCI_ROLE_MASTER) { in btm_ble_conn_complete() 182 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, in btm_ble_conn_complete() 185 l2cble_conn_comp(handle, role, bda, bda_type, conn_interval, conn_latency, in btm_ble_conn_complete() 205 role = HCI_ROLE_UNKNOWN; in btm_ble_conn_complete() 219 btm_ble_update_mode_operation(role, &bda, status); in btm_ble_conn_complete() 221 if (role == HCI_ROLE_SLAVE) in btm_ble_conn_complete()
|
/system/bt/stack/smp/ |
D | smp_br_main.cc | 306 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role]; in smp_br_state_machine_event() 314 if (p_cb->role > HCI_ROLE_SLAVE) { in smp_br_state_machine_event() 315 SMP_TRACE_ERROR("%s: invalid role %d", __func__, p_cb->role); in smp_br_state_machine_event() 321 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master", in smp_br_state_machine_event() 335 state_table = smp_br_state_table[curr_state][p_cb->role]; in smp_br_state_machine_event()
|
D | smp_act.cc | 72 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key); in smp_update_key_mask() 81 } else if (p_cb->role == HCI_ROLE_SLAVE) { in smp_update_key_mask() 518 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) in smp_proc_pair_cmd() 548 if (p_cb->role == HCI_ROLE_SLAVE) { in smp_proc_pair_cmd() 786 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE) { in smp_br_process_pairing_command() 794 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) in smp_br_process_pairing_command() 826 if (p_cb->role == HCI_ROLE_SLAVE) { in smp_br_process_pairing_command() 873 if (p_cb->role == HCI_ROLE_MASTER) { in smp_br_check_authorization_request() 894 if (p_cb->role == HCI_ROLE_MASTER && p_cb->local_r_key == 0) in smp_br_check_authorization_request() 910 p_cb->role, p_cb->local_r_key, p_cb->local_i_key); in smp_br_select_next_key() [all …]
|
/system/bt/bta/jv/ |
D | bta_jv_api.cc | 264 void BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvL2capConnect() argument 275 Bind(&bta_jv_l2cap_connect, conn_type, sec_mask, role, in BTA_JvL2capConnect() 333 void BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvL2capStartServer() argument 343 Bind(&bta_jv_l2cap_start_server, conn_type, sec_mask, role, in BTA_JvL2capStartServer() 535 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvRfcommConnect() argument 545 Bind(&bta_jv_rfcomm_connect, sec_mask, role, remote_scn, in BTA_JvRfcommConnect() 590 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvRfcommStartServer() argument 606 Bind(&bta_jv_rfcomm_start_server, sec_mask, role, local_scn, in BTA_JvRfcommStartServer()
|
D | bta_jv_int.h | 154 tBTA_JV_ROLE role, uint16_t remote_psm, 163 int32_t type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint16_t local_psm, 171 extern void bta_jv_rfcomm_connect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 177 extern void bta_jv_rfcomm_start_server(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
|
/system/bt/bta/include/ |
D | bta_pan_api.h | 67 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member 148 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info,
|
/system/bt/stack/avct/ |
D | avct_api.cc | 140 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); in AVCT_CreateConn() 151 if (p_cc->role == AVCT_INT) { in AVCT_CreateConn() 235 uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role) { in AVCT_CreateBrowse() argument 241 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); in AVCT_CreateBrowse() 255 if (role == AVCT_INT) { in AVCT_CreateBrowse()
|
/system/bt/stack/include/ |
D | avct_api.h | 117 uint8_t role; /* Initiator/acceptor role */ member 209 extern uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role);
|
/system/sepolicy/private/ |
D | roles_decl | 1 role r;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | roles_decl | 1 role r;
|
/system/sepolicy/reqd_mask/ |
D | roles_decl | 1 role r;
|
D | roles | 1 role r types reqd_mask_type;
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | roles_decl | 1 role r;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | roles_decl | 1 role r;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | roles_decl | 1 role r;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | roles | 1 role r types domain;
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | roles | 1 role r types domain;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | roles | 1 role r types domain;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | roles | 1 role r types domain;
|
/system/sepolicy/public/ |
D | roles | 1 role r types domain;
|
/system/bt/vendor_libs/test_vendor_lib/packets/hci/ |
D | le_meta_event_builder.cc | 36 …Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer, uint… in CreateLeConnectionCompleteEvent() argument 43 CHECK(evt_ptr->AddOctets1(role)); in CreateLeConnectionCompleteEvent() 55 Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer, in CreateLeEnhancedConnectionCompleteEvent() argument 63 CHECK(evt_ptr->AddOctets1(role)); in CreateLeEnhancedConnectionCompleteEvent()
|
D | le_meta_event_builder.h | 47 … uint8_t role, uint8_t peer_address_type, 74 … hci::Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer,
|
/system/bt/bta/ag/ |
D | bta_ag_sdp.cc | 85 if (p_scb->role == BTA_AG_ACP) { in bta_ag_sdp_cback() 305 } else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_sdp_find_attr() 331 if (p_scb->role == BTA_AG_INT) { in bta_ag_sdp_find_attr() 432 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_do_disc() 441 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP) { in bta_ag_do_disc() 449 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_do_disc()
|