Home
last modified time | relevance | path

Searched refs:role (Results 1 – 25 of 86) sorted by relevance

1234

/system/bt/stack/pan/
Dpan_api.cc129 tPAN_RESULT PAN_SetRole(uint8_t role, uint8_t* sec_mask, in PAN_SetRole() argument
138 if ((!(role & in PAN_SetRole()
140 role != PAN_ROLE_INACTIVE) { in PAN_SetRole()
141 PAN_TRACE_ERROR("PAN role %d is invalid", role); in PAN_SetRole()
146 if (pan_cb.role == role) { in PAN_SetRole()
147 PAN_TRACE_EVENT("PAN role already was set to: %d", role); in PAN_SetRole()
157 PAN_TRACE_API("PAN_SetRole() called with role 0x%x", role); in PAN_SetRole()
159 if (role & PAN_ROLE_NAP_SERVER) { in PAN_SetRole()
176 else if (pan_cb.role & PAN_ROLE_NAP_SERVER) { in PAN_SetRole()
186 if (role & PAN_ROLE_GN_SERVER) { in PAN_SetRole()
[all …]
/system/bt/bta/pan/
Dbta_pan_api.cc97 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info, in BTA_PanSetRole() argument
104 p_buf->role = role; in BTA_PanSetRole()
106 if (p_user_info && (role & BTA_PAN_ROLE_PANU)) { in BTA_PanSetRole()
114 if (p_gn_info && (role & BTA_PAN_ROLE_GN)) { in BTA_PanSetRole()
122 if (p_nap_info && (role & BTA_PAN_ROLE_NAP)) { in BTA_PanSetRole()
182 void BTA_PanSetRole(UNUSED_ATTR tBTA_PAN_ROLE role, in BTA_PanSetRole() argument
/system/bt/stack/btm/
Dbtm_ble_connection_establishment.cc111 uint8_t role, status, bda_type; in btm_ble_conn_complete() local
119 STREAM_TO_UINT8(role, p); in btm_ble_conn_complete()
177 if (role == HCI_ROLE_MASTER) { in btm_ble_conn_complete()
182 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, in btm_ble_conn_complete()
185 l2cble_conn_comp(handle, role, bda, bda_type, conn_interval, conn_latency, in btm_ble_conn_complete()
205 role = HCI_ROLE_UNKNOWN; in btm_ble_conn_complete()
219 btm_ble_update_mode_operation(role, &bda, status); in btm_ble_conn_complete()
221 if (role == HCI_ROLE_SLAVE) in btm_ble_conn_complete()
/system/bt/stack/smp/
Dsmp_br_main.cc306 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role]; in smp_br_state_machine_event()
314 if (p_cb->role > HCI_ROLE_SLAVE) { in smp_br_state_machine_event()
315 SMP_TRACE_ERROR("%s: invalid role %d", __func__, p_cb->role); in smp_br_state_machine_event()
321 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master", in smp_br_state_machine_event()
335 state_table = smp_br_state_table[curr_state][p_cb->role]; in smp_br_state_machine_event()
Dsmp_act.cc72 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key); in smp_update_key_mask()
81 } else if (p_cb->role == HCI_ROLE_SLAVE) { in smp_update_key_mask()
518 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) in smp_proc_pair_cmd()
548 if (p_cb->role == HCI_ROLE_SLAVE) { in smp_proc_pair_cmd()
786 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE) { in smp_br_process_pairing_command()
794 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) in smp_br_process_pairing_command()
826 if (p_cb->role == HCI_ROLE_SLAVE) { in smp_br_process_pairing_command()
873 if (p_cb->role == HCI_ROLE_MASTER) { in smp_br_check_authorization_request()
894 if (p_cb->role == HCI_ROLE_MASTER && p_cb->local_r_key == 0) in smp_br_check_authorization_request()
910 p_cb->role, p_cb->local_r_key, p_cb->local_i_key); in smp_br_select_next_key()
[all …]
/system/bt/bta/jv/
Dbta_jv_api.cc264 void BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvL2capConnect() argument
275 Bind(&bta_jv_l2cap_connect, conn_type, sec_mask, role, in BTA_JvL2capConnect()
333 void BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvL2capStartServer() argument
343 Bind(&bta_jv_l2cap_start_server, conn_type, sec_mask, role, in BTA_JvL2capStartServer()
535 tBTA_JV_STATUS BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvRfcommConnect() argument
545 Bind(&bta_jv_rfcomm_connect, sec_mask, role, remote_scn, in BTA_JvRfcommConnect()
590 tBTA_JV_STATUS BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, in BTA_JvRfcommStartServer() argument
606 Bind(&bta_jv_rfcomm_start_server, sec_mask, role, local_scn, in BTA_JvRfcommStartServer()
Dbta_jv_int.h154 tBTA_JV_ROLE role, uint16_t remote_psm,
163 int32_t type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, uint16_t local_psm,
171 extern void bta_jv_rfcomm_connect(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
177 extern void bta_jv_rfcomm_start_server(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
/system/bt/bta/include/
Dbta_pan_api.h67 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member
148 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO* p_user_info,
/system/bt/stack/avct/
Davct_api.cc140 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); in AVCT_CreateConn()
151 if (p_cc->role == AVCT_INT) { in AVCT_CreateConn()
235 uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role) { in AVCT_CreateBrowse() argument
241 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); in AVCT_CreateBrowse()
255 if (role == AVCT_INT) { in AVCT_CreateBrowse()
/system/bt/stack/include/
Davct_api.h117 uint8_t role; /* Initiator/acceptor role */ member
209 extern uint16_t AVCT_CreateBrowse(uint8_t handle, uint8_t role);
/system/sepolicy/private/
Droles_decl1 role r;
/system/sepolicy/prebuilts/api/26.0/private/
Droles_decl1 role r;
/system/sepolicy/reqd_mask/
Droles_decl1 role r;
Droles1 role r types reqd_mask_type;
/system/sepolicy/prebuilts/api/29.0/private/
Droles_decl1 role r;
/system/sepolicy/prebuilts/api/28.0/private/
Droles_decl1 role r;
/system/sepolicy/prebuilts/api/27.0/private/
Droles_decl1 role r;
/system/sepolicy/prebuilts/api/27.0/public/
Droles1 role r types domain;
/system/sepolicy/prebuilts/api/28.0/public/
Droles1 role r types domain;
/system/sepolicy/prebuilts/api/26.0/public/
Droles1 role r types domain;
/system/sepolicy/prebuilts/api/29.0/public/
Droles1 role r types domain;
/system/sepolicy/public/
Droles1 role r types domain;
/system/bt/vendor_libs/test_vendor_lib/packets/hci/
Dle_meta_event_builder.cc36 …Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer, uint… in CreateLeConnectionCompleteEvent() argument
43 CHECK(evt_ptr->AddOctets1(role)); in CreateLeConnectionCompleteEvent()
55 Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer, in CreateLeEnhancedConnectionCompleteEvent() argument
63 CHECK(evt_ptr->AddOctets1(role)); in CreateLeEnhancedConnectionCompleteEvent()
Dle_meta_event_builder.h47 … uint8_t role, uint8_t peer_address_type,
74 … hci::Status status, uint16_t handle, uint8_t role, uint8_t peer_address_type, const Address& peer,
/system/bt/bta/ag/
Dbta_ag_sdp.cc85 if (p_scb->role == BTA_AG_ACP) { in bta_ag_sdp_cback()
305 } else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_sdp_find_attr()
331 if (p_scb->role == BTA_AG_INT) { in bta_ag_sdp_find_attr()
432 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_do_disc()
441 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP) { in bta_ag_do_disc()
449 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) { in bta_ag_do_disc()

1234