/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/btm/ |
H A D | btm_snoop_filter.c | 122 if (!IsL2capDynamicPsm(cmpInfo->l2capPsm)) { in BtmFindFilterInfoByInfoUsePsm() 123 if (srcInfo->l2capPsm == cmpInfo->l2capPsm) { in BtmFindFilterInfoByInfoUsePsm() 142 cmpInfo->l2capPsm = srcInfo->l2capPsm; in BtmFindFilterInfoByInfoUseScn() 170 uint8_t module, uint8_t rfcommScn, uint16_t l2capPsm, bool isLocal, const BtAddr *remoteAddr) in AllocFilterInfo() argument 176 info->l2capPsm = l2capPsm; in AllocFilterInfo() 257 .l2capPsm = psm, in BTM_RemoveLocalL2capPsmForLogging() 277 .l2capPsm = psm, in BTM_RemoveRemoteL2capPsmForLogging()
|
H A D | btm_snoop_filter.h | 43 uint16_t l2capPsm; member
|
H A D | btm_snoop_filter_acl.c | 426 .l2capPsm = *psm, in ProcessL2capConnectionRequest()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/avctp/ |
H A D | avctp_gap.c | 77 serviceInfo.channelId.l2capPsm, in AvctSecurityResult() 185 gapParam.info.channelId.l2capPsm = psm; in AvctRequestSecurity() 220 gapParam.info.channelId.l2capPsm = lpsm; in AvctRequestSecurityBy()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/service/src/hid_host/ |
H A D | hid_host_l2cap_connection.cpp | 24 { .l2capPsm = HID_CONTROL_PSM }}; in Startup() 33 { .l2capPsm = HID_CONTROL_PSM }}; in Startup() 60 { .l2capPsm = HID_CONTROL_PSM }}; in Shutdown() 63 { .l2capPsm = HID_CONTROL_PSM }}; in Shutdown() 112 __func__, result, security.channelId.l2capPsm); in HidHostSecurityCheckCallback() 168 __func__, result, security.channelId.l2capPsm); in HidHostIndSecurityCheckDeviceConnectCallback() 701 { .l2capPsm = HID_CONTROL_PSM }}; in SendGapRequestSecurity() 713 { .l2capPsm = HID_CONTROL_PSM }}; in SendGapRequestSecurity()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/service/src/pan/ |
H A D | pan_bnep.cpp | 25 { .l2capPsm = BT_BNEP_PSM }}; in Startup() 34 { .l2capPsm = BT_BNEP_PSM }}; in Startup() 54 { .l2capPsm = BT_BNEP_PSM }}; in Shutdown() 57 { .l2capPsm = BT_BNEP_PSM }}; in Shutdown() 115 __func__, result, security.channelId.l2capPsm); in BnepSecurityCheckCallback() 171 __func__, result, security.channelId.l2capPsm); in BnepIndSecurityCheckDeviceConnectCallback() 663 { .l2capPsm = BT_BNEP_PSM }}; in SendGapRequestSecurity() 675 { .l2capPsm = BT_BNEP_PSM }}; in SendGapRequestSecurity()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/gap/ |
H A D | gap_if.c | 326 … serviceInfo->protocolId ? serviceInfo->channelId.rfcommChannel : serviceInfo->channelId.l2capPsm, in GAPIF_RegisterServiceSecurity() 363 … serviceInfo->protocolId ? serviceInfo->channelId.rfcommChannel : serviceInfo->channelId.l2capPsm, in GAPIF_RegisterServiceSecurityAsync() 407 … serviceInfo->protocolId ? serviceInfo->channelId.rfcommChannel : serviceInfo->channelId.l2capPsm); in GAPIF_DeregisterServiceSecurity() 441 … serviceInfo->protocolId ? serviceInfo->channelId.rfcommChannel : serviceInfo->channelId.l2capPsm); in GAPIF_DeregisterServiceSecurityAsync() 483 … param->info.protocolId ? param->info.channelId.rfcommChannel : param->info.channelId.l2capPsm); in GAPIF_RequestSecurity() 510 … param->info.protocolId ? param->info.channelId.rfcommChannel : param->info.channelId.l2capPsm); in GAPIF_RequestSecurityAsync()
|
H A D | gap.c | 272 return (protocolID == SEC_PROTOCOL_L2CAP) ? (channelID1.l2capPsm == channelID2.l2capPsm) in GapCompareChannelID()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/rfcomm/ |
H A D | rfcomm_gap_if.c | 166 param.info.channelId.l2capPsm = BT_PSM_RFCOMM; in RfcommCheckSessionSecurity()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/avdtp/ |
H A D | avdtp_l2cap.c | 128 chlId.l2capPsm = AVDT_PSM; in AvdtConnectSignalingIndication() 840 …NFO("[AVDT]%{public}s:result(%hu), l2capPsm(0x%x)", __func__, result, security.channelId.l2capPsm); in AvdtRevSecurityCheckCallback() 868 __func__, result, transTable->lcid, security.channelId.l2capPsm); in AvdtRevSecurityCheck()
|
H A D | avdtp_impl.c | 1619 chlId.l2capPsm = AVDT_PSM; in AvdtActConnReq() 1825 …NFO("[AVDT]%{public}s:result(%hu), l2capPsm(0x%x)", __func__, result, security.channelId.l2capPsm); in AvdtSecurityCheckCallback() 1851 …BUG("[AVDT]%{public}s:result(%hu), l2capPsm(0x%x)", __func__, result, security.channelId.l2capPsm); in AvdtSecurityCheck()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/include/ |
H A D | gap_if.h | 123 uint16_t l2capPsm; member
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/service/src/gavdp/ |
H A D | a2dp_profile.cpp | 152 SEC_PROTOCOL_L2CAP, { .l2capPsm = AVDT_PSM }, in Enable() 155 SEC_PROTOCOL_L2CAP, { .l2capPsm = AVDT_PSM }, in Enable()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/att/ |
H A D | att_connect.c | 607 gapSecurity->info.channelId.l2capPsm = 0x001F; in AttAssignGAPRequestSecurity()
|