Lines Matching refs:attempt
104 * the attempt (i.e. Unknown Connection Id) there's no point of
113 /* The connection attempt was doing scan for new RPA, and is
210 conn->attempt++;
271 conn->attempt++;
285 for (; conn->attempt <= size; conn->attempt++) {
287 (esco_param[conn->attempt - 1].pkt_type & ESCO_2EV3))
289 BT_DBG("hcon %p skipped attempt %d, eSCO 2M not supported",
290 conn, conn->attempt);
293 return conn->attempt <= size;
354 conn->attempt++;
369 param = &esco_param_msbc[conn->attempt - 1];
394 param = &esco_param_msbc[conn->attempt - 1];
420 param = &esco_param_cvsd[conn->attempt - 1];
422 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
424 param = &sco_param_cvsd[conn->attempt - 1];
470 conn->attempt++;
483 param = &esco_param_msbc[conn->attempt - 1];
490 param = &esco_param_cvsd[conn->attempt - 1];
492 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
494 param = &sco_param_cvsd[conn->attempt - 1];
663 cp.attempt = cpu_to_le16(4);
1227 * attempt as a peripheral.
1347 /* Since the controller supports only one LE connection attempt at a
1348 * time, we return -EBUSY if there is any connection attempt running.
1583 * attempt, we simply update pending_sec_level and auth_type fields
2918 * already being aborted so don't attempt to overwrite it.