summaryrefslogtreecommitdiffstats
path: root/btif/src/btif_hh.c
diff options
context:
space:
mode:
authorAdam Hampson <ahampson@google.com>2014-01-27 14:05:17 -0800
committerAdam Hampson <ahampson@google.com>2014-01-28 16:37:12 +0000
commit8a82348c04109cb85e3c0b676dd1c7c5cb461c24 (patch)
tree93f06ca57d9c38f71e937c34a733b1447acea3ea /btif/src/btif_hh.c
parent6a5cd52ec261ba9212a969785467993e343b39b9 (diff)
downloadandroid_system_bt-8a82348c04109cb85e3c0b676dd1c7c5cb461c24.tar.gz
android_system_bt-8a82348c04109cb85e3c0b676dd1c7c5cb461c24.tar.bz2
android_system_bt-8a82348c04109cb85e3c0b676dd1c7c5cb461c24.zip
bluetooth: hid: store ssr_max_latency and ssr_min_tout in bonding db
Store the ssr_max_latency and ssr_min_tout parameters in the bonding database. Previously these parameters were not stored for HID devices. This caused an inconsistency in sniff behavior between when the HID device was paired and following a reboot of the host. When the HID device is paired the SSR parameters are retrieved from the HID device and are stored in the HID Host's device list. If the host is rebooted then the HID Host's device list is constructed from the bonding database. If the SSR max latency is non-zero then the SSR parameters are sent to the firmware and SSR is used. In the event that the SSR max latency is 0, as it is if the parameters are not found, then SSR is disabled. Bug: 12764547 Change-Id: I63637575fdfcf4cb4ca0ce8dc2e4ccda9cccaf66 Signed-off-by: Adam Hampson <ahampson@google.com>
Diffstat (limited to 'btif/src/btif_hh.c')
-rw-r--r--btif/src/btif_hh.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/btif/src/btif_hh.c b/btif/src/btif_hh.c
index 8faa9f5db..dbc9aab5f 100644
--- a/btif/src/btif_hh.c
+++ b/btif/src/btif_hh.c
@@ -975,6 +975,7 @@ static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
p_data->dscp_info.version, p_data->dscp_info.ctry_code,
+ p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout,
len, p_data->dscp_info.descriptor.dsc_list);
ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);