Home
last modified time | relevance | path

Searched refs:reply (Results 1 – 19 of 19) sorted by relevance

/system/core/gatekeeperd/
DIGateKeeperService.cpp30 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) { in onTransact() argument
33 CHECK_INTERFACE(IGateKeeperService, data, reply); in onTransact()
57 reply->writeNoException(); in onTransact()
58 reply->writeInt32(1); in onTransact()
60 reply->writeInt32(GATEKEEPER_RESPONSE_OK); in onTransact()
61 reply->writeInt32(0); in onTransact()
62 reply->writeInt32(outSize); in onTransact()
63 reply->writeInt32(outSize); in onTransact()
64 void *buf = reply->writeInplace(outSize); in onTransact()
68 reply->writeInt32(GATEKEEPER_RESPONSE_RETRY); in onTransact()
[all …]
DIUserManager.cpp34 Parcel data, reply; in getCredentialOwnerProfile() local
37 status_t rc = remote()->transact(GET_CREDENTIAL_OWNER_PROFILE, data, &reply, 0); in getCredentialOwnerProfile()
43 int32_t exception = reply.readExceptionCode(); in getCredentialOwnerProfile()
49 return reply.readInt32(); in getCredentialOwnerProfile()
DIGateKeeperService.h104 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
/system/core/fingerprintd/
DIFingerprintDaemon.cpp47 status_t BnFingerprintDaemon::onTransact(uint32_t code, const Parcel& data, Parcel* reply, in onTransact() argument
51 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact()
58 reply->writeNoException(); in onTransact()
59 reply->writeInt32(ret); in onTransact()
63 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact()
68 reply->writeNoException(); in onTransact()
69 reply->writeInt32(ret); in onTransact()
73 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact()
82 reply->writeNoException(); in onTransact()
83 reply->writeInt32(ret); in onTransact()
[all …]
DIFingerprintDaemonCallback.cpp34 Parcel data, reply; in onEnrollResult() local
40 return remote()->transact(ON_ENROLL_RESULT, data, &reply, IBinder::FLAG_ONEWAY); in onEnrollResult()
44 Parcel data, reply; in onAcquired() local
48 return remote()->transact(ON_ACQUIRED, data, &reply, IBinder::FLAG_ONEWAY); in onAcquired()
52 Parcel data, reply; in onAuthenticated() local
57 return remote()->transact(ON_AUTHENTICATED, data, &reply, IBinder::FLAG_ONEWAY); in onAuthenticated()
61 Parcel data, reply; in onError() local
65 return remote()->transact(ON_ERROR, data, &reply, IBinder::FLAG_ONEWAY); in onError()
69 Parcel data, reply; in onRemoved() local
74 return remote()->transact(ON_REMOVED, data, &reply, IBinder::FLAG_ONEWAY); in onRemoved()
[all …]
DIFingerprintDaemon.h77 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
/system/security/keystore/
DIKeystoreService.cpp404 Parcel data, reply; in getState() local
407 status_t status = remote()->transact(BnKeystoreService::GET_STATE, data, &reply); in getState()
412 int32_t err = reply.readExceptionCode(); in getState()
413 int32_t ret = reply.readInt32(); in getState()
423 Parcel data, reply; in get() local
426 status_t status = remote()->transact(BnKeystoreService::GET, data, &reply); in get()
431 int32_t err = reply.readExceptionCode(); in get()
432 ssize_t len = reply.readInt32(); in get()
433 if (len >= 0 && (size_t) len <= reply.dataAvail()) { in get()
435 const void* buf = reply.readInplace(ulen); in get()
[all …]
/system/security/keystore-engine/
Drsa_meth.cpp91 uint8_t* reply = NULL; in keystore_rsa_priv_enc() local
94 num, &reply, &replyLen); in keystore_rsa_priv_enc()
97 free(reply); in keystore_rsa_priv_enc()
101 free(reply); in keystore_rsa_priv_enc()
108 memcpy(to, reply, replyLen); in keystore_rsa_priv_enc()
109 free(reply); in keystore_rsa_priv_enc()
137 uint8_t* reply = NULL; in keystore_rsa_priv_dec() local
140 flen, &reply, &replyLen); in keystore_rsa_priv_dec()
154 if (*reply == 0x00) { in keystore_rsa_priv_dec()
155 alignedReply = reply + 1; in keystore_rsa_priv_dec()
[all …]
Dandroid_engine.cpp157 uint8_t* reply = NULL; in rsa_private_transform() local
159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); in rsa_private_transform()
168 free(reply); in rsa_private_transform()
177 memcpy(out, reply + reply_len - len, len); in rsa_private_transform()
184 memcpy(out + len - reply_len, reply, reply_len); in rsa_private_transform()
186 memcpy(out, reply, len); in rsa_private_transform()
189 free(reply); in rsa_private_transform()
255 uint8_t* reply = NULL; in ecdsa_sign() local
258 digest, digest_len, &reply, &reply_len); in ecdsa_sign()
267 free(reply); in ecdsa_sign()
[all …]
Ddsa_meth.cpp70 uint8_t* reply = NULL; in keystore_dsa_do_sign() local
73 dlen, &reply, &replyLen); in keystore_dsa_do_sign()
89 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_dsa_do_sign()
Decdsa_meth.cpp76 uint8_t* reply = NULL; in keystore_ecdsa_do_sign() local
79 dlen, &reply, &replyLen); in keystore_ecdsa_do_sign()
95 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_ecdsa_do_sign()
/system/core/libnetutils/
Ddhcpclient.c353 static int is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) in is_valid_reply() argument
359 if (reply->op != OP_BOOTREPLY) { in is_valid_reply()
360 if (verbose) ALOGD("Wrong Op %d != %d\n", reply->op, OP_BOOTREPLY); in is_valid_reply()
363 if (reply->xid != msg->xid) { in is_valid_reply()
364 if (verbose) ALOGD("Wrong Xid 0x%x != 0x%x\n", ntohl(reply->xid), in is_valid_reply()
368 if (reply->htype != msg->htype) { in is_valid_reply()
369 if (verbose) ALOGD("Wrong Htype %d != %d\n", reply->htype, msg->htype); in is_valid_reply()
372 if (reply->hlen != msg->hlen) { in is_valid_reply()
373 if (verbose) ALOGD("Wrong Hlen %d != %d\n", reply->hlen, msg->hlen); in is_valid_reply()
376 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) { in is_valid_reply()
[all …]
/system/extras/tests/binder/benchmarks/
DbinderAddInts.cpp84 const Parcel& data, Parcel* reply,
260 Parcel send, reply; in client() local
276 send, &reply)) != 0) { in client()
290 int result = reply.readInt32(); in client()
313 Parcel* reply, uint32_t flags) { in onTransact() argument
334 reply->writeInt32(val1 + val2); in onTransact()
/system/extras/tests/net_test/
Dmultinetwork_test.py573 reply_desc, reply = gen_reply(version, myaddr, remoteaddr, packet)
575 reply_desc, reply = None, None
579 self._ReceiveAndExpectResponse(netid, packet, reply, msg)
648 myaddr, remoteaddr, packet, reply, msg): argument
649 establishing_ack = Packets.ACK(version, remoteaddr, myaddr, reply)[1]
743 reply_desc, reply = Packets.SYNACK(version, myaddr, remoteaddr,
746 reply_desc, reply = None, None
750 reply = self._ReceiveAndExpectResponse(netid, packet, reply, msg)
751 if reply:
753 remoteaddr, packet, reply, msg)
[all …]
Dmultinetwork_base.py615 def _ReceiveAndExpectResponse(self, netid, packet, reply, msg): argument
617 if reply:
618 return self.ExpectPacketOn(netid, msg, reply)
Dping6_test.py342 reply = posix.read(fd, 4096)
343 self.assertEquals(written, len(reply))
351 reply = posix.read(fd, 4096)
352 self.assertEquals(written, len(reply))
/system/security/keystore/include/keystore/
DIKeystoreService.h240 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
/system/core/fastboot/
Dfastboot_protocol.txt115 will reply with "DATA%08x" if it has enough
/system/core/adb/
Dprotocol.txt90 Once the recipient has tried all its private keys, it can reply with an