/system/core/gatekeeperd/ |
D | IGateKeeperService.cpp | 30 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) { in onTransact() argument 33 CHECK_INTERFACE(IGateKeeperService, data, reply); in onTransact() 57 reply->writeNoException(); in onTransact() 58 reply->writeInt32(1); in onTransact() 60 reply->writeInt32(GATEKEEPER_RESPONSE_OK); in onTransact() 61 reply->writeInt32(0); in onTransact() 62 reply->writeInt32(outSize); in onTransact() 63 reply->writeInt32(outSize); in onTransact() 64 void *buf = reply->writeInplace(outSize); in onTransact() 68 reply->writeInt32(GATEKEEPER_RESPONSE_RETRY); in onTransact() [all …]
|
D | IUserManager.cpp | 34 Parcel data, reply; in getCredentialOwnerProfile() local 37 status_t rc = remote()->transact(GET_CREDENTIAL_OWNER_PROFILE, data, &reply, 0); in getCredentialOwnerProfile() 43 int32_t exception = reply.readExceptionCode(); in getCredentialOwnerProfile() 49 return reply.readInt32(); in getCredentialOwnerProfile()
|
D | IGateKeeperService.h | 104 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
|
/system/core/fingerprintd/ |
D | IFingerprintDaemon.cpp | 47 status_t BnFingerprintDaemon::onTransact(uint32_t code, const Parcel& data, Parcel* reply, in onTransact() argument 51 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact() 58 reply->writeNoException(); in onTransact() 59 reply->writeInt32(ret); in onTransact() 63 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact() 68 reply->writeNoException(); in onTransact() 69 reply->writeInt32(ret); in onTransact() 73 CHECK_INTERFACE(IFingerprintDaemon, data, reply); in onTransact() 82 reply->writeNoException(); in onTransact() 83 reply->writeInt32(ret); in onTransact() [all …]
|
D | IFingerprintDaemonCallback.cpp | 34 Parcel data, reply; in onEnrollResult() local 40 return remote()->transact(ON_ENROLL_RESULT, data, &reply, IBinder::FLAG_ONEWAY); in onEnrollResult() 44 Parcel data, reply; in onAcquired() local 48 return remote()->transact(ON_ACQUIRED, data, &reply, IBinder::FLAG_ONEWAY); in onAcquired() 52 Parcel data, reply; in onAuthenticated() local 57 return remote()->transact(ON_AUTHENTICATED, data, &reply, IBinder::FLAG_ONEWAY); in onAuthenticated() 61 Parcel data, reply; in onError() local 65 return remote()->transact(ON_ERROR, data, &reply, IBinder::FLAG_ONEWAY); in onError() 69 Parcel data, reply; in onRemoved() local 74 return remote()->transact(ON_REMOVED, data, &reply, IBinder::FLAG_ONEWAY); in onRemoved() [all …]
|
D | IFingerprintDaemon.h | 77 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
|
/system/security/keystore/ |
D | IKeystoreService.cpp | 404 Parcel data, reply; in getState() local 407 status_t status = remote()->transact(BnKeystoreService::GET_STATE, data, &reply); in getState() 412 int32_t err = reply.readExceptionCode(); in getState() 413 int32_t ret = reply.readInt32(); in getState() 423 Parcel data, reply; in get() local 426 status_t status = remote()->transact(BnKeystoreService::GET, data, &reply); in get() 431 int32_t err = reply.readExceptionCode(); in get() 432 ssize_t len = reply.readInt32(); in get() 433 if (len >= 0 && (size_t) len <= reply.dataAvail()) { in get() 435 const void* buf = reply.readInplace(ulen); in get() [all …]
|
/system/security/keystore-engine/ |
D | rsa_meth.cpp | 91 uint8_t* reply = NULL; in keystore_rsa_priv_enc() local 94 num, &reply, &replyLen); in keystore_rsa_priv_enc() 97 free(reply); in keystore_rsa_priv_enc() 101 free(reply); in keystore_rsa_priv_enc() 108 memcpy(to, reply, replyLen); in keystore_rsa_priv_enc() 109 free(reply); in keystore_rsa_priv_enc() 137 uint8_t* reply = NULL; in keystore_rsa_priv_dec() local 140 flen, &reply, &replyLen); in keystore_rsa_priv_dec() 154 if (*reply == 0x00) { in keystore_rsa_priv_dec() 155 alignedReply = reply + 1; in keystore_rsa_priv_dec() [all …]
|
D | android_engine.cpp | 157 uint8_t* reply = NULL; in rsa_private_transform() local 159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); in rsa_private_transform() 168 free(reply); in rsa_private_transform() 177 memcpy(out, reply + reply_len - len, len); in rsa_private_transform() 184 memcpy(out + len - reply_len, reply, reply_len); in rsa_private_transform() 186 memcpy(out, reply, len); in rsa_private_transform() 189 free(reply); in rsa_private_transform() 255 uint8_t* reply = NULL; in ecdsa_sign() local 258 digest, digest_len, &reply, &reply_len); in ecdsa_sign() 267 free(reply); in ecdsa_sign() [all …]
|
D | dsa_meth.cpp | 70 uint8_t* reply = NULL; in keystore_dsa_do_sign() local 73 dlen, &reply, &replyLen); in keystore_dsa_do_sign() 89 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_dsa_do_sign()
|
D | ecdsa_meth.cpp | 76 uint8_t* reply = NULL; in keystore_ecdsa_do_sign() local 79 dlen, &reply, &replyLen); in keystore_ecdsa_do_sign() 95 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_ecdsa_do_sign()
|
/system/core/libnetutils/ |
D | dhcpclient.c | 353 static int is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) in is_valid_reply() argument 359 if (reply->op != OP_BOOTREPLY) { in is_valid_reply() 360 if (verbose) ALOGD("Wrong Op %d != %d\n", reply->op, OP_BOOTREPLY); in is_valid_reply() 363 if (reply->xid != msg->xid) { in is_valid_reply() 364 if (verbose) ALOGD("Wrong Xid 0x%x != 0x%x\n", ntohl(reply->xid), in is_valid_reply() 368 if (reply->htype != msg->htype) { in is_valid_reply() 369 if (verbose) ALOGD("Wrong Htype %d != %d\n", reply->htype, msg->htype); in is_valid_reply() 372 if (reply->hlen != msg->hlen) { in is_valid_reply() 373 if (verbose) ALOGD("Wrong Hlen %d != %d\n", reply->hlen, msg->hlen); in is_valid_reply() 376 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) { in is_valid_reply() [all …]
|
/system/extras/tests/binder/benchmarks/ |
D | binderAddInts.cpp | 84 const Parcel& data, Parcel* reply, 260 Parcel send, reply; in client() local 276 send, &reply)) != 0) { in client() 290 int result = reply.readInt32(); in client() 313 Parcel* reply, uint32_t flags) { in onTransact() argument 334 reply->writeInt32(val1 + val2); in onTransact()
|
/system/extras/tests/net_test/ |
D | multinetwork_test.py | 573 reply_desc, reply = gen_reply(version, myaddr, remoteaddr, packet) 575 reply_desc, reply = None, None 579 self._ReceiveAndExpectResponse(netid, packet, reply, msg) 648 myaddr, remoteaddr, packet, reply, msg): argument 649 establishing_ack = Packets.ACK(version, remoteaddr, myaddr, reply)[1] 743 reply_desc, reply = Packets.SYNACK(version, myaddr, remoteaddr, 746 reply_desc, reply = None, None 750 reply = self._ReceiveAndExpectResponse(netid, packet, reply, msg) 751 if reply: 753 remoteaddr, packet, reply, msg) [all …]
|
D | multinetwork_base.py | 615 def _ReceiveAndExpectResponse(self, netid, packet, reply, msg): argument 617 if reply: 618 return self.ExpectPacketOn(netid, msg, reply)
|
D | ping6_test.py | 342 reply = posix.read(fd, 4096) 343 self.assertEquals(written, len(reply)) 351 reply = posix.read(fd, 4096) 352 self.assertEquals(written, len(reply))
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 240 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 115 will reply with "DATA%08x" if it has enough
|
/system/core/adb/ |
D | protocol.txt | 90 Once the recipient has tried all its private keys, it can reply with an
|