Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 33) sorted by relevance

12

/system/keymaster/
Dandroid_keymaster.cpp63 SupportedResponse<T>* response) { in check_supported() argument
65 response->error = KM_ERROR_UNSUPPORTED_ALGORITHM; in check_supported()
82 SupportedAlgorithmsResponse* response) { in SupportedAlgorithms() argument
83 if (response == NULL) in SupportedAlgorithms()
86 response->error = KM_ERROR_OK; in SupportedAlgorithms()
92 response->results_length = algorithm_count; in SupportedAlgorithms()
93 response->results = dup_array(algorithms, algorithm_count); in SupportedAlgorithms()
94 if (!response->results) in SupportedAlgorithms()
95 response->error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in SupportedAlgorithms()
102 SupportedResponse<T>* response) { in GetSupported() argument
[all …]
Dsoft_keymaster_device.cpp260 ImportKeyResponse response; in import_keypair() local
261 convert_device(dev)->impl_->ImportKey(request, &response); in import_keypair()
262 if (response.error != KM_ERROR_OK) { in import_keypair()
263 LOG_E("Key import failed with error: %d", response.error); in import_keypair()
264 return response.error; in import_keypair()
267 *key_blob_length = response.key_blob.key_material_size; in import_keypair()
273 memcpy(*key_blob, response.key_blob.key_material, *key_blob_length); in import_keypair()
477 SupportedAlgorithmsResponse response; in get_supported_algorithms() local
478 convert_device(dev)->impl_->SupportedAlgorithms(request, &response); in get_supported_algorithms()
479 if (response.error != KM_ERROR_OK) { in get_supported_algorithms()
[all …]
/system/bt/hci/src/
Dhci_packet_parser.c35 BT_HDR *response,
39 static void parse_generic_command_complete(BT_HDR *response) { in parse_generic_command_complete() argument
40 read_command_complete_header(response, NO_OPCODE_CHECKING, 0 /* bytes after */); in parse_generic_command_complete()
42 buffer_allocator->free(response); in parse_generic_command_complete()
46 BT_HDR *response, in parse_read_buffer_size_response() argument
50 …uint8_t *stream = read_command_complete_header(response, HCI_READ_BUFFER_SIZE, 5 /* bytes after */… in parse_read_buffer_size_response()
56 buffer_allocator->free(response); in parse_read_buffer_size_response()
60 BT_HDR *response, in parse_read_local_version_info_response() argument
63 …uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_VERSION_INFO, 8 /* bytes a… in parse_read_local_version_info_response()
71 buffer_allocator->free(response); in parse_read_local_version_info_response()
[all …]
Dvendor.c166 static void transmit_completed_callback(BT_HDR *response, void *context) { in transmit_completed_callback() argument
169 ((tINT_CMD_CBACK)context)(response); in transmit_completed_callback()
/system/keymaster/include/keymaster/
Dandroid_keymaster.h54 SupportedAlgorithmsResponse* response);
56 SupportedBlockModesResponse* response);
58 SupportedPaddingModesResponse* response);
60 SupportedDigestsResponse* response);
62 SupportedImportFormatsResponse* response);
64 SupportedExportFormatsResponse* response);
66 void AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response);
67 void GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response);
69 GetKeyCharacteristicsResponse* response);
70 void ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response);
[all …]
/system/bt/device/src/
Dcontroller.c85 BT_HDR *response; in start_up() local
88 response = AWAIT_COMMAND(packet_factory->make_reset()); in start_up()
89 packet_parser->parse_generic_command_complete(response); in start_up()
92 response = AWAIT_COMMAND(packet_factory->make_read_buffer_size()); in start_up()
94 response, &acl_data_size_classic, &acl_buffer_count_classic); in start_up()
98 response = AWAIT_COMMAND( in start_up()
107 packet_parser->parse_generic_command_complete(response); in start_up()
111 response = AWAIT_COMMAND(packet_factory->make_read_local_version_info()); in start_up()
112 packet_parser->parse_read_local_version_info_response(response, &bt_version); in start_up()
115 response = AWAIT_COMMAND(packet_factory->make_read_bd_addr()); in start_up()
[all …]
/system/bt/hci/include/
Dhci_packet_parser.h31 void (*parse_generic_command_complete)(BT_HDR *response);
34 BT_HDR *response,
40 BT_HDR *response,
45 BT_HDR *response,
50 BT_HDR *response,
56 BT_HDR *response,
64 BT_HDR *response,
69 BT_HDR *response,
75 BT_HDR *response,
81 BT_HDR *response,
[all …]
Dhci_layer.h73 typedef void (*command_complete_cb)(BT_HDR *response, void *context);
/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp36 static void do_enroll(SoftGateKeeper &gatekeeper, EnrollResponse *response) { in do_enroll() argument
44 gatekeeper.Enroll(request, response); in do_enroll()
49 EnrollResponse response; in TEST() local
50 do_enroll(gatekeeper, &response); in TEST()
51 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_NONE, response.error); in TEST()
57 EnrollResponse response; in TEST() local
61 gatekeeper.Enroll(request, &response); in TEST()
63 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_INVALID, response.error); in TEST()
79 VerifyResponse response; in TEST() local
81 gatekeeper.Verify(request, &response); in TEST()
[all …]
/system/core/gatekeeperd/
DSoftGateKeeperDevice.cpp56 EnrollResponse response; in enroll() local
58 impl_->Enroll(request, &response); in enroll()
60 if (response.error == ERROR_RETRY) { in enroll()
61 return response.retry_timeout; in enroll()
62 } else if (response.error != ERROR_NONE) { in enroll()
66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in enroll()
67 *enrolled_password_handle_length = response.enrolled_password_handle.length; in enroll()
89 VerifyResponse response; in verify() local
91 impl_->Verify(request, &response); in verify()
93 if (response.error == ERROR_RETRY) { in verify()
[all …]
/system/gatekeeper/
Dgatekeeper.cpp23 void GateKeeper::Enroll(const EnrollRequest &request, EnrollResponse *response) { in Enroll() argument
24 if (response == NULL) return; in Enroll()
27 response->error = ERROR_INVALID; in Enroll()
42 response->error = ERROR_INVALID; in Enroll()
56 response->error = ERROR_UNKNOWN; in Enroll()
60 if (ThrottleRequest(uid, timestamp, &record, throttle_secure, response)) return; in Enroll()
63 response->error = ERROR_UNKNOWN; in Enroll()
73 response->SetRetryTimeout(timeout); in Enroll()
75 response->error = ERROR_INVALID; in Enroll()
95 response->error = ERROR_INVALID; in Enroll()
[all …]
/system/core/fastboot/
Dprotocol.c50 static int check_response(usb_handle *usb, unsigned int size, char *response) in check_response() argument
76 if(response) { in check_response()
77 strcpy(response, (char*) status + 4); in check_response()
110 char *response) in _command_start() argument
114 if(response) { in _command_start()
115 response[0] = 0; in _command_start()
129 return check_response(usb, size, response); in _command_start()
163 char *response) in _command_send() argument
170 r = _command_start(usb, cmd, size, response); in _command_send()
189 char *response) in _command_send_no_data() argument
[all …]
Dfastboot.h42 int fb_command_response(usb_handle *usb, const char *cmd, char *response);
51 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...);
Dfastboot_protocol.txt27 2. Client response with a single packet no greater than 64 bytes.
28 The first four bytes of the response are "OKAY", "FAIL", "DATA",
37 of the response (if present) provide a textual failure message
43 A DATA response packet will be 12 bytes long, in the form of
51 in the "DATA" response above.
54 The first four bytes of the response are "OKAY", "FAIL", or "INFO".
111 OKAY response.
Dengine.c87 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...) in fb_getvar() argument
93 response[FB_RESPONSE_SZ] = '\0'; in fb_getvar()
98 return fb_command_response(usb, cmd, response); in fb_getvar()
/system/bt/test/suite/cases/
Drfcomm.c33 char response[256] = { 0 }; in handshake() local
35 while (!strstr(response, HANDSHAKE_RESPONSE) && total < sizeof(response)) { in handshake()
36 ssize_t len = read(fd, response + total, sizeof(response) - total); in handshake()
40 …TASSERT(strstr(response, HANDSHAKE_RESPONSE) != NULL, "No valid response from HFP audio gateway."); in handshake()
/system/core/libutils/
DLooper.cpp188 const Response& response = mResponses.itemAt(mResponseIndex++); in pollOnce() local
189 int ident = response.request.ident; in pollOnce()
191 int fd = response.request.fd; in pollOnce()
192 int events = response.events; in pollOnce()
193 void* data = response.request.data; in pollOnce()
352 Response& response = mResponses.editItemAt(i); in pollInner() local
353 if (response.request.ident == POLL_CALLBACK) { in pollInner()
354 int fd = response.request.fd; in pollInner()
355 int events = response.events; in pollInner()
356 void* data = response.request.data; in pollInner()
[all …]
/system/core/adb/
Dservices.cpp543 static void connect_device(const std::string& host, std::string* response) { in connect_device() argument
545 *response = "empty host name"; in connect_device()
555 *response = android::base::StringPrintf("bad port number %s", pieces[1].c_str()); in connect_device()
566 *response = android::base::StringPrintf("unable to connect to %s:%d", in connect_device()
578 *response = android::base::StringPrintf("already connected to %s", serial.c_str()); in connect_device()
580 *response = android::base::StringPrintf("connected to %s", serial.c_str()); in connect_device()
584 void connect_emulator(const std::string& port_spec, std::string* response) { in connect_emulator() argument
587 *response = android::base::StringPrintf("unable to parse '%s' as <console port>,<adb port>", in connect_emulator()
595 *response = android::base::StringPrintf("Invalid port numbers: %s", port_spec.c_str()); in connect_emulator()
608 *response = android::base::StringPrintf("Emulator already registered on port %d", adb_port); in connect_emulator()
[all …]
Dadb_auth_client.cpp174 char response[2]; in adb_auth_event() local
178 ret = unix_read(fd, response, sizeof(response)); in adb_auth_event()
185 else if (ret == 2 && response[0] == 'O' && response[1] == 'K') { in adb_auth_event()
DSYNC.TXT43 1. A four-byte sync response id beeing "DENT"
51 When an sync response "DONE" is received the listing is done.
71 request (but not to chuck requests) with an "OKAY" sync response (length can
78 received is split up into chunks. The sync response id is "DATA" and length is
/system/bt/stack/l2cap/
Dl2cap_client.c216 tL2CAP_CFG_INFO response = { 0 }; in config_request_cb() local
224 response.result = L2CAP_CFG_OK; in config_request_cb()
230 response.mtu = L2CAP_MTU_MINIMUM; in config_request_cb()
231 response.mtu_present = true; in config_request_cb()
232 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; in config_request_cb()
240 response.fcr_present = true; in config_request_cb()
241 response.fcr = requested_parameters->fcr; in config_request_cb()
242 response.fcr.mode = L2CAP_FCR_BASIC_MODE; in config_request_cb()
243 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; in config_request_cb()
247 if (!L2CA_ConfigRsp(local_channel_id, &response)) { in config_request_cb()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h45 void Enroll(const EnrollRequest &request, EnrollResponse *response);
46 void Verify(const VerifyRequest &request, VerifyResponse *response);
208 failure_record_t *record, bool secure, GateKeeperMessage *response);
/system/bt/stack/btu/
Dbtu_hcif.c73 static void btu_hcif_command_complete_evt (BT_HDR *response, void *context);
956 …uint8_t *stream = hack->response->data + hack->response->offset + 3; // 2 to skip the event header… in btu_hcif_command_complete_evt_on_task()
962 hack->response->len - 5, // 3 for the command complete headers, 2 for the event headers in btu_hcif_command_complete_evt_on_task()
965 GKI_freebuf(hack->response); in btu_hcif_command_complete_evt_on_task()
969 static void btu_hcif_command_complete_evt(BT_HDR *response, void *context) in btu_hcif_command_complete_evt() argument
975 hack->response = response; in btu_hcif_command_complete_evt()
/system/extras/tests/net_test/
Diproute.py379 response = self._Recv()
380 hdr = NLMsgHdr(response)
384 def _ParseAck(self, response): argument
386 hdr, data = cstruct.Read(response, NLMsgHdr)
395 response = self._Recv()
396 self._ParseAck(response)
/system/bt/btif/src/
Dbtif_gatt_server.c89 btgatt_response_t response; member
499 btgatt_response_t *p_rsp = &p_cb->response; in btgatts_handle_event()
661 int status, btgatt_response_t *response) in btif_gatts_send_response() argument
668 memcpy(&btif_cb.response, response, sizeof(btgatt_response_t)); in btif_gatts_send_response()

12