/system/keymaster/ |
D | android_keymaster.cpp | 63 SupportedResponse<T>* response) { in check_supported() argument 65 response->error = KM_ERROR_UNSUPPORTED_ALGORITHM; in check_supported() 82 SupportedAlgorithmsResponse* response) { in SupportedAlgorithms() argument 83 if (response == NULL) in SupportedAlgorithms() 86 response->error = KM_ERROR_OK; in SupportedAlgorithms() 92 response->results_length = algorithm_count; in SupportedAlgorithms() 93 response->results = dup_array(algorithms, algorithm_count); in SupportedAlgorithms() 94 if (!response->results) in SupportedAlgorithms() 95 response->error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in SupportedAlgorithms() 102 SupportedResponse<T>* response) { in GetSupported() argument [all …]
|
D | soft_keymaster_device.cpp | 260 ImportKeyResponse response; in import_keypair() local 261 convert_device(dev)->impl_->ImportKey(request, &response); in import_keypair() 262 if (response.error != KM_ERROR_OK) { in import_keypair() 263 LOG_E("Key import failed with error: %d", response.error); in import_keypair() 264 return response.error; in import_keypair() 267 *key_blob_length = response.key_blob.key_material_size; in import_keypair() 273 memcpy(*key_blob, response.key_blob.key_material, *key_blob_length); in import_keypair() 477 SupportedAlgorithmsResponse response; in get_supported_algorithms() local 478 convert_device(dev)->impl_->SupportedAlgorithms(request, &response); in get_supported_algorithms() 479 if (response.error != KM_ERROR_OK) { in get_supported_algorithms() [all …]
|
/system/bt/hci/src/ |
D | hci_packet_parser.c | 35 BT_HDR *response, 39 static void parse_generic_command_complete(BT_HDR *response) { in parse_generic_command_complete() argument 40 read_command_complete_header(response, NO_OPCODE_CHECKING, 0 /* bytes after */); in parse_generic_command_complete() 42 buffer_allocator->free(response); in parse_generic_command_complete() 46 BT_HDR *response, in parse_read_buffer_size_response() argument 50 …uint8_t *stream = read_command_complete_header(response, HCI_READ_BUFFER_SIZE, 5 /* bytes after */… in parse_read_buffer_size_response() 56 buffer_allocator->free(response); in parse_read_buffer_size_response() 60 BT_HDR *response, in parse_read_local_version_info_response() argument 63 …uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_VERSION_INFO, 8 /* bytes a… in parse_read_local_version_info_response() 71 buffer_allocator->free(response); in parse_read_local_version_info_response() [all …]
|
D | vendor.c | 166 static void transmit_completed_callback(BT_HDR *response, void *context) { in transmit_completed_callback() argument 169 ((tINT_CMD_CBACK)context)(response); in transmit_completed_callback()
|
/system/keymaster/include/keymaster/ |
D | android_keymaster.h | 54 SupportedAlgorithmsResponse* response); 56 SupportedBlockModesResponse* response); 58 SupportedPaddingModesResponse* response); 60 SupportedDigestsResponse* response); 62 SupportedImportFormatsResponse* response); 64 SupportedExportFormatsResponse* response); 66 void AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response); 67 void GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response); 69 GetKeyCharacteristicsResponse* response); 70 void ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response); [all …]
|
/system/bt/device/src/ |
D | controller.c | 85 BT_HDR *response; in start_up() local 88 response = AWAIT_COMMAND(packet_factory->make_reset()); in start_up() 89 packet_parser->parse_generic_command_complete(response); in start_up() 92 response = AWAIT_COMMAND(packet_factory->make_read_buffer_size()); in start_up() 94 response, &acl_data_size_classic, &acl_buffer_count_classic); in start_up() 98 response = AWAIT_COMMAND( in start_up() 107 packet_parser->parse_generic_command_complete(response); in start_up() 111 response = AWAIT_COMMAND(packet_factory->make_read_local_version_info()); in start_up() 112 packet_parser->parse_read_local_version_info_response(response, &bt_version); in start_up() 115 response = AWAIT_COMMAND(packet_factory->make_read_bd_addr()); in start_up() [all …]
|
/system/bt/hci/include/ |
D | hci_packet_parser.h | 31 void (*parse_generic_command_complete)(BT_HDR *response); 34 BT_HDR *response, 40 BT_HDR *response, 45 BT_HDR *response, 50 BT_HDR *response, 56 BT_HDR *response, 64 BT_HDR *response, 69 BT_HDR *response, 75 BT_HDR *response, 81 BT_HDR *response, [all …]
|
D | hci_layer.h | 73 typedef void (*command_complete_cb)(BT_HDR *response, void *context);
|
/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 36 static void do_enroll(SoftGateKeeper &gatekeeper, EnrollResponse *response) { in do_enroll() argument 44 gatekeeper.Enroll(request, response); in do_enroll() 49 EnrollResponse response; in TEST() local 50 do_enroll(gatekeeper, &response); in TEST() 51 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_NONE, response.error); in TEST() 57 EnrollResponse response; in TEST() local 61 gatekeeper.Enroll(request, &response); in TEST() 63 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_INVALID, response.error); in TEST() 79 VerifyResponse response; in TEST() local 81 gatekeeper.Verify(request, &response); in TEST() [all …]
|
/system/core/gatekeeperd/ |
D | SoftGateKeeperDevice.cpp | 56 EnrollResponse response; in enroll() local 58 impl_->Enroll(request, &response); in enroll() 60 if (response.error == ERROR_RETRY) { in enroll() 61 return response.retry_timeout; in enroll() 62 } else if (response.error != ERROR_NONE) { in enroll() 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in enroll() 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; in enroll() 89 VerifyResponse response; in verify() local 91 impl_->Verify(request, &response); in verify() 93 if (response.error == ERROR_RETRY) { in verify() [all …]
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 23 void GateKeeper::Enroll(const EnrollRequest &request, EnrollResponse *response) { in Enroll() argument 24 if (response == NULL) return; in Enroll() 27 response->error = ERROR_INVALID; in Enroll() 42 response->error = ERROR_INVALID; in Enroll() 56 response->error = ERROR_UNKNOWN; in Enroll() 60 if (ThrottleRequest(uid, timestamp, &record, throttle_secure, response)) return; in Enroll() 63 response->error = ERROR_UNKNOWN; in Enroll() 73 response->SetRetryTimeout(timeout); in Enroll() 75 response->error = ERROR_INVALID; in Enroll() 95 response->error = ERROR_INVALID; in Enroll() [all …]
|
/system/core/fastboot/ |
D | protocol.c | 50 static int check_response(usb_handle *usb, unsigned int size, char *response) in check_response() argument 76 if(response) { in check_response() 77 strcpy(response, (char*) status + 4); in check_response() 110 char *response) in _command_start() argument 114 if(response) { in _command_start() 115 response[0] = 0; in _command_start() 129 return check_response(usb, size, response); in _command_start() 163 char *response) in _command_send() argument 170 r = _command_start(usb, cmd, size, response); in _command_send() 189 char *response) in _command_send_no_data() argument [all …]
|
D | fastboot.h | 42 int fb_command_response(usb_handle *usb, const char *cmd, char *response); 51 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...);
|
D | fastboot_protocol.txt | 27 2. Client response with a single packet no greater than 64 bytes. 28 The first four bytes of the response are "OKAY", "FAIL", "DATA", 37 of the response (if present) provide a textual failure message 43 A DATA response packet will be 12 bytes long, in the form of 51 in the "DATA" response above. 54 The first four bytes of the response are "OKAY", "FAIL", or "INFO". 111 OKAY response.
|
D | engine.c | 87 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...) in fb_getvar() argument 93 response[FB_RESPONSE_SZ] = '\0'; in fb_getvar() 98 return fb_command_response(usb, cmd, response); in fb_getvar()
|
/system/bt/test/suite/cases/ |
D | rfcomm.c | 33 char response[256] = { 0 }; in handshake() local 35 while (!strstr(response, HANDSHAKE_RESPONSE) && total < sizeof(response)) { in handshake() 36 ssize_t len = read(fd, response + total, sizeof(response) - total); in handshake() 40 …TASSERT(strstr(response, HANDSHAKE_RESPONSE) != NULL, "No valid response from HFP audio gateway."); in handshake()
|
/system/core/libutils/ |
D | Looper.cpp | 188 const Response& response = mResponses.itemAt(mResponseIndex++); in pollOnce() local 189 int ident = response.request.ident; in pollOnce() 191 int fd = response.request.fd; in pollOnce() 192 int events = response.events; in pollOnce() 193 void* data = response.request.data; in pollOnce() 352 Response& response = mResponses.editItemAt(i); in pollInner() local 353 if (response.request.ident == POLL_CALLBACK) { in pollInner() 354 int fd = response.request.fd; in pollInner() 355 int events = response.events; in pollInner() 356 void* data = response.request.data; in pollInner() [all …]
|
/system/core/adb/ |
D | services.cpp | 543 static void connect_device(const std::string& host, std::string* response) { in connect_device() argument 545 *response = "empty host name"; in connect_device() 555 *response = android::base::StringPrintf("bad port number %s", pieces[1].c_str()); in connect_device() 566 *response = android::base::StringPrintf("unable to connect to %s:%d", in connect_device() 578 *response = android::base::StringPrintf("already connected to %s", serial.c_str()); in connect_device() 580 *response = android::base::StringPrintf("connected to %s", serial.c_str()); in connect_device() 584 void connect_emulator(const std::string& port_spec, std::string* response) { in connect_emulator() argument 587 *response = android::base::StringPrintf("unable to parse '%s' as <console port>,<adb port>", in connect_emulator() 595 *response = android::base::StringPrintf("Invalid port numbers: %s", port_spec.c_str()); in connect_emulator() 608 *response = android::base::StringPrintf("Emulator already registered on port %d", adb_port); in connect_emulator() [all …]
|
D | adb_auth_client.cpp | 174 char response[2]; in adb_auth_event() local 178 ret = unix_read(fd, response, sizeof(response)); in adb_auth_event() 185 else if (ret == 2 && response[0] == 'O' && response[1] == 'K') { in adb_auth_event()
|
D | SYNC.TXT | 43 1. A four-byte sync response id beeing "DENT" 51 When an sync response "DONE" is received the listing is done. 71 request (but not to chuck requests) with an "OKAY" sync response (length can 78 received is split up into chunks. The sync response id is "DATA" and length is
|
/system/bt/stack/l2cap/ |
D | l2cap_client.c | 216 tL2CAP_CFG_INFO response = { 0 }; in config_request_cb() local 224 response.result = L2CAP_CFG_OK; in config_request_cb() 230 response.mtu = L2CAP_MTU_MINIMUM; in config_request_cb() 231 response.mtu_present = true; in config_request_cb() 232 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; in config_request_cb() 240 response.fcr_present = true; in config_request_cb() 241 response.fcr = requested_parameters->fcr; in config_request_cb() 242 response.fcr.mode = L2CAP_FCR_BASIC_MODE; in config_request_cb() 243 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; in config_request_cb() 247 if (!L2CA_ConfigRsp(local_channel_id, &response)) { in config_request_cb()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 45 void Enroll(const EnrollRequest &request, EnrollResponse *response); 46 void Verify(const VerifyRequest &request, VerifyResponse *response); 208 failure_record_t *record, bool secure, GateKeeperMessage *response);
|
/system/bt/stack/btu/ |
D | btu_hcif.c | 73 static void btu_hcif_command_complete_evt (BT_HDR *response, void *context); 956 …uint8_t *stream = hack->response->data + hack->response->offset + 3; // 2 to skip the event header… in btu_hcif_command_complete_evt_on_task() 962 hack->response->len - 5, // 3 for the command complete headers, 2 for the event headers in btu_hcif_command_complete_evt_on_task() 965 GKI_freebuf(hack->response); in btu_hcif_command_complete_evt_on_task() 969 static void btu_hcif_command_complete_evt(BT_HDR *response, void *context) in btu_hcif_command_complete_evt() argument 975 hack->response = response; in btu_hcif_command_complete_evt()
|
/system/extras/tests/net_test/ |
D | iproute.py | 379 response = self._Recv() 380 hdr = NLMsgHdr(response) 384 def _ParseAck(self, response): argument 386 hdr, data = cstruct.Read(response, NLMsgHdr) 395 response = self._Recv() 396 self._ParseAck(response)
|
/system/bt/btif/src/ |
D | btif_gatt_server.c | 89 btgatt_response_t response; member 499 btgatt_response_t *p_rsp = &p_cb->response; in btgatts_handle_event() 661 int status, btgatt_response_t *response) in btif_gatts_send_response() argument 668 memcpy(&btif_cb.response, response, sizeof(btgatt_response_t)); in btif_gatts_send_response()
|