/system/keymaster/ |
H A D | android_keymaster.cpp | 63 SupportedResponse<T>* response) { 65 response->error = KM_ERROR_UNSUPPORTED_ALGORITHM; 82 SupportedAlgorithmsResponse* response) { 83 if (response == NULL) 86 response->error = KM_ERROR_OK; 92 response->results_length = algorithm_count; 93 response->results = dup_array(algorithms, algorithm_count); 94 if (!response->results) 95 response->error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 102 SupportedResponse<T>* response) { 62 check_supported(const KeymasterContext& context, keymaster_algorithm_t algorithm, SupportedResponse<T>* response) argument 81 SupportedAlgorithms(const SupportedAlgorithmsRequest& , SupportedAlgorithmsResponse* response) argument 99 GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T* (OperationFactory::*get_supported_method)(size_t* count) const, SupportedResponse<T>* response) argument 117 SupportedBlockModes(const SupportedBlockModesRequest& request, SupportedBlockModesResponse* response) argument 123 SupportedPaddingModes(const SupportedPaddingModesRequest& request, SupportedPaddingModesResponse* response) argument 129 SupportedDigests(const SupportedDigestsRequest& request, SupportedDigestsResponse* response) argument 135 SupportedImportFormats(const SupportedImportFormatsRequest& request, SupportedImportFormatsResponse* response) argument 146 SupportedExportFormats(const SupportedExportFormatsRequest& request, SupportedExportFormatsResponse* response) argument 157 AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response) argument 163 GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response) argument 185 GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, GetKeyCharacteristicsResponse* response) argument 212 BeginOperation(const BeginOperationRequest& request, BeginOperationResponse* response) argument 264 UpdateOperation(const UpdateOperationRequest& request, UpdateOperationResponse* response) argument 291 FinishOperation(const FinishOperationRequest& request, FinishOperationResponse* response) argument 314 AbortOperation(const AbortOperationRequest& request, AbortOperationResponse* response) argument 329 ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) argument 362 ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) argument 383 DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) argument 389 DeleteAllKeys(const DeleteAllKeysRequest&, DeleteAllKeysResponse* response) argument [all...] |
H A D | soft_keymaster_device.cpp | 260 ImportKeyResponse response; local 261 convert_device(dev)->impl_->ImportKey(request, &response); 262 if (response.error != KM_ERROR_OK) { 263 LOG_E("Key import failed with error: %d", response.error); 264 return response.error; 267 *key_blob_length = response.key_blob.key_material_size; 273 memcpy(*key_blob, response.key_blob.key_material, *key_blob_length); 477 SupportedAlgorithmsResponse response; local 478 convert_device(dev)->impl_->SupportedAlgorithms(request, &response); 479 if (response 509 SupportedBlockModesResponse response; local 541 SupportedPaddingModesResponse response; local 572 SupportedDigestsResponse response; local 600 SupportedImportFormatsResponse response; local 629 SupportedExportFormatsResponse response; local 654 AddEntropyResponse response; local 674 GenerateKeyResponse response; local 710 GetKeyCharacteristicsResponse response; local 739 ImportKeyResponse response; local 780 ExportKeyResponse response; local 842 BeginOperationResponse response; local 879 UpdateOperationResponse response; local 918 FinishOperationResponse response; local 941 AbortOperationResponse response; local [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster.h | 54 SupportedAlgorithmsResponse* response); 56 SupportedBlockModesResponse* response); 58 SupportedPaddingModesResponse* response); 60 SupportedDigestsResponse* response); 62 SupportedImportFormatsResponse* response); 64 SupportedExportFormatsResponse* response); 66 void AddRngEntropy(const AddEntropyRequest& request, AddEntropyResponse* response); 67 void GenerateKey(const GenerateKeyRequest& request, GenerateKeyResponse* response); 69 GetKeyCharacteristicsResponse* response); 70 void ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response); [all...] |
/system/bt/hci/include/ |
H A D | hci_packet_parser.h | 31 void (*parse_generic_command_complete)(BT_HDR *response); 34 BT_HDR *response, 40 BT_HDR *response, 45 BT_HDR *response, 50 BT_HDR *response, 56 BT_HDR *response, 64 BT_HDR *response, 69 BT_HDR *response, 75 BT_HDR *response, 81 BT_HDR *response, [all...] |
H A D | hci_layer.h | 73 typedef void (*command_complete_cb)(BT_HDR *response, void *context);
|
/system/bt/hci/src/ |
H A D | hci_packet_parser.c | 35 BT_HDR *response, 39 static void parse_generic_command_complete(BT_HDR *response) { argument 40 read_command_complete_header(response, NO_OPCODE_CHECKING, 0 /* bytes after */); 42 buffer_allocator->free(response); 46 BT_HDR *response, 50 uint8_t *stream = read_command_complete_header(response, HCI_READ_BUFFER_SIZE, 5 /* bytes after */); 56 buffer_allocator->free(response); 60 BT_HDR *response, 63 uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_VERSION_INFO, 8 /* bytes after */); 71 buffer_allocator->free(response); 45 parse_read_buffer_size_response( BT_HDR *response, uint16_t *data_size_ptr, uint16_t *acl_buffer_count_ptr) argument 59 parse_read_local_version_info_response( BT_HDR *response, bt_version_t *bt_version) argument 74 parse_read_bd_addr_response( BT_HDR *response, bt_bdaddr_t *address_ptr) argument 85 parse_read_local_supported_commands_response( BT_HDR *response, uint8_t *supported_commands_ptr, size_t supported_commands_length) argument 97 parse_read_local_extended_features_response( BT_HDR *response, uint8_t *page_number_ptr, uint8_t *max_page_number_ptr, bt_device_features_t *feature_pages, size_t feature_pages_count) argument 119 parse_ble_read_white_list_size_response( BT_HDR *response, uint8_t *white_list_size_ptr) argument 130 parse_ble_read_buffer_size_response( BT_HDR *response, uint16_t *data_size_ptr, uint8_t *acl_buffer_count_ptr) argument 143 parse_ble_read_supported_states_response( BT_HDR *response, uint8_t *supported_states, size_t supported_states_size) argument 155 parse_ble_read_local_supported_features_response( BT_HDR *response, bt_device_features_t *supported_features) argument 166 parse_ble_read_resolving_list_size_response( BT_HDR *response, uint8_t *resolving_list_size_ptr) argument 176 parse_ble_read_suggested_default_data_length_response( BT_HDR *response, uint16_t *ble_default_packet_length_ptr) argument 188 read_command_complete_header( BT_HDR *response, command_opcode_t expected_opcode, size_t minimum_bytes_after) argument [all...] |
H A D | vendor.c | 166 static void transmit_completed_callback(BT_HDR *response, void *context) { argument 169 ((tINT_CMD_CBACK)context)(response);
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 56 EnrollResponse response; local 58 impl_->Enroll(request, &response); 60 if (response.error == ERROR_RETRY) { 61 return response.retry_timeout; 62 } else if (response.error != ERROR_NONE) { 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; 89 VerifyResponse response; local 91 impl_->Verify(request, &response); 93 if (response [all...] |
/system/bt/device/src/ |
H A D | controller.c | 85 BT_HDR *response; local 88 response = AWAIT_COMMAND(packet_factory->make_reset()); 89 packet_parser->parse_generic_command_complete(response); 92 response = AWAIT_COMMAND(packet_factory->make_read_buffer_size()); 94 response, &acl_data_size_classic, &acl_buffer_count_classic); 98 response = AWAIT_COMMAND( 107 packet_parser->parse_generic_command_complete(response); 111 response = AWAIT_COMMAND(packet_factory->make_read_local_version_info()); 112 packet_parser->parse_read_local_version_info_response(response, &bt_version); 115 response [all...] |
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 36 static void do_enroll(SoftGateKeeper &gatekeeper, EnrollResponse *response) { argument 44 gatekeeper.Enroll(request, response); 49 EnrollResponse response; local 50 do_enroll(gatekeeper, &response); 51 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_NONE, response.error); 57 EnrollResponse response; local 61 gatekeeper.Enroll(request, &response); 63 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_INVALID, response.error); 79 VerifyResponse response; local 81 gatekeeper.Verify(request, &response); 117 VerifyResponse response; local 165 VerifyResponse response; local 199 VerifyResponse response; local [all...] |
/system/bt/test/suite/cases/ |
H A D | rfcomm.c | 33 char response[256] = { 0 }; local 35 while (!strstr(response, HANDSHAKE_RESPONSE) && total < sizeof(response)) { 36 ssize_t len = read(fd, response + total, sizeof(response) - total); 37 TASSERT(len != -1 && len != 0, "Unable to read complete response from socket."); 40 TASSERT(strstr(response, HANDSHAKE_RESPONSE) != NULL, "No valid response from HFP audio gateway.");
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 23 void GateKeeper::Enroll(const EnrollRequest &request, EnrollResponse *response) { argument 24 if (response == NULL) return; 27 response->error = ERROR_INVALID; 42 response->error = ERROR_INVALID; 56 response->error = ERROR_UNKNOWN; 60 if (ThrottleRequest(uid, timestamp, &record, throttle_secure, response)) return; 63 response->error = ERROR_UNKNOWN; 73 response->SetRetryTimeout(timeout); 75 response->error = ERROR_INVALID; 95 response 102 Verify(const VerifyRequest &request, VerifyResponse *response) argument 256 ThrottleRequest(uint32_t uid, uint64_t timestamp, failure_record_t *record, bool secure, GateKeeperMessage *response) argument [all...] |
/system/core/fastboot/ |
H A D | protocol.c | 50 static int check_response(usb_handle *usb, unsigned int size, char *response) argument 76 if(response) { 77 strcpy(response, (char*) status + 4); 110 char *response) 114 if(response) { 115 response[0] = 0; 129 return check_response(usb, size, response); 163 char *response) 170 r = _command_start(usb, cmd, size, response); 189 char *response) 109 _command_start(usb_handle *usb, const char *cmd, unsigned size, char *response) argument 161 _command_send(usb_handle *usb, const char *cmd, const void *data, unsigned size, char *response) argument 188 _command_send_no_data(usb_handle *usb, const char *cmd, char *response) argument 199 fb_command_response(usb_handle *usb, const char *cmd, char *response) argument [all...] |
H A D | fastboot.h | 42 int fb_command_response(usb_handle *usb, const char *cmd, char *response); 51 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...);
|
H A D | engine.c | 87 int fb_getvar(struct usb_handle *usb, char *response, const char *fmt, ...) argument 93 response[FB_RESPONSE_SZ] = '\0'; 98 return fb_command_response(usb, cmd, response);
|
/system/core/adb/ |
H A D | adb_auth_client.cpp | 174 char response[2]; local 178 ret = unix_read(fd, response, sizeof(response)); 185 else if (ret == 2 && response[0] == 'O' && response[1] == 'K') {
|
H A D | services.cpp | 543 static void connect_device(const std::string& host, std::string* response) { argument 545 *response = "empty host name"; 555 *response = android::base::StringPrintf("bad port number %s", pieces[1].c_str()); 566 *response = android::base::StringPrintf("unable to connect to %s:%d", 578 *response = android::base::StringPrintf("already connected to %s", serial.c_str()); 580 *response = android::base::StringPrintf("connected to %s", serial.c_str()); 584 void connect_emulator(const std::string& port_spec, std::string* response) { argument 587 *response = android::base::StringPrintf("unable to parse '%s' as <console port>,<adb port>", 595 *response = android::base::StringPrintf("Invalid port numbers: %s", port_spec.c_str()); 608 *response 634 std::string response; local [all...] |
/system/core/libutils/ |
H A D | Looper.cpp | 188 const Response& response = mResponses.itemAt(mResponseIndex++); 189 int ident = response.request.ident; 191 int fd = response.request.fd; 192 int events = response.events; 193 void* data = response.request.data; 350 // Invoke all response callbacks. 352 Response& response = mResponses.editItemAt(i); 353 if (response.request.ident == POLL_CALLBACK) { 354 int fd = response.request.fd; 355 int events = response [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper.h | 45 void Enroll(const EnrollRequest &request, EnrollResponse *response); 46 void Verify(const VerifyRequest &request, VerifyResponse *response); 208 failure_record_t *record, bool secure, GateKeeperMessage *response);
|
/system/bt/stack/l2cap/ |
H A D | l2cap_client.c | 216 tL2CAP_CFG_INFO response = { 0 }; local 224 response.result = L2CAP_CFG_OK; 230 response.mtu = L2CAP_MTU_MINIMUM; 231 response.mtu_present = true; 232 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; 240 response.fcr_present = true; 241 response.fcr = requested_parameters->fcr; 242 response.fcr.mode = L2CAP_FCR_BASIC_MODE; 243 response.result = L2CAP_CFG_UNACCEPTABLE_PARAMS; 247 if (!L2CA_ConfigRsp(local_channel_id, &response)) { [all...] |
/system/extras/tests/net_test/ |
H A D | iproute.py | 379 response = self._Recv() 380 hdr = NLMsgHdr(response) 384 def _ParseAck(self, response): 386 hdr, data = cstruct.Read(response, NLMsgHdr) 395 response = self._Recv() 396 self._ParseAck(response) 434 ValueError: If the kernel's response could not be parsed. 637 # The response will either be an error or a list of routes.
|
/system/bt/stack/include/ |
H A D | btu.h | 41 BT_HDR *response; member in struct:__anon1088 164 /* This is the inquiry response information held by BTU, and available
|
/system/bt/stack/btu/ |
H A D | btu_hcif.c | 73 static void btu_hcif_command_complete_evt (BT_HDR *response, void *context); 956 uint8_t *stream = hack->response->data + hack->response->offset + 3; // 2 to skip the event headers, 1 to skip the command credits 962 hack->response->len - 5, // 3 for the command complete headers, 2 for the event headers 965 GKI_freebuf(hack->response); 969 static void btu_hcif_command_complete_evt(BT_HDR *response, void *context) argument 975 hack->response = response;
|
/system/bt/btif/src/ |
H A D | btif_gatt_server.c | 89 btgatt_response_t response; member in struct:__anon664 499 btgatt_response_t *p_rsp = &p_cb->response; 661 int status, btgatt_response_t *response) 668 memcpy(&btif_cb.response, response, sizeof(btgatt_response_t)); 660 btif_gatts_send_response(int conn_id, int trans_id, int status, btgatt_response_t *response) argument
|
/system/netd/server/ |
H A D | RouteController.cpp | 198 } response; local 205 (ret = recv(sock, &response, sizeof(response), 0)) != -1) { 206 if (ret == sizeof(response)) { 207 ret = response.err.error; // Netlink errors are negative errno. 209 ALOGE("netlink response contains error (%s)", strerror(-ret)); 212 ALOGE("bad netlink response message size (%d != %zu)", ret, sizeof(response));
|