/system/bt/stack/srvc/ |
H A D | srvc_battery.cc | 277 tGATTS_RSP rsp; local 288 memset(&rsp, 0, sizeof(tGATTS_RSP)); 293 rsp.attr_value.handle = p_inst->pending_handle; 294 rsp.attr_value.len = 2; 295 pp = rsp.attr_value.value; 297 srvc_sr_rsp(p_inst->pending_clcb_idx, st, &rsp); 301 rsp.attr_value.handle = p_inst->pending_handle; 302 rsp.attr_value.len = 1; 303 pp = rsp.attr_value.value; 305 srvc_sr_rsp(p_inst->pending_clcb_idx, st, &rsp); [all...] |
/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 172 (const GatekeeperResponse &rsp) { 173 ret = static_cast<int>(rsp.code); // propagate errors 174 if (rsp.code >= GatekeeperStatusCode::STATUS_OK) { 177 *enrolled_password_handle = new uint8_t[rsp.data.size()]; 178 *enrolled_password_handle_length = rsp.data.size(); 179 memcpy(*enrolled_password_handle, rsp.data.data(), 183 } else if (rsp.code == GatekeeperStatusCode::ERROR_RETRY_TIMEOUT && rsp.timeout > 0) { 184 ret = rsp.timeout; 261 (const GatekeeperResponse &rsp) { [all...] |
/system/core/trusty/storage/lib/ |
H A D | storage.c | 149 struct storage_file_open_resp rsp = { 0 }; local 150 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; 157 if ((size_t)rc != sizeof(rsp)) { 158 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); 162 *handle_p = make_file_handle(session, rsp.handle); 284 struct storage_file_get_size_resp rsp; local 285 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; 292 if ((size_t)rc != sizeof(rsp)) { [all...] |
/system/keymaster/ |
H A D | android_keymaster_messages_test.cpp | 108 SupportedResponse<keymaster_digest_t> rsp(ver); 110 rsp.error = KM_ERROR_OK; 111 rsp.SetResults(digests); 113 UniquePtr<SupportedResponse<keymaster_digest_t>> deserialized(round_trip(ver, rsp, 20)); 141 GenerateKeyResponse rsp(ver); 142 rsp.error = KM_ERROR_OK; 143 rsp.key_blob.key_material = dup_array(TEST_DATA); 144 rsp.key_blob.key_material_size = array_length(TEST_DATA); 145 rsp.enforced.Reinitialize(params, array_length(params)); 147 UniquePtr<GenerateKeyResponse> deserialized(round_trip(ver, rsp, 10 [all...] |
H A D | android_keymaster.cpp | 94 void AndroidKeymaster::GetVersion(const GetVersionRequest&, GetVersionResponse* rsp) { argument 95 if (rsp == NULL) 98 rsp->major_ver = MAJOR_VER; 99 rsp->minor_ver = MINOR_VER; 100 rsp->subminor_ver = SUBMINOR_VER; 101 rsp->error = KM_ERROR_OK;
|
/system/core/libunwindstack/ |
H A D | User.h | 72 uint64_t rsp; member in struct:x86_64_user_regs
|
H A D | Regs.cpp | 200 (*regs)[X86_64_REG_RSP] = user->rsp; 204 regs->set_sp(user->rsp);
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device.cpp | 171 GenerateKeyResponse rsp(message_version_); 173 keymaster_error_t err = Send(req, &rsp); 179 *key_blob_length = rsp.key_blob.key_material_size; 181 memcpy(*key_blob, rsp.key_blob.key_material, *key_blob_length); 439 KeymasterResponse* rsp) { 463 if (!rsp->Deserialize(&p, p + rsp_size)) { 466 } else if (rsp->error != KM_ERROR_OK) { 467 ALOGE("Response of size %d contained error code %d\n", (int)rsp_size, (int)rsp->error); 468 return rsp->error; 470 return rsp 438 Send(uint32_t command, const Serializable& req, KeymasterResponse* rsp) argument [all...] |
H A D | trusty_keymaster_device_test.cpp | 73 Rsp rsp; local 74 (device->*method)(req, &rsp); 76 *out_size = rsp.SerializedSize(); 78 rsp.Serialize(out, out + *out_size);
|
/system/nfc/src/nfa/ee/ |
H A D | nfa_ee_main.c | 138 tNFC_NFCEE_MODE_SET_REVT rsp; local 168 * process the same as the host gets activate rsp */ 177 rsp.mode = NFA_EE_MD_ACTIVATE; 178 rsp.nfcee_id = p_cb->nfcee_id; 179 rsp.status = NFA_STATUS_OK; 180 ee_msg.p_data = &rsp;
|
/system/bt/stack/avrc/ |
H A D | avrc_pars_ct.cc | 65 p_result->rsp.status = *p; 66 return p_result->rsp.status; 414 p_result->rsp.status = *p; 415 return p_result->rsp.status; 560 /* nothing comes as part of this rsp */ 604 BE_STREAM_TO_UINT8(p_result->rsp.status, p); 642 p_result->rsp.opcode = p_msg->hdr.opcode; 643 p_result->rsp.status = status; 683 p_result->rsp.opcode = p_msg->hdr.opcode; 684 p_result->rsp [all...] |
H A D | avrc_bld_tg.cc | 1304 p_rsp->rsp.opcode); 1305 if (opcode != p_rsp->rsp.opcode && p_rsp->rsp.status != AVRC_STS_NO_ERROR && 1306 avrc_is_valid_opcode(p_rsp->rsp.opcode)) { 1307 opcode = p_rsp->rsp.opcode; 1352 p_rsp->rsp.opcode = opcode; 1400 AVRC_TRACE_API("%s pdu=%x status=%x", __func__, p_rsp->rsp.pdu, 1401 p_rsp->rsp.status); 1402 if (p_rsp->rsp.status != AVRC_STS_NO_ERROR) { 1403 return (avrc_bld_rejected_rsp(&p_rsp->rsp, p_pk [all...] |
/system/core/debuggerd/libdebuggerd/x86_64/ |
H A D | machine.cpp | 65 _LOG(log, logtype::REGISTERS, " rip %016lx rbp %016lx rsp %016lx eflags %016lx\n", 66 r.rip, r.rbp, r.rsp, r.eflags);
|
/system/bt/stack/mcap/ |
H A D | mca_cact.cc | 453 evt_data.rsp.rsp_code = *p++; 464 if (evt_data.rsp.rsp_code == MCA_RSP_SUCCESS) { 469 if (evt_data.rsp.rsp_code == MCA_RSP_SUCCESS) { 470 evt_data.rsp.rsp_code = MCA_RSP_BAD_MDL; 510 MCA_TRACE_WARNING("dropping received rsp (not expecting a response)");
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 77 void GetVersion(const GetVersionRequest& req, GetVersionResponse* rsp) { argument 78 impl_->GetVersion(req, rsp);
|
/system/bt/stack/gatt/ |
H A D | gatt_main.cc | 621 /* Send L2CAP connect rsp */ 1072 tGATTS_SRV_CHG_RSP rsp; local 1080 GATTS_SRV_CHG_CMD_READ_NUM_CLENTS, NULL, &rsp); 1082 if (status && rsp.num_clients) { 1084 rsp.num_clients); 1085 num_clients = rsp.num_clients; 1090 GATTS_SRV_CHG_CMD_READ_CLENT, &req, &rsp); 1092 memcpy(&srv_chg_clt, &rsp.srv_chg, sizeof(tGATTS_SRV_CHG));
|
/system/bt/bta/av/ |
H A D | bta_av_act.cc | 755 p_rc_rsp->rsp.status = AVRC_STS_BAD_PARAM; 768 p_rc_rsp->rsp.status = AVRC_STS_BAD_PARAM; 773 p_rc_rsp->rsp.status = AVRC_STS_BAD_CMD; 808 p_rc_rsp->rsp.status = bta_av_chk_notif_evt_id(p_vendor); 809 if (p_rc_rsp->rsp.status != BTA_AV_STS_NO_RSP) evt = 0; 817 p_rc_rsp->rsp.status = AVRC_STS_BAD_CMD; 843 rc_rsp.rsp.status = BTA_AV_STS_NO_RSP; 943 rc_rsp.rsp.status = BTA_AV_STS_NO_RSP; 987 if (evt == 0 && rc_rsp.rsp.status != BTA_AV_STS_NO_RSP) { 989 rc_rsp.rsp [all...] |
/system/bt/stack/include/ |
H A D | mca_api.h | 202 tMCA_RSP_EVT rsp; member in union:__anon1177
|
H A D | avrc_defs.h | 1511 tAVRC_RSP rsp; member in union:__anon1018
|
/system/core/libmemunreachable/ |
H A D | ThreadCapture.cpp | 232 offsetof(struct pt_regs, rsp) / sizeof(uintptr_t)
|
/system/bt/btif/src/ |
H A D | btif_rc.cc | 832 BTIF_TRACE_ERROR("%s: Got vendorunique rsp from invalid rc handle", 918 "%s: Discard vendor dependent rsp. code: %d label: %d.", __func__, 1194 avrc_rsp.rsp.opcode = opcode; 1195 avrc_rsp.rsp.pdu = pdu; 1196 avrc_rsp.rsp.status = status; 1267 dump_rc_pdu(pmetamsg_resp->rsp.pdu)); 1274 ctype = get_rsp_type_code(pmetamsg_resp->rsp.status, code); 1278 if ((pmetamsg_resp->rsp.pdu == AVRC_PDU_REGISTER_NOTIFICATION) && 2031 * BT_STATUS_UNHANDLED - when rsp is not pending for 2053 /* check if rsp t [all...] |
H A D | btif_hf.cc | 1098 static bt_status_t formatted_at_response(const char* rsp, argument 1112 strncpy(ag_res.str, rsp, BTA_AG_AT_MAX_LEN);
|