/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 77 void GetVersion(const GetVersionRequest& req, GetVersionResponse* rsp) { argument 78 impl_->GetVersion(req, rsp);
|
/system/bt/stack/srvc/ |
H A D | srvc_battery.cc | 277 tGATTS_RSP rsp; local 288 memset(&rsp, 0, sizeof(tGATTS_RSP)); 293 rsp.attr_value.handle = p_inst->pending_handle; 294 rsp.attr_value.len = 2; 295 pp = rsp.attr_value.value; 297 srvc_sr_rsp(p_inst->pending_clcb_idx, st, &rsp); 301 rsp.attr_value.handle = p_inst->pending_handle; 302 rsp.attr_value.len = 1; 303 pp = rsp.attr_value.value; 305 srvc_sr_rsp(p_inst->pending_clcb_idx, st, &rsp); [all...] |
/system/core/libunwindstack/ |
H A D | User.h | 74 uint64_t rsp; member in struct:unwindstack::x86_64_user_regs
|
H A D | Ucontext.h | 162 uint64_t rsp; member in struct:unwindstack::x86_64_mcontext_t
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device_test.cpp | 73 Rsp rsp; local 74 (device->*method)(req, &rsp); 76 *out_size = rsp.SerializedSize(); 78 rsp.Serialize(out, out + *out_size);
|
H A D | trusty_keymaster_device.cpp | 755 KeymasterResponse* rsp) { 780 if (!rsp->Deserialize(&p, p + rsp_size)) { 783 } else if (rsp->error != KM_ERROR_OK) { 784 ALOGE("Response of size %d contained error code %d\n", (int)rsp_size, (int)rsp->error); 785 return rsp->error; 787 return rsp->error; 754 Send(uint32_t command, const Serializable& req, KeymasterResponse* rsp) argument
|
/system/core/trusty/storage/lib/ |
H A D | storage.c | 149 struct storage_file_open_resp rsp = { 0 }; local 150 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; 157 if ((size_t)rc != sizeof(rsp)) { 158 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); 162 *handle_p = make_file_handle(session, rsp.handle); 284 struct storage_file_get_size_resp rsp; local 285 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; 292 if ((size_t)rc != sizeof(rsp)) { [all...] |
/system/nfc/src/nfa/ee/ |
H A D | nfa_ee_main.c | 153 tNFC_NFCEE_MODE_SET_REVT rsp; local 183 * process the same as the host gets activate rsp */ 192 rsp.mode = NFA_EE_MD_ACTIVATE; 193 rsp.nfcee_id = p_cb->nfcee_id; 194 rsp.status = NFA_STATUS_OK; 195 ee_msg.p_data = &rsp;
|
/system/keymaster/ |
H A D | android_keymaster.cpp | 94 void AndroidKeymaster::GetVersion(const GetVersionRequest&, GetVersionResponse* rsp) { argument 95 if (rsp == NULL) 98 rsp->major_ver = MAJOR_VER; 99 rsp->minor_ver = MINOR_VER; 100 rsp->subminor_ver = SUBMINOR_VER; 101 rsp->error = KM_ERROR_OK;
|
/system/bt/stack/gatt/ |
H A D | gatt_main.cc | 613 /* Send L2CAP connect rsp */ 1060 tGATTS_SRV_CHG_RSP rsp; local 1068 GATTS_SRV_CHG_CMD_READ_NUM_CLENTS, NULL, &rsp); 1070 if (status && rsp.num_clients) { 1071 VLOG(1) << "num_srv_chg_clt_clients=" << +rsp.num_clients; 1072 num_clients = rsp.num_clients; 1077 GATTS_SRV_CHG_CMD_READ_CLENT, &req, &rsp); 1079 memcpy(&srv_chg_clt, &rsp.srv_chg, sizeof(tGATTS_SRV_CHG));
|
/system/bt/btif/src/ |
H A D | btif_hf.cc | 1100 static bt_status_t formatted_at_response(const char* rsp, RawAddress* bd_addr) { argument 1113 strncpy(ag_res.str, rsp, BTA_AG_AT_MAX_LEN);
|
/system/bt/stack/include/ |
H A D | mca_api.h | 202 tMCA_RSP_EVT rsp; member in union:__anon1166
|
H A D | avrc_defs.h | 1511 tAVRC_RSP rsp; member in union:__anon1009
|