/system/chre/core/include/chre/core/ |
H A D | request_multiplexer_impl.h | 25 bool RequestMultiplexer<RequestType>::addRequest(const RequestType& request, argument 31 bool requestStored = mRequests.push_back(request); 34 *maximalRequestChanged = mCurrentMaximalRequest.mergeWith(request); 42 size_t index, const RequestType& request, bool *maximalRequestChanged) { 47 mRequests[index] = request; 41 updateRequest( size_t index, const RequestType& request, bool *maximalRequestChanged) argument
|
H A D | sensor_request_manager.h | 38 * Destructs the sensor request manager and releases platform sensor resources 55 * Sets a sensor request for the given nanoapp for the provided sensor handle. 56 * If the nanoapp has made a previous request, it is replaced by this request. 57 * If the request changes the mode to SensorMode::Off the request is removed. 60 * @param sensorHandle The sensor handle for which this sensor request is 62 * @param request The new sensor request for this nanoapp. 63 * @return true if the request wa [all...] |
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.h | 68 gatekeeper_error_t Send(uint32_t command, const GateKeeperMessage& request, 71 gatekeeper_error_t Send(const EnrollRequest& request, EnrollResponse *response) { argument 72 return Send(GK_ENROLL, request, response); 75 gatekeeper_error_t Send(const VerifyRequest& request, VerifyResponse *response) { argument 76 return Send(GK_VERIFY, request, response);
|
H A D | trusty_gatekeeper.cpp | 106 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 110 gatekeeper_error_t error = Send(request, &response); 139 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); 142 gatekeeper_error_t error = Send(request, &response); 162 gatekeeper_error_t TrustyGateKeeperDevice::Send(uint32_t command, const GateKeeperMessage& request, argument 164 uint32_t request_size = request.GetSerializedSize(); 168 request.Serialize(send_buf, send_buf + request_size);
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device.cpp | 156 RequestType* request) { 157 request->additional_params.Clear(); 159 request->additional_params.push_back(TAG_APPLICATION_ID, *client_id); 162 request->additional_params.push_back(TAG_APPLICATION_DATA, *app_data); 179 ConfigureRequest request; local 180 if (!params_copy.GetTagValue(TAG_OS_VERSION, &request.os_version) || 181 !params_copy.GetTagValue(TAG_OS_PATCHLEVEL, &request.os_patchlevel)) { 187 keymaster_error_t err = Send(KM_CONFIGURE, request, &response); 202 AddEntropyRequest request; local 203 request 155 AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, RequestType* request) argument 263 GetKeyCharacteristicsRequest request; local 381 AttestKeyRequest request; local 441 UpgradeKeyRequest request; local 482 BeginOperationRequest request; local 530 UpdateOperationRequest request; local 589 FinishOperationRequest request; local 634 AbortOperationRequest request; local [all...] |
/system/nvram/core/ |
H A D | nvram_manager.cpp | 108 // Looks at |request| to determine the command to execute, then invokes 110 void NvramManager::Dispatch(const nvram::Request& request, argument 113 const nvram::RequestUnion& input = request.payload; 166 nvram_result_t NvramManager::GetInfo(const GetInfoRequest& /* request */, 192 nvram_result_t NvramManager::CreateSpace(const CreateSpaceRequest& request, argument 194 const uint32_t index = request.index; 215 if (request.size > kMaxSpaceSize) { 216 NVRAM_LOG_INFO("Create request exceeds max space size."); 220 if (request.authorization_value.size() > kMaxAuthSize) { 226 for (uint32_t control : request 289 GetSpaceInfo(const GetSpaceInfoRequest& request, GetSpaceInfoResponse* response) argument 324 DeleteSpace(const DeleteSpaceRequest& request, DeleteSpaceResponse* ) argument 393 WriteSpace(const WriteSpaceRequest& request, WriteSpaceResponse* ) argument 439 ReadSpace(const ReadSpaceRequest& request, ReadSpaceResponse* response) argument 467 LockSpaceWrite( const LockSpaceWriteRequest& request, LockSpaceWriteResponse* ) argument 499 LockSpaceRead( const LockSpaceReadRequest& request, LockSpaceReadResponse* ) argument [all...] |
/system/chre/platform/shared/ |
H A D | host_protocol_chre.cc | 63 const auto *request = static_cast<const fbs::LoadNanoappRequest *>( local 65 const flatbuffers::Vector<uint8_t> *appBinary = request->app_binary(); 67 hostClientId, request->transaction_id(), request->app_id(), 68 request->app_version(), request->target_api_version(), 74 const auto *request = static_cast<const fbs::UnloadNanoappRequest *>( local 77 hostClientId, request->transaction_id(), request->app_id(), 78 request 83 const auto *request = static_cast<const fbs::TimeSyncMessage *>( local 190 auto request = fbs::CreateTimeSyncRequest(builder); local [all...] |
/system/keymaster/ |
H A D | soft_keymaster_device.cpp | 360 RequestType* request) { 361 request->additional_params.Clear(); 363 request->additional_params.push_back(TAG_APPLICATION_ID, *client_id); 365 request->additional_params.push_back(TAG_APPLICATION_DATA, *app_data); 423 SupportedAlgorithmsRequest request; 425 convert_device(dev)->impl_->SupportedAlgorithms(request, &response); 457 SupportedBlockModesRequest request; 458 request.algorithm = algorithm; 459 request.purpose = purpose; 461 convert_device(dev)->impl_->SupportedBlockModes(request, 359 AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, RequestType* request) argument 618 ConfigureRequest request; local 749 GenerateKeyRequest request; local 799 GenerateKeyRequest request; local 880 GetKeyCharacteristicsRequest request; local 918 GetKeyCharacteristicsRequest request; local 946 ImportKeyRequest request; local 1030 ExportKeyRequest request; local 1080 AttestKeyRequest request; local 1253 BeginOperationRequest request; local 1322 UpdateOperationRequest request; local 1401 FinishOperationRequest request; local 1557 FinishOperationRequest request; local 1601 AbortOperationRequest request; local [all...] |
/system/update_engine/ |
H A D | proxy_resolver.cc | 53 bool DirectProxyResolver::CancelProxyRequest(ProxyRequestId request) { argument 54 return MessageLoop::current()->CancelTask(request);
|
H A D | proxy_resolver.h | 41 // An id that identifies a proxy request. Used to cancel an ongoing request 54 // Returns the id of the pending request on success or kProxyRequestIdNull 59 // Cancel the proxy resolution request initiated by GetProxiesForUrl(). The 60 // |request| value must be the one provided by GetProxiesForUrl(). 61 virtual bool CancelProxyRequest(ProxyRequestId request) = 0; 74 bool CancelProxyRequest(ProxyRequestId request) override;
|
H A D | chrome_browser_proxy_resolver_unittest.cc | 158 ProxyRequestId request = resolver_.GetProxiesForUrl(kUrl, callback); local 160 // Cancel the request and then run the D-Bus success callback. The original 162 EXPECT_TRUE(resolver_.CancelProxyRequest(request)); 172 ProxyRequestId request = local 175 // Cancel the same request twice. The second call should fail. 176 EXPECT_TRUE(resolver_.CancelProxyRequest(request)); 177 EXPECT_FALSE(resolver_.CancelProxyRequest(request));
|
/system/core/debuggerd/tombstoned/ |
H A D | tombstoned.cpp | 255 TombstonedCrashPacket request = {}; local 258 LOG(WARNING) << "crash request timed out"; 265 rc = TEMP_FAILURE_RETRY(read(sockfd, &request, sizeof(request))); 269 } else if (rc != sizeof(request)) { 271 << sizeof(request) << ")"; 275 if (request.packet_type != CrashPacketType::kDumpRequest) { 277 << StringPrintf("%#2hhX", request.packet_type); 281 crash->crash_type = request.packet.dump_request.dump_type; 288 crash->crash_pid = request 321 TombstonedCrashPacket request = {}; local [all...] |
/system/chre/host/common/ |
H A D | host_protocol_host.cc | 150 auto request = fbs::CreateHubInfoRequest(builder); local 151 finalize(builder, fbs::ChreMessage::HubInfoRequest, request.Union()); 159 auto request = fbs::CreateLoadNanoappRequest( local 161 finalize(builder, fbs::ChreMessage::LoadNanoappRequest, request.Union()); 165 auto request = fbs::CreateNanoappListRequest(builder); local 166 finalize(builder, fbs::ChreMessage::NanoappListRequest, request.Union()); 172 auto request = fbs::CreateUnloadNanoappRequest( local 174 finalize(builder, fbs::ChreMessage::UnloadNanoappRequest, request.Union()); 179 auto request = fbs::CreateTimeSyncMessage(builder, offset); local 180 finalize(builder, fbs::ChreMessage::TimeSyncMessage, request 184 auto request = fbs::CreateDebugDumpRequest(builder); local [all...] |
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 40 EnrollRequest request(0, NULL, &password, NULL); 42 gatekeeper.Enroll(request, response); 57 EnrollRequest request(0, NULL, &password, NULL); 59 gatekeeper.Enroll(request, &response); 75 VerifyRequest request(0, 1, &enroll_response.enrolled_password_handle, 79 gatekeeper.Verify(request, &response); 113 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, 116 gatekeeper.Verify(request, &response); 161 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, 164 gatekeeper.Verify(request, [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 25 void GateKeeper::Enroll(const EnrollRequest &request, EnrollResponse *response) { argument 28 if (!request.provided_password.buffer.get()) { 34 uint32_t uid = request.user_id; 36 if (request.password_handle.buffer.get() == NULL) { 41 reinterpret_cast<password_handle_t *>(request.password_handle.buffer.get()); 72 if (!DoVerify(pw_handle, request.enrolled_password)) { 95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), 96 request.provided_password.length)) { 104 void GateKeeper::Verify(const VerifyRequest &request, VerifyResponse *response) { argument 107 if (!request [all...] |
/system/nvram/messages/tests/ |
H A D | nvram_messages_test.cpp | 38 Request request; local 39 request.payload.Activate<COMMAND_GET_INFO>(); 42 EncodeAndDecode(request, &decoded); 87 Request request; local 89 request.payload.Activate<COMMAND_CREATE_SPACE>(); 99 EncodeAndDecode(request, &decoded); 131 Request request; local 133 request.payload.Activate<COMMAND_GET_SPACE_INFO>(); 137 EncodeAndDecode(request, &decoded); 178 Request request; local 215 Request request; local 239 Request request; local 281 Request request; local 326 Request request; local 363 Request request; local 409 Request request; local [all...] |
/system/core/libutils/ |
H A D | Looper.cpp | 156 const Request& request = mRequests.valueAt(i); 158 request.initEventItem(&eventItem); 160 int epollResult = epoll_ctl(mEpollFd, EPOLL_CTL_ADD, request.fd, & eventItem); 163 request.fd, strerror(errno)); 183 int ident = response.request.ident; 185 int fd = response.request.fd; 187 void* data = response.request.data; 347 if (response.request.ident == POLL_CALLBACK) { 348 int fd = response.request.fd; 350 void* data = response.request [all...] |
/system/chre/core/ |
H A D | sensor_request_manager.cc | 43 LOGE("Invalid continuous request for a one-shot sensor."); 48 LOGE("Invalid one-shot request for a continuous sensor."); 136 // The request changes the mode to off and there was an existing request. 137 // The existing request is removed from the multiplexer. The nanoapp is 138 // unregistered from events of this type if this request was successful. 145 // existing request). We assign to success to be true and no other 151 // The request changes the mode to the enabled state and there was no 152 // existing request. The request i 326 add(const SensorRequest& request, bool *requestChanged) argument 381 update(size_t updateIndex, const SensorRequest& request, bool *requestChanged) argument [all...] |
/system/tpm/tpm_manager/client/ |
H A D | binder_proxy_helper.h | 45 void SendRequest(const RequestProtobufType& request) { argument 50 request_bytes.resize(request.ByteSize()); 51 if (!request.SerializeToArray(request_bytes.data(), request_bytes.size())) {
|
/system/chre/platform/include/chre/platform/ |
H A D | platform_sensor.h | 116 * Sends the sensor request to the platform sensor. The implementation 117 * of this method is supplied by the platform. If the request is 120 * setting this new request fails due to a transient failure (example: 123 * If the request's latency is lower than its interval, the platform sensor 126 * @param request The new request to set this sensor to. 128 * supplied request. 130 bool applyRequest(const SensorRequest& request);
|
/system/chre/platform/linux/ |
H A D | platform_sensor.cc | 45 bool PlatformSensor::applyRequest(const SensorRequest& request) { argument 46 // TODO: Implement this. Perhaps consider the request and start to pass in
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 54 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 58 impl_->Enroll(request, &response); 88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); 91 impl_->Verify(request, &response);
|
/system/nvram/hal/include/nvram/hal/ |
H A D | nvram_device_adapter.h | 34 // parameters are passed in |request| and |response| will be filled in with 36 virtual void Execute(const nvram::Request& request,
|
/system/tpm/tpm_manager/server/ |
H A D | dbus_service.h | 70 const RequestProtobufType& request); 79 const RequestProtobufType& request);
|
/system/chre/core/tests/ |
H A D | sensor_request_test.cc | 48 SensorRequest request; local 49 EXPECT_EQ(request.getInterval(), Nanoseconds(CHRE_SENSOR_INTERVAL_DEFAULT)); 50 EXPECT_EQ(request.getLatency(), Nanoseconds(CHRE_SENSOR_LATENCY_DEFAULT)); 51 EXPECT_EQ(request.getMode(), SensorMode::Off); 214 SensorRequest request(SensorMode::ActiveContinuous, 220 EXPECT_FALSE(request.mergeWith(otherRequest)); 221 EXPECT_EQ(request.getMode(), SensorMode::ActiveContinuous); 222 EXPECT_EQ(request.getInterval(), Nanoseconds(10)); 223 EXPECT_EQ(request.getLatency(), Nanoseconds(100)); 227 SensorRequest request(SensorMod [all...] |