/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 34 static void do_enroll(SoftGateKeeper &gatekeeper, EnrollResponse *response) { argument 42 gatekeeper.Enroll(request, response); 47 EnrollResponse response; local 48 do_enroll(gatekeeper, &response); 49 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_NONE, response.error); 55 EnrollResponse response; local 59 gatekeeper.Enroll(request, &response); 61 ASSERT_EQ(::gatekeeper::gatekeeper_error_t::ERROR_INVALID, response.error); 77 VerifyResponse response; local 79 gatekeeper.Verify(request, &response); 115 VerifyResponse response; local 163 VerifyResponse response; local 197 VerifyResponse response; local [all...] |
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.h | 69 GateKeeperMessage* response); 71 gatekeeper_error_t Send(const EnrollRequest& request, EnrollResponse *response) { argument 72 return Send(GK_ENROLL, request, response); 75 gatekeeper_error_t Send(const VerifyRequest& request, VerifyResponse *response) { argument 76 return Send(GK_VERIFY, request, response);
|
/system/bt/packet/avrcp/ |
H A D | pass_through_packet.h | 29 bool response, bool pushed, uint8_t operation_id); 39 PassThroughPacketBuilder(bool response, bool pushed, uint8_t opperation_id) argument 40 : PacketBuilder(response ? CType::ACCEPTED : CType::CONTROL, 0x09, 0x00,
|
H A D | pass_through_packet.cc | 23 bool response, bool pushed, uint8_t opperation_id) { 25 new PassThroughPacketBuilder(response, pushed, opperation_id)); 22 MakeBuilder( bool response, bool pushed, uint8_t opperation_id) argument
|
/system/bt/test/suite/rfcomm/ |
H A D | rfcomm_unittest.cc | 61 char response[1024]; local 62 len = read(fd, response, sizeof(response)); 111 char response[1024]; local 112 len = read(fd, response, sizeof(response)); 127 << "Number of read response fails: " << read_fail;
|
/system/netd/server/dns/ |
H A D | DnsTlsServer.h | 42 std::vector<uint8_t> response; member in struct:android::net::DnsTlsServer::Result
|
H A D | DnsTlsQueryMap.cpp | 30 // Store the query so it can be matched to the response or reissued. 125 void DnsTlsQueryMap::onResponse(std::vector<uint8_t> response) { argument 126 ALOGV("Got response of size %zu", response.size()); 127 if (response.size() < 2) { 131 uint16_t id = response[0] << 8 | response[1]; 135 ALOGW("Discarding response: unknown ID %d", id); 138 Result r = { .code = Response::success, .response = std::move(response) }; [all...] |
/system/tpm/tpm_manager/client/ |
H A D | tpm_ownership_binder_proxy.cc | 34 void CreateErrorResponse(ResponseProtobufType* response) { argument 35 response->set_status(tpm_manager::STATUS_DEVICE_ERROR);
|
H A D | tpm_nvram_binder_proxy.cc | 34 void CreateErrorResponse(ResponseProtobufType* response) { argument 35 response->set_result(tpm_manager::NVRAM_RESULT_IPC_ERROR);
|
/system/tpm/tpm_manager/server/ |
H A D | dbus_service.cc | 131 std::unique_ptr<DBusMethodResponse<const ReplyProtobufType&>> response, 133 // Convert |response| to a shared_ptr so |nvram_service_| can safely copy the 138 auto callback = [](const SharedResponsePointer& response, 140 response->Return(reply); 144 base::Bind(callback, SharedResponsePointer(std::move(response)))); 153 std::unique_ptr<DBusMethodResponse<const ReplyProtobufType&>> response, 155 // Convert |response| to a shared_ptr so |ownership_service_| can safely 160 auto callback = [](const SharedResponsePointer& response, 162 response->Return(reply); 166 base::Bind(callback, SharedResponsePointer(std::move(response)))); 130 HandleNvramDBusMethod( std::unique_ptr<DBusMethodResponse<const ReplyProtobufType&>> response, const RequestProtobufType& request) argument 152 HandleOwnershipDBusMethod( std::unique_ptr<DBusMethodResponse<const ReplyProtobufType&>> response, const RequestProtobufType& request) argument [all...] |
/system/tpm/trunks/ |
H A D | error_codes.cc | 323 // Check if we have a TPM 'Format-One' response code. 355 std::string response; local 356 CHECK_EQ(Serialize_TPM_ST(TPM_ST_NO_SESSIONS, &response), TPM_RC_SUCCESS); 357 CHECK_EQ(Serialize_UINT32(kErrorResponseSize, &response), TPM_RC_SUCCESS); 358 CHECK_EQ(Serialize_TPM_RC(error_code, &response), TPM_RC_SUCCESS); 359 return response;
|
H A D | tpm_handle.cc | 66 std::string response; local 67 TPM_RC result = SendCommandInternal(command, &response); 69 response = CreateErrorResponse(result); 71 return response; 75 std::string* response) { 93 response->assign(response_buf, static_cast<size_t>(result)); 74 SendCommandInternal(const std::string& command, std::string* response) argument
|
H A D | tpm_simulator_handle.cc | 66 unsigned char* response; local 70 &response_size, &response); 71 return std::string(reinterpret_cast<char*>(response), response_size);
|
H A D | background_command_transceiver.cc | 41 const std::string& response) { 42 base::Closure task = base::Bind(callback, response); 80 std::string response; local 85 base::Bind(&AssignAndSignal, &response, &response_ready); 93 return response; 38 PostCallbackToTaskRunner( const trunks::CommandTransceiver::ResponseCallback& callback, const scoped_refptr<base::SingleThreadTaskRunner>& task_runner, const std::string& response) argument
|
H A D | trunks_binder_service.cc | 45 std::vector<uint8_t>* response) { 48 response->resize(response_proto.ByteSize()); 49 CHECK(response_proto.SerializeToArray(response->data(), response->size())) 95 const std::string& response) { 97 CreateResponseProto(response, &binder_response); 100 LOG(ERROR) << "TrunksBinderService: Failed to send response to client: " 108 std::vector<uint8_t>* response) { 112 CreateResponseProto(CreateErrorResponse(SAPI_RC_BAD_PARAMETER), response); local 116 response); 44 CreateResponseProto(const std::string& data, std::vector<uint8_t>* response) argument 93 OnResponse( const android::sp<android::trunks::ITrunksClient>& client, const std::string& response) argument 106 SendCommandAndWait( const std::vector<uint8_t>& command, std::vector<uint8_t>* response) argument [all...] |
/system/update_engine/ |
H A D | omaha_response_handler_action.cc | 58 const OmahaResponse& response = GetInputObject(); local 59 if (!response.update_exists) { 71 LOG(ERROR) << "There are no suitable URLs in the response to use."; 78 install_plan_.version = response.version; 79 install_plan_.system_version = response.system_version; 94 // Fill up the other properties based on the response. 96 for (const auto& package : response.packages) { 113 install_plan_.public_key_rsa = response.public_key_rsa; 114 install_plan_.hash_checks_mandatory = AreHashChecksMandatory(response); 127 << "Unable to save the update check response has 175 AreHashChecksMandatory( const OmahaResponse& response) argument [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 56 EnrollResponse response; local 58 impl_->Enroll(request, &response); 60 if (response.error == ERROR_RETRY) { 61 return response.retry_timeout; 62 } else if (response.error != ERROR_NONE) { 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; 89 VerifyResponse response; local 91 impl_->Verify(request, &response); 93 if (response [all...] |
/system/core/libappfuse/tests/ |
H A D | FuseBufferTest.cc | 116 FuseResponse response; local 118 memset(response.read_data, 'a', 10); 120 response.Reset(0, -1, 2); 121 EXPECT_EQ(sizeof(fuse_out_header), response.header.len); 122 EXPECT_EQ(-1, response.header.error); 123 EXPECT_EQ(2u, response.header.unique); 124 EXPECT_EQ('a', response.read_data[0]); 125 EXPECT_EQ('a', response.read_data[9]); 127 response.Reset(5, -4, 3); 128 EXPECT_EQ(sizeof(fuse_out_header) + 5, response 140 FuseResponse response; local [all...] |
/system/nvram/hal/ |
H A D | testing_nvram_implementation.cpp | 42 nvram::Response* response) override; 51 bool SendRequest(const nvram::Request& request, nvram::Response* response); 71 nvram::Response* response) { 72 if (!SendRequest(request, response)) { 73 response->result = NV_RESULT_INTERNAL_ERROR; 95 nvram::Response* response) { 116 PLOG(ERROR) << "Failed to read NVRAM response"; 120 if (!nvram::Decode(command_buffer_, static_cast<size_t>(rc), response)) { 121 LOG(ERROR) << "Failed to decode NVRAM response."; 70 Execute(const nvram::Request& request, nvram::Response* response) argument 94 SendRequest(const nvram::Request& request, nvram::Response* response) argument
|
/system/nvram/messages/tests/ |
H A D | nvram_messages_test.cpp | 49 Response response; local 50 response.result = NV_RESULT_SUCCESS; 51 response.payload.Activate<COMMAND_GET_INFO>(); 54 response.payload.Activate<COMMAND_GET_INFO>(); 66 EncodeAndDecode(response, &decoded); 68 EXPECT_EQ(NV_RESULT_SUCCESS, response.result); 118 Response response; local 119 response.result = NV_RESULT_SPACE_ALREADY_EXISTS; 120 response.payload.Activate<COMMAND_CREATE_SPACE>(); 123 EncodeAndDecode(response, 148 Response response; local 202 Response response; local 226 Response response; local 268 Response response; local 305 Response response; local 350 Response response; local 387 Response response; local 412 Response response; local [all...] |
/system/tpm/attestation/server/ |
H A D | dbus_service.cc | 70 response, 73 // Convert |response| to a shared_ptr so |service_| can safely copy the 78 auto callback = [](const SharedResponsePointer& response, 80 response->Return(reply); 84 base::Bind(callback, SharedResponsePointer(std::move(response)))); 88 std::unique_ptr<DBusMethodResponse<const GetKeyInfoReply&>> response, 91 // Convert |response| to a shared_ptr so |service_| can safely copy the 96 auto callback = [](const SharedResponsePointer& response, 97 const GetKeyInfoReply& reply) { response->Return(reply); }; 100 base::Bind(callback, SharedResponsePointer(std::move(response)))); 68 HandleCreateGoogleAttestedKey( std::unique_ptr<DBusMethodResponse<const CreateGoogleAttestedKeyReply&>> response, const CreateGoogleAttestedKeyRequest& request) argument 87 HandleGetKeyInfo( std::unique_ptr<DBusMethodResponse<const GetKeyInfoReply&>> response, const GetKeyInfoRequest& request) argument 103 HandleGetEndorsementInfo( std::unique_ptr<DBusMethodResponse<const GetEndorsementInfoReply&>> response, const GetEndorsementInfoRequest& request) argument 122 HandleGetAttestationKeyInfo( std::unique_ptr<DBusMethodResponse<const GetAttestationKeyInfoReply&>> response, const GetAttestationKeyInfoRequest& request) argument 141 HandleActivateAttestationKey( std::unique_ptr<DBusMethodResponse<const ActivateAttestationKeyReply&>> response, const ActivateAttestationKeyRequest& request) argument 160 HandleCreateCertifiableKey( std::unique_ptr<DBusMethodResponse<const CreateCertifiableKeyReply&>> response, const CreateCertifiableKeyRequest& request) argument 179 HandleDecrypt( std::unique_ptr<DBusMethodResponse<const DecryptReply&>> response, const DecryptRequest& request) argument 195 HandleSign( std::unique_ptr<DBusMethodResponse<const SignReply&>> response, const SignRequest& request) argument 211 HandleRegisterKeyWithChapsToken( std::unique_ptr<DBusMethodResponse<const RegisterKeyWithChapsTokenReply&>> response, const RegisterKeyWithChapsTokenRequest& request) argument [all...] |
H A D | dbus_service_test.cc | 105 auto response = CallMethod(call.get()); local 106 dbus::MessageReader reader(response.get()); 129 auto response = CallMethod(call.get()); local 130 dbus::MessageReader reader(response.get()); 158 auto response = CallMethod(call.get()); local 159 dbus::MessageReader reader(response.get()); 189 auto response = CallMethod(call.get()); local 190 dbus::MessageReader reader(response.get()); 219 auto response = CallMethod(call.get()); local 220 dbus::MessageReader reader(response 257 auto response = CallMethod(call.get()); local 290 auto response = CallMethod(call.get()); local 320 auto response = CallMethod(call.get()); local 347 auto response = CallMethod(call.get()); local 374 auto response = CallMethod(call.get()); local [all...] |
/system/connectivity/wificond/tests/ |
H A D | server_unittest.cpp | 69 // |response| is mapped to second parameters of GetInterfaces(). 76 vector<InterfaceInfo>* response) { 78 response->emplace_back(interface); 72 MockGetInterfacesResponse( const vector<InterfaceInfo>& mock_response, bool mock_return_value, uint32_t wiphy_index, vector<InterfaceInfo>* response) argument
|
/system/core/debuggerd/tombstoned/ |
H A D | intercept_manager.cpp | 120 InterceptResponse response = {}; local 121 response.status = InterceptStatus::kFailed; 122 snprintf(response.error_message, sizeof(response.error_message), "invalid intercept request"); 123 TEMP_FAILURE_RETRY(write(sockfd, &response, sizeof(response))); 132 InterceptResponse response = {}; local 133 response.status = InterceptStatus::kFailedAlreadyRegistered; 134 snprintf(response.error_message, sizeof(response 144 InterceptResponse response = {}; local 213 InterceptResponse response = {}; local [all...] |
/system/core/init/ |
H A D | firmware_handler.cpp | 52 const char* response = (rc != -1) ? "0" : "-1"; local 53 WriteFully(loading_fd, response, strlen(response)); 105 // Write "-1" as our response to the kernel's firmware request, since we have nothing for it.
|