/system/teeui/test/ |
D | teeui_locale_test.cpp | 39 int error = runRenderTest("en", false /* magnified */); in TEST_F() local 40 ASSERT_EQ(error, 0); in TEST_F() 44 int error = runRenderTest("en", true /* magnified */); in TEST_F() local 45 ASSERT_EQ(error, 0); in TEST_F() 49 int error = runRenderTest("af", false /* magnified */); in TEST_F() local 50 ASSERT_EQ(error, 0); in TEST_F() 54 int error = runRenderTest("af", true /* magnified */); in TEST_F() local 55 ASSERT_EQ(error, 0); in TEST_F() 59 int error = runRenderTest("am", false /* magnified */); in TEST_F() local 60 ASSERT_EQ(error, 0); in TEST_F() [all …]
|
D | teeui_draw_label_text_test.cpp | 45 int error = runRenderTest("en", false /* magnified */, &kText12Character8Group[0]); in TEST_F() local 46 ASSERT_EQ(error, 0); in TEST_F() 50 int error = runRenderTest("en", true /* magnified */, &kText12Character8Group[0]); in TEST_F() local 51 ASSERT_EQ(error, 0); in TEST_F() 55 int error = runRenderTest("en", false /* magnified */, &kText100Character1Group[0]); in TEST_F() local 56 ASSERT_EQ(error, 0); in TEST_F() 60 int error = runRenderTest("en", true /* magnified */, &kText100Character1Group[0]); in TEST_F() local 61 ASSERT_EQ(error, 0); in TEST_F() 65 int error = runRenderTest("en", false /* magnified */, ""); in TEST_F() local 66 ASSERT_EQ(error, 0); in TEST_F() [all …]
|
/system/security/keystore2/src/crypto/ |
D | error.rs | 21 #[error("Failed to decrypt.")] 25 #[error("Failed to encrypt.")] 29 #[error("Invalid IV length.")] 33 #[error("Invalid AEAD tag length.")] 37 #[error("Invalid key length.")] 41 #[error("Invalid data length.")] 45 #[error("Invalid salt length.")] 49 #[error("Random number generation failed.")] 53 #[error(transparent)] 57 #[error(transparent)] [all …]
|
/system/libvintf/test/ |
D | LibVintfTest.cpp | 67 std::string error; in add() local 68 bool success = cm.addKernel(std::move(kernel), &error); in add() 69 EXPECT_EQ(success, error == "") << "success: " << success << ", error: " << error; in add() 370 std::string error; in TEST_F() local 378 "</manifest>", &error)) << error; in TEST_F() 386 "</manifest>", &error)); in TEST_F() 387 EXPECT_THAT(error, HasSubstr("Native HAL 'foo' should not have <transport> defined")); in TEST_F() 829 std::string error; in TEST_F() local 846 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F() 853 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F() [all …]
|
/system/update_engine/cros/ |
D | dbus_service.cc | 60 bool DBusUpdateEngineService::AttemptUpdate(ErrorPtr* error, in AttemptUpdate() argument 64 error, in_app_version, in_omaha_url, 0 /* no flags */); in AttemptUpdate() 68 ErrorPtr* error, in AttemptUpdateWithFlags() argument 77 error, in AttemptUpdateWithFlags() 84 bool DBusUpdateEngineService::AttemptInstall(ErrorPtr* error, in AttemptInstall() argument 87 return common_->AttemptInstall(error, in_omaha_url, dlc_ids); in AttemptInstall() 90 bool DBusUpdateEngineService::AttemptRollback(ErrorPtr* error, in AttemptRollback() argument 92 return common_->AttemptRollback(error, in_powerwash); in AttemptRollback() 95 bool DBusUpdateEngineService::CanRollback(ErrorPtr* error, in CanRollback() argument 97 return common_->CanRollback(error, out_can_rollback); in CanRollback() [all …]
|
D | common_service.h | 47 bool SetUpdateAttemptFlags(brillo::ErrorPtr* error, int32_t in_flags_as_int); 49 bool AttemptUpdate(brillo::ErrorPtr* error, 58 bool AttemptInstall(brillo::ErrorPtr* error, 62 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash); 66 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback); 70 bool ResetStatus(brillo::ErrorPtr* error); 75 bool SetDlcActiveValue(brillo::ErrorPtr* error, 82 bool GetStatus(brillo::ErrorPtr* error, 86 bool RebootIfNeeded(brillo::ErrorPtr* error); 96 bool SetChannel(brillo::ErrorPtr* error, [all …]
|
D | dbus_service.h | 45 bool AttemptUpdate(brillo::ErrorPtr* error, 49 bool AttemptUpdateWithFlags(brillo::ErrorPtr* error, 54 bool AttemptInstall(brillo::ErrorPtr* error, 58 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash) override; 62 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback) override; 66 bool ResetStatus(brillo::ErrorPtr* error) override; 71 bool SetDlcActiveValue(brillo::ErrorPtr* error, 77 bool GetStatusAdvanced(brillo::ErrorPtr* error, 81 bool RebootIfNeeded(brillo::ErrorPtr* error) override; 91 bool SetChannel(brillo::ErrorPtr* error, [all …]
|
D | common_service.cc | 52 void LogAndSetError(ErrorPtr* error, in LogAndSetError() argument 55 brillo::Error::AddTo(error, in LogAndSetError() 105 bool UpdateEngineService::AttemptInstall(brillo::ErrorPtr* error, in AttemptInstall() argument 111 LogAndSetError(error, FROM_HERE, "Could not schedule install operation."); in AttemptInstall() 117 bool UpdateEngineService::AttemptRollback(ErrorPtr* error, bool in_powerwash) { in AttemptRollback() argument 122 LogAndSetError(error, FROM_HERE, "Rollback attempt failed."); in AttemptRollback() 136 bool UpdateEngineService::ResetStatus(ErrorPtr* error) { in ResetStatus() argument 139 LogAndSetError(error, FROM_HERE, "ResetStatus failed."); in ResetStatus() 145 bool UpdateEngineService::SetDlcActiveValue(brillo::ErrorPtr* error, in SetDlcActiveValue() argument 150 LogAndSetError(error, FROM_HERE, "SetDlcActiveValue failed."); in SetDlcActiveValue() [all …]
|
/system/keymaster/km_openssl/ |
D | attestation_utils.cpp | 36 keymaster_error_t* error) { in make_cert_chain() argument 38 *error = encode_certificate(certificate, &blob); in make_cert_chain() 39 if (*error != KM_ERROR_OK) return {}; in make_cert_chain() 42 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in make_cert_chain() 59 keymaster_error_t error = build_attestation_record(attest_params, sw_enforced, tee_enforced, in build_attestation_extension() local 61 if (error != KM_ERROR_OK) return error; in build_attestation_extension() 90 keymaster_error_t error = in build_eat_extension() local 92 if (error != KM_ERROR_OK) return error; in build_eat_extension() 116 if (auto error = build_attestation_extension(attest_params, tee_enforced, sw_enforced, in add_attestation_extension() local 118 return error; in add_attestation_extension() [all …]
|
D | block_cipher_operation.cpp | 79 keymaster_error_t* error) { in CreateOperation() argument 80 *error = KM_ERROR_OK; in CreateOperation() 84 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation() 88 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation() 92 *error = KM_ERROR_INCOMPATIBLE_BLOCK_MODE; in CreateOperation() 98 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation() 99 if (*error != KM_ERROR_OK) { in CreateOperation() 105 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation() 110 *error = KM_ERROR_INCOMPATIBLE_PADDING_MODE; in CreateOperation() 127 *error = KM_ERROR_UNSUPPORTED_PURPOSE; in CreateOperation() [all …]
|
D | ec_key_factory.cpp | 58 keymaster_error_t error = EcKeySizeToCurve(*key_size_bits, curve); in GetCurveAndSize() local 59 if (error != KM_ERROR_OK) { in GetCurveAndSize() 63 keymaster_error_t error = EcCurveToKeySize(*curve, key_size_bits); in GetCurveAndSize() local 64 if (error != KM_ERROR_OK) { in GetCurveAndSize() 65 return error; in GetCurveAndSize() 92 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey() local 93 if (error != KM_ERROR_OK) { in GenerateKey() 94 return error; in GenerateKey() 124 error = EvpKeyToKeyMaterial(pkey.get(), &key_material); in GenerateKey() 125 if (error != KM_ERROR_OK) return error; in GenerateKey() [all …]
|
D | rsa_operation.cpp | 37 EVP_PKEY* RsaOperationFactory::GetRsaKey(const Key& key, keymaster_error_t* error) { in GetRsaKey() argument 40 *error = KM_ERROR_UNKNOWN_ERROR; in GetRsaKey() 46 *error = KM_ERROR_UNKNOWN_ERROR; in GetRsaKey() 63 keymaster_error_t* error) { in CreateRsaOperation() argument 65 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateRsaOperation() 72 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error, true)) { in CreateRsaOperation() 76 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error)); in CreateRsaOperation() 81 if (!op) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in CreateRsaOperation() 95 keymaster_error_t* error) { in CreateRsaOperation() argument 98 *error = GetAndValidateMgfDigest(begin_params, key, &mgf_digest); in CreateRsaOperation() [all …]
|
/system/keymaster/key_blob_utils/ |
D | auth_encrypted_key_blob.cpp | 39 Buffer generate_nonce(const RandomSource& random, size_t size, keymaster_error_t* error) { in generate_nonce() argument 40 if (!error) return {}; in generate_nonce() 41 *error = KM_ERROR_OK; in generate_nonce() 45 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in generate_nonce() 55 const AuthorizationSet& hidden, keymaster_error_t* error) { in BuildAesGcmInfo() argument 56 if (!error) return {}; in BuildAesGcmInfo() 57 *error = KM_ERROR_OK; in BuildAesGcmInfo() 72 *error = KM_ERROR_UNKNOWN_ERROR; in BuildAesGcmInfo() 82 const KeymasterKeyBlob& master_key, keymaster_error_t* error) { in DeriveAesGcmKeyEncryptionKey() argument 83 if (!error) return {}; in DeriveAesGcmKeyEncryptionKey() [all …]
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 187 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local 189 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 190 error = in CreateKeyBlob() 192 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 195 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust); in CreateKeyBlob() 196 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 198 error = SerializeIntegrityAssuredBlob(key_material, hidden, *hw_enforced, *sw_enforced, blob); in CreateKeyBlob() 199 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 213 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 214 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob() [all …]
|
D | soft_attestation_cert.cpp | 282 keymaster_error_t* error) { in getAttestationKey() argument 284 if (error) *error = KM_ERROR_OK; in getAttestationKey() 294 if (error) *error = KM_ERROR_UNSUPPORTED_ALGORITHM; in getAttestationKey() 299 CertificateChain getAttestationChain(keymaster_algorithm_t algorithm, keymaster_error_t* error) { in getAttestationChain() argument 300 if (error) *error = KM_ERROR_OK; in getAttestationChain() 307 if (!retval.entries && error) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in getAttestationChain() 311 if (!retval.entries && error) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in getAttestationChain() 314 if (error) *error = KM_ERROR_UNSUPPORTED_ALGORITHM; in getAttestationChain()
|
D | keymaster1_passthrough_context.cpp | 105 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 106 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob() 129 keymaster_error_t error = device->get_key_characteristics(device, &blob, client_id_ptr, in parseKeymaster1HwBlob() local 131 if (error != KM_ERROR_OK) return error; in parseKeymaster1HwBlob() 151 keymaster_error_t error = in ParseKeyBlob() local 153 if (error != KM_ERROR_OK) return error; in ParseKeyBlob() 156 error = in ParseKeyBlob() 158 if (error != KM_ERROR_INVALID_KEY_BLOB && error != KM_ERROR_OK) return error; in ParseKeyBlob() 160 if (error == KM_ERROR_INVALID_KEY_BLOB) { in ParseKeyBlob() 161 error = parseKeymaster1HwBlob(km1_engine_->device(), blob, additional_params, &key_material, in ParseKeyBlob() [all …]
|
D | soft_keymaster_context.cpp | 185 keymaster_error_t error = SetAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local 187 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 190 error = BuildHiddenAuthorizations(key_description, &hidden, root_of_trust_); in CreateKeyBlob() 191 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 200 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 201 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob() 262 keymaster_error_t error; in ParseKeyBlob() local 266 if (error != KM_ERROR_OK) return error; in ParseKeyBlob() 277 error = BuildHiddenAuthorizations(additional_params, &hidden, root_of_trust_); in ParseKeyBlob() 278 if (error != KM_ERROR_OK) return error; in ParseKeyBlob() [all …]
|
/system/libvintf/ |
D | KernelInfo.cpp | 41 std::string* error) const { in matchKernelConfigs() 50 if (error != nullptr) { in matchKernelConfigs() 51 *error = "Missing config " + key; in matchKernelConfigs() 57 if (error != nullptr) { in matchKernelConfigs() 58 *error = "For config " + key + ", value = " + kernelValue + " but required " + in matchKernelConfigs() 72 const std::vector<MatrixKernel>& kernels, Level kernelLevel, std::string* error) const { in getMatchedKernelRequirements() 93 if (error) { in getMatchedKernelRequirements() 94 *error = "Seen unspecified source matrix level; this should not happen."; in getMatchedKernelRequirements() 108 if (error) { in getMatchedKernelRequirements() 119 *error = ss.str(); in getMatchedKernelRequirements() [all …]
|
D | CompatibilityMatrix.cpp | 48 bool CompatibilityMatrix::addKernel(MatrixKernel&& kernel, std::string* error) { in addKernel() argument 50 if (error) { in addKernel() 51 *error = "Cannot add <kernel> to a " + to_string(mType) + " compatibility matrix."; in addKernel() 69 if (error) { in addKernel() 70 *error = "Kernel version mismatch; for level " + in addKernel() 91 if (error) { in addKernel() 92 *error = in addKernel() 122 const std::string& path, std::string* error) { in fetchAllInformation() argument 123 return details::fetchAllInformation(fileSystem, path, this, error); in fetchAllInformation() 193 bool CompatibilityMatrix::addAllHalsAsOptional(CompatibilityMatrix* other, std::string* error) { in addAllHalsAsOptional() argument [all …]
|
D | ManifestHal.cpp | 31 bool ManifestHal::isValid(std::string* error) const { in isValid() 32 if (error) { in isValid() 33 error->clear(); in isValid() 44 if (error) { in isValid() 45 *error += "Duplicated major version: " + to_string(v) + " vs. " + in isValid() 56 if (!canConvertToFqInstance(getName(), v, interface, instance, format, error)) { in isValid() 67 if (error) *error += transportArchError + "\n"; in isValid() 147 bool ManifestHal::verifyInstance(const FqInstance& fqInstance, std::string* error) const { in verifyInstance() 149 if (error) { in verifyInstance() 150 *error = "Should not add \"" + fqInstance.string() + "\" to a HAL with name " + in verifyInstance() [all …]
|
D | parse_xml.cpp | 158 virtual bool buildObject(Object* o, NodeType* n, std::string* error) const = 0; 175 inline bool operator()(Object* object, NodeType* root, std::string* error) const { in operator ()() 179 return this->buildObject(object, root, error); in operator ()() 181 inline bool operator()(Object* o, const std::string& xml, std::string* error) const { in operator ()() 183 if (error == nullptr) error = &errorBuffer; in operator ()() 187 *error = "Not a valid XML"; in operator ()() 190 bool ret = (*this)(o, getRootChild(doc), error); in operator ()() 252 std::string* error) const { in parseAttr() 256 *error = "Could not find/parse attr with name \"" + attrName + "\" and value \"" + in parseAttr() 263 std::string* error) const { in parseAttr() [all …]
|
/system/libbase/ |
D | parsenetaddress_test.cpp | 24 std::string canonical, host, error; in TEST() local 28 ParseNetAddress("www.google.com", &host, &port, &canonical, &error)); in TEST() 34 ParseNetAddress("www.google.com:666", &host, &port, &canonical, &error)); in TEST() 41 std::string canonical, host, error; in TEST() local 44 EXPECT_TRUE(ParseNetAddress("1.2.3.4", &host, &port, &canonical, &error)); in TEST() 49 EXPECT_TRUE(ParseNetAddress("1.2.3.4:666", &host, &port, &canonical, &error)); in TEST() 56 std::string canonical, host, error; in TEST() local 59 EXPECT_TRUE(ParseNetAddress("::1", &host, &port, &canonical, &error)); in TEST() 65 &canonical, &error)); in TEST() 70 EXPECT_TRUE(ParseNetAddress("[::1]:666", &host, &port, &canonical, &error)); in TEST() [all …]
|
/system/core/run-as/ |
D | run-as.cpp | 76 error(1, errno, "couldn't stat %s", path); in check_directory() 84 error(1, 0, "%s not a directory: %o", path, st.st_mode); in check_directory() 89 error(1, 0, "%s has wrong owner: %d/%d, not %d", path, st.st_uid, st.st_gid, uid); in check_directory() 94 error(1, 0, "%s readable or writable by others: %o", path, st.st_mode); in check_directory() 105 error(1, 0, "%s data path not absolute: %s", package_name, data_path); in check_data_path() 122 error(1, 0, "%s data path too long: %s", package_name, data_path); in check_data_path() 130 error(1, 0, "%s contains '..': %s", package_name, data_path); in check_data_path() 149 error(1, errno, "getgroups failed"); in get_supplementary_gids() 154 error(1, errno, "getgroups failed"); in get_supplementary_gids() 167 error(1, 0, "usage: run-as <package-name> [--user <uid>] <command> [<args>]\n"); in main() [all …]
|
/system/update_engine/aosp/ |
D | binder_service_android.cc | 109 brillo::ErrorPtr error; in applyPayload() local 111 payload_url, payload_offset, payload_size, str_headers, &error)) { in applyPayload() 112 return ErrorPtrToStatus(error); in applyPayload() 124 brillo::ErrorPtr error; in applyPayloadFd() local 126 pfd.get(), payload_offset, payload_size, str_headers, &error)) { in applyPayloadFd() 127 return ErrorPtrToStatus(error); in applyPayloadFd() 133 brillo::ErrorPtr error; in suspend() local 134 if (!service_delegate_->SuspendUpdate(&error)) in suspend() 135 return ErrorPtrToStatus(error); in suspend() 140 brillo::ErrorPtr error; in resume() local [all …]
|
/system/core/fastboot/ |
D | udp.cpp | 106 std::string* error); 118 bool InitializeProtocol(std::string* error); 126 size_t rx_length, int attempts, std::string* error); 132 std::string* error); 143 std::string* error) { in NewTransport() argument 146 if (!transport->InitializeProtocol(error)) { in NewTransport() 153 bool UdpTransport::InitializeProtocol(std::string* error) { in InitializeProtocol() argument 162 kMaxConnectAttempts, error); in InitializeProtocol() 166 *error = "invalid query response from target"; in InitializeProtocol() 176 kMaxTransmissionAttempts, error); in InitializeProtocol() [all …]
|