Home
last modified time | relevance | path

Searched refs:error (Results 1 – 25 of 933) sorted by relevance

12345678910>>...38

/system/teeui/test/
Dteeui_locale_test.cpp39 int error = runRenderTest("en", false /* magnified */); in TEST_F() local
40 ASSERT_EQ(error, 0); in TEST_F()
44 int error = runRenderTest("en", true /* magnified */); in TEST_F() local
45 ASSERT_EQ(error, 0); in TEST_F()
49 int error = runRenderTest("af", false /* magnified */); in TEST_F() local
50 ASSERT_EQ(error, 0); in TEST_F()
54 int error = runRenderTest("af", true /* magnified */); in TEST_F() local
55 ASSERT_EQ(error, 0); in TEST_F()
59 int error = runRenderTest("am", false /* magnified */); in TEST_F() local
60 ASSERT_EQ(error, 0); in TEST_F()
[all …]
Dteeui_draw_label_text_test.cpp45 int error = runRenderTest("en", false /* magnified */, &kText12Character8Group[0]); in TEST_F() local
46 ASSERT_EQ(error, 0); in TEST_F()
50 int error = runRenderTest("en", true /* magnified */, &kText12Character8Group[0]); in TEST_F() local
51 ASSERT_EQ(error, 0); in TEST_F()
55 int error = runRenderTest("en", false /* magnified */, &kText100Character1Group[0]); in TEST_F() local
56 ASSERT_EQ(error, 0); in TEST_F()
60 int error = runRenderTest("en", true /* magnified */, &kText100Character1Group[0]); in TEST_F() local
61 ASSERT_EQ(error, 0); in TEST_F()
65 int error = runRenderTest("en", false /* magnified */, ""); in TEST_F() local
66 ASSERT_EQ(error, 0); in TEST_F()
[all …]
/system/security/keystore2/src/crypto/
Derror.rs21 #[error("Failed to decrypt.")]
25 #[error("Failed to encrypt.")]
29 #[error("Invalid IV length.")]
33 #[error("Invalid AEAD tag length.")]
37 #[error("Invalid key length.")]
41 #[error("Invalid data length.")]
45 #[error("Invalid salt length.")]
49 #[error("Random number generation failed.")]
53 #[error(transparent)]
57 #[error(transparent)]
[all …]
/system/libvintf/test/
DLibVintfTest.cpp67 std::string error; in add() local
68 bool success = cm.addKernel(std::move(kernel), &error); in add()
69 EXPECT_EQ(success, error == "") << "success: " << success << ", error: " << error; in add()
370 std::string error; in TEST_F() local
378 "</manifest>", &error)) << error; in TEST_F()
386 "</manifest>", &error)); in TEST_F()
387 EXPECT_THAT(error, HasSubstr("Native HAL 'foo' should not have <transport> defined")); in TEST_F()
829 std::string error; in TEST_F() local
846 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F()
853 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F()
[all …]
/system/update_engine/cros/
Ddbus_service.cc60 bool DBusUpdateEngineService::AttemptUpdate(ErrorPtr* error, in AttemptUpdate() argument
64 error, in_app_version, in_omaha_url, 0 /* no flags */); in AttemptUpdate()
68 ErrorPtr* error, in AttemptUpdateWithFlags() argument
77 error, in AttemptUpdateWithFlags()
84 bool DBusUpdateEngineService::AttemptInstall(ErrorPtr* error, in AttemptInstall() argument
87 return common_->AttemptInstall(error, in_omaha_url, dlc_ids); in AttemptInstall()
90 bool DBusUpdateEngineService::AttemptRollback(ErrorPtr* error, in AttemptRollback() argument
92 return common_->AttemptRollback(error, in_powerwash); in AttemptRollback()
95 bool DBusUpdateEngineService::CanRollback(ErrorPtr* error, in CanRollback() argument
97 return common_->CanRollback(error, out_can_rollback); in CanRollback()
[all …]
Dcommon_service.h47 bool SetUpdateAttemptFlags(brillo::ErrorPtr* error, int32_t in_flags_as_int);
49 bool AttemptUpdate(brillo::ErrorPtr* error,
58 bool AttemptInstall(brillo::ErrorPtr* error,
62 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash);
66 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback);
70 bool ResetStatus(brillo::ErrorPtr* error);
75 bool SetDlcActiveValue(brillo::ErrorPtr* error,
82 bool GetStatus(brillo::ErrorPtr* error,
86 bool RebootIfNeeded(brillo::ErrorPtr* error);
96 bool SetChannel(brillo::ErrorPtr* error,
[all …]
Ddbus_service.h45 bool AttemptUpdate(brillo::ErrorPtr* error,
49 bool AttemptUpdateWithFlags(brillo::ErrorPtr* error,
54 bool AttemptInstall(brillo::ErrorPtr* error,
58 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash) override;
62 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback) override;
66 bool ResetStatus(brillo::ErrorPtr* error) override;
71 bool SetDlcActiveValue(brillo::ErrorPtr* error,
77 bool GetStatusAdvanced(brillo::ErrorPtr* error,
81 bool RebootIfNeeded(brillo::ErrorPtr* error) override;
91 bool SetChannel(brillo::ErrorPtr* error,
[all …]
Dcommon_service.cc52 void LogAndSetError(ErrorPtr* error, in LogAndSetError() argument
55 brillo::Error::AddTo(error, in LogAndSetError()
105 bool UpdateEngineService::AttemptInstall(brillo::ErrorPtr* error, in AttemptInstall() argument
111 LogAndSetError(error, FROM_HERE, "Could not schedule install operation."); in AttemptInstall()
117 bool UpdateEngineService::AttemptRollback(ErrorPtr* error, bool in_powerwash) { in AttemptRollback() argument
122 LogAndSetError(error, FROM_HERE, "Rollback attempt failed."); in AttemptRollback()
136 bool UpdateEngineService::ResetStatus(ErrorPtr* error) { in ResetStatus() argument
139 LogAndSetError(error, FROM_HERE, "ResetStatus failed."); in ResetStatus()
145 bool UpdateEngineService::SetDlcActiveValue(brillo::ErrorPtr* error, in SetDlcActiveValue() argument
150 LogAndSetError(error, FROM_HERE, "SetDlcActiveValue failed."); in SetDlcActiveValue()
[all …]
/system/keymaster/km_openssl/
Dattestation_utils.cpp36 keymaster_error_t* error) { in make_cert_chain() argument
38 *error = encode_certificate(certificate, &blob); in make_cert_chain()
39 if (*error != KM_ERROR_OK) return {}; in make_cert_chain()
42 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in make_cert_chain()
59 keymaster_error_t error = build_attestation_record(attest_params, sw_enforced, tee_enforced, in build_attestation_extension() local
61 if (error != KM_ERROR_OK) return error; in build_attestation_extension()
90 keymaster_error_t error = in build_eat_extension() local
92 if (error != KM_ERROR_OK) return error; in build_eat_extension()
116 if (auto error = build_attestation_extension(attest_params, tee_enforced, sw_enforced, in add_attestation_extension() local
118 return error; in add_attestation_extension()
[all …]
Dblock_cipher_operation.cpp79 keymaster_error_t* error) { in CreateOperation() argument
80 *error = KM_ERROR_OK; in CreateOperation()
84 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation()
88 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation()
92 *error = KM_ERROR_INCOMPATIBLE_BLOCK_MODE; in CreateOperation()
98 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation()
99 if (*error != KM_ERROR_OK) { in CreateOperation()
105 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
110 *error = KM_ERROR_INCOMPATIBLE_PADDING_MODE; in CreateOperation()
127 *error = KM_ERROR_UNSUPPORTED_PURPOSE; in CreateOperation()
[all …]
Dec_key_factory.cpp58 keymaster_error_t error = EcKeySizeToCurve(*key_size_bits, curve); in GetCurveAndSize() local
59 if (error != KM_ERROR_OK) { in GetCurveAndSize()
63 keymaster_error_t error = EcCurveToKeySize(*curve, key_size_bits); in GetCurveAndSize() local
64 if (error != KM_ERROR_OK) { in GetCurveAndSize()
65 return error; in GetCurveAndSize()
92 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey() local
93 if (error != KM_ERROR_OK) { in GenerateKey()
94 return error; in GenerateKey()
124 error = EvpKeyToKeyMaterial(pkey.get(), &key_material); in GenerateKey()
125 if (error != KM_ERROR_OK) return error; in GenerateKey()
[all …]
Drsa_operation.cpp37 EVP_PKEY* RsaOperationFactory::GetRsaKey(const Key& key, keymaster_error_t* error) { in GetRsaKey() argument
40 *error = KM_ERROR_UNKNOWN_ERROR; in GetRsaKey()
46 *error = KM_ERROR_UNKNOWN_ERROR; in GetRsaKey()
63 keymaster_error_t* error) { in CreateRsaOperation() argument
65 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateRsaOperation()
72 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error, true)) { in CreateRsaOperation()
76 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error)); in CreateRsaOperation()
81 if (!op) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in CreateRsaOperation()
95 keymaster_error_t* error) { in CreateRsaOperation() argument
98 *error = GetAndValidateMgfDigest(begin_params, key, &mgf_digest); in CreateRsaOperation()
[all …]
/system/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.cpp39 Buffer generate_nonce(const RandomSource& random, size_t size, keymaster_error_t* error) { in generate_nonce() argument
40 if (!error) return {}; in generate_nonce()
41 *error = KM_ERROR_OK; in generate_nonce()
45 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in generate_nonce()
55 const AuthorizationSet& hidden, keymaster_error_t* error) { in BuildAesGcmInfo() argument
56 if (!error) return {}; in BuildAesGcmInfo()
57 *error = KM_ERROR_OK; in BuildAesGcmInfo()
72 *error = KM_ERROR_UNKNOWN_ERROR; in BuildAesGcmInfo()
82 const KeymasterKeyBlob& master_key, keymaster_error_t* error) { in DeriveAesGcmKeyEncryptionKey() argument
83 if (!error) return {}; in DeriveAesGcmKeyEncryptionKey()
[all …]
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp187 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local
189 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
190 error = in CreateKeyBlob()
192 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
195 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust); in CreateKeyBlob()
196 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
198 error = SerializeIntegrityAssuredBlob(key_material, hidden, *hw_enforced, *sw_enforced, blob); in CreateKeyBlob()
199 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
213 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local
214 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob()
[all …]
Dsoft_attestation_cert.cpp282 keymaster_error_t* error) { in getAttestationKey() argument
284 if (error) *error = KM_ERROR_OK; in getAttestationKey()
294 if (error) *error = KM_ERROR_UNSUPPORTED_ALGORITHM; in getAttestationKey()
299 CertificateChain getAttestationChain(keymaster_algorithm_t algorithm, keymaster_error_t* error) { in getAttestationChain() argument
300 if (error) *error = KM_ERROR_OK; in getAttestationChain()
307 if (!retval.entries && error) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in getAttestationChain()
311 if (!retval.entries && error) *error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in getAttestationChain()
314 if (error) *error = KM_ERROR_UNSUPPORTED_ALGORITHM; in getAttestationChain()
Dkeymaster1_passthrough_context.cpp105 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local
106 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob()
129 keymaster_error_t error = device->get_key_characteristics(device, &blob, client_id_ptr, in parseKeymaster1HwBlob() local
131 if (error != KM_ERROR_OK) return error; in parseKeymaster1HwBlob()
151 keymaster_error_t error = in ParseKeyBlob() local
153 if (error != KM_ERROR_OK) return error; in ParseKeyBlob()
156 error = in ParseKeyBlob()
158 if (error != KM_ERROR_INVALID_KEY_BLOB && error != KM_ERROR_OK) return error; in ParseKeyBlob()
160 if (error == KM_ERROR_INVALID_KEY_BLOB) { in ParseKeyBlob()
161 error = parseKeymaster1HwBlob(km1_engine_->device(), blob, additional_params, &key_material, in ParseKeyBlob()
[all …]
Dsoft_keymaster_context.cpp185 keymaster_error_t error = SetAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local
187 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
190 error = BuildHiddenAuthorizations(key_description, &hidden, root_of_trust_); in CreateKeyBlob()
191 if (error != KM_ERROR_OK) return error; in CreateKeyBlob()
200 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local
201 if (error != KM_ERROR_OK) return error; in UpgradeKeyBlob()
262 keymaster_error_t error; in ParseKeyBlob() local
266 if (error != KM_ERROR_OK) return error; in ParseKeyBlob()
277 error = BuildHiddenAuthorizations(additional_params, &hidden, root_of_trust_); in ParseKeyBlob()
278 if (error != KM_ERROR_OK) return error; in ParseKeyBlob()
[all …]
/system/libvintf/
DKernelInfo.cpp41 std::string* error) const { in matchKernelConfigs()
50 if (error != nullptr) { in matchKernelConfigs()
51 *error = "Missing config " + key; in matchKernelConfigs()
57 if (error != nullptr) { in matchKernelConfigs()
58 *error = "For config " + key + ", value = " + kernelValue + " but required " + in matchKernelConfigs()
72 const std::vector<MatrixKernel>& kernels, Level kernelLevel, std::string* error) const { in getMatchedKernelRequirements()
93 if (error) { in getMatchedKernelRequirements()
94 *error = "Seen unspecified source matrix level; this should not happen."; in getMatchedKernelRequirements()
108 if (error) { in getMatchedKernelRequirements()
119 *error = ss.str(); in getMatchedKernelRequirements()
[all …]
DCompatibilityMatrix.cpp48 bool CompatibilityMatrix::addKernel(MatrixKernel&& kernel, std::string* error) { in addKernel() argument
50 if (error) { in addKernel()
51 *error = "Cannot add <kernel> to a " + to_string(mType) + " compatibility matrix."; in addKernel()
69 if (error) { in addKernel()
70 *error = "Kernel version mismatch; for level " + in addKernel()
91 if (error) { in addKernel()
92 *error = in addKernel()
122 const std::string& path, std::string* error) { in fetchAllInformation() argument
123 return details::fetchAllInformation(fileSystem, path, this, error); in fetchAllInformation()
193 bool CompatibilityMatrix::addAllHalsAsOptional(CompatibilityMatrix* other, std::string* error) { in addAllHalsAsOptional() argument
[all …]
DManifestHal.cpp31 bool ManifestHal::isValid(std::string* error) const { in isValid()
32 if (error) { in isValid()
33 error->clear(); in isValid()
44 if (error) { in isValid()
45 *error += "Duplicated major version: " + to_string(v) + " vs. " + in isValid()
56 if (!canConvertToFqInstance(getName(), v, interface, instance, format, error)) { in isValid()
67 if (error) *error += transportArchError + "\n"; in isValid()
147 bool ManifestHal::verifyInstance(const FqInstance& fqInstance, std::string* error) const { in verifyInstance()
149 if (error) { in verifyInstance()
150 *error = "Should not add \"" + fqInstance.string() + "\" to a HAL with name " + in verifyInstance()
[all …]
Dparse_xml.cpp158 virtual bool buildObject(Object* o, NodeType* n, std::string* error) const = 0;
175 inline bool operator()(Object* object, NodeType* root, std::string* error) const { in operator ()()
179 return this->buildObject(object, root, error); in operator ()()
181 inline bool operator()(Object* o, const std::string& xml, std::string* error) const { in operator ()()
183 if (error == nullptr) error = &errorBuffer; in operator ()()
187 *error = "Not a valid XML"; in operator ()()
190 bool ret = (*this)(o, getRootChild(doc), error); in operator ()()
252 std::string* error) const { in parseAttr()
256 *error = "Could not find/parse attr with name \"" + attrName + "\" and value \"" + in parseAttr()
263 std::string* error) const { in parseAttr()
[all …]
/system/libbase/
Dparsenetaddress_test.cpp24 std::string canonical, host, error; in TEST() local
28 ParseNetAddress("www.google.com", &host, &port, &canonical, &error)); in TEST()
34 ParseNetAddress("www.google.com:666", &host, &port, &canonical, &error)); in TEST()
41 std::string canonical, host, error; in TEST() local
44 EXPECT_TRUE(ParseNetAddress("1.2.3.4", &host, &port, &canonical, &error)); in TEST()
49 EXPECT_TRUE(ParseNetAddress("1.2.3.4:666", &host, &port, &canonical, &error)); in TEST()
56 std::string canonical, host, error; in TEST() local
59 EXPECT_TRUE(ParseNetAddress("::1", &host, &port, &canonical, &error)); in TEST()
65 &canonical, &error)); in TEST()
70 EXPECT_TRUE(ParseNetAddress("[::1]:666", &host, &port, &canonical, &error)); in TEST()
[all …]
/system/core/run-as/
Drun-as.cpp76 error(1, errno, "couldn't stat %s", path); in check_directory()
84 error(1, 0, "%s not a directory: %o", path, st.st_mode); in check_directory()
89 error(1, 0, "%s has wrong owner: %d/%d, not %d", path, st.st_uid, st.st_gid, uid); in check_directory()
94 error(1, 0, "%s readable or writable by others: %o", path, st.st_mode); in check_directory()
105 error(1, 0, "%s data path not absolute: %s", package_name, data_path); in check_data_path()
122 error(1, 0, "%s data path too long: %s", package_name, data_path); in check_data_path()
130 error(1, 0, "%s contains '..': %s", package_name, data_path); in check_data_path()
149 error(1, errno, "getgroups failed"); in get_supplementary_gids()
154 error(1, errno, "getgroups failed"); in get_supplementary_gids()
167 error(1, 0, "usage: run-as <package-name> [--user <uid>] <command> [<args>]\n"); in main()
[all …]
/system/update_engine/aosp/
Dbinder_service_android.cc109 brillo::ErrorPtr error; in applyPayload() local
111 payload_url, payload_offset, payload_size, str_headers, &error)) { in applyPayload()
112 return ErrorPtrToStatus(error); in applyPayload()
124 brillo::ErrorPtr error; in applyPayloadFd() local
126 pfd.get(), payload_offset, payload_size, str_headers, &error)) { in applyPayloadFd()
127 return ErrorPtrToStatus(error); in applyPayloadFd()
133 brillo::ErrorPtr error; in suspend() local
134 if (!service_delegate_->SuspendUpdate(&error)) in suspend()
135 return ErrorPtrToStatus(error); in suspend()
140 brillo::ErrorPtr error; in resume() local
[all …]
/system/core/fastboot/
Dudp.cpp106 std::string* error);
118 bool InitializeProtocol(std::string* error);
126 size_t rx_length, int attempts, std::string* error);
132 std::string* error);
143 std::string* error) { in NewTransport() argument
146 if (!transport->InitializeProtocol(error)) { in NewTransport()
153 bool UdpTransport::InitializeProtocol(std::string* error) { in InitializeProtocol() argument
162 kMaxConnectAttempts, error); in InitializeProtocol()
166 *error = "invalid query response from target"; in InitializeProtocol()
176 kMaxTransmissionAttempts, error); in InitializeProtocol()
[all …]

12345678910>>...38