/system/security/keystore2/src/ |
D | error.rs | 203 Err(BinderStatus::new_service_specific_error(rc, None)) in map_err_with() 239 Err(anyhow!(Error::Rc(rc))).context("nested nested rc") in nested_nested_rc() 247 Err(anyhow!(Error::Km(ec))).context("nested nested ec") in nested_nested_ec() 263 Err(anyhow!(selinux::Error::perm())).context("nested nexted selinux permission denied") in nested_nested_selinux_perm() 277 Err(anyhow!(TestError::Fail)).context("nested nested other error") in nested_nested_other_error() 285 Err(BinderStatus::new_service_specific_error(sse, None)) in binder_sse_error() 289 Err(BinderStatus::new_exception(ex, None)) in binder_exception() 303 Result::<(), i32>::Err(rc), in keystore_error_test() 304 map_or_log_err(nested_rc(ResponseCode(rc)), |_| Err(BinderStatus::ok())) in keystore_error_test() 313 Result::<(), i32>::Err(ec), in keystore_error_test() [all …]
|
D | legacy_migrator.rs | 187 return Err(Error::sys()).context( in check_state() 232 Err(e) => return Some(Err(e)), in do_serialized() 261 if let Err(e) = sender.send((new_state, result)) { in do_serialized() 267 Err(e) => { in do_serialized() 268 return Some(Err(e).context("In do_serialized. Failed to receive from the sender.")) in do_serialized() 300 Err(e) => match e.root_cause().downcast_ref::<Error>() { in with_try_migrate() 302 _ => return Err(e), in with_try_migrate() 314 return Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)) in with_try_migrate() 320 return Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)) in with_try_migrate() 334 Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)).context("Legacy database is empty.") in with_try_migrate() [all …]
|
D | operation.rs | 265 _ => return Err(Error::Km(ErrorCode::INVALID_OPERATION_HANDLE)), in prune() 267 Err(_) => return Err(Error::Rc(ResponseCode::OPERATION_BUSY)), in prune() 281 return Err(Error::Rc(ResponseCode::OPERATION_BUSY)); in prune() 288 Err(e) => { in prune() 290 return Err(Error::sys()); in prune() 297 if let Err(e) = map_km_error(km_op.abort()) { in prune() 316 Err(Error::Km(e)) => *locked_outcome = Outcome::ErrorCode(*e), in update_outcome() 317 Err(_) => *locked_outcome = Outcome::ErrorCode(ErrorCode::UNKNOWN_ERROR), in update_outcome() 332 _ => Err(Error::Km(ErrorCode::INVALID_OPERATION_HANDLE)).context(format!( in check_active() 345 return Err(anyhow!(Error::Rc(ResponseCode::TOO_MUCH_DATA))); in check_input_length() [all …]
|
D | enforcements.rs | 233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request() 301 Err(TryRecvError::Empty) => break, in before_finish() 302 Err(TryRecvError::Disconnected) => { in before_finish() 356 Err(Error::Km(ErrorCode::KEY_USER_NOT_AUTHENTICATED)).context(concat!( in get_auth_tokens() 363 Err(Error::sys()).context("In AuthInfo::get_auth_tokens: Cannot be reached.") in get_auth_tokens() 434 return Err(Error::Km(Ec::INCOMPATIBLE_PURPOSE)) in authorize_create() 443 return Err(Error::Km(Ec::UNSUPPORTED_PURPOSE)).context( in authorize_create() 456 return Err(Error::Km(Ec::UNSUPPORTED_PURPOSE)).context( in authorize_create() 466 return Err(Error::Km(Ec::UNSUPPORTED_PURPOSE)) in authorize_create() 511 return Err(Error::Km(Ec::KEY_NOT_YET_VALID)) in authorize_create() [all …]
|
D | legacy_blob.rs | 294 return Err(Error::BadEncoding) in decode_alias() 300 return Err(Error::BadEncoding).context("In decode_alias: could not decode filename."); in decode_alias() 311 return Err(Error::BadLen).context("In new_from_stream.")?; in new_from_stream() 325 return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) in new_from_stream() 333 return Err(Error::BadLen).context(format!( in new_from_stream() 386 Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) in new_from_stream() 389 _ => Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)).context(format!( in new_from_stream() 516 Err(anyhow::anyhow!("Invalid.")) in read_key_parameters() 535 TagType::INVALID => Err(anyhow::anyhow!("Invalid.")), in read_key_parameters() 537 return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) in read_key_parameters() [all …]
|
D | shared_secret_negotiation.rs | 181 Err(e) => { in connect_participants() 213 Err(e) => { in connect_participants() 259 Err(e) => { in negotiate_shared_secret() 278 Err(SharedSecretError::Checksum(p)) in negotiate_shared_secret() 281 (_, Err(e)) => Err(SharedSecretError::Computation { e, p }), in negotiate_shared_secret() 285 if let Err(e) = negotiation_result { in negotiate_shared_secret()
|
D | apc.rs | 113 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err() 235 if let Err(e) = state.confirmation_token_sender.send(confirmation_token.to_vec()) { in result() 257 if let Err(e) = listener.onCompleted(rc, data_confirmed) { in result() 278 return Err(Error::pending()) in present_prompt() 288 return Err(Error::sys()).context(format!( in present_prompt() 299 return Err(Error::unimplemented()) in present_prompt() 333 return Err(Error::ignored()) in cancel_prompt() 338 return Err(Error::ignored()).context(concat!( in cancel_prompt()
|
D | service.rs | 112 Err(error::Error::sys()) in get_i_sec_level_by_uuid() 128 Err(error::Error::Km(ErrorCode::HARDWARE_TYPE_UNAVAILABLE)) in get_security_level() 200 Err(e) => match e.root_cause().downcast_ref::<Error>() { in update_subcomponent() 202 _ => Err(e), in update_subcomponent() 221 return Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)).context("No key to update."); in update_subcomponent() 235 return Err(Error::Rc(ResponseCode::INVALID_ARGUMENT)) in update_subcomponent() 264 _ => return Err(Error::perm()).context( in list_entries() 275 Err(e) => { in list_entries() 285 return Err(e).context("In list_entries: While checking key permission.")?; in list_entries()
|
D | security_level.rs | 230 return Err(Error::sys()).context(concat!( in create_operation() 279 Err(Error::Km(ErrorCode::INVALID_ARGUMENT)) in create_operation() 283 _ => Err(Error::Km(ErrorCode::INVALID_ARGUMENT)) in create_operation() 327 Err(Error::Km(ErrorCode::TOO_MANY_OPERATIONS)) => { in create_operation() 331 v @ Err(Error::Km(ErrorCode::INVALID_KEY_BLOB)) => { in create_operation() 362 return Err(Error::sys()).context(concat!( in create_operation() 473 return Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in generate_key() 590 return Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in import_key() 623 v => Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in import_key() 655 return Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)).context(format!( in import_wrapped_key() [all …]
|
/system/tools/aidl/tests/golden_output/aidl-test-interface-rust-source/gen/android/aidl/tests/ |
D | ITestService.rs | 75 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in UnimplementedMethod() 78 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in Deprecated() 81 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in TestOneway() 84 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatBoolean() 87 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatByte() 90 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatChar() 93 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatInt() 96 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatLong() 99 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatFloat() 102 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatDouble() [all …]
|
D | INewName.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RealName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in RealName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in RealName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
D | INamedCallback.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in GetName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in GetName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in GetName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
D | IOldName.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RealName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in RealName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in RealName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
D | DeprecatedParcelable.rs | 35 .unwrap_or(Err(binder::StatusCode::UNEXPECTED_NULL)) in deserialize() 45 if parcelable_size < 0 { return Err(binder::StatusCode::BAD_VALUE); } in deserialize_option() 47 return Err(binder::StatusCode::BAD_VALUE); in deserialize_option()
|
D | OtherParcelableForToString.rs | 37 .unwrap_or(Err(binder::StatusCode::UNEXPECTED_NULL)) in deserialize() 47 if parcelable_size < 0 { return Err(binder::StatusCode::BAD_VALUE); } in deserialize_option() 49 return Err(binder::StatusCode::BAD_VALUE); in deserialize_option()
|
D | GenericStructuredParcelable.rs | 40 .unwrap_or(Err(binder::StatusCode::UNEXPECTED_NULL)) in deserialize() 50 if parcelable_size < 0 { return Err(binder::StatusCode::BAD_VALUE); } in deserialize_option() 52 return Err(binder::StatusCode::BAD_VALUE); in deserialize_option()
|
/system/security/keystore2/src/crypto/ |
D | lib.rs | 55 Err(Error::RandomNumberGenerationFailed) in generate_aes256_key() 71 Err(Error::RandomNumberGenerationFailed) in generate_random_data() 88 _ => return Err(Error::InvalidIvLength), in aes_gcm_decrypt() 91 return Err(Error::InvalidAeadTagLength); in aes_gcm_decrypt() 96 _ => return Err(Error::InvalidKeyLength), in aes_gcm_decrypt() 116 false => Err(Error::DecryptionFailed), in aes_gcm_decrypt() 128 return Err(Error::RandomNumberGenerationFailed); in aes_gcm_encrypt() 133 _ => return Err(Error::InvalidKeyLength), in aes_gcm_encrypt() 154 Err(Error::EncryptionFailed) in aes_gcm_encrypt() 189 return Err(Error::InvalidSaltLength); in derive_key() [all …]
|
/system/bt/gd/rust/hci/custom_types/ |
D | lib.rs | 52 Err(_) => Err(InvalidAddressError), in try_from() 55 Err(InvalidAddressError) in try_from() 96 Err(_) => Err(InvalidClassOfDeviceError), in try_from() 99 Err(InvalidClassOfDeviceError) in try_from()
|
/system/libbase/include/android-base/ |
D | expected.h | 610 template <class Err = E _ENABLE_IF( 611 std::is_constructible_v<E, Err> && 615 constexpr unexpected(Err&& e) : val_(std::forward<Err>(e)) {} in unexpected() 623 template<class Err _ENABLE_IF( 624 std::is_constructible_v<E, Err> && 625 !std::is_constructible_v<E, unexpected<Err>&> && 626 !std::is_constructible_v<E, unexpected<Err>> && 627 !std::is_constructible_v<E, const unexpected<Err>&> && 628 !std::is_constructible_v<E, const unexpected<Err>> && 629 !std::is_convertible_v<unexpected<Err>&, E> && [all …]
|
/system/bt/gd/rust/linux/mgmt/src/bin/btmanagerd/ |
D | main.rs | 52 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed( in main() 67 Err(_) => { in main() 68 ctx.reply(Err(dbus_crossroads::MethodErr::failed("cannot stop Bluetooth"))) in main() 98 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed(&format!( in main() 117 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed(&format!( in main()
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 178 return Err(anyhow!(Error::sys("Failed to open KeystoreKeyBackend"))); in new() 212 Err(anyhow!(Error::sys(format!( in lookup() 218 _ => Err(anyhow!(io::Error::last_os_error())) in lookup() 241 Err(anyhow!(Error::sys("getcon returned a NULL context"))) in getcon() 244 _ => Err(anyhow!(io::Error::last_os_error())).context("getcon failed"), in getcon() 265 Err(anyhow!(Error::sys(format!( in getpidcon() 271 _ => Err(anyhow!(io::Error::last_os_error())) in getpidcon() 308 io::ErrorKind::PermissionDenied => Err(anyhow!(Error::perm())), in check_access() 309 _ => Err(anyhow!(e)), in check_access() 341 c => Err(anyhow!(format!( in check_context()
|
/system/bt/gd/rust/hal/src/ |
D | snoop.rs | 69 type Err = SnoopModeParseError; typedef 71 fn from_str(s: &str) -> Result<Self, Self::Err> { in from_str() argument 76 _ => Err(SnoopModeParseError), in from_str() 146 if let Err(e) = evt_up_tx.send(evt.clone()).await { in provide_snooped_hal() 153 if let Err(e) = raw_hal.cmd_tx.send(cmd.clone()) { in provide_snooped_hal() 160 if let Err(e) = raw_hal.acl_tx.send(acl.clone()) { in provide_snooped_hal() 167 if let Err(e) = acl_up_tx.send(acl.clone()).await { in provide_snooped_hal() 174 if let Err(e) = raw_hal.iso_tx.send(iso.clone()) { in provide_snooped_hal() 181 if let Err(e) = iso_up_tx.send(iso.clone()).await { in provide_snooped_hal()
|
/system/extras/profcollectd/libprofcollectd/ |
D | config.rs | 84 type Err = serde_json::Error; typedef 85 fn from_str(s: &str) -> Result<Self, Self::Err> { in from_str() argument 107 T::Err: Error + Send + Sync + 'static, in get_device_config() 121 T::Err: Error + Send + Sync + 'static, in get_property()
|
/system/security/keystore2/system_property/ |
D | lib.rs | 129 let mut result = Err(PropertyWatcherError::ReadCallbackNotCalled); in read() 161 return Err(PropertyWatcherError::WaitFailed); in wait_for_property_creation() 190 return Err(PropertyWatcherError::WaitFailed); in wait() 215 Err(anyhow!(PropertyWatcherError::SetPropertyFailed)) in write()
|
/system/bt/gd/rust/facade_proto/ |
D | build.rs | 52 Err(e) => println!("Proto dir failed to be created: {}", e), in main() 57 Err(e) => println!("Grpc dir failed to be created: {}", e), in main() 65 Err(_) => PathBuf::from(env::current_dir().unwrap()).join("../..").canonicalize().unwrap(), in main()
|