Home
last modified time | relevance | path

Searched refs:rsp (Results 1 – 25 of 33) sorted by relevance

12

/system/keymaster/tests/
Dandroid_keymaster_messages_test.cpp105 GenerateKeyResponse rsp(ver); in TEST() local
106 rsp.error = KM_ERROR_OK; in TEST()
107 rsp.key_blob.key_material = dup_array(TEST_DATA); in TEST()
108 rsp.key_blob.key_material_size = array_length(TEST_DATA); in TEST()
109 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
111 rsp.certificate_chain = CertificateChain(3); in TEST()
112 rsp.certificate_chain.entries[0] = {dup_buffer("foo", 3), 3}; in TEST()
113 rsp.certificate_chain.entries[1] = {dup_buffer("bar", 3), 3}; in TEST()
114 rsp.certificate_chain.entries[2] = {dup_buffer("baz", 3), 3}; in TEST()
118 deserialized.reset(round_trip(ver, rsp, 109)); in TEST()
[all …]
/system/core/trusty/storage/lib/
Dstorage.c149 struct storage_file_open_resp rsp = { 0 }; in storage_open_file() local
150 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_open_file()
157 if ((size_t)rc != sizeof(rsp)) { in storage_open_file()
158 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); in storage_open_file()
162 *handle_p = make_file_handle(session, rsp.handle); in storage_open_file()
284 struct storage_file_get_size_resp rsp; in storage_get_file_size() local
285 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_get_file_size()
292 if ((size_t)rc != sizeof(rsp)) { in storage_get_file_size()
293 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); in storage_get_file_size()
297 *size_p = rsp.size; in storage_get_file_size()
/system/core/trusty/keymaster/ipc/
Dtrusty_keymaster_ipc.cpp146 keymaster::KeymasterResponse* rsp) { in trusty_keymaster_send() argument
174 if (!rsp->Deserialize(&p, p + rsp_size)) { in trusty_keymaster_send()
177 } else if (rsp->error != KM_ERROR_OK) { in trusty_keymaster_send()
178 ALOGE("Response of size %d contained error code %d\n", (int)rsp_size, (int)rsp->error); in trusty_keymaster_send()
179 return rsp->error; in trusty_keymaster_send()
181 return rsp->error; in trusty_keymaster_send()
/system/chre/host/common/test/
Dchre_test_client.cc100 void handleHubInfoResponse(const fbs::HubInfoResponseT &rsp) override { in handleHubInfoResponse() argument
102 LOGI(" Name: '%s'", getStringFromByteVector(rsp.name)); in handleHubInfoResponse()
103 LOGI(" Vendor: '%s'", getStringFromByteVector(rsp.vendor)); in handleHubInfoResponse()
104 LOGI(" Toolchain: '%s'", getStringFromByteVector(rsp.toolchain)); in handleHubInfoResponse()
106 rsp.platform_version, rsp.toolchain_version); in handleHubInfoResponse()
108 rsp.peak_mips, rsp.stopped_power, rsp.sleep_power, rsp.peak_power); in handleHubInfoResponse()
109 LOGI(" Max message len: %" PRIu32, rsp.max_msg_len); in handleHubInfoResponse()
111 rsp.platform_id, rsp.chre_platform_version); in handleHubInfoResponse()
/system/core/gatekeeperd/
Dgatekeeperd.cpp204 [&gkResponse](const GatekeeperResponse& rsp) { in enroll() argument
205 if (rsp.code >= GatekeeperStatusCode::STATUS_OK) { in enroll()
206 *gkResponse = GKResponse::ok({rsp.data.begin(), rsp.data.end()}); in enroll()
207 } else if (rsp.code == GatekeeperStatusCode::ERROR_RETRY_TIMEOUT && in enroll()
208 rsp.timeout > 0) { in enroll()
209 *gkResponse = GKResponse::retry(rsp.timeout); in enroll()
283 [&gkResponse](const GatekeeperResponse& rsp) { in verifyChallenge() argument
284 if (rsp.code >= GatekeeperStatusCode::STATUS_OK) { in verifyChallenge()
286 {rsp.data.begin(), rsp.data.end()}, in verifyChallenge()
287 rsp.code == GatekeeperStatusCode::STATUS_REENROLL /* reenroll */); in verifyChallenge()
[all …]
/system/keymaster/android_keymaster/
Dandroid_keymaster.cpp159 void AndroidKeymaster::GetVersion(const GetVersionRequest&, GetVersionResponse* rsp) { in GetVersion() argument
160 if (rsp == nullptr) return; in GetVersion()
162 rsp->major_ver = 2; in GetVersion()
163 rsp->minor_ver = 0; in GetVersion()
164 rsp->subminor_ver = 0; in GetVersion()
165 rsp->error = KM_ERROR_OK; in GetVersion()
169 GetVersion2Response rsp; in GetVersion2() local
170 rsp.km_version = context_->GetKmVersion(); in GetVersion2()
171 rsp.km_date = kKmDate; in GetVersion2()
172 rsp.max_message_version = MessageVersion(rsp.km_version, rsp.km_date); in GetVersion2()
[all …]
/system/core/trusty/keymaster/
DTrustyKeymaster.cpp74 ConfigureResponse rsp(message_version()); in Initialize() local
75 Configure(req, &rsp); in Initialize()
77 if (rsp.error != KM_ERROR_OK) { in Initialize()
78 LOG(FATAL) << "Failed to configure keymaster " << rsp.error; in Initialize()
102 KeymasterResponse* rsp) { in ForwardCommand() argument
104 err = trusty_keymaster_send(command, req, rsp); in ForwardCommand()
107 rsp->error = err; in ForwardCommand()
/system/unwinding/libunwindstack/
DAsmGetRegsX86_64.S44 lea 8(%rsp), %rax
57 movq (%rsp), %rax
DRegsX86_64.cpp105 (*regs)[X86_64_REG_RSP] = user->rsp; in Read()
123 regs_[X86_64_REG_RSP] = ucontext->uc_mcontext.rsp; in SetFromUcontext()
/system/unwinding/libunwindstack/tests/files/offline/eh_frame_hdr_begin_x86_64/
Dregs.txt10 rsp: 7ffcc8596ce8
/system/bt/build/toolchain/gcc/
DBUILD.gn41 rspfile = "{{output}}.rsp"
55 rspfile = soname + ".rsp"
79 rspfile = "$outfile.rsp"
/system/unwinding/libunwindstack/tests/files/offline/load_bias_ro_rx_x86_64/
Dregs.txt16 rsp: 7ffd224153c8
/system/unwinding/libunwindstack/tests/files/offline/signal_fde_x86_64/
Dregs.txt16 rsp: 707eb5aa8320
/system/bt/build/toolchain/clang/
DBUILD.gn60 rspfile = "{{output}}.rsp"
74 rspfile = soname + ".rsp"
98 rspfile = "$outfile.rsp"
/system/core/trusty/keymaster/include/trusty_keymaster/ipc/
Dtrusty_keymaster_ipc.h36 keymaster::KeymasterResponse* rsp);
/system/nfc/src/nfa/ee/
Dnfa_ee_main.cc163 tNFC_NFCEE_MODE_SET_REVT rsp; in nfa_ee_restore_one_ecb() local
202 rsp.mode = NFA_EE_MD_ACTIVATE; in nfa_ee_restore_one_ecb()
203 rsp.nfcee_id = p_cb->nfcee_id; in nfa_ee_restore_one_ecb()
204 rsp.status = NFA_STATUS_OK; in nfa_ee_restore_one_ecb()
205 ee_msg.p_data = &rsp; in nfa_ee_restore_one_ecb()
/system/core/trusty/keymaster/set_attestation_key/
Dset_attestation_key.cpp125 SetAttestationKeyResponse rsp; in set_attestation_key_or_cert_bin() local
127 ret = trusty_keymaster_send(cmd, req, &rsp); in set_attestation_key_or_cert_bin()
250 ClearAttestationCertChainResponse rsp; in clear_cert_chain() local
257 ret = trusty_keymaster_send(KM_CLEAR_ATTESTATION_CERT_CHAIN, req, &rsp); in clear_cert_chain()
/system/unwinding/libunwindstack/include/unwindstack/
DUserX86_64.h54 uint64_t rsp; member
DUcontextX86_64.h61 uint64_t rsp; member
/system/nfc/src/fuzzers/rw/
Dt3t.cc308 auto rsp = &p[1]; in Type3_FixPackets() local
309 rsp[T3T_MSG_RSP_OFFSET_STATUS1] = T3T_MSG_RSP_STATUS_OK; in Type3_FixPackets()
310 memcpy(&rsp[T3T_MSG_RSP_OFFSET_IDM], TEST_NFCID, sizeof(TEST_NFCID)); in Type3_FixPackets()
/system/bt/profile/avrcp/tests/
Davrcp_device_test.cc1587 auto rsp = RejectBuilder::MakeBuilder(static_cast<CommandPdu>(0), Status::INVALID_COMMAND); in TEST_F() local
1588 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F()
1599 auto rsp = RejectBuilder::MakeBuilder(CommandPdu::GET_CAPABILITIES, Status::INVALID_PARAMETER); in TEST_F() local
1600 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F()
1611 …auto rsp = RejectBuilder::MakeBuilder(CommandPdu::GET_ELEMENT_ATTRIBUTES, Status::INVALID_PARAMETE… in TEST_F() local
1612 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F()
1623 auto rsp = RejectBuilder::MakeBuilder(CommandPdu::PLAY_ITEM, Status::INVALID_PARAMETER); in TEST_F() local
1624 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F()
1635 …auto rsp = RejectBuilder::MakeBuilder(CommandPdu::SET_ADDRESSED_PLAYER, Status::INVALID_PARAMETER); in TEST_F() local
1636 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F()
[all …]
/system/bt/stack/gatt/
Dgatt_main.cc887 tGATTS_SRV_CHG_RSP rsp; in gatt_init_srv_chg() local
897 GATTS_SRV_CHG_CMD_READ_NUM_CLENTS, NULL, &rsp); in gatt_init_srv_chg()
899 if (!(status && rsp.num_clients)) return; in gatt_init_srv_chg()
901 VLOG(1) << "num_srv_chg_clt_clients=" << +rsp.num_clients; in gatt_init_srv_chg()
902 uint8_t num_clients = rsp.num_clients; in gatt_init_srv_chg()
907 &req, &rsp); in gatt_init_srv_chg()
909 memcpy(&srv_chg_clt, &rsp.srv_chg, sizeof(tGATTS_SRV_CHG)); in gatt_init_srv_chg()
/system/bt/stack/avrc/
Davrc_pars_ct.cc86 p_result->rsp.status = *p; in avrc_pars_vendor_rsp()
87 return p_result->rsp.status; in avrc_pars_vendor_rsp()
558 p_result->rsp.status = *p; in avrc_ctrl_pars_vendor_rsp()
559 return p_result->rsp.status; in avrc_ctrl_pars_vendor_rsp()
848 BE_STREAM_TO_UINT8(p_result->rsp.status, p); in avrc_ctrl_pars_vendor_rsp()
892 p_result->rsp.opcode = p_msg->hdr.opcode; in AVRC_Ctrl_ParsResponse()
893 p_result->rsp.status = status; in AVRC_Ctrl_ParsResponse()
933 p_result->rsp.opcode = p_msg->hdr.opcode; in AVRC_ParsResponse()
934 p_result->rsp.status = status; in AVRC_ParsResponse()
Davrc_bld_tg.cc1302 p_rsp->rsp.opcode); in avrc_bld_init_rsp_buffer()
1303 if (opcode != p_rsp->rsp.opcode && p_rsp->rsp.status != AVRC_STS_NO_ERROR && in avrc_bld_init_rsp_buffer()
1304 avrc_is_valid_opcode(p_rsp->rsp.opcode)) { in avrc_bld_init_rsp_buffer()
1305 opcode = p_rsp->rsp.opcode; in avrc_bld_init_rsp_buffer()
1349 p_rsp->rsp.opcode = opcode; in avrc_bld_init_rsp_buffer()
1397 AVRC_TRACE_API("%s pdu=%x status=%x", __func__, p_rsp->rsp.pdu, in AVRC_BldResponse()
1398 p_rsp->rsp.status); in AVRC_BldResponse()
1399 if (p_rsp->rsp.status != AVRC_STS_NO_ERROR) { in AVRC_BldResponse()
1400 return (avrc_bld_rejected_rsp(&p_rsp->rsp, p_pkt)); in AVRC_BldResponse()
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h68 void GetVersion(const GetVersionRequest& req, GetVersionResponse* rsp) { in GetVersion() argument
69 impl_->GetVersion(req, rsp); in GetVersion()

12