/system/keymaster/tests/ |
D | android_keymaster_messages_test.cpp | 105 GenerateKeyResponse rsp(ver); in TEST() local 106 rsp.error = KM_ERROR_OK; in TEST() 107 rsp.key_blob.key_material = dup_array(TEST_DATA); in TEST() 108 rsp.key_blob.key_material_size = array_length(TEST_DATA); in TEST() 109 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 111 rsp.certificate_chain = CertificateChain(3); in TEST() 112 rsp.certificate_chain.entries[0] = {dup_buffer("foo", 3), 3}; in TEST() 113 rsp.certificate_chain.entries[1] = {dup_buffer("bar", 3), 3}; in TEST() 114 rsp.certificate_chain.entries[2] = {dup_buffer("baz", 3), 3}; in TEST() 118 deserialized.reset(round_trip(ver, rsp, 109)); in TEST() [all …]
|
/system/core/trusty/storage/lib/ |
D | storage.c | 149 struct storage_file_open_resp rsp = { 0 }; in storage_open_file() local 150 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_open_file() 157 if ((size_t)rc != sizeof(rsp)) { in storage_open_file() 158 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); in storage_open_file() 162 *handle_p = make_file_handle(session, rsp.handle); in storage_open_file() 284 struct storage_file_get_size_resp rsp; in storage_get_file_size() local 285 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_get_file_size() 292 if ((size_t)rc != sizeof(rsp)) { in storage_get_file_size() 293 ALOGE("%s: invalid response length (%zd != %zd)\n", __func__, rc, sizeof(rsp)); in storage_get_file_size() 297 *size_p = rsp.size; in storage_get_file_size()
|
/system/core/trusty/keymaster/ipc/ |
D | trusty_keymaster_ipc.cpp | 146 keymaster::KeymasterResponse* rsp) { in trusty_keymaster_send() argument 174 if (!rsp->Deserialize(&p, p + rsp_size)) { in trusty_keymaster_send() 177 } else if (rsp->error != KM_ERROR_OK) { in trusty_keymaster_send() 178 ALOGE("Response of size %d contained error code %d\n", (int)rsp_size, (int)rsp->error); in trusty_keymaster_send() 179 return rsp->error; in trusty_keymaster_send() 181 return rsp->error; in trusty_keymaster_send()
|
/system/chre/host/common/test/ |
D | chre_test_client.cc | 100 void handleHubInfoResponse(const fbs::HubInfoResponseT &rsp) override { in handleHubInfoResponse() argument 102 LOGI(" Name: '%s'", getStringFromByteVector(rsp.name)); in handleHubInfoResponse() 103 LOGI(" Vendor: '%s'", getStringFromByteVector(rsp.vendor)); in handleHubInfoResponse() 104 LOGI(" Toolchain: '%s'", getStringFromByteVector(rsp.toolchain)); in handleHubInfoResponse() 106 rsp.platform_version, rsp.toolchain_version); in handleHubInfoResponse() 108 rsp.peak_mips, rsp.stopped_power, rsp.sleep_power, rsp.peak_power); in handleHubInfoResponse() 109 LOGI(" Max message len: %" PRIu32, rsp.max_msg_len); in handleHubInfoResponse() 111 rsp.platform_id, rsp.chre_platform_version); in handleHubInfoResponse()
|
/system/core/gatekeeperd/ |
D | gatekeeperd.cpp | 204 [&gkResponse](const GatekeeperResponse& rsp) { in enroll() argument 205 if (rsp.code >= GatekeeperStatusCode::STATUS_OK) { in enroll() 206 *gkResponse = GKResponse::ok({rsp.data.begin(), rsp.data.end()}); in enroll() 207 } else if (rsp.code == GatekeeperStatusCode::ERROR_RETRY_TIMEOUT && in enroll() 208 rsp.timeout > 0) { in enroll() 209 *gkResponse = GKResponse::retry(rsp.timeout); in enroll() 283 [&gkResponse](const GatekeeperResponse& rsp) { in verifyChallenge() argument 284 if (rsp.code >= GatekeeperStatusCode::STATUS_OK) { in verifyChallenge() 286 {rsp.data.begin(), rsp.data.end()}, in verifyChallenge() 287 rsp.code == GatekeeperStatusCode::STATUS_REENROLL /* reenroll */); in verifyChallenge() [all …]
|
/system/keymaster/android_keymaster/ |
D | android_keymaster.cpp | 159 void AndroidKeymaster::GetVersion(const GetVersionRequest&, GetVersionResponse* rsp) { in GetVersion() argument 160 if (rsp == nullptr) return; in GetVersion() 162 rsp->major_ver = 2; in GetVersion() 163 rsp->minor_ver = 0; in GetVersion() 164 rsp->subminor_ver = 0; in GetVersion() 165 rsp->error = KM_ERROR_OK; in GetVersion() 169 GetVersion2Response rsp; in GetVersion2() local 170 rsp.km_version = context_->GetKmVersion(); in GetVersion2() 171 rsp.km_date = kKmDate; in GetVersion2() 172 rsp.max_message_version = MessageVersion(rsp.km_version, rsp.km_date); in GetVersion2() [all …]
|
/system/core/trusty/keymaster/ |
D | TrustyKeymaster.cpp | 74 ConfigureResponse rsp(message_version()); in Initialize() local 75 Configure(req, &rsp); in Initialize() 77 if (rsp.error != KM_ERROR_OK) { in Initialize() 78 LOG(FATAL) << "Failed to configure keymaster " << rsp.error; in Initialize() 102 KeymasterResponse* rsp) { in ForwardCommand() argument 104 err = trusty_keymaster_send(command, req, rsp); in ForwardCommand() 107 rsp->error = err; in ForwardCommand()
|
/system/unwinding/libunwindstack/ |
D | AsmGetRegsX86_64.S | 44 lea 8(%rsp), %rax 57 movq (%rsp), %rax
|
D | RegsX86_64.cpp | 105 (*regs)[X86_64_REG_RSP] = user->rsp; in Read() 123 regs_[X86_64_REG_RSP] = ucontext->uc_mcontext.rsp; in SetFromUcontext()
|
/system/unwinding/libunwindstack/tests/files/offline/eh_frame_hdr_begin_x86_64/ |
D | regs.txt | 10 rsp: 7ffcc8596ce8
|
/system/bt/build/toolchain/gcc/ |
D | BUILD.gn | 41 rspfile = "{{output}}.rsp" 55 rspfile = soname + ".rsp" 79 rspfile = "$outfile.rsp"
|
/system/unwinding/libunwindstack/tests/files/offline/load_bias_ro_rx_x86_64/ |
D | regs.txt | 16 rsp: 7ffd224153c8
|
/system/unwinding/libunwindstack/tests/files/offline/signal_fde_x86_64/ |
D | regs.txt | 16 rsp: 707eb5aa8320
|
/system/bt/build/toolchain/clang/ |
D | BUILD.gn | 60 rspfile = "{{output}}.rsp" 74 rspfile = soname + ".rsp" 98 rspfile = "$outfile.rsp"
|
/system/core/trusty/keymaster/include/trusty_keymaster/ipc/ |
D | trusty_keymaster_ipc.h | 36 keymaster::KeymasterResponse* rsp);
|
/system/nfc/src/nfa/ee/ |
D | nfa_ee_main.cc | 163 tNFC_NFCEE_MODE_SET_REVT rsp; in nfa_ee_restore_one_ecb() local 202 rsp.mode = NFA_EE_MD_ACTIVATE; in nfa_ee_restore_one_ecb() 203 rsp.nfcee_id = p_cb->nfcee_id; in nfa_ee_restore_one_ecb() 204 rsp.status = NFA_STATUS_OK; in nfa_ee_restore_one_ecb() 205 ee_msg.p_data = &rsp; in nfa_ee_restore_one_ecb()
|
/system/core/trusty/keymaster/set_attestation_key/ |
D | set_attestation_key.cpp | 125 SetAttestationKeyResponse rsp; in set_attestation_key_or_cert_bin() local 127 ret = trusty_keymaster_send(cmd, req, &rsp); in set_attestation_key_or_cert_bin() 250 ClearAttestationCertChainResponse rsp; in clear_cert_chain() local 257 ret = trusty_keymaster_send(KM_CLEAR_ATTESTATION_CERT_CHAIN, req, &rsp); in clear_cert_chain()
|
/system/unwinding/libunwindstack/include/unwindstack/ |
D | UserX86_64.h | 54 uint64_t rsp; member
|
D | UcontextX86_64.h | 61 uint64_t rsp; member
|
/system/nfc/src/fuzzers/rw/ |
D | t3t.cc | 308 auto rsp = &p[1]; in Type3_FixPackets() local 309 rsp[T3T_MSG_RSP_OFFSET_STATUS1] = T3T_MSG_RSP_STATUS_OK; in Type3_FixPackets() 310 memcpy(&rsp[T3T_MSG_RSP_OFFSET_IDM], TEST_NFCID, sizeof(TEST_NFCID)); in Type3_FixPackets()
|
/system/bt/profile/avrcp/tests/ |
D | avrcp_device_test.cc | 1587 auto rsp = RejectBuilder::MakeBuilder(static_cast<CommandPdu>(0), Status::INVALID_COMMAND); in TEST_F() local 1588 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F() 1599 auto rsp = RejectBuilder::MakeBuilder(CommandPdu::GET_CAPABILITIES, Status::INVALID_PARAMETER); in TEST_F() local 1600 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F() 1611 …auto rsp = RejectBuilder::MakeBuilder(CommandPdu::GET_ELEMENT_ATTRIBUTES, Status::INVALID_PARAMETE… in TEST_F() local 1612 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F() 1623 auto rsp = RejectBuilder::MakeBuilder(CommandPdu::PLAY_ITEM, Status::INVALID_PARAMETER); in TEST_F() local 1624 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F() 1635 …auto rsp = RejectBuilder::MakeBuilder(CommandPdu::SET_ADDRESSED_PLAYER, Status::INVALID_PARAMETER); in TEST_F() local 1636 EXPECT_CALL(response_cb, Call(1, false, matchPacket(std::move(rsp)))).Times(1); in TEST_F() [all …]
|
/system/bt/stack/gatt/ |
D | gatt_main.cc | 887 tGATTS_SRV_CHG_RSP rsp; in gatt_init_srv_chg() local 897 GATTS_SRV_CHG_CMD_READ_NUM_CLENTS, NULL, &rsp); in gatt_init_srv_chg() 899 if (!(status && rsp.num_clients)) return; in gatt_init_srv_chg() 901 VLOG(1) << "num_srv_chg_clt_clients=" << +rsp.num_clients; in gatt_init_srv_chg() 902 uint8_t num_clients = rsp.num_clients; in gatt_init_srv_chg() 907 &req, &rsp); in gatt_init_srv_chg() 909 memcpy(&srv_chg_clt, &rsp.srv_chg, sizeof(tGATTS_SRV_CHG)); in gatt_init_srv_chg()
|
/system/bt/stack/avrc/ |
D | avrc_pars_ct.cc | 86 p_result->rsp.status = *p; in avrc_pars_vendor_rsp() 87 return p_result->rsp.status; in avrc_pars_vendor_rsp() 558 p_result->rsp.status = *p; in avrc_ctrl_pars_vendor_rsp() 559 return p_result->rsp.status; in avrc_ctrl_pars_vendor_rsp() 848 BE_STREAM_TO_UINT8(p_result->rsp.status, p); in avrc_ctrl_pars_vendor_rsp() 892 p_result->rsp.opcode = p_msg->hdr.opcode; in AVRC_Ctrl_ParsResponse() 893 p_result->rsp.status = status; in AVRC_Ctrl_ParsResponse() 933 p_result->rsp.opcode = p_msg->hdr.opcode; in AVRC_ParsResponse() 934 p_result->rsp.status = status; in AVRC_ParsResponse()
|
D | avrc_bld_tg.cc | 1302 p_rsp->rsp.opcode); in avrc_bld_init_rsp_buffer() 1303 if (opcode != p_rsp->rsp.opcode && p_rsp->rsp.status != AVRC_STS_NO_ERROR && in avrc_bld_init_rsp_buffer() 1304 avrc_is_valid_opcode(p_rsp->rsp.opcode)) { in avrc_bld_init_rsp_buffer() 1305 opcode = p_rsp->rsp.opcode; in avrc_bld_init_rsp_buffer() 1349 p_rsp->rsp.opcode = opcode; in avrc_bld_init_rsp_buffer() 1397 AVRC_TRACE_API("%s pdu=%x status=%x", __func__, p_rsp->rsp.pdu, in AVRC_BldResponse() 1398 p_rsp->rsp.status); in AVRC_BldResponse() 1399 if (p_rsp->rsp.status != AVRC_STS_NO_ERROR) { in AVRC_BldResponse() 1400 return (avrc_bld_rejected_rsp(&p_rsp->rsp, p_pkt)); in AVRC_BldResponse()
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 68 void GetVersion(const GetVersionRequest& req, GetVersionResponse* rsp) { in GetVersion() argument 69 impl_->GetVersion(req, rsp); in GetVersion()
|