Home
last modified time | relevance | path

Searched refs:reply (Results 1 – 9 of 9) sorted by relevance

/system/security/keystore/
DIKeystoreService.cpp58 Parcel data, reply; in test() local
60 status_t status = remote()->transact(BnKeystoreService::TEST, data, &reply); in test()
65 int32_t err = reply.readExceptionCode(); in test()
66 int32_t ret = reply.readInt32(); in test()
76 Parcel data, reply; in get() local
79 status_t status = remote()->transact(BnKeystoreService::GET, data, &reply); in get()
84 int32_t err = reply.readExceptionCode(); in get()
85 ssize_t len = reply.readInt32(); in get()
86 if (len >= 0 && (size_t) len <= reply.dataAvail()) { in get()
88 const void* buf = reply.readInplace(ulen); in get()
[all …]
/system/security/keystore-engine/
Drsa_meth.cpp91 uint8_t* reply = NULL; in keystore_rsa_priv_enc() local
94 num, &reply, &replyLen); in keystore_rsa_priv_enc()
97 free(reply); in keystore_rsa_priv_enc()
101 free(reply); in keystore_rsa_priv_enc()
108 memcpy(to, reply, replyLen); in keystore_rsa_priv_enc()
109 free(reply); in keystore_rsa_priv_enc()
137 uint8_t* reply = NULL; in keystore_rsa_priv_dec() local
140 flen, &reply, &replyLen); in keystore_rsa_priv_dec()
154 if (*reply == 0x00) { in keystore_rsa_priv_dec()
155 alignedReply = reply + 1; in keystore_rsa_priv_dec()
[all …]
Decdsa_meth.cpp76 uint8_t* reply = NULL; in keystore_ecdsa_do_sign() local
79 dlen, &reply, &replyLen); in keystore_ecdsa_do_sign()
95 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_ecdsa_do_sign()
Ddsa_meth.cpp70 uint8_t* reply = NULL; in keystore_dsa_do_sign() local
73 dlen, &reply, &replyLen); in keystore_dsa_do_sign()
89 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_dsa_do_sign()
/system/core/libnetutils/
Ddhcpclient.c351 static int is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) in is_valid_reply() argument
357 if (reply->op != OP_BOOTREPLY) { in is_valid_reply()
358 if (verbose) ALOGD("netcfg: Wrong Op %d != %d\n", reply->op, OP_BOOTREPLY); in is_valid_reply()
361 if (reply->xid != msg->xid) { in is_valid_reply()
362 if (verbose) ALOGD("netcfg: Wrong Xid 0x%x != 0x%x\n", ntohl(reply->xid), in is_valid_reply()
366 if (reply->htype != msg->htype) { in is_valid_reply()
367 if (verbose) ALOGD("netcfg: Wrong Htype %d != %d\n", reply->htype, msg->htype); in is_valid_reply()
370 if (reply->hlen != msg->hlen) { in is_valid_reply()
371 if (verbose) ALOGD("netcfg: Wrong Hlen %d != %d\n", reply->hlen, msg->hlen); in is_valid_reply()
374 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) { in is_valid_reply()
[all …]
/system/extras/tests/binder/benchmarks/
DbinderAddInts.cpp84 const Parcel& data, Parcel* reply,
260 Parcel send, reply; in client() local
276 send, &reply)) != 0) { in client()
290 int result = reply.readInt32(); in client()
313 Parcel* reply, uint32_t flags) { in onTransact() argument
334 reply->writeInt32(val1 + val2); in onTransact()
/system/security/keystore/include/keystore/
DIKeystoreService.h129 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
/system/core/fastboot/
Dfastboot_protocol.txt115 will reply with "DATA%08x" if it has enough
/system/core/adb/
Dprotocol.txt90 Once the recipient has tried all its private keys, it can reply with an