Searched refs:reply (Results 1 – 9 of 9) sorted by relevance
/system/security/keystore/ |
D | IKeystoreService.cpp | 58 Parcel data, reply; in test() local 60 status_t status = remote()->transact(BnKeystoreService::TEST, data, &reply); in test() 65 int32_t err = reply.readExceptionCode(); in test() 66 int32_t ret = reply.readInt32(); in test() 76 Parcel data, reply; in get() local 79 status_t status = remote()->transact(BnKeystoreService::GET, data, &reply); in get() 84 int32_t err = reply.readExceptionCode(); in get() 85 ssize_t len = reply.readInt32(); in get() 86 if (len >= 0 && (size_t) len <= reply.dataAvail()) { in get() 88 const void* buf = reply.readInplace(ulen); in get() [all …]
|
/system/security/keystore-engine/ |
D | rsa_meth.cpp | 91 uint8_t* reply = NULL; in keystore_rsa_priv_enc() local 94 num, &reply, &replyLen); in keystore_rsa_priv_enc() 97 free(reply); in keystore_rsa_priv_enc() 101 free(reply); in keystore_rsa_priv_enc() 108 memcpy(to, reply, replyLen); in keystore_rsa_priv_enc() 109 free(reply); in keystore_rsa_priv_enc() 137 uint8_t* reply = NULL; in keystore_rsa_priv_dec() local 140 flen, &reply, &replyLen); in keystore_rsa_priv_dec() 154 if (*reply == 0x00) { in keystore_rsa_priv_dec() 155 alignedReply = reply + 1; in keystore_rsa_priv_dec() [all …]
|
D | ecdsa_meth.cpp | 76 uint8_t* reply = NULL; in keystore_ecdsa_do_sign() local 79 dlen, &reply, &replyLen); in keystore_ecdsa_do_sign() 95 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_ecdsa_do_sign()
|
D | dsa_meth.cpp | 70 uint8_t* reply = NULL; in keystore_dsa_do_sign() local 73 dlen, &reply, &replyLen); in keystore_dsa_do_sign() 89 const_cast<const unsigned char**>(reinterpret_cast<unsigned char**>(&reply)), in keystore_dsa_do_sign()
|
/system/core/libnetutils/ |
D | dhcpclient.c | 351 static int is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) in is_valid_reply() argument 357 if (reply->op != OP_BOOTREPLY) { in is_valid_reply() 358 if (verbose) ALOGD("netcfg: Wrong Op %d != %d\n", reply->op, OP_BOOTREPLY); in is_valid_reply() 361 if (reply->xid != msg->xid) { in is_valid_reply() 362 if (verbose) ALOGD("netcfg: Wrong Xid 0x%x != 0x%x\n", ntohl(reply->xid), in is_valid_reply() 366 if (reply->htype != msg->htype) { in is_valid_reply() 367 if (verbose) ALOGD("netcfg: Wrong Htype %d != %d\n", reply->htype, msg->htype); in is_valid_reply() 370 if (reply->hlen != msg->hlen) { in is_valid_reply() 371 if (verbose) ALOGD("netcfg: Wrong Hlen %d != %d\n", reply->hlen, msg->hlen); in is_valid_reply() 374 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) { in is_valid_reply() [all …]
|
/system/extras/tests/binder/benchmarks/ |
D | binderAddInts.cpp | 84 const Parcel& data, Parcel* reply, 260 Parcel send, reply; in client() local 276 send, &reply)) != 0) { in client() 290 int result = reply.readInt32(); in client() 313 Parcel* reply, uint32_t flags) { in onTransact() argument 334 reply->writeInt32(val1 + val2); in onTransact()
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 129 virtual status_t onTransact(uint32_t code, const Parcel& data, Parcel* reply,
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 115 will reply with "DATA%08x" if it has enough
|
/system/core/adb/ |
D | protocol.txt | 90 Once the recipient has tried all its private keys, it can reply with an
|