/device/google/cuttlefish/host/commands/modem_simulator/unittest/ |
D | service_test.cpp | 106 void ReadCommandResponse(std::vector<std::string>& response) { in ReadCommandResponse() argument 141 response.push_back(command); in ReadCommandResponse() 144 response.push_back(command); in ReadCommandResponse() 160 inline bool IsFinalResponseSuccess(std::string response) { in IsFinalResponseSuccess() argument 163 if (*iter == response) { in IsFinalResponseSuccess() 171 inline bool IsFinalResponseError(std::string response) { in IsFinalResponseError() argument 174 if (response.compare(0, iter->size(), *iter) == 0) { in IsFinalResponseError() 182 inline bool IsIntermediateResponse(std::string response) { in IsIntermediateResponse() argument 183 if (response.compare(0, command_prefix_.size(), command_prefix_) == 0) { in IsIntermediateResponse() 194 std::vector<std::string> response; in openLogicalChannel() local [all …]
|
/device/google/cuttlefish/guest/hals/ril/reference-libril/ |
D | ril_service.h | 27 int token, RIL_Errno e, void *response, size_t responselen); 30 int responseType, int serial, RIL_Errno e, void *response, 34 int responseType, int serial, RIL_Errno e, void *response, 38 int responseType, int serial, RIL_Errno e, void *response, 42 int responseType, int serial, RIL_Errno e, void *response, 46 int responseType, int serial, RIL_Errno e, void *response, 50 int responseType, int serial, RIL_Errno e, void *response, 55 void *response, size_t responselen); 58 int responseType, int serial, RIL_Errno e, void *response, 62 int responseType, int serial, RIL_Errno e, void *response, size_t responselen); [all …]
|
D | ril_service.cpp | 132 void convertRilHardwareConfigListToHal(void *response, size_t responseLen, 135 void convertRilRadioCapabilityToHal(void *response, size_t responseLen, RadioCapability& rc); 137 void convertRilLceDataInfoToHal(void *response, size_t responseLen, LceDataInfo& lce); 139 void convertRilSignalStrengthToHal(void *response, size_t responseLen, 142 void convertRilSignalStrengthToHal_1_2(void* response, size_t responseLen, 145 void convertRilSignalStrengthToHal_1_4(void *response, size_t responseLen, 148 void convertRilSignalStrengthToHal_1_6(void* response, size_t responseLen, 162 void convertRilDataCallListToHal(void *response, size_t responseLen, 165 void convertRilDataCallListToHal_1_4(void* response, size_t responseLen, 168 void convertRilDataCallListToHal_1_5(void* response, size_t responseLen, [all …]
|
D | ril_config.cpp | 349 RIL_Errno e, void *response, size_t responseLen) { in getSimSlotsStatusResponse() argument 359 if ((response == NULL) || (responseLen % sizeof(RIL_SimSlotStatus_V1_2) != 0)) { in getSimSlotsStatusResponse() 363 RIL_SimSlotStatus_V1_2 *psimSlotStatus = ((RIL_SimSlotStatus_V1_2 *) response); in getSimSlotsStatusResponse() 386 RIL_Errno e, void *response, size_t responseLen) { in setSimSlotsMappingResponse() argument 405 RIL_Errno e, void *response, size_t responseLen) { in getPhoneCapabilityResponse() argument 414 if ((response == NULL) || (responseLen % sizeof(RIL_PhoneCapability) != 0)) { in getPhoneCapabilityResponse() 418 RIL_PhoneCapability *pCapability = (RIL_PhoneCapability *)response; in getPhoneCapabilityResponse() 439 RIL_Errno e, void *response, size_t responseLen) { in setPreferredDataModemResponse() argument 458 RIL_Errno e, void *response, size_t responseLen) { in setModemsConfigResponse() argument 477 RIL_Errno e, void *response, size_t responseLen) { in getModemsConfigResponse() argument [all …]
|
/device/google/cuttlefish/guest/hals/keymint/remote/ |
D | remote_keymaster.cpp | 41 auto response = channel_->ReceiveMessage(); in ForwardCommand() local 42 if (!response) { in ForwardCommand() 47 const uint8_t* buffer = response->payload; in ForwardCommand() 48 const uint8_t* buffer_end = response->payload + response->payload_size; in ForwardCommand() 105 ConfigureVerifiedBootInfoResponse response = in Initialize() local 107 if (response.error != KM_ERROR_OK) { in Initialize() 109 << response.error; in Initialize() 176 GetVersionResponse* response) { in GetVersion() argument 177 ForwardCommand(GET_VERSION, request, response); in GetVersion() 182 SupportedAlgorithmsResponse* response) { in SupportedAlgorithms() argument [all …]
|
D | remote_keymint_device.cpp | 218 AddEntropyResponse response(impl_.message_version()); in addRngEntropy() local 219 impl_.AddRngEntropy(request, &response); in addRngEntropy() 221 return kmError2ScopedAStatus(response.error); in addRngEntropy() 240 GenerateKeyResponse response(impl_.message_version()); in generateKey() local 241 impl_.GenerateKey(request, &response); in generateKey() 243 if (response.error != KM_ERROR_OK) { in generateKey() 253 return kmError2ScopedAStatus(response.error); in generateKey() 256 creationResult->keyBlob = kmBlob2vector(response.key_blob); in generateKey() 258 keyParams, securityLevel_, response.unenforced, response.enforced); in generateKey() 260 convertCertificateChain(response.certificate_chain); in generateKey() [all …]
|
D | remote_keymaster.h | 40 GetVersionResponse* response); 42 SupportedAlgorithmsResponse* response); 44 SupportedBlockModesResponse* response); 46 SupportedPaddingModesResponse* response); 48 SupportedDigestsResponse* response); 50 SupportedImportFormatsResponse* response); 52 SupportedExportFormatsResponse* response); 54 AddEntropyResponse* response); 55 void Configure(const ConfigureRequest& request, ConfigureResponse* response); 57 GenerateKeyResponse* response); [all …]
|
D | remote_remotely_provisioned_component.cpp | 44 ndk::ScopedAStatus toKeymasterError(const KeymasterResponse& response) { in toKeymasterError() argument 46 static_cast<keymaster_error_t>(-static_cast<int32_t>(response.error)); in toKeymasterError() 58 GetHwInfoResponse response = impl_.GetHwInfo(); in getHardwareInfo() local 59 if (response.error != KM_ERROR_OK) { in getHardwareInfo() 60 return toKeymasterError(response); in getHardwareInfo() 63 info->versionNumber = response.version; in getHardwareInfo() 64 info->rpcAuthorName = response.rpcAuthorName; in getHardwareInfo() 65 info->supportedEekCurve = response.supportedEekCurve; in getHardwareInfo() 66 info->uniqueId = response.uniqueId; in getHardwareInfo() 67 info->supportedNumKeysInCsr = response.supportedNumKeysInCsr; in getHardwareInfo() [all …]
|
D | remote_keymint_operation.cpp | 65 UpdateOperationResponse response(impl_.message_version()); in updateAad() local 66 impl_.UpdateOperation(request, &response); in updateAad() 68 return kmError2ScopedAStatus(response.error); in updateAad() 89 UpdateOperationResponse response(impl_.message_version()); in update() local 90 impl_.UpdateOperation(request, &response); in update() 92 if (response.error != KM_ERROR_OK) { in update() 93 return kmError2ScopedAStatus(response.error); in update() 95 if (response.input_consumed != request.input.buffer_size()) { in update() 99 *output = kmBuffer2vector(response.output); in update() 134 FinishOperationResponse response(impl_.message_version()); in finish() local [all …]
|
D | remote_shared_secret.cpp | 38 auto response = impl_.GetHmacSharingParameters(); in getSharedSecretParameters() local 39 params->seed = kmBlob2vector(response.params.seed); in getSharedSecretParameters() 40 params->nonce = {std::begin(response.params.nonce), in getSharedSecretParameters() 41 std::end(response.params.nonce)}; in getSharedSecretParameters() 42 return kmError2ScopedAStatus(response.error); in getSharedSecretParameters() 62 auto response = impl_.ComputeSharedHmac(request); in computeSharedSecret() local 63 if (response.error == KM_ERROR_OK) { in computeSharedSecret() 64 *sharingCheck = kmBlob2vector(response.sharing_check); in computeSharedSecret() 66 return kmError2ScopedAStatus(response.error); in computeSharedSecret()
|
D | remote_secure_clock.cpp | 42 GenerateTimestampTokenResponse response(request.message_version); in generateTimeStamp() local 43 impl_.GenerateTimestampToken(request, &response); in generateTimeStamp() 44 if (response.error != KM_ERROR_OK) { in generateTimeStamp() 45 return kmError2ScopedAStatus(response.error); in generateTimeStamp() 47 token->challenge = response.token.challenge; in generateTimeStamp() 49 static_cast<int64_t>(response.token.timestamp); in generateTimeStamp() 50 token->mac = kmBlob2vector(response.token.mac); in generateTimeStamp()
|
D | service.cpp | 63 GenerateTimestampTokenResponse response(remote_keymaster.message_version()); in getSecurityLevel() local 64 remote_keymaster.GenerateTimestampToken(request, &response); in getSecurityLevel() 66 if (response.error != STATUS_OK) { in getSecurityLevel() 68 << response.error; in getSecurityLevel() 71 return static_cast<SecurityLevel>(response.token.security_level); in getSecurityLevel()
|
/device/google/cuttlefish/host/commands/run_cvd/ |
D | server_loop_impl.cpp | 119 auto response = LauncherResponse::kSuccess; in Run() local 123 response = LauncherResponse::kError; in Run() 125 const auto n_written = client->Write(&response, sizeof(response)); in Run() 126 if (n_written != sizeof(response)) { in Run() 198 auto response = LauncherResponse::kSuccess; in HandleActionWithNoData() local 199 client->Write(&response, sizeof(response)); in HandleActionWithNoData() 204 auto response = LauncherResponse::kError; in HandleActionWithNoData() local 205 client->Write(&response, sizeof(response)); in HandleActionWithNoData() 212 auto response = LauncherResponse::kSuccess; in HandleActionWithNoData() local 213 client->Write(&response, sizeof(response)); in HandleActionWithNoData() [all …]
|
/device/google/cuttlefish/guest/hals/gatekeeper/remote/ |
D | remote_gatekeeper.cpp | 92 EnrollResponse response; in enroll() local 93 auto error = Send(request, &response); in enroll() 97 } else if (response.error == ERROR_RETRY) { in enroll() 99 *rsp = {ERROR_RETRY_TIMEOUT, static_cast<int32_t>(response.retry_timeout), 0, {}}; in enroll() 101 } else if (response.error != ERROR_NONE) { in enroll() 102 LOG(ERROR) << "Enroll response has an error: " << response.error; in enroll() 106 response.enrolled_password_handle.Data<::gatekeeper::password_handle_t>(); in enroll() 110 {response.enrolled_password_handle.Data<uint8_t>(), in enroll() 111 (response.enrolled_password_handle.Data<uint8_t>() + in enroll() 112 response.enrolled_password_handle.size())}}; in enroll() [all …]
|
D | remote_gatekeeper.h | 84 GateKeeperMessage* response); 87 EnrollResponse* response) { in Send() argument 88 return Send(ENROLL, request, response); in Send() 91 gatekeeper_error_t Send(const VerifyRequest& request, VerifyResponse* response) { in Send() argument 92 return Send(VERIFY, request, response); in Send()
|
/device/google/cuttlefish/guest/hals/ril/reference-ril/ |
D | reference-ril.c | 306 extern uint8_t * convertHexStringToBytes(void *response, size_t responseLen); 321 #define RIL_onRequestComplete(t, e, response, responselen) s_rilenv->OnRequestComplete(t,e, respons… argument 424 static int parse_technology_response(const char *response, int *current, int32_t *preferred); 529 static int parseSimResponseLine(char* line, RIL_SIM_IO_Response* response) { in parseSimResponseLine() argument 534 err = at_tok_nextint(&line, &response->sw1); in parseSimResponseLine() 536 err = at_tok_nextint(&line, &response->sw2); in parseSimResponseLine() 540 err = at_tok_nextstr(&line, &response->simResponse); in parseSimResponseLine() 872 RIL_Data_Call_Response_v11 *response = responses; in requestOrSendDataCallList() local 881 err = at_tok_nextint(&line, &response->cid); in requestOrSendDataCallList() 885 err = at_tok_nextint(&line, &response->active); in requestOrSendDataCallList() [all …]
|
/device/google/cuttlefish/common/libs/security/ |
D | keymaster_channel_test.cpp | 40 auto response = channel.ReceiveMessage(); in TEST() local 41 EXPECT_EQ(response->cmd, keymaster::GET_VERSION) << "Command mismatch"; in TEST() 42 EXPECT_FALSE(response->is_response) << "Request/response mismatch"; in TEST() 45 const uint8_t* read_data = response->payload; in TEST() 46 EXPECT_TRUE(read.Deserialize(&read_data, read_data + response->payload_size)) in TEST() 65 auto response = channel.ReceiveMessage(); in TEST() local 66 EXPECT_EQ(response->cmd, keymaster::GET_VERSION) << "Command mismatch"; in TEST() 67 EXPECT_TRUE(response->is_response) << "Request/response mismatch"; in TEST() 70 const uint8_t* read_data = response->payload; in TEST() 71 EXPECT_TRUE(read.Deserialize(&read_data, read_data + response->payload_size)) in TEST()
|
/device/google/cuttlefish/host/commands/secure_env/ |
D | keymaster_responder.cpp | 44 METHOD_NAME##Response response(keymaster_.message_version()); \ in ProcessMessage() 45 keymaster_.METHOD_NAME(request, &response); \ in ProcessMessage() 46 return channel_.SendResponse(ENUM_NAME, response); \ in ProcessMessage() 81 auto response = keymaster_.METHOD_NAME(request); \ in ProcessMessage() 82 return channel_.SendResponse(ENUM_NAME, response); \ in ProcessMessage() 99 auto response = keymaster_.METHOD_NAME(); \ in ProcessMessage() 100 return channel_.SendResponse(ENUM_NAME, response); \ in ProcessMessage() 113 AddEntropyResponse response(keymaster_.message_version()); in ProcessMessage() local 115 keymaster_.AddRngEntropy(request, &response); in ProcessMessage() 116 return channel_.SendResponse(ADD_RNG_ENTROPY, response); in ProcessMessage()
|
D | tpm_keymaster_enforcement.cpp | 246 VerifyAuthorizationResponse response(keymaster::kDefaultMessageVersion); in VerifyAuthorization() local 247 response.error = KM_ERROR_UNKNOWN_ERROR; in VerifyAuthorization() 248 response.token.challenge = request.challenge; in VerifyAuthorization() 249 response.token.timestamp = get_current_time_ms(); in VerifyAuthorization() 250 response.token.security_level = SecurityLevel(); in VerifyAuthorization() 253 .challenge = response.token.challenge, in VerifyAuthorization() 254 .timestamp = response.token.timestamp, in VerifyAuthorization() 255 .security_level = response.token.security_level, in VerifyAuthorization() 263 return response; in VerifyAuthorization() 266 return response; in VerifyAuthorization() [all …]
|
D | suspend_resume_handler.cpp | 98 auto response = LauncherResponse::kSuccess; in SuspendResumeHandler() local 100 channel_to_run_cvd_->Write(&response, sizeof(response)); in SuspendResumeHandler() 101 CF_EXPECT_EQ(sizeof(response), n_written); in SuspendResumeHandler() 112 auto response = LauncherResponse::kSuccess; in SuspendResumeHandler() local 114 channel_to_run_cvd_->Write(&response, sizeof(response)); in SuspendResumeHandler() 115 CF_EXPECT_EQ(sizeof(response), n_written); in SuspendResumeHandler()
|
D | gatekeeper_responder.cpp | 44 EnrollResponse response; in ProcessMessage() local 45 gatekeeper_.Enroll(enroll_request, &response); in ProcessMessage() 46 return channel_.SendResponse(ENROLL, response); in ProcessMessage() 55 VerifyResponse response; in ProcessMessage() local 56 gatekeeper_.Verify(verify_request, &response); in ProcessMessage() 57 return channel_.SendResponse(VERIFY, response); in ProcessMessage()
|
/device/google/cuttlefish/host/commands/modem_simulator/ |
D | channel_monitor.cpp | 61 void Client::SendCommandResponse(std::string response) const { in SendCommandResponse() 62 if (response.empty()) { in SendCommandResponse() 67 if (response.back() != '\r') { in SendCommandResponse() 68 response += '\r'; in SendCommandResponse() 70 LOG(VERBOSE) << " AT< " << response; in SendCommandResponse() 73 WriteAll(client_write_fd_, response); in SendCommandResponse() 78 for (auto& response : responses) { in SendCommandResponse() local 79 SendCommandResponse(response); in SendCommandResponse() 193 void ChannelMonitor::SendUnsolicitedCommand(std::string& response) { in SendUnsolicitedCommand() argument 197 iter->get()->SendCommandResponse(response); in SendUnsolicitedCommand() [all …]
|
/device/linaro/dragonboard/shared/utils/rmtfs/ |
D | qmi_rmtfs.qmi | 32 response open_resp { 41 response close_resp { 52 response iovec_resp { 61 response alloc_buf_resp { 70 response dev_error_resp {
|
/device/google/cuttlefish/host/libs/command_util/ |
D | util.cc | 154 LauncherResponse response; in RunLauncherAction() local 155 CF_EXPECT(ReadExactBinaryResult(monitor_socket, &response), in RunLauncherAction() 157 CF_EXPECT_EQ((int)response, (int)LauncherResponse::kSuccess); in RunLauncherAction() 184 LauncherResponse response; in RunLauncherAction() local 185 CF_EXPECT(ReadExactBinaryResult(monitor_socket, &response), in RunLauncherAction() 187 CF_EXPECT_EQ((int)response, (int)LauncherResponse::kSuccess); in RunLauncherAction()
|
/device/google/cuttlefish/host/libs/web/http_client/ |
D | http_client.cc | 227 auto response = in DownloadToJson() local 229 auto result = ParseJson(response.data); in DownloadToJson() 234 error_json["response"] = response.data; in DownloadToJson() 235 return HttpResponse<Json::Value>{error_json, response.http_code}; in DownloadToJson() 237 return HttpResponse<Json::Value>{*result, response.http_code}; in DownloadToJson() 400 HttpResponse<T> response; in RetryImpl() local 405 response = CF_EXPECT(attempt_fn()); in RetryImpl() 406 if (!response.HttpServerError()) { in RetryImpl() 407 return response; in RetryImpl() 410 return response; in RetryImpl()
|