/system/teeui/test/ |
D | teeui_locale_test.cpp | 39 int error = runRenderTest("en", false /* magnified */); in TEST_F() local 40 ASSERT_EQ(error, 0); in TEST_F() 44 int error = runRenderTest("en", true /* magnified */); in TEST_F() local 45 ASSERT_EQ(error, 0); in TEST_F() 49 int error = runRenderTest("af", false /* magnified */); in TEST_F() local 50 ASSERT_EQ(error, 0); in TEST_F() 54 int error = runRenderTest("af", true /* magnified */); in TEST_F() local 55 ASSERT_EQ(error, 0); in TEST_F() 59 int error = runRenderTest("am", false /* magnified */); in TEST_F() local 60 ASSERT_EQ(error, 0); in TEST_F() [all …]
|
D | teeui_draw_label_text_test.cpp | 45 int error = runRenderTest("en", false /* magnified */, &kText12Character8Group[0]); in TEST_F() local 46 ASSERT_EQ(error, 0); in TEST_F() 50 int error = runRenderTest("en", true /* magnified */, &kText12Character8Group[0]); in TEST_F() local 51 ASSERT_EQ(error, 0); in TEST_F() 55 int error = runRenderTest("en", false /* magnified */, &kText100Character1Group[0]); in TEST_F() local 56 ASSERT_EQ(error, 0); in TEST_F() 60 int error = runRenderTest("en", true /* magnified */, &kText100Character1Group[0]); in TEST_F() local 61 ASSERT_EQ(error, 0); in TEST_F() 65 int error = runRenderTest("en", false /* magnified */, ""); in TEST_F() local 66 ASSERT_EQ(error, 0); in TEST_F() [all …]
|
/system/core/adb/ |
D | socket_spec_test.cpp | 28 std::string hostname, error, serial; in TEST() local 30 EXPECT_FALSE(parse_tcp_socket_spec("sneakernet:5037", &hostname, &port, &serial, &error)); in TEST() 31 EXPECT_TRUE(error.find("sneakernet") != std::string::npos); in TEST() 35 std::string hostname, error, serial; in TEST() local 37 EXPECT_TRUE(parse_tcp_socket_spec("tcp:5037", &hostname, &port, &serial, &error)); in TEST() 44 std::string hostname, error, serial; in TEST() local 46 EXPECT_FALSE(parse_tcp_socket_spec("tcp:", &hostname, &port, &serial, &error)); in TEST() 47 EXPECT_FALSE(parse_tcp_socket_spec("tcp:-1", &hostname, &port, &serial, &error)); in TEST() 48 EXPECT_FALSE(parse_tcp_socket_spec("tcp:65536", &hostname, &port, &serial, &error)); in TEST() 52 std::string hostname, error, serial; in TEST() local [all …]
|
D | adb_listeners_test.cpp | 68 std::string error; in TEST_F() local 71 install_listener("tcp:9000", "tcp:9000", &transport_, false, nullptr, &error)); in TEST_F() 72 ASSERT_TRUE(error.empty()); in TEST_F() 78 std::string error; in TEST_F() local 81 install_listener("tcp:9000", "tcp:9000", &transport_, false, nullptr, &error)); in TEST_F() 82 ASSERT_TRUE(error.empty()); in TEST_F() 85 install_listener("tcp:9000", "tcp:9001", &transport_, false, nullptr, &error)); in TEST_F() 86 ASSERT_TRUE(error.empty()); in TEST_F() 92 std::string error; in TEST_F() local 95 install_listener("tcp:9000", "tcp:9000", &transport_, true, nullptr, &error)); in TEST_F() [all …]
|
D | socket_spec.cpp | 79 std::string* serial, std::string* error) { in parse_tcp_socket_spec() argument 81 *error = "specification is not tcp: "; in parse_tcp_socket_spec() 82 *error += spec; in parse_tcp_socket_spec() 95 *error = StringPrintf("bad port number '%d'", port_value); in parse_tcp_socket_spec() 104 if (!android::base::ParseNetAddress(addr, &hostname_value, &port_value, serial, error)) { in parse_tcp_socket_spec() 120 int get_host_socket_spec_port(std::string_view spec, std::string* error) { in get_host_socket_spec_port() argument 123 if (!parse_tcp_socket_spec(spec, nullptr, &port, nullptr, error)) { in get_host_socket_spec_port() 131 *error = "given vsock server socket string was invalid"; in get_host_socket_spec_port() 135 *error = "could not parse vsock port"; in get_host_socket_spec_port() 140 *error = "vsock port was negative."; in get_host_socket_spec_port() [all …]
|
/system/update_engine/ |
D | dbus_service.cc | 60 bool DBusUpdateEngineService::AttemptUpdate(ErrorPtr* error, in AttemptUpdate() argument 64 error, in_app_version, in_omaha_url, 0 /* no flags */); in AttemptUpdate() 68 ErrorPtr* error, in AttemptUpdateWithFlags() argument 77 error, in AttemptUpdateWithFlags() 84 bool DBusUpdateEngineService::AttemptInstall(ErrorPtr* error, in AttemptInstall() argument 87 return common_->AttemptInstall(error, in_omaha_url, dlc_ids); in AttemptInstall() 90 bool DBusUpdateEngineService::AttemptRollback(ErrorPtr* error, in AttemptRollback() argument 92 return common_->AttemptRollback(error, in_powerwash); in AttemptRollback() 95 bool DBusUpdateEngineService::CanRollback(ErrorPtr* error, in CanRollback() argument 97 return common_->CanRollback(error, out_can_rollback); in CanRollback() [all …]
|
D | common_service.h | 48 bool SetUpdateAttemptFlags(brillo::ErrorPtr* error, int32_t in_flags_as_int); 50 bool AttemptUpdate(brillo::ErrorPtr* error, 59 bool AttemptInstall(brillo::ErrorPtr* error, 63 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash); 67 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback); 71 bool ResetStatus(brillo::ErrorPtr* error); 76 bool SetDlcActiveValue(brillo::ErrorPtr* error, 83 bool GetStatus(brillo::ErrorPtr* error, 87 bool RebootIfNeeded(brillo::ErrorPtr* error); 97 bool SetChannel(brillo::ErrorPtr* error, [all …]
|
D | dbus_service.h | 45 bool AttemptUpdate(brillo::ErrorPtr* error, 49 bool AttemptUpdateWithFlags(brillo::ErrorPtr* error, 54 bool AttemptInstall(brillo::ErrorPtr* error, 58 bool AttemptRollback(brillo::ErrorPtr* error, bool in_powerwash) override; 62 bool CanRollback(brillo::ErrorPtr* error, bool* out_can_rollback) override; 66 bool ResetStatus(brillo::ErrorPtr* error) override; 71 bool SetDlcActiveValue(brillo::ErrorPtr* error, 77 bool GetStatusAdvanced(brillo::ErrorPtr* error, 81 bool RebootIfNeeded(brillo::ErrorPtr* error) override; 91 bool SetChannel(brillo::ErrorPtr* error, [all …]
|
D | binder_service_android.cc | 35 Status ErrorPtrToStatus(const brillo::ErrorPtr& error) { in ErrorPtrToStatus() argument 37 1, android::String8{error->GetMessage().c_str()}); in ErrorPtrToStatus() 124 brillo::ErrorPtr error; in applyPayload() local 126 payload_url, payload_offset, payload_size, str_headers, &error)) { in applyPayload() 127 return ErrorPtrToStatus(error); in applyPayload() 139 brillo::ErrorPtr error; in applyPayloadFd() local 141 pfd.get(), payload_offset, payload_size, str_headers, &error)) { in applyPayloadFd() 142 return ErrorPtrToStatus(error); in applyPayloadFd() 148 brillo::ErrorPtr error; in suspend() local 149 if (!service_delegate_->SuspendUpdate(&error)) in suspend() [all …]
|
D | common_service.cc | 52 void LogAndSetError(ErrorPtr* error, in LogAndSetError() argument 55 brillo::Error::AddTo(error, in LogAndSetError() 106 bool UpdateEngineService::AttemptInstall(brillo::ErrorPtr* error, in AttemptInstall() argument 111 LogAndSetError(error, FROM_HERE, "Could not schedule install operation."); in AttemptInstall() 117 bool UpdateEngineService::AttemptRollback(ErrorPtr* error, bool in_powerwash) { in AttemptRollback() argument 122 LogAndSetError(error, FROM_HERE, "Rollback attempt failed."); in AttemptRollback() 136 bool UpdateEngineService::ResetStatus(ErrorPtr* error) { in ResetStatus() argument 139 LogAndSetError(error, FROM_HERE, "ResetStatus failed."); in ResetStatus() 145 bool UpdateEngineService::SetDlcActiveValue(brillo::ErrorPtr* error, in SetDlcActiveValue() argument 150 LogAndSetError(error, FROM_HERE, "SetDlcActiveValue failed."); in SetDlcActiveValue() [all …]
|
/system/libvintf/ |
D | KernelInfo.cpp | 42 std::string* error) const { in matchKernelConfigs() 51 if (error != nullptr) { in matchKernelConfigs() 52 *error = "Missing config " + key; in matchKernelConfigs() 58 if (error != nullptr) { in matchKernelConfigs() 59 *error = "For config " + key + ", value = " + kernelValue + " but required " + in matchKernelConfigs() 73 const std::vector<MatrixKernel>& kernels, Level kernelLevel, std::string* error) const { in getMatchedKernelRequirements() 94 if (error) { in getMatchedKernelRequirements() 95 *error = "Seen unspecified source matrix level; this should not happen."; in getMatchedKernelRequirements() 109 if (error) { in getMatchedKernelRequirements() 120 *error = ss.str(); in getMatchedKernelRequirements() [all …]
|
D | CompatibilityMatrix.cpp | 48 bool CompatibilityMatrix::addKernel(MatrixKernel&& kernel, std::string* error) { in addKernel() argument 50 if (error) { in addKernel() 51 *error = "Cannot add <kernel> to a " + to_string(mType) + " compatibility matrix."; in addKernel() 69 if (error) { in addKernel() 70 *error = "Kernel version mismatch; for level " + in addKernel() 91 if (error) { in addKernel() 92 *error = in addKernel() 122 const std::string& path, std::string* error) { in fetchAllInformation() argument 124 error); in fetchAllInformation() 194 bool CompatibilityMatrix::addAllHalsAsOptional(CompatibilityMatrix* other, std::string* error) { in addAllHalsAsOptional() argument [all …]
|
D | ManifestHal.cpp | 27 bool ManifestHal::isValid(std::string* error) const { in isValid() 28 if (error) { in isValid() 29 error->clear(); in isValid() 40 if (error) { in isValid() 41 *error += "Duplicated major version: " + to_string(v) + " vs. " + to_string(it->second); in isValid() 47 if (error) *error += transportArchError; in isValid() 115 bool ManifestHal::verifyInstance(const FqInstance& fqInstance, std::string* error) const { in verifyInstance() 117 if (error) { in verifyInstance() 118 *error = "Should not add \"" + fqInstance.string() + "\" to a HAL with name " + in verifyInstance() 124 if (error) *error = "Should specify version: \"" + fqInstance.string() + "\""; in verifyInstance() [all …]
|
D | VintfObject.cpp | 57 std::string error; in Get() local 58 status_t status = fetchAllInformation(ptr->object.get(), &error); in Get() 66 LOG(ERROR) << id << ": " << status << " VINTF parse error: " << error; in Get() 152 std::string* error) { in getCombinedFrameworkMatrix() argument 154 auto matrixFragmentsStatus = getAllFrameworkMatrixLevels(&matrixFragments, error); in getCombinedFrameworkMatrix() 159 if (error && error->empty()) { in getCombinedFrameworkMatrix() 160 *error = "Cannot get framework matrix for each FCM version for unknown error."; in getCombinedFrameworkMatrix() 193 if (error) { in getCombinedFrameworkMatrix() 194 *error = "No framework compatibility matrix files under " + kSystemVintfDir + in getCombinedFrameworkMatrix() 200 auto combined = CompatibilityMatrix::combine(deviceLevel, &matrixFragments, error); in getCombinedFrameworkMatrix() [all …]
|
/system/core/adb/client/ |
D | adb_client.cpp | 76 static std::optional<TransportId> switch_socket_transport(int fd, std::string* error) { in switch_socket_transport() argument 110 *error = perror_str("write failure during connection"); in switch_socket_transport() 116 if (!adb_status(fd, error)) { in switch_socket_transport() 117 D("Switch transport failed: %s", error->c_str()); in switch_socket_transport() 123 *error = "failed to read transport id from server"; in switch_socket_transport() 132 bool adb_status(borrowed_fd fd, std::string* error) { in adb_status() argument 135 *error = perror_str("protocol fault (couldn't read status)"); in adb_status() 144 *error = android::base::StringPrintf("protocol fault (status %02x %02x %02x %02x?!)", in adb_status() 149 ReadProtocolString(fd, error, error); in adb_status() 153 static int _adb_connect(std::string_view service, TransportId* transport, std::string* error, in _adb_connect() argument [all …]
|
/system/keymaster/km_openssl/ |
D | block_cipher_operation.cpp | 81 keymaster_error_t* error) { in CreateOperation() argument 82 *error = KM_ERROR_OK; in CreateOperation() 86 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation() 90 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE; in CreateOperation() 94 *error = KM_ERROR_INCOMPATIBLE_BLOCK_MODE; in CreateOperation() 100 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation() 101 if (*error != KM_ERROR_OK) { in CreateOperation() 107 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation() 112 *error = KM_ERROR_INCOMPATIBLE_PADDING_MODE; in CreateOperation() 129 *error = KM_ERROR_UNSUPPORTED_PURPOSE; in CreateOperation() [all …]
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 154 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local 156 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 159 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust); in CreateKeyBlob() 160 if (error != KM_ERROR_OK) return error; in CreateKeyBlob() 169 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 170 if (error != KM_ERROR_OK) in UpgradeKeyBlob() 171 return error; in UpgradeKeyBlob() 204 keymaster_error_t error; in ParseKeyBlob() local 208 if (error != KM_ERROR_OK) return error; in ParseKeyBlob() 220 error = BuildHiddenAuthorizations(additional_params, &hidden, softwareRootOfTrust); in ParseKeyBlob() [all …]
|
D | keymaster1_passthrough_context.cpp | 98 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 99 if (error != KM_ERROR_OK) in UpgradeKeyBlob() 100 return error; in UpgradeKeyBlob() 127 keymaster_error_t error = device->get_key_characteristics(device, &blob, client_id_ptr, in parseKeymaster1HwBlob() local 129 if (error != KM_ERROR_OK) in parseKeymaster1HwBlob() 130 return error; in parseKeymaster1HwBlob() 148 keymaster_error_t error = BuildHiddenAuthorizations(additional_params, &hidden, in ParseKeyBlob() local 150 if (error != KM_ERROR_OK) in ParseKeyBlob() 151 return error; in ParseKeyBlob() 154 … error = DeserializeIntegrityAssuredBlob(blob, hidden, &key_material, &hw_enforced, &sw_enforced); in ParseKeyBlob() [all …]
|
D | soft_keymaster_context.cpp | 202 keymaster_error_t error = SetAuthorizations(key_description, origin, os_version_, in CreateKeyBlob() local 204 if (error != KM_ERROR_OK) in CreateKeyBlob() 205 return error; in CreateKeyBlob() 208 error = BuildHiddenAuthorizations(key_description, &hidden, root_of_trust_); in CreateKeyBlob() 209 if (error != KM_ERROR_OK) in CreateKeyBlob() 210 return error; in CreateKeyBlob() 219 keymaster_error_t error = ParseKeyBlob(key_to_upgrade, upgrade_params, &key); in UpgradeKeyBlob() local 220 if (error != KM_ERROR_OK) in UpgradeKeyBlob() 221 return error; in UpgradeKeyBlob() 282 keymaster_error_t error; in ParseKeyBlob() local [all …]
|
/system/libvintf/test/ |
D | LibVintfTest.cpp | 65 std::string error; in add() local 66 bool success = cm.addKernel(std::move(kernel), &error); in add() 67 EXPECT_EQ(success, error == "") << "success: " << success << ", error: " << error; in add() 822 std::string error; in TEST_F() local 839 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F() 846 EXPECT_TRUE(ki.checkCompatibility(cm, &error)) << error; in TEST_F() 848 EXPECT_FALSE(ki.checkCompatibility(cm, &error)) in TEST_F() 850 EXPECT_IN("kernelSepolicyVersion = 30 but required >= 40", error); in TEST_F() 897 EXPECT_FALSE(badAvb.checkCompatibility(cm, &error, CheckFlags::ENABLE_ALL_CHECKS)); in TEST_F() 898 EXPECT_STREQ(error.c_str(), "Vbmeta version 1.0 does not match framework matrix 2.1"); in TEST_F() [all …]
|
/system/libbase/ |
D | parsenetaddress_test.cpp | 24 std::string canonical, host, error; in TEST() local 28 ParseNetAddress("www.google.com", &host, &port, &canonical, &error)); in TEST() 34 ParseNetAddress("www.google.com:666", &host, &port, &canonical, &error)); in TEST() 41 std::string canonical, host, error; in TEST() local 44 EXPECT_TRUE(ParseNetAddress("1.2.3.4", &host, &port, &canonical, &error)); in TEST() 49 EXPECT_TRUE(ParseNetAddress("1.2.3.4:666", &host, &port, &canonical, &error)); in TEST() 56 std::string canonical, host, error; in TEST() local 59 EXPECT_TRUE(ParseNetAddress("::1", &host, &port, &canonical, &error)); in TEST() 65 &canonical, &error)); in TEST() 70 EXPECT_TRUE(ParseNetAddress("[::1]:666", &host, &port, &canonical, &error)); in TEST() [all …]
|
/system/core/adb/sysdeps/posix/ |
D | network.cpp | 32 static void set_error(std::string* error) { in set_error() argument 33 if (error) { in set_error() 34 *error = strerror(errno); in set_error() 58 static int _network_loopback_client(bool ipv6, int port, int type, std::string* error) { in _network_loopback_client() argument 61 set_error(error); in _network_loopback_client() 70 set_error(error); in _network_loopback_client() 77 set_error(error); in _network_loopback_client() 84 int network_loopback_client(int port, int type, std::string* error) { in network_loopback_client() argument 86 int rc = _network_loopback_client(false, port, type, error); in network_loopback_client() 88 return _network_loopback_client(true, port, type, error); in network_loopback_client() [all …]
|
/system/core/run-as/ |
D | run-as.cpp | 76 error(1, errno, "couldn't stat %s", path); in check_directory() 84 error(1, 0, "%s not a directory: %o", path, st.st_mode); in check_directory() 89 error(1, 0, "%s has wrong owner: %d/%d, not %d", path, st.st_uid, st.st_gid, uid); in check_directory() 94 error(1, 0, "%s readable or writable by others: %o", path, st.st_mode); in check_directory() 105 error(1, 0, "%s data path not absolute: %s", package_name, data_path); in check_data_path() 122 error(1, 0, "%s data path too long: %s", package_name, data_path); in check_data_path() 130 error(1, 0, "%s contains '..': %s", package_name, data_path); in check_data_path() 149 error(1, errno, "getgroups failed"); in get_supplementary_gids() 154 error(1, errno, "getgroups failed"); in get_supplementary_gids() 167 error(1, 0, "usage: run-as <package-name> [--user <uid>] <command> [<args>]\n"); in main() [all …]
|
/system/keymaster/android_keymaster/ |
D | android_keymaster.cpp | 81 response->error = KM_ERROR_UNSUPPORTED_ALGORITHM; in check_supported() 94 rsp->error = KM_ERROR_OK; in GetVersion() 102 response->error = KM_ERROR_OK; in SupportedAlgorithms() 111 response->error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in SupportedAlgorithms() 124 response->error = KM_ERROR_UNSUPPORTED_PURPOSE; in GetSupported() 177 response.error = KM_ERROR_UNIMPLEMENTED; in GetHmacSharingParameters() 181 response.error = policy->GetHmacSharingParameters(&response.params); in GetHmacSharingParameters() 190 response.error = KM_ERROR_UNIMPLEMENTED; in ComputeSharedHmac() 194 response.error = policy->ComputeSharedHmac(request.params_array, &response.sharing_check); in ComputeSharedHmac() 203 response.error = KM_ERROR_UNIMPLEMENTED; in VerifyAuthorization() [all …]
|
/system/core/fastboot/ |
D | udp.cpp | 106 std::string* error); 118 bool InitializeProtocol(std::string* error); 126 size_t rx_length, int attempts, std::string* error); 132 std::string* error); 143 std::string* error) { in NewTransport() argument 146 if (!transport->InitializeProtocol(error)) { in NewTransport() 153 bool UdpTransport::InitializeProtocol(std::string* error) { in InitializeProtocol() argument 162 kMaxConnectAttempts, error); in InitializeProtocol() 166 *error = "invalid query response from target"; in InitializeProtocol() 176 kMaxTransmissionAttempts, error); in InitializeProtocol() [all …]
|