/aosp12/system/tools/aidl/tests/golden_output/aidl-test-interface-rust-source/gen/android/aidl/tests/ |
H A D | ITestService.rs | 75 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in UnimplementedMethod() 78 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in Deprecated() 81 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in TestOneway() 84 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatBoolean() 87 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatByte() 90 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatChar() 93 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatInt() 96 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatLong() 99 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatFloat() 102 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RepeatDouble() [all …]
|
H A D | INamedCallback.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in GetName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in GetName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in GetName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
H A D | INewName.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RealName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in RealName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in RealName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
H A D | IOldName.rs | 24 Err(binder::StatusCode::UNKNOWN_TRANSACTION.into()) in RealName() 41 if let Err(binder::StatusCode::UNKNOWN_TRANSACTION) = _aidl_reply { in RealName() 48 if !_aidl_status.is_ok() { return Err(_aidl_status); } in RealName() 65 Err(_aidl_status) => _aidl_reply.write(_aidl_status)? in on_transact() 69 _ => Err(binder::StatusCode::UNKNOWN_TRANSACTION) in on_transact()
|
/aosp12/system/security/keystore2/src/ |
H A D | error.rs | 203 Err(BinderStatus::new_service_specific_error(rc, None)) in map_err_with() 239 Err(anyhow!(Error::Rc(rc))).context("nested nested rc") in nested_nested_rc() 247 Err(anyhow!(Error::Km(ec))).context("nested nested ec") in nested_nested_ec() 285 Err(BinderStatus::new_service_specific_error(sse, None)) in binder_sse_error() 289 Err(BinderStatus::new_exception(ex, None)) in binder_exception() 303 Result::<(), i32>::Err(rc), in keystore_error_test() 313 Result::<(), i32>::Err(ec), in keystore_error_test() 323 Result::<(), i32>::Err(ec), in keystore_error_test() 327 |_| Err(BinderStatus::ok()) in keystore_error_test() 340 Result::<(), ResponseCode>::Err(ResponseCode::SYSTEM_ERROR), in keystore_error_test() [all …]
|
H A D | legacy_migrator.rs | 187 return Err(Error::sys()).context( in check_state() 232 Err(e) => return Some(Err(e)), in do_serialized() 261 if let Err(e) = sender.send((new_state, result)) { in do_serialized() 267 Err(e) => { in do_serialized() 300 Err(e) => match e.root_cause().downcast_ref::<Error>() { in with_try_migrate() 302 _ => return Err(e), in with_try_migrate() 320 return Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)) in with_try_migrate() 354 Err(e) => return Err(e), in with_try_migrate_super_key() 543 Err(Error::Rc(ResponseCode::KEY_NOT_FOUND)) in check_and_migrate() 559 Err(e) => Err(e), in check_and_migrate() [all …]
|
H A D | operation.rs | 265 _ => return Err(Error::Km(ErrorCode::INVALID_OPERATION_HANDLE)), in prune() 267 Err(_) => return Err(Error::Rc(ResponseCode::OPERATION_BUSY)), in prune() 281 return Err(Error::Rc(ResponseCode::OPERATION_BUSY)); in prune() 288 Err(e) => { in prune() 290 return Err(Error::sys()); in prune() 297 if let Err(e) = map_km_error(km_op.abort()) { in prune() 316 Err(Error::Km(e)) => *locked_outcome = Outcome::ErrorCode(*e), in update_outcome() 345 return Err(anyhow!(Error::Rc(ResponseCode::TOO_MUCH_DATA))); in check_input_length() 489 if let Err(e) = self.abort(Outcome::Dropped) { in drop() 778 None => break Err(Error::Rc(ResponseCode::BACKEND_BUSY)), in prune() [all …]
|
H A D | enforcements.rs | 233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request() 301 Err(TryRecvError::Empty) => break, in before_finish() 302 Err(TryRecvError::Disconnected) => { in before_finish() 434 return Err(Error::Km(Ec::INCOMPATIBLE_PURPOSE)) in authorize_create() 466 return Err(Error::Km(Ec::UNSUPPORTED_PURPOSE)) in authorize_create() 519 return Err(Error::Km(Ec::KEY_EXPIRED)) in authorize_create() 527 return Err(Error::Km(Ec::KEY_EXPIRED)) in authorize_create() 566 return Err(Error::Km(Ec::INCOMPATIBLE_PURPOSE)) in authorize_create() 603 return Err(Error::Km(Ec::DEVICE_LOCKED)) in authorize_create() 610 return Err(Error::Km(Ec::BOOT_LEVEL_EXCEEDED)) in authorize_create() [all …]
|
H A D | legacy_blob.rs | 294 return Err(Error::BadEncoding) in decode_alias() 333 return Err(Error::BadLen).context(format!( in new_from_stream() 633 Err(e) => match e.kind() { in read_generic_blob() 688 Err(e) => match e.kind() { in list_legacy_keystore_entries_for_uid() 691 return Err(e).context(format!( in list_legacy_keystore_entries_for_uid() 851 Err(e) => match e.kind() { in list_user() 854 return Err(e).context(format!( in list_user() 929 Err(e) => match e.kind() { in with_retry_interrupted() 931 _ => return Err(e), in with_retry_interrupted() 1205 Err(anyhow!("should not be called")) in read_golden_key_blob_test() [all …]
|
H A D | apc.rs | 113 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err() 235 if let Err(e) = state.confirmation_token_sender.send(confirmation_token.to_vec()) { in result() 257 if let Err(e) = listener.onCompleted(rc, data_confirmed) { in result() 278 return Err(Error::pending()) in present_prompt() 288 return Err(Error::sys()).context(format!( in present_prompt() 299 return Err(Error::unimplemented()) in present_prompt() 333 return Err(Error::ignored()) in cancel_prompt() 338 return Err(Error::ignored()).context(concat!( in cancel_prompt()
|
H A D | shared_secret_negotiation.rs | 181 Err(e) => { in connect_participants() 213 Err(e) => { in connect_participants() 259 Err(e) => { in negotiate_shared_secret() 278 Err(SharedSecretError::Checksum(p)) in negotiate_shared_secret() 281 (_, Err(e)) => Err(SharedSecretError::Computation { e, p }), in negotiate_shared_secret() 285 if let Err(e) = negotiation_result { in negotiate_shared_secret()
|
H A D | security_level.rs | 232 return Err(Error::sys()).context(concat!( in create_operation() 281 Err(Error::Km(ErrorCode::INVALID_ARGUMENT)) in create_operation() 285 _ => Err(Error::Km(ErrorCode::INVALID_ARGUMENT)) in create_operation() 364 return Err(Error::sys()).context(concat!( in create_operation() 500 return Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in generate_key() 617 return Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in import_key() 650 v => Err(error::Error::Km(ErrorCode::INVALID_ARGUMENT)) in import_key() 836 Err(Error::Km(ErrorCode::KEY_REQUIRES_UPGRADE)) => { in upgrade_keyblob_if_required_with() 863 Err(e) => Err(e).context(concat!( in upgrade_keyblob_if_required_with() 955 Err(e) => Err(e) in convert_storage_key_to_ephemeral() [all …]
|
/aosp12/system/security/keystore2/src/crypto/ |
H A D | lib.rs | 55 Err(Error::RandomNumberGenerationFailed) in generate_aes256_key() 71 Err(Error::RandomNumberGenerationFailed) in generate_random_data() 88 _ => return Err(Error::InvalidIvLength), in aes_gcm_decrypt() 116 false => Err(Error::DecryptionFailed), in aes_gcm_decrypt() 154 Err(Error::EncryptionFailed) in aes_gcm_encrypt() 240 return Err(Error::HKDFExtractFailed); in hkdf_extract() 244 return Err(Error::HKDFExtractFailed); in hkdf_extract() 261 return Err(Error::HKDFExpandFailed); in hkdf_expand() 390 return Err(Error::ECPoint2OctFailed); in ec_point_point_to_oct() 394 return Err(Error::ECPoint2OctFailed); in ec_point_point_to_oct() [all …]
|
/aosp12/system/libbase/include/android-base/ |
H A D | expected.h | 610 template <class Err = E _ENABLE_IF( 615 constexpr unexpected(Err&& e) : val_(std::forward<Err>(e)) {} in unexpected() 623 template<class Err _ENABLE_IF( 624 std::is_constructible_v<E, Err> && 639 template<class Err _ENABLE_IF( 640 std::is_constructible_v<E, Err> && 654 template<class Err _ENABLE_IF( 655 std::is_constructible_v<E, Err> && 670 template<class Err _ENABLE_IF( 689 template<class Err = E> [all …]
|
/aosp12/build/soong/finder/fs/ |
H A D | fs.go | 285 Err: link.readErr, 308 Err: os.ErrInvalid, 315 Err: os.ErrNotExist, 322 Err: file.readErr, 344 Err: os.ErrNotExist, 489 Err: os.ErrNotExist, 546 Err: dir.readErr, 580 Err: os.ErrNotExist, 718 Err: readErr, 794 Err: os.ErrExist, [all …]
|
/aosp12/system/bt/gd/rust/linux/mgmt/src/bin/btmanagerd/ |
H A D | main.rs | 52 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed( in main() 67 Err(_) => { in main() 68 ctx.reply(Err(dbus_crossroads::MethodErr::failed("cannot stop Bluetooth"))) in main() 98 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed(&format!( in main() 117 Err(_) => ctx.reply(Err(dbus_crossroads::MethodErr::failed(&format!( in main()
|
/aosp12/system/bt/gd/rust/hci/custom_types/ |
H A D | lib.rs | 52 Err(_) => Err(InvalidAddressError), in try_from() 55 Err(InvalidAddressError) in try_from() 96 Err(_) => Err(InvalidClassOfDeviceError), in try_from() 99 Err(InvalidClassOfDeviceError) in try_from()
|
/aosp12/frameworks/compile/slang/ |
H A D | llvm-rs-as.cpp | 131 SMDiagnostic Err; in main() local 132 std::unique_ptr<Module> M(parseAssemblyFile(InputFilename, Err, Context)); in main() 134 Err.print(argv[0], errs()); in main() 139 std::string Err; in main() local 140 raw_string_ostream stream(Err); in main() 144 errs() << Err; in main()
|
/aosp12/frameworks/native/libs/binder/rust/tests/ |
H A D | ndk_rust_interop.rs | 40 Err(e) => { in rust_call_ndk() 53 Err(e) => return e.into(), in rust_call_ndk() 60 Err(e) if e == StatusCode::BAD_TYPE => {} in rust_call_ndk() 61 Err(e) => { in rust_call_ndk() 95 Err(e) => e as c_int, in rust_start_service()
|
/aosp12/frameworks/native/libs/binder/rust/src/ |
H A D | parcel.rs | 231 return Err(StatusCode::UNEXPECTED_NULL); in resize_out_vec() 361 assert_eq!(parcel.read::<bool>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 362 assert_eq!(parcel.read::<i8>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 363 assert_eq!(parcel.read::<u16>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 364 assert_eq!(parcel.read::<i32>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 365 assert_eq!(parcel.read::<u32>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 366 assert_eq!(parcel.read::<i64>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 367 assert_eq!(parcel.read::<u64>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 368 assert_eq!(parcel.read::<f32>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() 369 assert_eq!(parcel.read::<f64>(), Err(StatusCode::NOT_ENOUGH_DATA)); in test_read_write() [all …]
|
/aosp12/system/security/keystore2/selinux/src/ |
H A D | lib.rs | 178 return Err(anyhow!(Error::sys("Failed to open KeystoreKeyBackend"))); in new() 212 Err(anyhow!(Error::sys(format!( in lookup() 218 _ => Err(anyhow!(io::Error::last_os_error())) in lookup() 241 Err(anyhow!(Error::sys("getcon returned a NULL context"))) in getcon() 244 _ => Err(anyhow!(io::Error::last_os_error())).context("getcon failed"), in getcon() 265 Err(anyhow!(Error::sys(format!( in getpidcon() 271 _ => Err(anyhow!(io::Error::last_os_error())) in getpidcon() 308 io::ErrorKind::PermissionDenied => Err(anyhow!(Error::perm())), in check_access() 309 _ => Err(anyhow!(e)), in check_access() 341 c => Err(anyhow!(format!( in check_context()
|
/aosp12/frameworks/native/vulkan/libvulkan/ |
H A D | driver_gen.cpp | 37 … Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkCreateSwapchainKHR not executed."); in checkedCreateSwapchainKHR() 46 … Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkDestroySwapchainKHR not executed."); in checkedDestroySwapchainKHR() 54 … Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkGetSwapchainImagesKHR not executed."); in checkedGetSwapchainImagesKHR() 63 … Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkAcquireNextImageKHR not executed."); in checkedAcquireNextImageKHR() 72 Logger(queue).Err(queue, "VK_KHR_swapchain not enabled. vkQueuePresentKHR not executed."); in checkedQueuePresentKHR() 81 Logger(device).Err(device, "VK_VERSION_1_1 not enabled. vkBindImageMemory2 not executed."); in checkedBindImageMemory2() 90 …Logger(device).Err(device, "VK_KHR_bind_memory2 not enabled. vkBindImageMemory2KHR not executed."); in checkedBindImageMemory2KHR() 99 …Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkGetDeviceGroupPresentCapabilitiesKHR n… in checkedGetDeviceGroupPresentCapabilitiesKHR() 117 … Logger(device).Err(device, "VK_KHR_swapchain not enabled. vkAcquireNextImage2KHR not executed."); in checkedAcquireNextImage2KHR() 126 … Logger(device).Err(device, "VK_EXT_hdr_metadata not enabled. vkSetHdrMetadataEXT not executed."); in checkedSetHdrMetadataEXT() [all …]
|
/aosp12/system/bt/gd/rust/hal/src/ |
H A D | snoop.rs | 69 type Err = SnoopModeParseError; typedef 71 fn from_str(s: &str) -> Result<Self, Self::Err> { in from_str() argument 76 _ => Err(SnoopModeParseError), in from_str() 146 if let Err(e) = evt_up_tx.send(evt.clone()).await { in provide_snooped_hal() 153 if let Err(e) = raw_hal.cmd_tx.send(cmd.clone()) { in provide_snooped_hal() 160 if let Err(e) = raw_hal.acl_tx.send(acl.clone()) { in provide_snooped_hal() 167 if let Err(e) = acl_up_tx.send(acl.clone()).await { in provide_snooped_hal() 174 if let Err(e) = raw_hal.iso_tx.send(iso.clone()) { in provide_snooped_hal() 181 if let Err(e) = iso_up_tx.send(iso.clone()).await { in provide_snooped_hal()
|
/aosp12/packages/modules/DnsResolver/ |
H A D | doh.rs | 118 return Err(anyhow!("no domain")); in new_with_socket() 175 Err(e) => { in doh_handler() 182 Err(e) => { in doh_handler() 240 Err(e) => { in doh_handler() 322 Err(quiche::h3::Error::Done) => { in recv_query() 326 Err(e) => { in recv_query() 339 Err(quiche::Error::Done) => { in flush_tx() 343 Err(e) => { in flush_tx() 429 Err(e) => { in doh_new() 462 if let Err(e) = doh.query(cmd) { in doh_query() [all …]
|
/aosp12/packages/modules/Virtualization/virtmanager/src/ |
H A D | aidl.rs | 65 Err(e) => { in startVm() 67 Err(StatusCode::BAD_VALUE) in startVm() 72 Err(StatusCode::UNKNOWN_ERROR) in startVm() 93 return Err(StatusCode::PERMISSION_DENIED.into()); in debugListVms() 115 return Err(StatusCode::PERMISSION_DENIED.into()); in debugHoldVmRef() 128 return Err(StatusCode::PERMISSION_DENIED.into()); in debugDropVmRef() 194 if let Err(e) = callback.onDied(cid as i32) { in callback_on_died()
|