Home
last modified time | relevance | path

Searched refs:request (Results 1 – 18 of 18) sorted by relevance

/trusty/user/app/keymaster/
Dtrusty_keymaster.h53 void SetBootParams(const SetBootParamsRequest& request,
58 void SetAttestationKey(const SetAttestationKeyRequest& request,
63 void SetWrappedAttestationKey(const SetAttestationKeyRequest& request,
67 void DestroyAttestationIds(const DestroyAttestationIdsRequest& request,
73 void SetAttestationIds(const SetAttestationIdsRequest& request,
79 void SetAttestationIdsKM3(const SetAttestationIdsKM3Request& request,
85 const ClearAttestationCertChainRequest& request,
93 const AppendAttestationCertChainRequest& request,
99 void AtapGetCaRequest(const AtapGetCaRequestRequest& request,
107 void AtapSetCaResponseBegin(const AtapSetCaResponseBeginRequest& request,
[all …]
Dtrusty_keymaster.cpp71 void TrustyKeymaster::SetBootParams(const SetBootParamsRequest& request, in SetBootParams() argument
77 request.os_version, request.os_patchlevel, in SetBootParams()
78 request.verified_boot_key, request.verified_boot_state, in SetBootParams()
79 request.device_locked, request.verified_boot_hash); in SetBootParams()
94 void TrustyKeymaster::SetAttestationKey(const SetAttestationKeyRequest& request, in SetAttestationKey() argument
105 size_t key_size = request.key_data.buffer_size(); in SetAttestationKey()
106 const uint8_t* key = request.key_data.begin(); in SetAttestationKey()
109 key_slot = keymaster_algorithm_to_key_slot(request.algorithm); in SetAttestationKey()
122 const DestroyAttestationIdsRequest& request, in DestroyAttestationIds() argument
135 void TrustyKeymaster::SetAttestationIds(const SetAttestationIdsRequest& request, in SetAttestationIds() argument
[all …]
Dsecure_storage_manager.cpp466 const SetAttestationIdsRequest& request) { in ValidateAndSetBaseAttestationIds() argument
473 if (request.brand.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds()
474 LOG_E("Error: Brand ID too large: %zu", request.brand.buffer_size()); in ValidateAndSetBaseAttestationIds()
476 } else if (request.brand.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds()
478 attestation_ids->brand.size = request.brand.buffer_size(); in ValidateAndSetBaseAttestationIds()
479 memcpy(attestation_ids->brand.bytes, request.brand.begin(), in ValidateAndSetBaseAttestationIds()
480 request.brand.buffer_size()); in ValidateAndSetBaseAttestationIds()
483 if (request.device.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds()
484 LOG_E("Error: Device ID too large: %zu", request.device.buffer_size()); in ValidateAndSetBaseAttestationIds()
486 } else if (request.device.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds()
[all …]
Dsecure_storage_manager.h178 const SetAttestationIdsRequest& request);
189 const SetAttestationIdsKM3Request& request);
Dopenssl_keymaster_enforcement.h52 const VerifyAuthorizationRequest& request) override;
Dopenssl_keymaster_enforcement.cpp209 const VerifyAuthorizationRequest& request) { in VerifyAuthorization() argument
215 VerifyAuthorizationResponse response(request.message_version); in VerifyAuthorization()
216 response.token.challenge = request.challenge; in VerifyAuthorization()
/trusty/user/app/avb/
Davb_manager.h41 void ReadRollbackIndex(const RollbackIndexRequest& request,
43 void WriteRollbackIndex(const RollbackIndexRequest& request,
48 void GetVersion(const GetVersionRequest& request,
52 void ReadPermanentAttributes(const ReadPermanentAttributesRequest& request,
55 const WritePermanentAttributesRequest& request,
57 void ReadLockState(const ReadLockStateRequest& request,
59 void WriteLockState(const WriteLockStateRequest& request,
Davb_manager.cpp67 void AvbManager::ReadRollbackIndex(const RollbackIndexRequest& request, in ReadRollbackIndex() argument
71 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in ReadRollbackIndex()
73 TLOGE("Error: Invalid slot value: %u\n", request.get_slot()); in ReadRollbackIndex()
119 void AvbManager::WriteRollbackIndex(const RollbackIndexRequest& request, in WriteRollbackIndex() argument
123 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in WriteRollbackIndex()
125 TLOGE("Error: Invalid slot value: %u\n", request.get_slot()); in WriteRollbackIndex()
144 uint64_t request_value = request.get_value(); in WriteRollbackIndex()
185 void AvbManager::GetVersion(const GetVersionRequest& request, in GetVersion() argument
191 const ReadPermanentAttributesRequest& request, in ReadPermanentAttributes() argument
214 const WritePermanentAttributesRequest& request, in WritePermanentAttributes() argument
[all …]
DREADME.md14 Rollback indexes are strictly increasing, and any request to write a value to a
37 Once the AVB resource manager receives a LOCK_BOOT_STATE request, all requests
/trusty/user/app/avb/test/
Dunittest.cpp26 RollbackIndexRequest request(slot, value); in TEST() local
29 avb_manager.ReadRollbackIndex(request, &response); in TEST()
37 RollbackIndexRequest request(slot, value); in TEST() local
40 avb_manager.WriteRollbackIndex(request, &response); in TEST()
48 RollbackIndexRequest request(slot, value); in TEST() local
51 avb_manager.WriteRollbackIndex(request, &response); in TEST()
61 RollbackIndexRequest request(slot, value); in TEST() local
64 avb_manager.ReadRollbackIndex(request, &response); in TEST()
72 RollbackIndexRequest request(slot, value); in TEST() local
75 avb_manager.ReadRollbackIndex(request, &response); in TEST()
[all …]
/trusty/user/base/lib/smc/tests/
Dsmc_test.c64 struct smc_msg request = { in TEST_F() local
69 rc = smc_send_request(_state->channel, &request); in TEST_F()
84 struct smc_msg request = { in TEST_F() local
95 rc = smc_send_request(channel1, &request); in TEST_F()
98 rc = smc_send_request(channel2, &request); in TEST_F()
118 struct smc_msg request = { in TEST_F() local
124 rc = smc_send_request(_state->channel, &request); in TEST_F()
137 struct smc_msg request = { in TEST_F() local
143 rc = smc_send_request(_state->channel, &request); in TEST_F()
155 struct smc_msg request = { in TEST_F() local
[all …]
/trusty/kernel/platform/generic-arm64/
Dsmc_service_access_policy.c63 const struct smc_msg* request) { in smc_test_request_check() argument
66 request->params[1] != SMC_ACCESS_CONTROL_ALLOW_ARGS) { in smc_test_request_check()
71 if (request->params[1] == SMC_ACCESS_CONTROL_VALIDATE_ARGS) { in smc_test_request_check()
76 paddr_t paddr = request->params[2]; in smc_test_request_check()
91 const struct smc_msg* request) { in default_request_check() argument
/trusty/kernel/services/smc/
Dsmc_service.c95 struct smc_msg request; in smc_service_handle_msg() local
100 rc = ktipc_recv(channel, sizeof(request), &request, sizeof(request)); in smc_service_handle_msg()
101 if ((size_t)rc != sizeof(request)) { in smc_service_handle_msg()
106 smc_nr = (uint32_t)request.params[0]; in smc_service_handle_msg()
122 &request); in smc_service_handle_msg()
133 .r0 = (ulong)request.params[0], in smc_service_handle_msg()
134 .r1 = (ulong)request.params[1], in smc_service_handle_msg()
135 .r2 = (ulong)request.params[2], in smc_service_handle_msg()
136 .r3 = (ulong)request.params[3], in smc_service_handle_msg()
/trusty/user/base/app/acvp/
Dacvp.cpp251 struct acvp_req** request, in ParseAcvpMessage() argument
296 *request = (struct acvp_req*)buffer; in ParseAcvpMessage()
378 struct acvp_req* request = nullptr; in AcvpOnMessage() local
380 int rc = ParseAcvpMessage(chan, message_buffer, &request, &shared_mem); in AcvpOnMessage()
386 if (request->num_args > bssl::acvp::kMaxArgs) { in AcvpOnMessage()
387 TLOGE("Too many args in ACVP message: %d\n", request->num_args); in AcvpOnMessage()
391 if (!tool->MapShm(shared_mem, request->buffer_size)) { in AcvpOnMessage()
402 for (uint32_t i = 0; i < request->num_args; ++i) { in AcvpOnMessage()
404 if (__builtin_add_overflow(cur_offset, request->lengths[i], &end) || in AcvpOnMessage()
410 request->lengths[i]); in AcvpOnMessage()
[all …]
/trusty/user/app/sample/stats-test/consumer/
Dconsumer.cpp156 ConsumerCtlMsg request; in test_ctl_on_message() local
160 .iov_base = &request, in test_ctl_on_message()
161 .iov_len = sizeof(request), in test_ctl_on_message()
184 if (static_cast<size_t>(rc) != sizeof(request)) { in test_ctl_on_message()
191 switch (request.cmd) { in test_ctl_on_message()
210 TLOGE("Invalid cmd %d\n", request.cmd); in test_ctl_on_message()
/trusty/kernel/services/smc/include/services/smc/
Dacl.h39 const struct smc_msg* request);
/trusty/host/common/scripts/metrics_atoms_protoc_plugin/
Dmetrics_atoms_protoc_plugin.py360 request = plugin.CodeGeneratorRequest()
361 request.ParseFromString(data)
364 options = request.parameter.split(',') if request.parameter else []
384 for proto_file in request.proto_file:
/trusty/user/base/lib/hwkey/rust/src/
Dlib.rs135 self.0.send(&HwkeyMsg { msg: req_msg, request: slot_id })?; in get_keyslot_data()
516 request: &'a [u8], field
533 serializer.serialize_bytes(self.request) in serialize()