/trusty/user/app/keymaster/ |
D | trusty_keymaster.h | 53 void SetBootParams(const SetBootParamsRequest& request, 58 void SetAttestationKey(const SetAttestationKeyRequest& request, 63 void SetWrappedAttestationKey(const SetAttestationKeyRequest& request, 67 void DestroyAttestationIds(const DestroyAttestationIdsRequest& request, 73 void SetAttestationIds(const SetAttestationIdsRequest& request, 79 void SetAttestationIdsKM3(const SetAttestationIdsKM3Request& request, 85 const ClearAttestationCertChainRequest& request, 93 const AppendAttestationCertChainRequest& request, 99 void AtapGetCaRequest(const AtapGetCaRequestRequest& request, 107 void AtapSetCaResponseBegin(const AtapSetCaResponseBeginRequest& request, [all …]
|
D | trusty_keymaster.cpp | 71 void TrustyKeymaster::SetBootParams(const SetBootParamsRequest& request, in SetBootParams() argument 77 request.os_version, request.os_patchlevel, in SetBootParams() 78 request.verified_boot_key, request.verified_boot_state, in SetBootParams() 79 request.device_locked, request.verified_boot_hash); in SetBootParams() 94 void TrustyKeymaster::SetAttestationKey(const SetAttestationKeyRequest& request, in SetAttestationKey() argument 105 size_t key_size = request.key_data.buffer_size(); in SetAttestationKey() 106 const uint8_t* key = request.key_data.begin(); in SetAttestationKey() 109 key_slot = keymaster_algorithm_to_key_slot(request.algorithm); in SetAttestationKey() 122 const DestroyAttestationIdsRequest& request, in DestroyAttestationIds() argument 135 void TrustyKeymaster::SetAttestationIds(const SetAttestationIdsRequest& request, in SetAttestationIds() argument [all …]
|
D | secure_storage_manager.cpp | 466 const SetAttestationIdsRequest& request) { in ValidateAndSetBaseAttestationIds() argument 473 if (request.brand.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds() 474 LOG_E("Error: Brand ID too large: %zu", request.brand.buffer_size()); in ValidateAndSetBaseAttestationIds() 476 } else if (request.brand.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds() 478 attestation_ids->brand.size = request.brand.buffer_size(); in ValidateAndSetBaseAttestationIds() 479 memcpy(attestation_ids->brand.bytes, request.brand.begin(), in ValidateAndSetBaseAttestationIds() 480 request.brand.buffer_size()); in ValidateAndSetBaseAttestationIds() 483 if (request.device.buffer_size() > kAttestationIdLengthMax) { in ValidateAndSetBaseAttestationIds() 484 LOG_E("Error: Device ID too large: %zu", request.device.buffer_size()); in ValidateAndSetBaseAttestationIds() 486 } else if (request.device.buffer_size() > 0) { in ValidateAndSetBaseAttestationIds() [all …]
|
D | secure_storage_manager.h | 178 const SetAttestationIdsRequest& request); 189 const SetAttestationIdsKM3Request& request);
|
D | openssl_keymaster_enforcement.h | 52 const VerifyAuthorizationRequest& request) override;
|
D | openssl_keymaster_enforcement.cpp | 209 const VerifyAuthorizationRequest& request) { in VerifyAuthorization() argument 215 VerifyAuthorizationResponse response(request.message_version); in VerifyAuthorization() 216 response.token.challenge = request.challenge; in VerifyAuthorization()
|
/trusty/user/app/avb/ |
D | avb_manager.h | 41 void ReadRollbackIndex(const RollbackIndexRequest& request, 43 void WriteRollbackIndex(const RollbackIndexRequest& request, 48 void GetVersion(const GetVersionRequest& request, 52 void ReadPermanentAttributes(const ReadPermanentAttributesRequest& request, 55 const WritePermanentAttributesRequest& request, 57 void ReadLockState(const ReadLockStateRequest& request, 59 void WriteLockState(const WriteLockStateRequest& request,
|
D | avb_manager.cpp | 67 void AvbManager::ReadRollbackIndex(const RollbackIndexRequest& request, in ReadRollbackIndex() argument 71 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in ReadRollbackIndex() 73 TLOGE("Error: Invalid slot value: %u\n", request.get_slot()); in ReadRollbackIndex() 119 void AvbManager::WriteRollbackIndex(const RollbackIndexRequest& request, in WriteRollbackIndex() argument 123 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in WriteRollbackIndex() 125 TLOGE("Error: Invalid slot value: %u\n", request.get_slot()); in WriteRollbackIndex() 144 uint64_t request_value = request.get_value(); in WriteRollbackIndex() 185 void AvbManager::GetVersion(const GetVersionRequest& request, in GetVersion() argument 191 const ReadPermanentAttributesRequest& request, in ReadPermanentAttributes() argument 214 const WritePermanentAttributesRequest& request, in WritePermanentAttributes() argument [all …]
|
D | README.md | 14 Rollback indexes are strictly increasing, and any request to write a value to a 37 Once the AVB resource manager receives a LOCK_BOOT_STATE request, all requests
|
/trusty/user/app/avb/test/ |
D | unittest.cpp | 26 RollbackIndexRequest request(slot, value); in TEST() local 29 avb_manager.ReadRollbackIndex(request, &response); in TEST() 37 RollbackIndexRequest request(slot, value); in TEST() local 40 avb_manager.WriteRollbackIndex(request, &response); in TEST() 48 RollbackIndexRequest request(slot, value); in TEST() local 51 avb_manager.WriteRollbackIndex(request, &response); in TEST() 61 RollbackIndexRequest request(slot, value); in TEST() local 64 avb_manager.ReadRollbackIndex(request, &response); in TEST() 72 RollbackIndexRequest request(slot, value); in TEST() local 75 avb_manager.ReadRollbackIndex(request, &response); in TEST() [all …]
|
/trusty/user/base/lib/smc/tests/ |
D | smc_test.c | 64 struct smc_msg request = { in TEST_F() local 69 rc = smc_send_request(_state->channel, &request); in TEST_F() 84 struct smc_msg request = { in TEST_F() local 95 rc = smc_send_request(channel1, &request); in TEST_F() 98 rc = smc_send_request(channel2, &request); in TEST_F() 118 struct smc_msg request = { in TEST_F() local 124 rc = smc_send_request(_state->channel, &request); in TEST_F() 137 struct smc_msg request = { in TEST_F() local 143 rc = smc_send_request(_state->channel, &request); in TEST_F() 155 struct smc_msg request = { in TEST_F() local [all …]
|
/trusty/kernel/platform/generic-arm64/ |
D | smc_service_access_policy.c | 63 const struct smc_msg* request) { in smc_test_request_check() argument 66 request->params[1] != SMC_ACCESS_CONTROL_ALLOW_ARGS) { in smc_test_request_check() 71 if (request->params[1] == SMC_ACCESS_CONTROL_VALIDATE_ARGS) { in smc_test_request_check() 76 paddr_t paddr = request->params[2]; in smc_test_request_check() 91 const struct smc_msg* request) { in default_request_check() argument
|
/trusty/kernel/services/smc/ |
D | smc_service.c | 95 struct smc_msg request; in smc_service_handle_msg() local 100 rc = ktipc_recv(channel, sizeof(request), &request, sizeof(request)); in smc_service_handle_msg() 101 if ((size_t)rc != sizeof(request)) { in smc_service_handle_msg() 106 smc_nr = (uint32_t)request.params[0]; in smc_service_handle_msg() 122 &request); in smc_service_handle_msg() 133 .r0 = (ulong)request.params[0], in smc_service_handle_msg() 134 .r1 = (ulong)request.params[1], in smc_service_handle_msg() 135 .r2 = (ulong)request.params[2], in smc_service_handle_msg() 136 .r3 = (ulong)request.params[3], in smc_service_handle_msg()
|
/trusty/user/base/app/acvp/ |
D | acvp.cpp | 251 struct acvp_req** request, in ParseAcvpMessage() argument 296 *request = (struct acvp_req*)buffer; in ParseAcvpMessage() 378 struct acvp_req* request = nullptr; in AcvpOnMessage() local 380 int rc = ParseAcvpMessage(chan, message_buffer, &request, &shared_mem); in AcvpOnMessage() 386 if (request->num_args > bssl::acvp::kMaxArgs) { in AcvpOnMessage() 387 TLOGE("Too many args in ACVP message: %d\n", request->num_args); in AcvpOnMessage() 391 if (!tool->MapShm(shared_mem, request->buffer_size)) { in AcvpOnMessage() 402 for (uint32_t i = 0; i < request->num_args; ++i) { in AcvpOnMessage() 404 if (__builtin_add_overflow(cur_offset, request->lengths[i], &end) || in AcvpOnMessage() 410 request->lengths[i]); in AcvpOnMessage() [all …]
|
/trusty/user/app/sample/stats-test/consumer/ |
D | consumer.cpp | 156 ConsumerCtlMsg request; in test_ctl_on_message() local 160 .iov_base = &request, in test_ctl_on_message() 161 .iov_len = sizeof(request), in test_ctl_on_message() 184 if (static_cast<size_t>(rc) != sizeof(request)) { in test_ctl_on_message() 191 switch (request.cmd) { in test_ctl_on_message() 210 TLOGE("Invalid cmd %d\n", request.cmd); in test_ctl_on_message()
|
/trusty/kernel/services/smc/include/services/smc/ |
D | acl.h | 39 const struct smc_msg* request);
|
/trusty/host/common/scripts/metrics_atoms_protoc_plugin/ |
D | metrics_atoms_protoc_plugin.py | 360 request = plugin.CodeGeneratorRequest() 361 request.ParseFromString(data) 364 options = request.parameter.split(',') if request.parameter else [] 384 for proto_file in request.proto_file:
|
/trusty/user/base/lib/hwkey/rust/src/ |
D | lib.rs | 135 self.0.send(&HwkeyMsg { msg: req_msg, request: slot_id })?; in get_keyslot_data() 516 request: &'a [u8], field 533 serializer.serialize_bytes(self.request) in serialize()
|