/trusty/user/base/lib/keybox/client/ |
D | client.c | 66 struct full_keybox_unwrap_response rsp; in keybox_unwrap() local 67 rc = tipc_recv2(chan, sizeof(rsp.header), &rsp, sizeof(rsp), in keybox_unwrap() 73 if (rsp.header.status != KEYBOX_STATUS_SUCCESS) { in keybox_unwrap() 74 rc = rsp.header.status; in keybox_unwrap() 78 if ((size_t)rc < sizeof(rsp)) { in keybox_unwrap() 84 if (__builtin_add_overflow(rsp.unwrap_header.unwrapped_keybox_len, in keybox_unwrap() 85 sizeof(rsp), &computed_size)) { in keybox_unwrap() 95 *unwrapped_keybox_size = rsp.unwrap_header.unwrapped_keybox_len; in keybox_unwrap()
|
/trusty/user/app/sample/hwcrypto/keybox/ |
D | srv.c | 67 struct full_keybox_unwrap_resp rsp = { in keybox_handle_unwrap() local 73 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap() 80 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap() 84 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap() 88 rsp.header.status = keybox_unwrap( in keybox_handle_unwrap() 90 sizeof(output), (size_t*)&rsp.unwrap_header.unwrapped_keybox_len); in keybox_handle_unwrap() 91 if (rsp.header.status != KEYBOX_STATUS_SUCCESS) { in keybox_handle_unwrap() 95 return tipc_send2(chan, &rsp, sizeof(rsp), output, in keybox_handle_unwrap() 96 rsp.unwrap_header.unwrapped_keybox_len); in keybox_handle_unwrap() 99 return tipc_send1(chan, &rsp, sizeof(rsp.header)); in keybox_handle_unwrap() [all …]
|
/trusty/user/app/sample/app-mgmt-test/port-waiter-srv/ |
D | main.c | 85 uint8_t rsp; in main() local 86 rc = tipc_recv1(shandle, sizeof(rsp), &rsp, sizeof(rsp)); in main() 87 if (rc != (int)sizeof(rsp)) { in main() 92 TLOGI("Received exit response: %" PRIu8 "\n", rsp); in main() 94 rc = tipc_send1(chandle, &rsp, sizeof(rsp)); in main() 95 if (rc != (int)sizeof(rsp)) { in main()
|
/trusty/user/base/lib/hwwsk/ |
D | client.c | 60 struct hwwsk_rsp_hdr rsp; in handle_reply() local 66 rc = tipc_recv2(chan, sizeof(rsp), &rsp, sizeof(rsp), buf, buf_size); in handle_reply() 73 if (rsp.status != 0) { in handle_reply() 74 rc = hwwsk_err_to_lk_err(rsp.status); in handle_reply() 79 if (((size_t)rc - sizeof(rsp)) > buf_size) { in handle_reply() 84 return (size_t)rc - sizeof(rsp); in handle_reply()
|
/trusty/user/app/secretkeeper/ |
D | tests.rs | 67 let rsp: SkMessage = session.recv(&mut buf).unwrap(); in bootloader_retrieve_key() localVariable 69 let rsp = bl::Response::from_slice(&rsp.0).unwrap(); in bootloader_retrieve_key() localVariable 70 expect!(matches!(rsp, bl::Response::IdentityKey(_))); in bootloader_retrieve_key() 71 if let bl::Response::IdentityKey(key) = rsp { in bootloader_retrieve_key()
|
D | lib.rs | 209 let rsp = self.ta.borrow().process_bootloader(&msg.0); in on_message() localVariable 210 handle.send(&SkMessage(rsp))?; in on_message()
|
/trusty/user/app/sample/app-mgmt-test/port-start-srv/ |
D | main.c | 36 uint8_t rsp = RSP_OK; in handle_cmd() local 45 rsp = RSP_CMD_FAILED; in handle_cmd() 53 rsp = RSP_CMD_FAILED; in handle_cmd() 64 rsp = RSP_INVALID_CMD; in handle_cmd() 68 rc = tipc_send1(channel, &rsp, sizeof(rsp)); in handle_cmd()
|
/trusty/user/base/lib/storage/ |
D | storage.c | 283 struct storage_file_open_resp rsp = {0}; in storage_open_file() local 284 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_open_file() 291 if ((size_t)rc != sizeof(rsp)) { in storage_open_file() 293 (size_t)rc, sizeof(rsp)); in storage_open_file() 296 *handle_p = make_file_handle(session, rsp.handle); in storage_open_file() 600 struct storage_file_get_size_resp rsp; in storage_get_file_size() local 601 struct iovec rx[2] = {{&msg, sizeof(msg)}, {&rsp, sizeof(rsp)}}; in storage_get_file_size() 608 if ((size_t)rc != sizeof(rsp)) { in storage_get_file_size() 610 (size_t)rc, sizeof(rsp)); in storage_get_file_size() 614 *size_p = rsp.size; in storage_get_file_size()
|
/trusty/user/app/avb/ipc/ |
D | avb_ipc.cpp | 52 Response rsp; in ExecuteCommand() local 53 (g_avb_manager->*operation)(req, &rsp); in ExecuteCommand() 55 *error = rsp.get_error(); in ExecuteCommand() 56 *out_size = rsp.GetSerializedSize(); in ExecuteCommand() 73 if (rsp.Serialize(out_buf->get(), out_buf->get() + *out_size) != in ExecuteCommand()
|
/trusty/user/app/keymaster/ipc/ |
D | keymaster_ipc.cpp | 177 static long serialize_response(Response& rsp, in serialize_response() argument 180 *out_size = rsp.SerializedSize(); in serialize_response() 188 rsp.Serialize(out->get(), out->get() + *out_size); in serialize_response() 206 Response rsp(device->message_version()); in do_dispatch() local 207 (device->*operation)(req, &rsp); in do_dispatch() 208 LOG_D("do_dispatch #1 err: %d", rsp.error); in do_dispatch() 211 device->set_configure_error(rsp.error); in do_dispatch() 214 err = serialize_response(rsp, out, out_size); in do_dispatch() 241 Response rsp = ((device->*operation)(req)); in do_dispatch() local 242 LOG_D("do_dispatch #2 err: %d", rsp.error); in do_dispatch() [all …]
|
/trusty/user/app/gatekeeper/ipc/ |
D | gatekeeper_ipc.cpp | 69 Response rsp; in exec_cmd() local 70 (device->*operation)(req, &rsp); in exec_cmd() 72 if (rsp.error == ERROR_NOT_IMPLEMENTED) { in exec_cmd() 76 *out_size = rsp.GetSerializedSize(); in exec_cmd() 89 if (rsp.Serialize(out_buf->get(), out_buf->get() + *out_size) != in exec_cmd()
|
/trusty/user/app/sample/app-mgmt-test/client/ |
D | main.c | 109 uint8_t rsp; in chan_send_cmd() local 118 ASSERT_EQ(sizeof(rsp), tipc_recv1(chan, sizeof(rsp), &rsp, sizeof(rsp))); in chan_send_cmd() 119 ASSERT_EQ(RSP_OK, rsp); in chan_send_cmd() 384 uint8_t rsp; in TEST() local 424 ASSERT_EQ(sizeof(rsp), tipc_recv1(chan, sizeof(rsp), &rsp, sizeof(rsp))); in TEST() 425 ASSERT_EQ(RSP_OK, rsp); in TEST()
|
/trusty/user/app/keymint/ |
D | ipc_manager.rs | 678 fn check_response_status(rsp: &KMMessage) -> Result<(), ErrorCode> { in check_response_status() 679 let error_code = legacy::deserialize_trusty_rsp_error_code(&rsp.0) in check_response_status()
|