/trusty/user/app/storage/rpmb_dev/ |
D | rpmb_dev.c | 107 s->header.key = s->cmd[0].key_mac; in rpmb_dev_program_key() 143 uint16_t addr = rpmb_get_u16(s->cmd[0].address); in rpmb_dev_data_write() 164 write_counter = rpmb_get_u32(s->cmd[0].write_counter); in rpmb_dev_data_write() 181 ret = write(s->data_fd, s->cmd[i].data, RPMB_PACKET_DATA_SIZE); in rpmb_dev_data_write() 235 addr = rpmb_get_u16(s->cmd[0].address); in rpmb_dev_data_read() 305 uint16_t req_resp = rpmb_get_u16(s->cmd[0].req_resp); in rpmb_dev_process_cmd() 306 uint16_t addr = rpmb_get_u16(s->cmd[0].address); in rpmb_dev_process_cmd() 309 struct rpmb_dev_cmd* cmd = &rpmb_dev_cmd_table[cmd_index]; in rpmb_dev_process_cmd() local 314 if (cmd->check_result_read) { in rpmb_dev_process_cmd() 315 sub_req = rpmb_get_u16(s->cmd[s->cmd_count - 1].req_resp); in rpmb_dev_process_cmd() [all …]
|
/trusty/user/base/lib/hwbcc/rust/src/ |
D | lib.rs | 76 cmd: BccCmd, field 90 serializer.serialize_as_bytes(&self.cmd)?; in serialize() 152 cmd: u32, field 192 Ok(Self { status: msg.status, cmd: msg.cmd, payload: response_payload }) in deserialize() 219 fn recv_resp(session: &Handle, cmd: BccCmd, buf: &mut [u8]) -> Result<HwBccResponse, HwBccError> { in recv_resp() 222 cmd.validate_response(response.cmd)?; in recv_resp() 280 let cmd = BccCmd::GetDiceArtifacts; in get_dice_artifacts() localVariable 281 session.send(&BccMsgHeader { cmd, test_mode: HwBccMode::Release, context })?; in get_dice_artifacts() 284 let response = recv_resp(&session, cmd, res_buf)?; in get_dice_artifacts() 311 let cmd = BccCmd::NsDeprivilege; in ns_deprivilege() localVariable [all …]
|
/trusty/user/base/lib/uirq/ |
D | uirq.c | 26 static int send_ack(handle_t h, uint32_t cmd) { in send_ack() argument 27 return trusty_write((int)h, &cmd, sizeof(cmd)); in send_ack()
|
/trusty/user/base/lib/hwwsk/rust/src/ |
D | lib.rs | 62 HwWskResponse { status, cmd: self.hdr.cmd | hwwsk_cmd_HWWSK_CMD_RESP as u32, payload } in response_from() 71 self.hdr.cmd.serialize(serializer)?; in serialize() 99 match hdr.cmd as hwwsk_cmd { in deserialize() 106 cmd => { in deserialize() 107 log::error!("unrecognized command request: {:?}", cmd); in deserialize() 112 Ok(Self { hdr: hwwsk_req_hdr { cmd: hdr.cmd, flags: hdr.flags }, req }) in deserialize() 192 cmd: u32, field 208 serializer.serialize_as_bytes(&self.cmd)?; in serialize() 231 let cmd = u32::from_ne_bytes(cmd_bytes.try_into()?); in deserialize() localVariable 234 Ok(Self { status, cmd, payload: response_payload }) in deserialize() [all …]
|
/trusty/user/app/keymaster/ipc/ |
D | keymaster_ipc.cpp | 117 uint32_t cmd, in send_response() argument 121 km_msg.cmd = cmd | KEYMASTER_RESP_BIT; in send_response() 132 km_msg.cmd = km_msg.cmd | KEYMASTER_STOP_BIT; in send_response() 154 uint32_t cmd, in send_error_response() argument 156 return send_response(chan, cmd, reinterpret_cast<uint8_t*>(&err), in send_error_response() 210 if (msg->cmd == KM_CONFIGURE) { in do_dispatch() 244 if (msg->cmd == KM_CONFIGURE) { in do_dispatch() 271 if (msg->cmd == KM_CONFIGURE) { in do_dispatch() 331 if (msg->cmd == KM_SET_ATTESTATION_IDS_SECURE && in keymaster_dispatch_secure() 333 LOG_E("Command %d by this UUID is not allowed\n", msg->cmd); in keymaster_dispatch_secure() [all …]
|
/trusty/user/app/storage/ |
D | rpmb.c | 212 struct rpmb_packet cmd = { in rpmb_program_key() local 220 memcpy(cmd.key_mac.byte, key->byte, sizeof(cmd.key_mac.byte)); in rpmb_program_key() 222 ret = rpmb_send(state->mmc_handle, &cmd, sizeof(cmd), &rescmd, in rpmb_program_key() 244 struct rpmb_packet cmd = { in rpmb_read_counter() local 250 ret = rpmb_send(state->mmc_handle, NULL, 0, &cmd, sizeof(cmd), &res, in rpmb_read_counter() 302 struct rpmb_packet cmd = { in rpmb_read_data() local 321 ret = rpmb_send(state->mmc_handle, NULL, 0, &cmd, sizeof(cmd), res, in rpmb_read_data() 440 struct rpmb_packet cmd[MAX_PACKET_COUNT]; in rpmb_write_data() local 450 memset(&cmd[i], 0, sizeof(cmd[i])); in rpmb_write_data() 451 memcpy(cmd[i].data, buf + i * sizeof(cmd[i].data), sizeof(cmd[i].data)); in rpmb_write_data() [all …]
|
/trusty/user/base/app/metrics/ |
D | consumer.c | 87 uint32_t cmd; in on_message() local 88 cmd = ((struct metrics_req*)msg)->cmd; in on_message() 90 .cmd = (cmd | METRICS_CMD_RESP_BIT) in on_message()
|
/trusty/user/base/lib/dlmalloc/test/ |
D | dlmalloc_test.c | 35 enum dlmalloc_test_command cmd, in dlmalloc_srv_rpc_expect() argument 39 .cmd = cmd, in dlmalloc_srv_rpc_expect() 59 ASSERT_EQ(msg.cmd, cmd); in dlmalloc_srv_rpc_expect() 64 static void dlmalloc_srv_rpc(handle_t chan, enum dlmalloc_test_command cmd) { in dlmalloc_srv_rpc() argument 65 dlmalloc_srv_rpc_expect(chan, cmd, NO_ERROR); in dlmalloc_srv_rpc()
|
/trusty/user/base/lib/system_state/ |
D | system_state.c | 85 if (resp->cmd != (req->cmd | SYSTEM_STATE_CMD_RESP_BIT)) { in system_state_send_req() 87 resp->cmd, req->cmd); in system_state_send_req() 106 .cmd = SYSTEM_STATE_CMD_GET_FLAG, in system_state_get_flag()
|
/trusty/user/app/sample/app-mgmt-test/port-start-srv/ |
D | main.c | 33 static bool handle_cmd(uint8_t cmd, handle_t channel, handle_t* start_port) { in handle_cmd() argument 38 switch (cmd) { in handle_cmd() 63 TLOGI("Invalid cmd: %d\n", cmd); in handle_cmd() 110 uint8_t cmd; in main() local 194 rc = tipc_recv1(channel, sizeof(cmd), &cmd, sizeof(cmd)); in main() 201 done = handle_cmd(cmd, channel, &start_port); in main()
|
/trusty/user/base/app/coverage/ |
D | aggregator.c | 38 resp.hdr.cmd = req->hdr.cmd | COVERAGE_AGGREGATOR_CMD_RESP_BIT; in handle_register() 62 resp.hdr.cmd = req->hdr.cmd | COVERAGE_AGGREGATOR_CMD_RESP_BIT; in handle_get_record() 117 switch (req.hdr.cmd) { in on_message() 125 TLOGE("cmd 0x%x: unknown command\n", req.hdr.cmd); in on_message()
|
D | client.c | 56 resp.hdr.cmd = req->hdr.cmd | COVERAGE_CLIENT_CMD_RESP_BIT; in handle_open() 81 resp.hdr.cmd = req->hdr.cmd | COVERAGE_CLIENT_CMD_RESP_BIT; in handle_share_record() 123 switch (req.hdr.cmd) { in on_message() 132 TLOGE("cmd 0x%x: unknown command\n", req.hdr.cmd); in on_message()
|
/trusty/user/base/lib/coverage/common/ |
D | ipc.c | 127 if (resp->hdr.cmd != (req->hdr.cmd | COVERAGE_AGGREGATOR_CMD_RESP_BIT)) { in coverage_aggregator_rpc() 128 TLOGE("cmd 0x%x: unknown command\n", resp->hdr.cmd); in coverage_aggregator_rpc() 146 if (resp->hdr.cmd != (req->hdr.cmd | COVERAGE_CLIENT_CMD_RESP_BIT)) { in coverage_client_rpc() 147 TLOGE("cmd 0x%x: unknown command\n", resp->hdr.cmd); in coverage_client_rpc()
|
/trusty/user/base/interface/spi/include/interface/spi/ |
D | spi.h | 106 uint32_t cmd; member 116 uint32_t cmd; member 128 uint32_t cmd; member
|
/trusty/user/base/lib/hwkey/rust/src/ |
D | lib.rs | 126 let cmd = hwkey_cmd_HWKEY_GET_KEYSLOT as u32; in get_keyslot_data() localVariable 129 header: hwkey_msg_header { cmd, op_id: 0u32, status: 0 }, in get_keyslot_data() 139 if !Self::validate_cmd(&cmd, &response.cmd) { in get_keyslot_data() 140 log::error!("unknown response cmd: {:?}", response.cmd); in get_keyslot_data() 211 let cmd = hwkey_cmd_HWKEY_DERIVE_VERSIONED as u32; in derive() localVariable 214 header: hwkey_msg_header { cmd, op_id: 0u32, status: 0u32 }, in derive() 229 if !Hwkey::validate_cmd(&cmd, &response.cmd) { in derive() 230 log::error!("unknown response cmd: {:?}", response.cmd); in derive() 579 cmd: u32, field 601 cmd: msg.header.cmd, in deserialize() [all …]
|
/trusty/user/base/app/crash-test/crasher/ |
D | crasher.c | 59 TLOGD("cmd %d\n", msg.cmd); in crasher_on_message() 61 switch (msg.cmd) { in crasher_on_message() 104 TLOGE("Bad command: %d\n", msg.cmd); in crasher_on_message() 113 TLOGD("cmd %d done\n", msg.cmd); in crasher_on_message()
|
/trusty/user/base/app/line-coverage/ |
D | aggregator.c | 39 resp.hdr.cmd = req->hdr.cmd | LINE_COVERAGE_AGGREGATOR_CMD_RESP_BIT; in handle_register() 64 resp.hdr.cmd = req->hdr.cmd | LINE_COVERAGE_AGGREGATOR_CMD_RESP_BIT; in handle_get_record() 119 switch (req.hdr.cmd) { in on_message() 127 TLOGE("cmd 0x%x: unknown command\n", req.hdr.cmd); in on_message()
|
D | client.c | 56 resp.hdr.cmd = LINE_COVERAGE_CLIENT_CMD_SEND_LIST | LINE_COVERAGE_CLIENT_CMD_RESP_BIT; in handle_send_list() 76 resp.hdr.cmd = LINE_COVERAGE_CLIENT_CMD_SEND_LIST | LINE_COVERAGE_CLIENT_CMD_RESP_BIT; in handle_send_list() 104 resp.hdr.cmd = req->hdr.cmd | LINE_COVERAGE_CLIENT_CMD_RESP_BIT; in handle_open() 129 resp.hdr.cmd = req->hdr.cmd | LINE_COVERAGE_CLIENT_CMD_RESP_BIT; in handle_share_record() 173 switch (req.hdr.cmd) { in on_message() 185 TLOGE("command 0x%x: unknown command\n", req.hdr.cmd); in on_message()
|
/trusty/user/app/sample/memref-test/lender/ |
D | lender.c | 89 static int lender_lend(handle_t chan, enum lender_command cmd) { in lender_lend() argument 91 switch (cmd) { in lender_lend() 99 TLOGE("Unsupported lend type %d\n", cmd); in lender_lend() 171 switch (msg.cmd) { in lender_on_message() 174 rc = lender_lend(chan, msg.cmd); in lender_on_message() 198 TLOGE("Bad command: %d\n", msg.cmd); in lender_on_message()
|
/trusty/user/base/lib/hwkey/ |
D | hwkey.c | 124 uint32_t cmd_sent = msg->header.cmd; in send_req() 150 if (msg->header.cmd != (cmd_sent | HWKEY_RESP_BIT)) { in send_req() 152 msg->header.cmd, cmd_sent); in send_req() 181 .header.cmd = HWKEY_GET_KEYSLOT, in hwkey_get_keyslot_data() 200 .header.cmd = HWKEY_DERIVE, in hwkey_derive() 257 .header.cmd = HWKEY_DERIVE_VERSIONED, in hwkey_derive_versioned() 291 if (resp_msg.header.cmd != (req_msg.header.cmd | HWKEY_RESP_BIT)) { in hwkey_derive_versioned() 293 resp_msg.header.cmd, req_msg.header.cmd); in hwkey_derive_versioned()
|
/trusty/user/base/interface/hwwsk/include/interface/hwwsk/ |
D | hwwsk.h | 136 uint32_t cmd; member 146 uint32_t cmd; member
|
/trusty/user/base/interface/keybox/include/interface/keybox/ |
D | keybox.h | 73 uint32_t cmd; member 100 uint32_t cmd; member
|
/trusty/user/base/lib/uirq/test/ |
D | main.c | 148 uint32_t cmd; in TEST() local 161 cmd = 1; in TEST() 162 rc = trusty_write(port, &cmd, sizeof(cmd)); in TEST() 166 rc = trusty_read(port, &cmd, sizeof(cmd)); in TEST()
|
/trusty/user/base/interface/secure_dpu/include/interface/secure_dpu/ |
D | secure_dpu.h | 92 uint32_t cmd; member 103 uint32_t cmd; member
|
/trusty/user/base/lib/hwbcc/client/ |
D | hwbcc.c | 51 if (resp.cmd != (hdr->cmd | HWBCC_CMD_RESP_BIT)) { in recv_resp() 52 TLOGE("Unknown response cmd: %x\n", resp.cmd); in recv_resp() 132 req.hdr.cmd = HWBCC_CMD_SIGN_DATA; in sign_data() 200 .cmd = HWBCC_CMD_GET_BCC, in get_bcc() 274 .cmd = HWBCC_CMD_GET_DICE_ARTIFACTS, in hwbcc_get_dice_artifacts() 312 .cmd = HWBCC_CMD_NS_DEPRIVILEGE in hwbcc_ns_deprivilege() 342 if (resp.cmd != (hdr.cmd | HWBCC_CMD_RESP_BIT)) { in hwbcc_ns_deprivilege() 343 TLOGE("Unknown response cmd: %x\n", resp.cmd); in hwbcc_ns_deprivilege()
|