/trusty/user/app/avb/test/ |
D | unittest.cpp | 24 uint32_t slot = 0; in TEST() local 26 RollbackIndexRequest request(slot, value); in TEST() 35 uint32_t slot = 0; in TEST() local 37 RollbackIndexRequest request(slot, value); in TEST() 46 uint32_t slot = 0; in TEST() local 48 RollbackIndexRequest request(slot, value); in TEST() 59 uint32_t slot = 0x00010000; in TEST() local 61 RollbackIndexRequest request(slot, value); in TEST() 70 uint32_t slot = kRollbackSlotMax + 1; in TEST() local 72 RollbackIndexRequest request(slot, value); in TEST() [all …]
|
/trusty/user/app/avb/ |
D | avb_manager.cpp | 43 uint32_t* slot) { in GetFilenameAndSlot() argument 50 *slot = raw_slot & ~kTypeMask; in GetFilenameAndSlot() 51 if (*slot >= kRollbackSlotMax) { in GetFilenameAndSlot() 52 TLOGE("Error: Slot value %u larger than supported %u\n", *slot, in GetFilenameAndSlot() 69 uint32_t slot; in ReadRollbackIndex() local 71 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in ReadRollbackIndex() 100 rc = storage_->read(sizeof(rollback_counter) * slot, &rollback_counter, in ReadRollbackIndex() 121 uint32_t slot; in WriteRollbackIndex() local 123 if (GetFilenameAndSlot(request.get_slot(), filename, &slot) < 0) { in WriteRollbackIndex() 148 write_buf[slot] = request_value; in WriteRollbackIndex() [all …]
|
D | avb_messages.h | 64 RollbackIndexRequest(uint32_t slot, uint64_t value) in RollbackIndexRequest() argument 65 : value_(value), slot_(slot) {} in RollbackIndexRequest() 71 void set_slot(uint32_t slot) { slot_ = slot; } in set_slot() argument
|
/trusty/kernel/lib/trusty/ |
D | tipc_dev_ql.c | 131 static inline uint32_t slot_to_addr(uint slot) { in slot_to_addr() argument 132 return (uint32_t)(slot + QL_TIPC_ADDR_BASE); in slot_to_addr() 138 int slot = bitmap_ffz(dev->inuse, QL_TIPC_ADDR_MAX_NUM); in alloc_local_addr() local 139 if (slot >= 0) { in alloc_local_addr() 140 bitmap_set(dev->inuse, slot); in alloc_local_addr() 141 dev->epts[slot].chan = chan; in alloc_local_addr() 142 dev->epts[slot].cookie = cookie; in alloc_local_addr() 143 return slot_to_addr(slot); in alloc_local_addr() 149 uint slot = addr_to_slot(local); in ept_lookup() local 150 if (slot < QL_TIPC_ADDR_MAX_NUM) { in ept_lookup() [all …]
|
D | tipc_virtio_dev.c | 287 static inline uint32_t slot_to_addr(uint slot) { in slot_to_addr() argument 288 return (uint32_t)(slot + TIPC_ADDR_BASE); in slot_to_addr() 294 int slot = bitmap_ffz(dev->inuse, TIPC_ADDR_MAX_NUM); in alloc_local_addr() local 295 if (slot >= 0) { in alloc_local_addr() 296 bitmap_set(dev->inuse, slot); in alloc_local_addr() 297 dev->epts[slot].chan = chan; in alloc_local_addr() 298 dev->epts[slot].remote = remote; in alloc_local_addr() 299 return slot_to_addr(slot); in alloc_local_addr() 305 uint slot = addr_to_slot(local); in lookup_ept() local 306 if (slot < TIPC_ADDR_MAX_NUM) { in lookup_ept() [all …]
|
/trusty/kernel/lib/trusty/include/lib/trusty/ |
D | trusty_app.h | 241 uint slot = slot_id - 1; in trusty_als_get() local 242 ASSERT(slot < als_slot_cnt); in trusty_als_get() 243 return app->als[slot]; in trusty_als_get() 249 uint slot = slot_id - 1; in trusty_als_set() local 250 ASSERT(slot < als_slot_cnt); in trusty_als_set() 251 app->als[slot] = ptr; in trusty_als_set()
|
/trusty/user/app/keymint/keys/ |
D | legacy.rs | 55 if let Some((sdd_data, slot)) = sdd_info { in build_derivation_info() 62 let secret: &[u8] = if slot == 0 { &[] } else { &sdd_data.secure_deletion_secret }; in build_derivation_info() 66 info.try_extend_from_slice(&slot.to_ne_bytes())?; in build_derivation_info() 110 let slot = SecureDeletionSlot(slot_idx); in convert_key() localVariable 111 let sdd_data = sdd_mgr.get_secret(slot)?; in convert_key() 121 (false, _, Some(slot)) => { in convert_key() 125 slot, in convert_key() 318 if let Some(slot) = encrypted_keyblob.key_slot { in delete_legacy_key() 319 if slot != NO_SDD_SLOT_IDX { in delete_legacy_key() 325 slot in delete_legacy_key() [all …]
|
/trusty/user/app/sample/hwcrypto/ |
D | hwkey_srv_fake_provider.c | 422 static uint32_t get_unittest_key32_handler(const struct hwkey_keyslot* slot, in get_unittest_key32_handler() argument 458 static uint32_t derived_keyslot_handler(const struct hwkey_keyslot* slot, in derived_keyslot_handler() argument 462 assert(slot); in derived_keyslot_handler() 463 return hwkey_get_derived_key(slot->priv, kbuf, kbuf_len, klen); in derived_keyslot_handler() 536 static uint32_t get_rpmb_ss_auth_key(const struct hwkey_keyslot* slot, in get_rpmb_ss_auth_key() argument 626 static uint32_t get_km_kak_key(const struct hwkey_keyslot* slot, in get_km_kak_key() argument 638 return derive_key_v1(slot->uuid, kak_salt, KM_KAK_SIZE, kbuf, *klen); in get_km_kak_key() 748 static uint32_t get_apploader_sign_key(const struct hwkey_keyslot* slot, in get_apploader_sign_key() argument 752 assert(slot); in get_apploader_sign_key() 753 return get_apploader_key(slot->priv, kbuf, kbuf_len, klen); in get_apploader_sign_key() [all …]
|
D | hwkey_srv.c | 125 const struct hwkey_keyslot* slot) { in is_allowed_to_read_opaque_key() argument 126 assert(slot); in is_allowed_to_read_opaque_key() 127 const struct hwkey_opaque_handle_data* handle = slot->priv; in is_allowed_to_read_opaque_key() 139 const struct hwkey_keyslot* slot) { in find_opaque_handle_for_slot() argument 143 if (entry->key_slot == slot) { in find_opaque_handle_for_slot() 156 const struct hwkey_keyslot* slot) { in insert_handle_node() argument 157 struct opaque_handle_node* entry = find_opaque_handle_for_slot(slot); in insert_handle_node() 167 entry->key_slot = slot; in insert_handle_node() 677 uint32_t get_key_handle(const struct hwkey_keyslot* slot, in get_key_handle() argument 684 const struct hwkey_opaque_handle_data* handle = slot->priv; in get_key_handle() [all …]
|
D | hwkey_srv_priv.h | 28 uint32_t (*handler)(const struct hwkey_keyslot* slot, 123 uint32_t get_key_handle(const struct hwkey_keyslot* slot,
|
/trusty/user/app/keymint/ |
D | secure_deletion_secret_manager.rs | 376 fn read_slot_data(&self, slot: SecureDeletionSlot, buffer: &mut [u8]) -> Result<(), Error> { in read_slot_data() 386 let requested_slot = slot.0 as usize; in read_slot_data() 489 Ok(slot) => slot, in new_secret() 546 fn get_secret(&self, slot: SecureDeletionSlot) -> Result<SecureDeletionData, Error> { in get_secret() 555 let requested_slot = slot.0 as usize; in get_secret() 567 match self.read_slot_data(slot, &mut secure_deletion_data.secure_deletion_secret) { in get_secret() 585 fn delete_secret(&mut self, slot: SecureDeletionSlot) -> Result<(), Error> { in delete_secret() 586 let requested_slot = slot.0 as usize; in delete_secret() 840 let slot = SecureDeletionSlot(slot_num as u32); in new_secret_data_file_expands() localVariable 841 sdsf.delete_secret(slot).expect("Couldn't delete secret"); in new_secret_data_file_expands() [all …]
|
/trusty/hardware/nxp/app/hwcrypto/ |
D | hwkey_srv_priv.h | 26 uint32_t (*handler)(const struct hwkey_keyslot* slot,
|
D | hwkey_srv_provider.c | 90 static uint32_t get_rpmb_ss_auth_key(const struct hwkey_keyslot* slot, in get_rpmb_ss_auth_key() argument
|
D | hwkey_srv.c | 73 static uint32_t get_unittest_key32(const struct hwkey_keyslot* slot, in get_unittest_key32() argument
|
/trusty/user/base/lib/hwasan/ |
D | exemptlist | 26 # TODO: HWASan suppresses stack slot reuse for storage-unittest, which blows the
|