Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 54) sorted by relevance

123

/trusty/user/app/cast-auth/app/test-app/
Dmain.cc234 android::status_t status; in CastAuthTest_SetUp() local
245 status = state->sess->setupPreconnectedClient( in CastAuthTest_SetUp()
247 ASSERT_EQ(android::OK, status); in CastAuthTest_SetUp()
277 auto status = _state->srv->ProvisionKey(wrapped_keybox); in TEST_F() local
278 ASSERT_TRUE(status.isOk(), "ProvisionKey"); in TEST_F()
283 auto status = _state->srv->SignHash(test_hash, &signature); in TEST_F() local
284 ASSERT_TRUE(status.isOk(), "SignHash"); in TEST_F()
296 auto status = _state->srv->ProvisionKey(test_pkcs1_der); in TEST_F() local
297 ASSERT_TRUE(status.isOk(), "ProvisionKey"); in TEST_F()
302 auto status = _state->srv->SignHash(test_hash, &signature); in TEST_F() local
[all …]
/trusty/user/app/sample/hwcrypto/keybox/
Dsrv.c73 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap()
80 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap()
84 rsp.header.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_unwrap()
88 rsp.header.status = keybox_unwrap( in keybox_handle_unwrap()
91 if (rsp.header.status != KEYBOX_STATUS_SUCCESS) { in keybox_handle_unwrap()
112 enum keybox_status status = KEYBOX_STATUS_SUCCESS; in keybox_handle_msg() local
129 rsp.status = KEYBOX_STATUS_INVALID_REQUEST; in keybox_handle_msg()
134 status = KEYBOX_STATUS_INTERNAL_ERROR; in keybox_handle_msg()
137 return status; in keybox_handle_msg()
/trusty/kernel/app/userscstest/
Duserscstest.c101 static void trusty_app_callback(struct trusty_app* ta, void* status) { in trusty_app_callback() argument
102 struct scs_test_status* status_ptr = (struct scs_test_status*)status; in trusty_app_callback()
196 struct scs_test_status status = {0}; in inspect_trusty_threads() local
197 trusty_app_forall(trusty_app_callback, &status); in inspect_trusty_threads()
198 ASSERT_NE(0, status.running_apps); in inspect_trusty_threads()
199 return status.invalid_apps; in inspect_trusty_threads()
/trusty/kernel/lib/sm/
Dtrusty_sched_share.c84 status_t status; in trusty_share_register() local
91 status = ext_mem_map_obj_id(vmm_get_kernel_aspace(), in trusty_share_register()
95 if (status) { in trusty_share_register()
156 status = vmm_free_region(vmm_get_kernel_aspace(), (vaddr_t)share_ptr); in trusty_share_register()
157 if (status) { in trusty_share_register()
168 status_t status; in trusty_share_unregister() local
192 status = vmm_free_region(vmm_get_kernel_aspace(), (vaddr_t)share_ptr); in trusty_share_unregister()
193 if (status) { in trusty_share_unregister()
/trusty/kernel/app/stdcalltest/
Dstdcalltest.c71 long status; in stdcalltest_sharedmem_rw() local
83 status = SM_ERR_INTERNAL_FAILURE; in stdcalltest_sharedmem_rw()
93 status = SM_ERR_INVALID_PARAMETERS; in stdcalltest_sharedmem_rw()
98 status = 0; in stdcalltest_sharedmem_rw()
103 status = SM_ERR_INTERNAL_FAILURE; in stdcalltest_sharedmem_rw()
106 return status; in stdcalltest_sharedmem_rw()
/trusty/user/app/sample/binder-test/client/
Dmain.cpp44 android::status_t status; in BinderTest_SetUp() local
55 status = state->sess->setupPreconnectedClient( in BinderTest_SetUp()
57 ASSERT_EQ(android::OK, status); in BinderTest_SetUp()
77 auto status = (*state->srv.*func)(in, &out); in CheckRepeat() local
78 EXPECT_EQ(true, status.isOk()); in CheckRepeat()
84 auto status = state->srv->RepeatString(in, &out); in CheckRepeat() local
85 EXPECT_EQ(true, status.isOk()); in CheckRepeat()
102 auto status = (*state->srv.*func)(input, &repeated, &reversed); in CheckReverse() local
103 EXPECT_EQ(status.isOk(), true); in CheckReverse()
/trusty/hardware/nxp/app/hwcrypto/
Dcaam.c64 uint32_t status; /* job result */ member
150 job->status = g_rings->out[1]; in run_job()
244 if (g_job->status & JOB_RING_STS) { in caam_open()
245 TLOGE("job failed (0x%08x)\n", g_job->status); in caam_open()
308 if (g_job->status & JOB_RING_STS) { in caam_decap_blob()
309 TLOGE("job failed (0x%08x)\n", g_job->status); in caam_decap_blob()
365 if (g_job->status & JOB_RING_STS) { in caam_gen_blob()
366 TLOGE("job failed (0x%08x)\n", g_job->status); in caam_gen_blob()
427 if (g_job->status & JOB_RING_STS) { in caam_aes_op()
428 TLOGE("job failed (0x%08x)\n", g_job->status); in caam_aes_op()
[all …]
Dhwkey_srv.c151 msg->header.status = _handle_slots(ctx, slot_id, key_slots, key_slot_cnt, in hwkey_handle_get_keyslot_cmd()
155 if (msg->header.status == HWKEY_ERR_NOT_FOUND) { in hwkey_handle_get_keyslot_cmd()
157 msg->header.status = _handle_slots(ctx, slot_id, test_key_slots, in hwkey_handle_get_keyslot_cmd()
187 msg->header.status = derive_key_v1(&ctx->uuid, ikm_data, ikm_len, in hwkey_handle_derive_key_cmd()
194 msg->header.status = HWKEY_ERR_NOT_IMPLEMENTED; in hwkey_handle_derive_key_cmd()
237 msg.header.status = HWKEY_ERR_NOT_IMPLEMENTED; in hwkey_chan_handle_msg()
/trusty/user/app/sample/hwcrypto/
Dhwkey_srv.c325 hdr->header.status = _handle_slots(ctx, slot_id, key_slots, key_slot_cnt, in hwkey_handle_get_keyslot_cmd()
374 hdr->header.status = HWKEY_ERR_BAD_LEN; in hwkey_handle_derive_key_cmd()
378 hdr->header.status = hwkey_handle_derive_key_impl( in hwkey_handle_derive_key_cmd()
421 uint32_t status; in hwkey_handle_derive_versioned_key_cmd() local
427 status = HWKEY_ERR_BAD_LEN; in hwkey_handle_derive_versioned_key_cmd()
443 status = HWKEY_ERR_GENERIC; in hwkey_handle_derive_versioned_key_cmd()
454 status = HWKEY_ERR_NOT_VALID; in hwkey_handle_derive_versioned_key_cmd()
460 status = hwkey_handle_derive_key_impl(&msg->kdf_version, &ctx->uuid, in hwkey_handle_derive_versioned_key_cmd()
469 status = HWKEY_NO_ERROR; in hwkey_handle_derive_versioned_key_cmd()
481 status = derive_key_versioned_v1(&ctx->uuid, shared, in hwkey_handle_derive_versioned_key_cmd()
[all …]
/trusty/user/base/interface/spi/include/interface/spi/
Dspi.h117 uint32_t status; member
129 uint32_t status; member
/trusty/user/base/lib/secure_dpu/
Dsecure_dpu.c113 if (hdr.status != SECURE_DPU_ERROR_OK) { in handle_allocate_buffer_resp()
114 TLOGE("Failed SECURE_DPU_CMD_ALLOCATE_BUFFER (%d)\n", hdr.status); in handle_allocate_buffer_resp()
198 if (hdr.status != SECURE_DPU_ERROR_OK) { in handle_start_secure_display_resp()
199 TLOGE("Failed SECURE_DPU_CMD_START_SECURE_DISPLAY (%d)\n", hdr.status); in handle_start_secure_display_resp()
247 if (hdr.status != SECURE_DPU_ERROR_OK) { in handle_stop_secure_display_resp()
248 TLOGE("Failed SECURE_DPU_CMD_STOP_SECURE_DISPLAY (%d)\n", hdr.status); in handle_stop_secure_display_resp()
/trusty/user/base/lib/hwkey/rust/src/
Dlib.rs129 header: hwkey_msg_header { cmd, op_id: 0u32, status: 0 }, in get_keyslot_data()
144 HwkeyError::from_hwkey_rc(response.status)?; in get_keyslot_data()
214 header: hwkey_msg_header { cmd, op_id: 0u32, status: 0u32 }, in derive()
234 HwkeyError::from_hwkey_rc(response.status)?; in derive()
578 status: u32, field
600 status: msg.header.status, in deserialize()
612 status: u32, field
647 status: msg.header.status, in deserialize()
/trusty/user/base/lib/hwwsk/rust/src/
Dlib.rs61 pub fn response_from(&self, status: u32, payload: Vec<u8>) -> HwWskResponse { in response_from()
62 HwWskResponse { status, cmd: self.hdr.cmd | hwwsk_cmd_HWWSK_CMD_RESP as u32, payload } in response_from()
194 status: u32, field
209 serializer.serialize_as_bytes(&self.status)?; in serialize()
230 let status = u32::from_ne_bytes(status_bytes.try_into()?); in deserialize() localVariable
234 Ok(Self { status, cmd, payload: response_payload }) in deserialize()
351 HwWskError::from_status(response.status)?; in create_key()
397 HwWskError::from_status(response.status)?; in export_key()
/trusty/user/base/lib/hwbcc/client/
Dhwbcc.c56 if (resp.status != NO_ERROR) { in recv_resp()
57 TLOGE("Status is not SUCCESS. Actual: %d\n", resp.status); in recv_resp()
58 rc = resp.status; in recv_resp()
348 if (resp.status != NO_ERROR) { in hwbcc_ns_deprivilege()
349 TLOGE("Status is not SUCCESS. Actual: %d\n", resp.status); in hwbcc_ns_deprivilege()
350 rc = resp.status; in hwbcc_ns_deprivilege()
/trusty/kernel/lib/shared/binder_discover/
Dbinder_discover.cpp90 android::status_t status = sess->setupPreconnectedClient({}, [=]() { in binder_discover_get_service() local
95 if (status != android::OK) { in binder_discover_get_service()
96 return status; in binder_discover_get_service()
/trusty/vendor/google/aosp/scripts/
Dlog_processor.py208 module, status = module_status
220 mwidth = term_width - len(module) - len(status) - 5 - 10
224 status = status[:mwidth]
230 status = self.colorize(status, self.color.green)
319 module, status, message = parsed
324 self.pinned.insert((module, status), (message, done))
/trusty/user/base/lib/keybox/client/
Dclient.c73 if (rsp.header.status != KEYBOX_STATUS_SUCCESS) { in keybox_unwrap()
74 rc = rsp.header.status; in keybox_unwrap()
/trusty/user/base/lib/hwbcc/rust/src/
Dlib.rs150 status: i32, field
192 Ok(Self { status: msg.status, cmd: msg.cmd, payload: response_payload }) in deserialize()
224 if response.status != 0 { in recv_resp()
225 log::error!("Status is not SUCCESS. Actual: {:?}", response.status); in recv_resp()
226 return Err(HwBccError::System(Error::from(response.status as c_long))); in recv_resp()
/trusty/user/app/keymint/
Dffi_bindings.rs123 let (status, bytes) = <u32>::deserialize(bytes).map_err(|e| { in deserialize()
127 if status != sys::keybox_status_KEYBOX_STATUS_SUCCESS { in deserialize()
128 error!(" Keybox unwrap cmd failed: {:?}", status); in deserialize()
/trusty/user/base/interface/keybox/include/interface/keybox/
Dkeybox.h101 int32_t status; member
/trusty/user/base/interface/hwwsk/include/interface/hwwsk/
Dhwwsk.h147 uint32_t status; member
/trusty/user/base/interface/secure_dpu/include/interface/secure_dpu/
Dsecure_dpu.h104 int32_t status; member
/trusty/user/base/lib/hwwsk/
Dclient.c73 if (rsp.status != 0) { in handle_reply()
74 rc = hwwsk_err_to_lk_err(rsp.status); in handle_reply()
/trusty/device/arm/generic-arm64/project/hafnium/
Dtos_fw_config.dts52 secure-status = "okay";
53 status = "disabled";
/trusty/user/base/interface/metrics/include/interface/metrics/
Dmetrics.h98 uint32_t status; member

123