Lines Matching refs:response

53 	/* request and response are in unencrypted memory */
54 struct snp_guest_msg *request, *response;
276 /* Build IV with response buffer sequence number */
291 dev_dbg(snp_dev->dev, "response [seqno %lld type %d version %d sz %d]\n",
294 /* Copy response from shared memory to encrypted memory. */
295 memcpy(resp, snp_dev->response, sizeof(*resp));
301 /* Verify response message type and version number. */
405 * this now because decryption uses the value stored in the response
443 /* Clear shared memory's response for the host to populate. */
444 memset(snp_dev->response, 0, sizeof(struct snp_guest_msg));
503 * The intermediate response buffer is used while decrypting the
504 * response payload. Make sure that it has enough space to cover the
541 * The intermediate response buffer is used while decrypting the
542 * response payload. Make sure that it has enough space to cover the
561 /* The response buffer contains the sensitive data, explicitly clear it. */
611 * The intermediate response buffer is used while decrypting the
612 * response payload. Make sure that it has enough space to cover the
862 /* Suspicious that the response populated entries without populating size */
943 /* Allocate the shared page used for the request and response message. */
948 snp_dev->response = alloc_shared_pages(dev, sizeof(struct snp_guest_msg));
949 if (!snp_dev->response)
968 snp_dev->input.resp_gpa = __pa(snp_dev->response);
989 free_shared_pages(snp_dev->response, sizeof(struct snp_guest_msg));
1002 free_shared_pages(snp_dev->response, sizeof(struct snp_guest_msg));