|
9 | 9 | //! (The Rust compiler should report an error if these don't line up:
|
10 | 10 | //! this can be used to update these if `set_access_key` changes.)
|
11 | 11 |
|
12 |
| -use sgx_types::sgx_aes_gcm_128bit_tag_t; |
| 12 | +use sgx_types::{sgx_aes_gcm_128bit_tag_t, sgx_status_t}; |
13 | 13 |
|
14 | 14 | use super::{set_access_key, RecommendedAesGcmIv};
|
| 15 | +use crate::enclave_messages::errors::SealingError; |
| 16 | +use crate::EcallResult; |
15 | 17 |
|
16 | 18 | // See enclave_messages::ARCHIVED_ENCLAVE_ID_SIZE
|
17 | 19 | pub const ARCHIVED_ENCLAVE_ID_SIZE: usize = 8;
|
@@ -44,8 +46,17 @@ pub struct SetAccessKeyEncryptedResponse {
|
44 | 46 | pub nonce: RecommendedAesGcmIv,
|
45 | 47 | }
|
46 | 48 |
|
| 49 | +// FFI type: SetAccessKeyResult |
| 50 | +pub type SetAccessKeyResult = EcallResult<SetAccessKeyEncryptedResponse, SealingError>; |
| 51 | + |
47 | 52 | // End FFI types
|
48 | 53 |
|
| 54 | +impl Default for SetAccessKeyResult { |
| 55 | + fn default() -> Self { |
| 56 | + EcallResult::Err(SealingError::Sgx(sgx_status_t::SGX_ERROR_UNEXPECTED)) |
| 57 | + } |
| 58 | +} |
| 59 | + |
49 | 60 | // Boilerplate From implementations:
|
50 | 61 |
|
51 | 62 | impl From<set_access_key::EncryptedRequest> for SetAccessKeyEncryptedRequest {
|
@@ -119,3 +130,15 @@ impl From<SetAccessKeyEncryptedResponse> for set_access_key::EncryptedResponse {
|
119 | 130 | };
|
120 | 131 | }
|
121 | 132 | }
|
| 133 | + |
| 134 | +impl From<set_access_key::SetAccessKeyResult> for SetAccessKeyResult { |
| 135 | + fn from(result: set_access_key::SetAccessKeyResult) -> Self { |
| 136 | + Self::from(result.map(SetAccessKeyEncryptedResponse::from)) |
| 137 | + } |
| 138 | +} |
| 139 | + |
| 140 | +impl From<SetAccessKeyResult> for set_access_key::SetAccessKeyResult { |
| 141 | + fn from(result: SetAccessKeyResult) -> Self { |
| 142 | + Self::from(result.map(set_access_key::EncryptedResponse::from)) |
| 143 | + } |
| 144 | +} |
0 commit comments