History log of /external/tpm2/Marshal_HashSequenceStart.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
3dfffca12cb483bee81b6f65b6aeed027204b8f1 21-Oct-2015 Vadim Bendebury <vbendeb@chromium.org> report error if input buffer is larger than expected

Let's make the implementation exact and always return TPM_RC_SIZE if
unmarshaling returns success but there are some leftover data.

BUG=chrome-os-partner:43025
TEST=fixed test is described in https://goo.gl/kQnud0, all previously
passing tests still succeed

Change-Id: I05f9c86d4a2a93bc5cdf73d4e743d56c3d53bdaa
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/307602
Reviewed-by: Utkarsh Sanghi <usanghi@chromium.org>
/external/tpm2/Marshal_HashSequenceStart.c
a4ed3aa64664a1241ea982d685db744caaae3ffa 30-Jul-2015 Jocelyn Bohr <bohr@chromium.org> Implementation files for command marshaling.

Generated C source and header files which add functions to unmarshal command
requests, execute commands, and marshal command responses. This
(tenatively) adds all final missing parts of libtpm2. These files are
generated from command_generator.py in CL:290556.

TEST=$ sudo emerge tpm2
builds libtpm2.a
Locally I was able to call ExecCommand to execute TPM2_Startup with
success after software TPM initialization.
BUG=chromium:501639

CQ-DEPEND=CL:290556

Change-Id: Ieb3f208795a21a172dea25b35027c5aceba7ee08
Reviewed-on: https://chromium-review.googlesource.com/289813
Tested-by: Jocelyn Bohr <bohr@chromium.org>
Reviewed-by: Darren Krahn <dkrahn@chromium.org>
Reviewed-by: Vadim Bendebury <vbendeb@chromium.org>
Commit-Queue: Jocelyn Bohr <bohr@chromium.org>
/external/tpm2/Marshal_HashSequenceStart.c