/system/tpm/trunks/ |
H A D | policy_session_test.cc | 124 std::vector<std::string> digests; local 125 digests.push_back("digest1"); 126 digests.push_back("digest2"); 127 digests.push_back("digest3"); 131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests)); 132 EXPECT_EQ(tpm_digests.count, digests.size()); 133 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[0]), digests[0]); local 134 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[1]), digests[ local 135 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[2]), digests[2]); local 140 std::vector<std::string> digests; local 149 std::vector<std::string> digests; local [all...] |
H A D | policy_session_impl.cc | 90 TPM_RC PolicySessionImpl::PolicyOR(const std::vector<std::string>& digests) { argument 91 if (digests.size() >= arraysize(TPML_DIGEST::digests)) { 92 LOG(ERROR) << "TPM2.0 Spec only allows for up to 8 digests."; 96 tpm_digests.count = digests.size(); 97 for (size_t i = 0; i < digests.size(); i++) { 98 tpm_digests.digests[i] = Make_TPM2B_DIGEST(digests[i]);
|
H A D | policy_session.h | 59 // of policy digests. After the command is executed, the policy represented 61 virtual TPM_RC PolicyOR(const std::vector<std::string>& digests) = 0;
|
H A D | policy_session_impl.h | 59 TPM_RC PolicyOR(const std::vector<std::string>& digests) override;
|
H A D | trunks_client_test.cc | 708 std::vector<std::string> digests; local 709 digests.push_back(sign_digest); 710 digests.push_back(decrypt_digest); 711 result = trial_session->PolicyOR(digests); 772 result = policy_session->PolicyOR(digests); 796 result = policy_session->PolicyOR(digests);
|
H A D | tpm_utility_impl.cc | 358 TPML_DIGEST_VALUES digests; local 359 digests.count = 1; 360 digests.digests[0].hash_alg = TPM_ALG_SHA256; 361 crypto::SHA256HashString(extend_data, digests.digests[0].digest.sha256, 368 return factory_.GetTpm()->PCR_ExtendSync(pcr_handle, pcr_name, digests, 403 pcr_value->assign(StringFrom_TPM2B_DIGEST(pcr_values.digests[0]));
|
H A D | trunks_factory_for_test.cc | 473 TPM_RC PolicyOR(const std::vector<std::string>& digests) override { 474 return target_->PolicyOR(digests);
|
H A D | tpm_utility_test.cc | 409 TPML_DIGEST_VALUES digests; local 412 .WillOnce(DoAll(SaveArg<2>(&digests), Return(TPM_RC_SUCCESS))); 415 EXPECT_EQ(1u, digests.count); 416 EXPECT_EQ(TPM_ALG_SHA256, digests.digests[0].hash_alg); 418 EXPECT_EQ(0, memcmp(hash_string.data(), digests.digests[0].digest.sha256, 447 pcr_values.digests[0].size = 5; 1526 pcr_values.digests[0] = Make_TPM2B_DIGEST(pcr_value);
|
H A D | mock_tpm.h | 762 const TPML_DIGEST_VALUES& digests, 768 const TPML_DIGEST_VALUES& digests, 780 TPML_DIGEST_VALUES* digests,
|
H A D | tpm_generated.h | 1115 TPM2B_DIGEST digests[8]; member in struct:trunks::TPML_DIGEST 1120 TPMT_HA digests[HASH_COUNT]; member in struct:trunks::TPML_DIGEST_VALUES 4628 const TPML_DIGEST_VALUES& digests, 4636 const TPML_DIGEST_VALUES& digests, 4641 const TPML_DIGEST_VALUES& digests, 4644 const TPML_DIGEST_VALUES& digests)> 4654 TPML_DIGEST_VALUES* digests, 4664 TPML_DIGEST_VALUES* digests,
|
H A D | tpm_generated.cc | 3388 if (arraysize(value.digests) < value.count) { 3392 result = Serialize_TPM2B_DIGEST(value.digests[i], buffer); 3411 if (arraysize(value->digests) < value->count) { 3415 result = Parse_TPM2B_DIGEST(buffer, &value->digests[i], value_bytes); 3433 if (arraysize(value.digests) < value.count) { 3437 result = Serialize_TPMT_HA(value.digests[i], buffer); 3456 if (arraysize(value->digests) < value->count) { 3460 result = Parse_TPMT_HA(buffer, &value->digests[i], value_bytes); 19194 const TPML_DIGEST_VALUES& digests, 19217 rc = Serialize_TPML_DIGEST_VALUES(digests, 19191 SerializeCommand_PCR_Extend( const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 19360 PCR_Extend(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate, const PCR_ExtendResponse& callback) argument 19380 PCR_ExtendSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate) argument 19485 ParseResponse_PCR_Event( const std::string& response, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument 19571 TPML_DIGEST_VALUES digests; local 19602 PCR_EventSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPM2B_EVENT& event_data, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument [all...] |
/system/keymaster/ |
H A D | soft_keymaster_device.cpp | 113 keymaster_digest_t* digests; local 116 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 118 LOG_E("Error %d getting supported digests from keymaster1 device", error); 121 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); 123 auto digest_vec = make_vector(digests, digests_length); 517 keymaster_digest_t** digests, 522 if (!digests || !digests_length) 527 return km1_dev->get_supported_digests(km1_dev, algorithm, purpose, digests, digests_length); 541 *digests = reinterpret_cast<keymaster_digest_t*>(malloc(*digests_length * sizeof(**digests))); 514 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument [all...] |
H A D | android_keymaster_test_utils.cpp | 762 keymaster_digest_t** digests, 765 unwrap(dev), algorithm, purpose, digests, digests_length); 770 std::copy_if(*digests, *digests + *digests_length, std::back_inserter(filtered_digests), 773 free(*digests); 775 *digests = reinterpret_cast<keymaster_digest_t*>( 777 std::copy(filtered_digests.begin(), filtered_digests.end(), *digests); 759 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
|
H A D | android_keymaster_messages_test.cpp | 109 keymaster_digest_t digests[] = {KM_DIGEST_NONE, KM_DIGEST_MD5, KM_DIGEST_SHA1}; local 111 rsp.SetResults(digests); 114 EXPECT_EQ(array_length(digests), deserialized->results_length); 115 EXPECT_EQ(0, memcmp(deserialized->results, digests, array_size(digests)));
|
H A D | android_keymaster_test.cpp | 212 string name() const override { return "Wrapped fake keymaster1 w/minimal digests"; } 247 string name() const override { return "Wrapped fake keymaster1 w/full digests"; } 787 vector<keymaster_digest_t> digests = { local 793 for (keymaster_digest_t digest : digests) { 807 EXPECT_EQ(digests.size() * key_sizes.size() * 3, 1312 vector<keymaster_digest_t> digests = { local 1323 for (keymaster_digest_t digest : digests) { 1488 keymaster_digest_t digests[] = { local 1500 for (auto digest : digests) 1504 for (auto digest : digests) { 2196 keymaster_digest_t digests[] = { local [all...] |
/system/tpm/tpm_manager/server/ |
H A D | tpm2_nvram_impl.cc | 562 std::vector<std::string> digests; local 564 digests.push_back(policy_record.policy_digests(i)); 566 TPM_RC result = session->PolicyOR(digests);
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 126 keymaster_digest_t** digests,
|