Searched defs:digests (Results 1 - 13 of 13) sorted by relevance

/system/tpm/trunks/
H A Dpolicy_session_test.cc124 std::vector<std::string> digests; local
125 digests.push_back("digest1");
126 digests.push_back("digest2");
127 digests.push_back("digest3");
131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests));
132 EXPECT_EQ(tpm_digests.count, digests.size());
133 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[0]), digests[0]); local
134 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[1]), digests[ local
135 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[2]), digests[2]); local
140 std::vector<std::string> digests; local
149 std::vector<std::string> digests; local
[all...]
H A Dpolicy_session_impl.cc90 TPM_RC PolicySessionImpl::PolicyOR(const std::vector<std::string>& digests) { argument
91 if (digests.size() >= arraysize(TPML_DIGEST::digests)) {
92 LOG(ERROR) << "TPM2.0 Spec only allows for up to 8 digests.";
96 tpm_digests.count = digests.size();
97 for (size_t i = 0; i < digests.size(); i++) {
98 tpm_digests.digests[i] = Make_TPM2B_DIGEST(digests[i]);
H A Dtpm_utility_test.cc409 TPML_DIGEST_VALUES digests; local
412 .WillOnce(DoAll(SaveArg<2>(&digests), Return(TPM_RC_SUCCESS)));
415 EXPECT_EQ(1u, digests.count);
416 EXPECT_EQ(TPM_ALG_SHA256, digests.digests[0].hash_alg);
418 EXPECT_EQ(0, memcmp(hash_string.data(), digests.digests[0].digest.sha256,
447 pcr_values.digests[0].size = 5;
1527 pcr_values.digests[0] = Make_TPM2B_DIGEST(pcr_value);
H A Dtrunks_client_test.cc710 std::vector<std::string> digests; local
711 digests.push_back(sign_digest);
712 digests.push_back(decrypt_digest);
713 result = trial_session->PolicyOR(digests);
774 result = policy_session->PolicyOR(digests);
798 result = policy_session->PolicyOR(digests);
H A Dtpm_utility_impl.cc358 TPML_DIGEST_VALUES digests; local
359 digests.count = 1;
360 digests.digests[0].hash_alg = TPM_ALG_SHA256;
361 crypto::SHA256HashString(extend_data, digests.digests[0].digest.sha256,
368 return factory_.GetTpm()->PCR_ExtendSync(pcr_handle, pcr_name, digests,
403 pcr_value->assign(StringFrom_TPM2B_DIGEST(pcr_values.digests[0]));
H A Dtpm_generated.h1115 TPM2B_DIGEST digests[8]; member in struct:trunks::TPML_DIGEST
1120 TPMT_HA digests[HASH_COUNT]; member in struct:trunks::TPML_DIGEST_VALUES
4628 const TPML_DIGEST_VALUES& digests,
4636 const TPML_DIGEST_VALUES& digests,
4641 const TPML_DIGEST_VALUES& digests,
4644 const TPML_DIGEST_VALUES& digests)>
4654 TPML_DIGEST_VALUES* digests,
4664 TPML_DIGEST_VALUES* digests,
H A Dtpm_generated.cc3388 if (arraysize(value.digests) < value.count) {
3392 result = Serialize_TPM2B_DIGEST(value.digests[i], buffer);
3411 if (arraysize(value->digests) < value->count) {
3415 result = Parse_TPM2B_DIGEST(buffer, &value->digests[i], value_bytes);
3433 if (arraysize(value.digests) < value.count) {
3437 result = Serialize_TPMT_HA(value.digests[i], buffer);
3456 if (arraysize(value->digests) < value->count) {
3460 result = Parse_TPMT_HA(buffer, &value->digests[i], value_bytes);
19194 const TPML_DIGEST_VALUES& digests,
19217 rc = Serialize_TPML_DIGEST_VALUES(digests,
19191 SerializeCommand_PCR_Extend( const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument
19360 PCR_Extend(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate, const PCR_ExtendResponse& callback) argument
19380 PCR_ExtendSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate) argument
19485 ParseResponse_PCR_Event( const std::string& response, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument
19571 TPML_DIGEST_VALUES digests; local
19602 PCR_EventSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPM2B_EVENT& event_data, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument
[all...]
/system/keymaster/tests/
H A Dandroid_keymaster_messages_test.cpp109 keymaster_digest_t digests[] = {KM_DIGEST_NONE, KM_DIGEST_MD5, KM_DIGEST_SHA1}; local
111 rsp.SetResults(digests);
114 EXPECT_EQ(array_length(digests), deserialized->results_length);
115 EXPECT_EQ(0, memcmp(deserialized->results, digests, array_size(digests)));
H A Dandroid_keymaster_test_utils.cpp794 keymaster_digest_t** digests,
797 unwrap(dev), algorithm, purpose, digests, digests_length);
802 std::copy_if(*digests, *digests + *digests_length, std::back_inserter(filtered_digests),
805 free(*digests);
807 *digests = reinterpret_cast<keymaster_digest_t*>(
809 std::copy(filtered_digests.begin(), filtered_digests.end(), *digests);
791 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
H A Dandroid_keymaster_test.cpp165 string name() const override { return "Wrapped fake keymaster1 w/minimal digests"; }
200 string name() const override { return "Wrapped fake keymaster1 w/full digests"; }
738 vector<keymaster_digest_t> digests = { local
744 for (keymaster_digest_t digest : digests) {
758 EXPECT_EQ(digests.size() * key_sizes.size() * 3,
1263 vector<keymaster_digest_t> digests = { local
1274 for (keymaster_digest_t digest : digests) {
1442 keymaster_digest_t digests[] = { local
1455 for (auto digest : digests)
1459 for (auto digest : digests) {
2399 keymaster_digest_t digests[] = { local
[all...]
/system/keymaster/legacy_support/
H A Dkeymaster1_legacy_support.cpp61 keymaster_digest_t* digests; local
64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
66 LOG(ERROR) << "Error " << error << " getting supported digests from keymaster1 device";
69 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests);
71 auto digest_vec = make_vector(digests, digests_length);
/system/tpm/tpm_manager/server/
H A Dtpm2_nvram_impl.cc562 std::vector<std::string> digests; local
564 digests.push_back(policy_record.policy_digests(i));
566 TPM_RC result = session->PolicyOR(digests);
/system/keymaster/contexts/
H A Dsoft_keymaster_device.cpp114 keymaster_digest_t* digests; local
117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
119 LOG_E("Error %d getting supported digests from keymaster1 device", error);
122 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests);
124 auto digest_vec = make_vector(digests, digests_length);
516 keymaster_digest_t** digests,
521 if (!digests || !digests_length)
526 return km1_dev->get_supported_digests(km1_dev, algorithm, purpose, digests, digests_length);
540 *digests = reinterpret_cast<keymaster_digest_t*>(malloc(*digests_length * sizeof(**digests)));
513 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
[all...]

Completed in 1848 milliseconds