/system/tpm/trunks/ |
H A D | policy_session_test.cc | 124 std::vector<std::string> digests; local 125 digests.push_back("digest1"); 126 digests.push_back("digest2"); 127 digests.push_back("digest3"); 131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests)); 132 EXPECT_EQ(tpm_digests.count, digests.size()); 133 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[0]), digests[0]); local 134 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[1]), digests[ local 135 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[2]), digests[2]); local 140 std::vector<std::string> digests; local 149 std::vector<std::string> digests; local [all...] |
H A D | policy_session_impl.cc | 90 TPM_RC PolicySessionImpl::PolicyOR(const std::vector<std::string>& digests) { argument 91 if (digests.size() >= arraysize(TPML_DIGEST::digests)) { 92 LOG(ERROR) << "TPM2.0 Spec only allows for up to 8 digests."; 96 tpm_digests.count = digests.size(); 97 for (size_t i = 0; i < digests.size(); i++) { 98 tpm_digests.digests[i] = Make_TPM2B_DIGEST(digests[i]);
|
H A D | tpm_utility_test.cc | 409 TPML_DIGEST_VALUES digests; local 412 .WillOnce(DoAll(SaveArg<2>(&digests), Return(TPM_RC_SUCCESS))); 415 EXPECT_EQ(1u, digests.count); 416 EXPECT_EQ(TPM_ALG_SHA256, digests.digests[0].hash_alg); 418 EXPECT_EQ(0, memcmp(hash_string.data(), digests.digests[0].digest.sha256, 447 pcr_values.digests[0].size = 5; 1527 pcr_values.digests[0] = Make_TPM2B_DIGEST(pcr_value);
|
H A D | trunks_client_test.cc | 710 std::vector<std::string> digests; local 711 digests.push_back(sign_digest); 712 digests.push_back(decrypt_digest); 713 result = trial_session->PolicyOR(digests); 774 result = policy_session->PolicyOR(digests); 798 result = policy_session->PolicyOR(digests);
|
H A D | tpm_utility_impl.cc | 358 TPML_DIGEST_VALUES digests; local 359 digests.count = 1; 360 digests.digests[0].hash_alg = TPM_ALG_SHA256; 361 crypto::SHA256HashString(extend_data, digests.digests[0].digest.sha256, 368 return factory_.GetTpm()->PCR_ExtendSync(pcr_handle, pcr_name, digests, 403 pcr_value->assign(StringFrom_TPM2B_DIGEST(pcr_values.digests[0]));
|
H A D | tpm_generated.h | 1115 TPM2B_DIGEST digests[8]; member in struct:trunks::TPML_DIGEST 1120 TPMT_HA digests[HASH_COUNT]; member in struct:trunks::TPML_DIGEST_VALUES 4628 const TPML_DIGEST_VALUES& digests, 4636 const TPML_DIGEST_VALUES& digests, 4641 const TPML_DIGEST_VALUES& digests, 4644 const TPML_DIGEST_VALUES& digests)> 4654 TPML_DIGEST_VALUES* digests, 4664 TPML_DIGEST_VALUES* digests,
|
H A D | tpm_generated.cc | 3388 if (arraysize(value.digests) < value.count) { 3392 result = Serialize_TPM2B_DIGEST(value.digests[i], buffer); 3411 if (arraysize(value->digests) < value->count) { 3415 result = Parse_TPM2B_DIGEST(buffer, &value->digests[i], value_bytes); 3433 if (arraysize(value.digests) < value.count) { 3437 result = Serialize_TPMT_HA(value.digests[i], buffer); 3456 if (arraysize(value->digests) < value->count) { 3460 result = Parse_TPMT_HA(buffer, &value->digests[i], value_bytes); 19194 const TPML_DIGEST_VALUES& digests, 19217 rc = Serialize_TPML_DIGEST_VALUES(digests, 19191 SerializeCommand_PCR_Extend( const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 19360 PCR_Extend(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate, const PCR_ExtendResponse& callback) argument 19380 PCR_ExtendSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPML_DIGEST_VALUES& digests, AuthorizationDelegate* authorization_delegate) argument 19485 ParseResponse_PCR_Event( const std::string& response, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument 19571 TPML_DIGEST_VALUES digests; local 19602 PCR_EventSync(const TPMI_DH_PCR& pcr_handle, const std::string& pcr_handle_name, const TPM2B_EVENT& event_data, TPML_DIGEST_VALUES* digests, AuthorizationDelegate* authorization_delegate) argument [all...] |
/system/keymaster/tests/ |
H A D | android_keymaster_messages_test.cpp | 109 keymaster_digest_t digests[] = {KM_DIGEST_NONE, KM_DIGEST_MD5, KM_DIGEST_SHA1}; local 111 rsp.SetResults(digests); 114 EXPECT_EQ(array_length(digests), deserialized->results_length); 115 EXPECT_EQ(0, memcmp(deserialized->results, digests, array_size(digests)));
|
H A D | android_keymaster_test_utils.cpp | 794 keymaster_digest_t** digests, 797 unwrap(dev), algorithm, purpose, digests, digests_length); 802 std::copy_if(*digests, *digests + *digests_length, std::back_inserter(filtered_digests), 805 free(*digests); 807 *digests = reinterpret_cast<keymaster_digest_t*>( 809 std::copy(filtered_digests.begin(), filtered_digests.end(), *digests); 791 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
|
H A D | android_keymaster_test.cpp | 165 string name() const override { return "Wrapped fake keymaster1 w/minimal digests"; } 200 string name() const override { return "Wrapped fake keymaster1 w/full digests"; } 738 vector<keymaster_digest_t> digests = { local 744 for (keymaster_digest_t digest : digests) { 758 EXPECT_EQ(digests.size() * key_sizes.size() * 3, 1263 vector<keymaster_digest_t> digests = { local 1274 for (keymaster_digest_t digest : digests) { 1442 keymaster_digest_t digests[] = { local 1455 for (auto digest : digests) 1459 for (auto digest : digests) { 2399 keymaster_digest_t digests[] = { local [all...] |
/system/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.cpp | 61 keymaster_digest_t* digests; local 64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 66 LOG(ERROR) << "Error " << error << " getting supported digests from keymaster1 device"; 69 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); 71 auto digest_vec = make_vector(digests, digests_length);
|
/system/tpm/tpm_manager/server/ |
H A D | tpm2_nvram_impl.cc | 562 std::vector<std::string> digests; local 564 digests.push_back(policy_record.policy_digests(i)); 566 TPM_RC result = session->PolicyOR(digests);
|
/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 114 keymaster_digest_t* digests; local 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 119 LOG_E("Error %d getting supported digests from keymaster1 device", error); 122 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); 124 auto digest_vec = make_vector(digests, digests_length); 516 keymaster_digest_t** digests, 521 if (!digests || !digests_length) 526 return km1_dev->get_supported_digests(km1_dev, algorithm, purpose, digests, digests_length); 540 *digests = reinterpret_cast<keymaster_digest_t*>(malloc(*digests_length * sizeof(**digests))); 513 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument [all...] |