Lines Matching refs:msg
51 EmptyKeymasterResponse msg(ver); in TEST() local
52 msg.error = KM_ERROR_OK; in TEST()
54 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); in TEST()
60 EmptyKeymasterResponse msg(ver); in TEST() local
61 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in TEST()
63 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); in TEST()
267 GetKeyCharacteristicsResponse msg(ver); in TEST() local
268 msg.error = KM_ERROR_OK; in TEST()
269 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
270 msg.unenforced.Reinitialize(params, array_length(params)); in TEST()
272 UniquePtr<GetKeyCharacteristicsResponse> deserialized(round_trip(ver, msg, 160)); in TEST()
273 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
274 EXPECT_EQ(msg.unenforced, deserialized->unenforced); in TEST()
280 BeginOperationRequest msg(ver); in TEST() local
281 msg.purpose = KM_PURPOSE_SIGN; in TEST()
282 msg.SetKeyMaterial("foo", 3); in TEST()
283 msg.additional_params.Reinitialize(params, array_length(params)); in TEST()
285 UniquePtr<BeginOperationRequest> deserialized(round_trip(ver, msg, 89)); in TEST()
289 EXPECT_EQ(msg.additional_params, deserialized->additional_params); in TEST()
295 BeginOperationResponse msg(ver); in TEST() local
296 msg.error = KM_ERROR_OK; in TEST()
297 msg.op_handle = 0xDEADBEEF; in TEST()
298 msg.output_params.push_back(Authorization(TAG_NONCE, "foo", 3)); in TEST()
303 deserialized.reset(round_trip(ver, msg, 12)); in TEST()
309 deserialized.reset(round_trip(ver, msg, 39)); in TEST()
326 EXPECT_EQ(msg.output_params, deserialized->output_params); in TEST()
336 BeginOperationResponse msg(ver); in TEST() local
337 msg.error = KM_ERROR_INVALID_OPERATION_HANDLE; in TEST()
338 msg.op_handle = 0xDEADBEEF; in TEST()
340 UniquePtr<BeginOperationResponse> deserialized(round_trip(ver, msg, 4)); in TEST()
347 UpdateOperationRequest msg(ver); in TEST() local
348 msg.op_handle = 0xDEADBEEF; in TEST()
349 msg.input.Reinitialize("foo", 3); in TEST()
354 deserialized.reset(round_trip(ver, msg, 15)); in TEST()
360 deserialized.reset(round_trip(ver, msg, 27)); in TEST()
372 UpdateOperationResponse msg(ver); in TEST() local
373 msg.error = KM_ERROR_OK; in TEST()
374 msg.output.Reinitialize("foo", 3); in TEST()
375 msg.input_consumed = 99; in TEST()
376 msg.output_params.push_back(TAG_APPLICATION_ID, "bar", 3); in TEST()
381 deserialized.reset(round_trip(ver, msg, 11)); in TEST()
384 deserialized.reset(round_trip(ver, msg, 15)); in TEST()
389 deserialized.reset(round_trip(ver, msg, 42)); in TEST()
419 FinishOperationRequest msg(ver); in TEST() local
420 msg.op_handle = 0xDEADBEEF; in TEST()
421 msg.signature.Reinitialize("bar", 3); in TEST()
422 msg.input.Reinitialize("baz", 3); in TEST()
427 deserialized.reset(round_trip(ver, msg, 15)); in TEST()
431 deserialized.reset(round_trip(ver, msg, 27)); in TEST()
435 deserialized.reset(round_trip(ver, msg, 34)); in TEST()
448 FinishOperationResponse msg(ver); in TEST() local
449 msg.error = KM_ERROR_OK; in TEST()
450 msg.output.Reinitialize("foo", 3); in TEST()
456 deserialized.reset(round_trip(ver, msg, 11)); in TEST()
461 deserialized.reset(round_trip(ver, msg, 23)); in TEST()
466 EXPECT_EQ(msg.error, deserialized->error); in TEST()
467 EXPECT_EQ(msg.output.available_read(), deserialized->output.available_read()); in TEST()
468 EXPECT_EQ(0, memcmp(msg.output.peek_read(), deserialized->output.peek_read(), in TEST()
469 msg.output.available_read())); in TEST()
475 ImportKeyRequest msg(ver); in TEST() local
476 msg.key_description.Reinitialize(params, array_length(params)); in TEST()
477 msg.key_format = KM_KEY_FORMAT_X509; in TEST()
478 msg.key_data = KeymasterKeyBlob(reinterpret_cast<const uint8_t*>("foo"), 3); in TEST()
479 msg.attestation_signing_key_blob = in TEST()
481 msg.attest_key_params.Reinitialize(params, array_length(params)); in TEST()
482 msg.issuer_subject = KeymasterBlob(reinterpret_cast<const uint8_t*>("bar"), 3); in TEST()
484 UniquePtr<ImportKeyRequest> deserialized(round_trip(ver, msg, ver < 4 ? 89 : 181)); in TEST()
485 EXPECT_EQ(msg.key_description, deserialized->key_description); in TEST()
486 EXPECT_EQ(msg.key_format, deserialized->key_format); in TEST()
487 EXPECT_EQ(msg.key_data.key_material_size, deserialized->key_data.key_material_size); in TEST()
488 EXPECT_EQ(0, memcmp(msg.key_data.key_material, deserialized->key_data.key_material, in TEST()
489 msg.key_data.key_material_size)); in TEST()
494 EXPECT_EQ(0, memcmp(msg.attestation_signing_key_blob.key_material, in TEST()
496 msg.attestation_signing_key_blob.key_material_size)); in TEST()
497 EXPECT_EQ(deserialized->attest_key_params, msg.attest_key_params); in TEST()
498 EXPECT_EQ(0, memcmp(msg.issuer_subject.data, deserialized->issuer_subject.data, in TEST()
506 ImportKeyResponse msg(ver); in TEST() local
507 msg.error = KM_ERROR_OK; in TEST()
508 msg.SetKeyMaterial("foo", 3); in TEST()
509 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
510 msg.unenforced.Reinitialize(params, array_length(params)); in TEST()
512 msg.certificate_chain = CertificateChain(3); in TEST()
513 msg.certificate_chain.entries[0] = {dup_buffer("foo", 3), 3}; in TEST()
514 msg.certificate_chain.entries[1] = {dup_buffer("bar", 3), 3}; in TEST()
515 msg.certificate_chain.entries[2] = {dup_buffer("baz", 3), 3}; in TEST()
519 deserialized.reset(round_trip(ver, msg, 167)); in TEST()
521 deserialized.reset(round_trip(ver, msg, 192)); in TEST()
524 EXPECT_EQ(msg.error, deserialized->error); in TEST()
525 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size); in TEST()
526 EXPECT_EQ(0, memcmp(msg.key_blob.key_material, deserialized->key_blob.key_material, in TEST()
527 msg.key_blob.key_material_size)); in TEST()
528 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
529 EXPECT_EQ(msg.unenforced, deserialized->unenforced); in TEST()
549 ExportKeyRequest msg(ver); in TEST() local
550 msg.additional_params.Reinitialize(params, array_length(params)); in TEST()
551 msg.key_format = KM_KEY_FORMAT_X509; in TEST()
552 msg.SetKeyMaterial("foo", 3); in TEST()
554 UniquePtr<ExportKeyRequest> deserialized(round_trip(ver, msg, 89)); in TEST()
555 EXPECT_EQ(msg.additional_params, deserialized->additional_params); in TEST()
556 EXPECT_EQ(msg.key_format, deserialized->key_format); in TEST()
564 ExportKeyResponse msg(ver); in TEST() local
565 msg.error = KM_ERROR_OK; in TEST()
566 msg.SetKeyMaterial("foo", 3); in TEST()
568 UniquePtr<ExportKeyResponse> deserialized(round_trip(ver, msg, 11)); in TEST()
576 DeleteKeyRequest msg(ver); in TEST() local
577 msg.SetKeyMaterial("foo", 3); in TEST()
579 UniquePtr<DeleteKeyRequest> deserialized(round_trip(ver, msg, 7)); in TEST()
587 DeleteAllKeysRequest msg(ver); in TEST() local
588 UniquePtr<DeleteAllKeysRequest> deserialized(round_trip(ver, msg, 0)); in TEST()
593 GetVersionRequest msg(0); in TEST() local
595 size_t size = msg.SerializedSize(); in TEST()
599 EXPECT_EQ(buf.get() + size, msg.Serialize(buf.get(), buf.get() + size)); in TEST()
608 GetVersionResponse msg(0); in TEST() local
609 msg.error = KM_ERROR_OK; in TEST()
610 msg.major_ver = 9; in TEST()
611 msg.minor_ver = 98; in TEST()
612 msg.subminor_ver = 38; in TEST()
614 size_t size = msg.SerializedSize(); in TEST()
618 EXPECT_EQ(buf.get() + size, msg.Serialize(buf.get(), buf.get() + size)); in TEST()
624 EXPECT_EQ(9U, msg.major_ver); in TEST()
625 EXPECT_EQ(98U, msg.minor_ver); in TEST()
626 EXPECT_EQ(38U, msg.subminor_ver); in TEST()
630 GetVersion2Request msg; in TEST() local
632 msg.max_message_version = 0xDEADBEEF; in TEST()
633 size_t size = msg.SerializedSize(); in TEST()
637 EXPECT_EQ(buf.get() + size, msg.Serialize(buf.get(), buf.get() + size)); in TEST()
643 EXPECT_EQ(0xDEADBEEF, msg.max_message_version); in TEST()
647 GetVersion2Response msg; in TEST() local
648 msg.error = KM_ERROR_OK; in TEST()
649 msg.km_version = KmVersion::KEYMINT_1; in TEST()
650 msg.km_date = 20121900; in TEST()
652 size_t size = msg.SerializedSize(); in TEST()
656 EXPECT_EQ(buf.get() + size, msg.Serialize(buf.get(), buf.get() + size)); in TEST()
662 EXPECT_EQ(KmVersion::KEYMINT_1, msg.km_version); in TEST()
663 EXPECT_EQ(20121900U, msg.km_date); in TEST()
740 AddEntropyRequest msg(ver); in TEST() local
741 msg.random_data.Reinitialize("foo", 3); in TEST()
743 UniquePtr<AddEntropyRequest> deserialized(round_trip(ver, msg, 7)); in TEST()
751 AbortOperationRequest msg(ver); in TEST() local
752 UniquePtr<AbortOperationRequest> deserialized(round_trip(ver, msg, 8)); in TEST()
758 AttestKeyRequest msg(ver); in TEST() local
759 msg.SetKeyMaterial("foo", 3); in TEST()
760 msg.attest_params.Reinitialize(params, array_length(params)); in TEST()
762 UniquePtr<AttestKeyRequest> deserialized(round_trip(ver, msg, 85)); in TEST()
765 EXPECT_EQ(msg.attest_params, deserialized->attest_params); in TEST()
771 AttestKeyResponse msg(ver); in TEST() local
772 msg.error = KM_ERROR_OK; in TEST()
773 msg.certificate_chain = CertificateChain(3); in TEST()
774 EXPECT_TRUE(!!msg.certificate_chain.entries); in TEST()
775 msg.certificate_chain.entries[0] = {dup_buffer("foo", 3), 3}; in TEST()
776 msg.certificate_chain.entries[1] = {dup_buffer("bar", 3), 3}; in TEST()
777 msg.certificate_chain.entries[2] = {dup_buffer("baz", 3), 3}; in TEST()
779 UniquePtr<AttestKeyResponse> deserialized(round_trip(ver, msg, 29)); in TEST()
795 UpgradeKeyRequest msg(ver); in TEST() local
796 msg.SetKeyMaterial("foo", 3); in TEST()
797 msg.upgrade_params.Reinitialize(params, array_length(params)); in TEST()
799 UniquePtr<UpgradeKeyRequest> deserialized(round_trip(ver, msg, 85)); in TEST()
802 EXPECT_EQ(msg.upgrade_params, deserialized->upgrade_params); in TEST()
823 GenerateTimestampTokenRequest msg(ver); in TEST() local
824 msg.challenge = 1; in TEST()
825 UniquePtr<GenerateTimestampTokenRequest> deserialized(round_trip(ver, msg, 8)); in TEST()
832 GenerateTimestampTokenResponse msg(ver); in TEST() local
833 msg.error = KM_ERROR_OK; in TEST()
834 msg.token.challenge = 1; in TEST()
835 msg.token.timestamp = 2; in TEST()
836 msg.token.security_level = KM_SECURITY_LEVEL_SOFTWARE; in TEST()
837 msg.token.mac.data = dup_array(TEST_DATA); in TEST()
838 msg.token.mac.data_length = array_length(TEST_DATA); in TEST()
839 UniquePtr<GenerateTimestampTokenResponse> deserialized(round_trip(ver, msg, 39)); in TEST()
843 EXPECT_EQ(msg.token.mac.data_length, deserialized->token.mac.data_length); in TEST()
845 0, memcmp(msg.token.mac.data, deserialized->token.mac.data, msg.token.mac.data_length)); in TEST()
852 GetRootOfTrustRequest msg(ver, challenge); in TEST() local
854 UniquePtr<GetRootOfTrustRequest> deserialized(round_trip(ver, msg, 20)); in TEST()
862 GetRootOfTrustResponse msg(ver, rootOfTrust); in TEST() local
863 msg.error = KM_ERROR_OK; in TEST()
865 UniquePtr<GetRootOfTrustResponse> deserialized(round_trip(ver, msg, 24)); in TEST()
870 #define SET_ATTESTATION_ID(x) msg.x.Reinitialize(#x, strlen(#x))
882 SetAttestationIdsRequest msg(ver); in TEST() local
892 UniquePtr<SetAttestationIdsRequest> deserialized(round_trip(ver, msg, 81)); in TEST()
938 Message msg(ver); in parse_garbage() local
943 msg.Deserialize(&p, end); in parse_garbage()
958 Message msg(ver); in parse_garbage() local
963 msg.Deserialize(&p, end); in parse_garbage()