Lines Matching refs:req
80 GenerateKeyRequest req(ver); in TEST() local
81 req.key_description.Reinitialize(params, array_length(params)); in TEST()
82 req.attestation_signing_key_blob = in TEST()
84 req.attest_key_params.Reinitialize(params, array_length(params)); in TEST()
85 req.issuer_subject = KeymasterBlob(reinterpret_cast<const uint8_t*>("bar"), 3); in TEST()
87 UniquePtr<GenerateKeyRequest> deserialized(round_trip(ver, req, ver < 4 ? 78 : 170)); in TEST()
88 EXPECT_EQ(deserialized->key_description, req.key_description); in TEST()
93 EXPECT_EQ(0, memcmp(req.attestation_signing_key_blob.key_material, in TEST()
96 EXPECT_EQ(deserialized->attest_key_params, req.attest_key_params); in TEST()
97 EXPECT_EQ(0, memcmp(req.issuer_subject.data, deserialized->issuer_subject.data, in TEST()
161 GenerateRkpKeyRequest req(ver); in TEST() local
162 req.test_mode = true; in TEST()
164 UniquePtr<GenerateRkpKeyRequest> deserialized(round_trip(ver, req, 1)); in TEST()
165 EXPECT_EQ(deserialized->test_mode, req.test_mode); in TEST()
193 GenerateCsrRequest req(ver); in TEST() local
194 req.test_mode = true; in TEST()
195 req.num_keys = 2; in TEST()
196 req.keys_to_sign_array = new KeymasterBlob[req.num_keys]; in TEST()
197 for (size_t i = 0; i < req.num_keys; i++) { in TEST()
198 req.SetKeyToSign(i, dup_array(TEST_DATA), array_length(TEST_DATA)); in TEST()
200 req.SetEndpointEncCertChain(dup_array(TEST_DATA), array_length(TEST_DATA)); in TEST()
201 req.SetChallenge(dup_array(TEST_DATA), array_length(TEST_DATA)); in TEST()
202 UniquePtr<GenerateCsrRequest> deserialized(round_trip(ver, req, 65)); in TEST()
203 EXPECT_EQ(deserialized->test_mode, req.test_mode); in TEST()
204 EXPECT_EQ(deserialized->num_keys, req.num_keys); in TEST()
205 for (int i = 0; i < (int)req.num_keys; i++) { in TEST()
207 req.keys_to_sign_array[i].data_length); in TEST()
209 req.keys_to_sign_array[i].data, in TEST()
210 req.keys_to_sign_array[i].data_length)); in TEST()
213 req.endpoint_enc_cert_chain.data_length); in TEST()
215 req.endpoint_enc_cert_chain.data, in TEST()
216 req.endpoint_enc_cert_chain.data_length)); in TEST()
217 EXPECT_EQ(deserialized->challenge.data_length, req.challenge.data_length); in TEST()
218 EXPECT_EQ(0, std::memcmp(deserialized->challenge.data, req.challenge.data, in TEST()
219 req.challenge.data_length)); in TEST()
254 GenerateCsrV2Request req(ver); in TEST() local
255 EXPECT_TRUE(req.InitKeysToSign(2)); in TEST()
256 for (size_t i = 0; i < req.num_keys; i++) { in TEST()
257 req.SetKeyToSign(i, dup_array(TEST_DATA), array_length(TEST_DATA)); in TEST()
259 req.SetChallenge(dup_array(TEST_DATA), array_length(TEST_DATA)); in TEST()
260 UniquePtr<GenerateCsrV2Request> deserialized(round_trip(ver, req, 49)); in TEST()
261 EXPECT_EQ(deserialized->num_keys, req.num_keys); in TEST()
262 for (int i = 0; i < (int)req.num_keys; i++) { in TEST()
264 req.keys_to_sign_array[i].data_length); in TEST()
266 req.keys_to_sign_array[i].data, in TEST()
267 req.keys_to_sign_array[i].data_length)); in TEST()
269 EXPECT_EQ(deserialized->challenge.data_length, req.challenge.data_length); in TEST()
270 EXPECT_EQ(0, std::memcmp(deserialized->challenge.data, req.challenge.data, in TEST()
271 req.challenge.data_length)); in TEST()
294 GetKeyCharacteristicsRequest req(ver); in TEST() local
295 req.additional_params.Reinitialize(params, array_length(params)); in TEST()
296 req.SetKeyMaterial("foo", 3); in TEST()
298 UniquePtr<GetKeyCharacteristicsRequest> deserialized(round_trip(ver, req, 85)); in TEST()
708 ConfigureRequest req(ver); in TEST() local
709 req.os_version = 1; in TEST()
710 req.os_patchlevel = 1; in TEST()
712 UniquePtr<ConfigureRequest> deserialized(round_trip(ver, req, 8)); in TEST()
713 EXPECT_EQ(deserialized->os_version, req.os_version); in TEST()
714 EXPECT_EQ(deserialized->os_patchlevel, req.os_patchlevel); in TEST()
727 ConfigureVendorPatchlevelRequest req(ver); in TEST() local
728 req.vendor_patchlevel = 2; in TEST()
730 UniquePtr<ConfigureVendorPatchlevelRequest> deserialized(round_trip(ver, req, 4)); in TEST()
731 EXPECT_EQ(deserialized->vendor_patchlevel, req.vendor_patchlevel); in TEST()
744 ConfigureBootPatchlevelRequest req(ver); in TEST() local
745 req.boot_patchlevel = 2; in TEST()
747 UniquePtr<ConfigureBootPatchlevelRequest> deserialized(round_trip(ver, req, 4)); in TEST()
748 EXPECT_EQ(deserialized->boot_patchlevel, req.boot_patchlevel); in TEST()
761 ConfigureVerifiedBootInfoRequest req(ver, "super", "duper", {1, 2, 3, 4, 5, 6}); in TEST() local
763 UniquePtr<ConfigureVerifiedBootInfoRequest> deserialized(round_trip(ver, req, 28)); in TEST()
765 EXPECT_EQ(deserialized->boot_state, req.boot_state); in TEST()
766 EXPECT_EQ(deserialized->bootloader_state, req.bootloader_state); in TEST()
767 EXPECT_EQ(deserialized->vbmeta_digest, req.vbmeta_digest); in TEST()
848 UpgradeKeyResponse req(ver); in TEST() local
849 req.error = KM_ERROR_OK; in TEST()
850 req.upgraded_key.key_material = dup_array(TEST_DATA); in TEST()
851 req.upgraded_key.key_material_size = array_length(TEST_DATA); in TEST()
853 UniquePtr<UpgradeKeyResponse> deserialized(round_trip(ver, req, 19)); in TEST()
855 EXPECT_EQ(req.upgraded_key.key_material_size, deserialized->upgraded_key.key_material_size); in TEST()
856 EXPECT_EQ(0, memcmp(req.upgraded_key.key_material, deserialized->upgraded_key.key_material, in TEST()
857 req.upgraded_key.key_material_size)); in TEST()