Lines Matching full:1
22 #define ARCB_MEAS_HMAC_SHA512 1
24 #define PAF_PHKH_ATT (1ULL << 61)
65 report_skip("Attestation version 1 not supported"); in test_attest_v1()
79 arcb->nks = 1; in test_attest_v1()
91 report(cc == 1 && uvcb.header.rc == 0x101, "invalid continuation token"); in test_attest_v1()
94 uvcb.user_data_length = sizeof(uvcb.user_data) + 1; in test_attest_v1()
96 report(cc == 1 && uvcb.header.rc == 0x102, "invalid user data size"); in test_attest_v1()
101 report(cc == 1 && uvcb.header.rc == 0x103, "invalid address arcb"); in test_attest_v1()
108 report(cc == 1 && uvcb.header.rc == 0x106, "unsupported version"); in test_attest_v1()
111 arcb->req_len += 1; in test_attest_v1()
113 report(cc == 1 && uvcb.header.rc == 0x107, "arcb too big"); in test_attest_v1()
114 arcb->req_len -= 1; in test_attest_v1()
123 report(cc == 1 && uvcb.header.rc == 0x107, "too many nks for arcb"); in test_attest_v1()
124 arcb->nks = 1; in test_attest_v1()
128 report(cc == 1 && uvcb.header.rc == 0x108, "invalid num key slots"); in test_attest_v1()
129 arcb->nks = 1; in test_attest_v1()
137 report(cc == 1 && uvcb.header.rc == 0x109, "encrypted size too big"); in test_attest_v1()
140 report(cc == 1 && uvcb.header.rc == 0x109, "encrypted size too small"); in test_attest_v1()
145 report(cc == 1 && uvcb.header.rc == 0x10a, "invalid flag"); in test_attest_v1()
150 report(cc == 1 && uvcb.header.rc == 0x10b, "invalid measurement algorithm"); in test_attest_v1()
154 report(cc == 1 && uvcb.header.rc == 0x10c, "unable unseal"); in test_attest_v1()
158 report(cc == 1 && uvcb.header.rc == 0x10d, "invalid measurement size"); in test_attest_v1()
163 report(cc == 1 && uvcb.header.rc == 0x10e, "invalid additional size"); in test_attest_v1()
184 uvcb.header.len -= 1; in test_attest()
187 uvcb.header.len += 1; in test_attest()
189 uvcb.header.len += 1; in test_attest()
192 uvcb.header.len -= 1; in test_attest()