METHOD(imc_t, destroy, void,
private_tnc_imc_t *this)
{
- dlclose(this->handle);
+ //dlclose(this->handle);
this->mutex->destroy(this->mutex);
free(this->supported_types);
free(this->name);
METHOD(imv_t, destroy, void,
private_tnc_imv_t *this)
{
- dlclose(this->handle);
+ //dlclose(this->handle);
this->mutex->destroy(this->mutex);
free(this->supported_types);
free(this->name);
}
}
DESTROY_IF(e);
-
+
this->pcrs->insert_last(this->pcrs, new);
qsort(this->pcrs, this->pcrs->get_count(this->pcrs),
*out_pcr_composite = chunk_clone(pcr_composite);
DBG4(DBG_PTS, "calculated PCR Composite: %B", out_pcr_composite);
}
-
+
/* SHA1 hash of PCR Composite to construct TPM_QUOTE_INFO */
hasher = lib->crypto->create_hasher(lib->crypto, HASH_SHA1);
hasher->allocate_hash(hasher, pcr_composite, &hash_pcr_composite);
hasher->destroy(hasher);
-
+
writer->write_data(writer, hash_pcr_composite);
chunk_clear(&pcr_composite);
chunk_clear(&hash_pcr_composite);
-
+
if (!this->secret.ptr)
{
DBG1(DBG_PTS, "Secret assessment value unavailable",
private_pts_t *this, chunk_t data, chunk_t signature)
{
public_key_t *aik_pub_key;
- chunk_t key_encoding;
aik_pub_key = this->aik->get_public_key(this->aik);
if (!aik_pub_key)
/**
* Verification of an EMPSA PKCS1 signature described in PKCS#1
*/
-static bool verify_rsa_signature(private_openssl_rsa_public_key_t *this,
+static bool verify_signature(private_openssl_rsa_public_key_t *this,
int type, chunk_t data, chunk_t signature)
{
bool valid = FALSE;
switch (scheme)
{
case SIGN_RSA_SHA1:
- return verify_rsa_signature(this, NID_sha1, data, signature);
+ return verify_signature(this, NID_sha1, data, signature);
case SIGN_RSA_EMSA_PKCS1_NULL:
return verify_emsa_pkcs1_signature(this, NID_undef, data, signature);
case SIGN_RSA_EMSA_PKCS1_SHA1: