Lines Matching refs:command_size
9420 UINT32 command_size = 10; // Header size.
9447 command_size += startup_type_bytes.size();
9468 command_size += authorization_size_bytes.size() +
9481 command_size,
9493 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
9656 UINT32 command_size = 10; // Header size.
9683 command_size += shutdown_type_bytes.size();
9704 command_size += authorization_size_bytes.size() +
9717 command_size,
9729 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
9892 UINT32 command_size = 10; // Header size.
9919 command_size += full_test_bytes.size();
9940 command_size += authorization_size_bytes.size() +
9953 command_size,
9965 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
10128 UINT32 command_size = 10; // Header size.
10155 command_size += to_test_bytes.size();
10176 command_size += authorization_size_bytes.size() +
10189 command_size,
10201 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
10378 UINT32 command_size = 10; // Header size.
10415 command_size += authorization_size_bytes.size() +
10428 command_size,
10440 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
10653 UINT32 command_size = 10; // Header size.
10730 command_size += tpm_key_bytes.size();
10734 command_size += bind_bytes.size();
10738 command_size += nonce_caller_bytes.size();
10742 command_size += encrypted_salt_bytes.size();
10746 command_size += session_type_bytes.size();
10750 command_size += symmetric_bytes.size();
10754 command_size += auth_hash_bytes.size();
10775 command_size += authorization_size_bytes.size() +
10788 command_size,
10800 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
11042 UINT32 command_size = 10; // Header size.
11069 command_size += session_handle_bytes.size();
11090 command_size += authorization_size_bytes.size() +
11103 command_size,
11115 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
11287 UINT32 command_size = 10; // Header size.
11350 command_size += parent_handle_bytes.size();
11354 command_size += in_sensitive_bytes.size();
11358 command_size += in_public_bytes.size();
11362 command_size += outside_info_bytes.size();
11366 command_size += creation_pcr_bytes.size();
11387 command_size += authorization_size_bytes.size() +
11400 command_size,
11412 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
11689 UINT32 command_size = 10; // Header size.
11738 command_size += parent_handle_bytes.size();
11742 command_size += in_private_bytes.size();
11746 command_size += in_public_bytes.size();
11767 command_size += authorization_size_bytes.size() +
11780 command_size,
11792 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
12015 UINT32 command_size = 10; // Header size.
12064 command_size += in_private_bytes.size();
12068 command_size += in_public_bytes.size();
12072 command_size += hierarchy_bytes.size();
12093 command_size += authorization_size_bytes.size() +
12106 command_size,
12118 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
12336 UINT32 command_size = 10; // Header size.
12363 command_size += object_handle_bytes.size();
12384 command_size += authorization_size_bytes.size() +
12397 command_size,
12409 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
12642 UINT32 command_size = 10; // Header size.
12698 command_size += activate_handle_bytes.size();
12702 command_size += key_handle_bytes.size();
12706 command_size += credential_blob_bytes.size();
12710 command_size += secret_bytes.size();
12731 command_size += authorization_size_bytes.size() +
12744 command_size,
12756 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
12973 UINT32 command_size = 10; // Header size.
13022 command_size += handle_bytes.size();
13026 command_size += credential_bytes.size();
13030 command_size += object_name_bytes.size();
13051 command_size += authorization_size_bytes.size() +
13064 command_size,
13076 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
13298 UINT32 command_size = 10; // Header size.
13325 command_size += item_handle_bytes.size();
13346 command_size += authorization_size_bytes.size() +
13359 command_size,
13371 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
13573 UINT32 command_size = 10; // Header size.
13622 command_size += object_handle_bytes.size();
13626 command_size += parent_handle_bytes.size();
13630 command_size += new_auth_bytes.size();
13651 command_size += authorization_size_bytes.size() +
13664 command_size,
13676 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
13891 UINT32 command_size = 10; // Header size.
13947 command_size += object_handle_bytes.size();
13951 command_size += new_parent_handle_bytes.size();
13955 command_size += encryption_key_in_bytes.size();
13959 command_size += symmetric_alg_bytes.size();
13980 command_size += authorization_size_bytes.size() +
13993 command_size,
14005 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
14255 UINT32 command_size = 10; // Header size.
14318 command_size += old_parent_bytes.size();
14322 command_size += new_parent_bytes.size();
14326 command_size += in_duplicate_bytes.size();
14330 command_size += name_bytes.size();
14334 command_size += in_sym_seed_bytes.size();
14355 command_size += authorization_size_bytes.size() +
14368 command_size,
14380 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
14619 UINT32 command_size = 10; // Header size.
14689 command_size += parent_handle_bytes.size();
14693 command_size += encryption_key_bytes.size();
14697 command_size += object_public_bytes.size();
14701 command_size += duplicate_bytes.size();
14705 command_size += in_sym_seed_bytes.size();
14709 command_size += symmetric_alg_bytes.size();
14730 command_size += authorization_size_bytes.size() +
14743 command_size,
14755 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
14977 UINT32 command_size = 10; // Header size.
15033 command_size += key_handle_bytes.size();
15037 command_size += message_bytes.size();
15041 command_size += in_scheme_bytes.size();
15045 command_size += label_bytes.size();
15066 command_size += authorization_size_bytes.size() +
15079 command_size,
15091 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
15305 UINT32 command_size = 10; // Header size.
15361 command_size += key_handle_bytes.size();
15365 command_size += cipher_text_bytes.size();
15369 command_size += in_scheme_bytes.size();
15373 command_size += label_bytes.size();
15394 command_size += authorization_size_bytes.size() +
15407 command_size,
15419 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
15630 UINT32 command_size = 10; // Header size.
15657 command_size += key_handle_bytes.size();
15678 command_size += authorization_size_bytes.size() +
15691 command_size,
15703 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
15918 UINT32 command_size = 10; // Header size.
15960 command_size += key_handle_bytes.size();
15964 command_size += in_point_bytes.size();
15985 command_size += authorization_size_bytes.size() +
15998 command_size,
16010 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
16212 UINT32 command_size = 10; // Header size.
16239 command_size += curve_id_bytes.size();
16260 command_size += authorization_size_bytes.size() +
16273 command_size,
16285 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
16468 UINT32 command_size = 10; // Header size.
16531 command_size += key_a_bytes.size();
16535 command_size += in_qs_b_bytes.size();
16539 command_size += in_qe_b_bytes.size();
16543 command_size += in_scheme_bytes.size();
16547 command_size += counter_bytes.size();
16568 command_size += authorization_size_bytes.size() +
16581 command_size,
16593 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
16827 UINT32 command_size = 10; // Header size.
16882 command_size += key_handle_bytes.size();
16886 command_size += decrypt_bytes.size();
16890 command_size += mode_bytes.size();
16894 command_size += iv_in_bytes.size();
16898 command_size += in_data_bytes.size();
16919 command_size += authorization_size_bytes.size() +
16932 command_size,
16944 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
17175 UINT32 command_size = 10; // Header size.
17224 command_size += data_bytes.size();
17228 command_size += hash_alg_bytes.size();
17232 command_size += hierarchy_bytes.size();
17253 command_size += authorization_size_bytes.size() +
17266 command_size,
17278 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
17498 UINT32 command_size = 10; // Header size.
17547 command_size += handle_bytes.size();
17551 command_size += buffer_bytes.size();
17555 command_size += hash_alg_bytes.size();
17576 command_size += authorization_size_bytes.size() +
17589 command_size,
17601 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
17807 command_size = 10; // Header size.
17834 command_size += bytes_requested_bytes.size();
17855 command_size += authorization_size_bytes.size() +
17868 command_size,
17880 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
18074 UINT32 command_size = 10; // Header size.
18109 command_size += in_data_bytes.size();
18130 command_size += authorization_size_bytes.size() +
18143 command_size,
18155 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
18321 UINT32 command_size = 10; // Header size.
18370 command_size += handle_bytes.size();
18374 command_size += auth_bytes.size();
18378 command_size += hash_alg_bytes.size();
18399 command_size += authorization_size_bytes.size() +
18412 command_size,
18424 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
18615 UINT32 command_size = 10; // Header size.
18657 command_size += auth_bytes.size();
18661 command_size += hash_alg_bytes.size();
18682 command_size += authorization_size_bytes.size() +
18695 command_size,
18707 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
18891 UINT32 command_size = 10; // Header size.
18933 command_size += sequence_handle_bytes.size();
18937 command_size += buffer_bytes.size();
18958 command_size += authorization_size_bytes.size() +
18971 command_size,
18983 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
19157 UINT32 command_size = 10; // Header size.
19206 command_size += sequence_handle_bytes.size();
19210 command_size += buffer_bytes.size();
19214 command_size += hierarchy_bytes.size();
19235 command_size += authorization_size_bytes.size() +
19248 command_size,
19260 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
19485 UINT32 command_size = 10; // Header size.
19534 command_size += pcr_handle_bytes.size();
19538 command_size += sequence_handle_bytes.size();
19542 command_size += buffer_bytes.size();
19563 command_size += authorization_size_bytes.size() +
19576 command_size,
19588 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
19787 UINT32 command_size = 10; // Header size.
19843 command_size += object_handle_bytes.size();
19847 command_size += sign_handle_bytes.size();
19851 command_size += qualifying_data_bytes.size();
19855 command_size += in_scheme_bytes.size();
19876 command_size += authorization_size_bytes.size() +
19889 command_size,
19901 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
20137 UINT32 command_size = 10; // Header size.
20207 command_size += sign_handle_bytes.size();
20211 command_size += object_handle_bytes.size();
20215 command_size += qualifying_data_bytes.size();
20219 command_size += creation_hash_bytes.size();
20223 command_size += in_scheme_bytes.size();
20227 command_size += creation_ticket_bytes.size();
20248 command_size += authorization_size_bytes.size() +
20261 command_size,
20273 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
20514 UINT32 command_size = 10; // Header size.
20570 command_size += sign_handle_bytes.size();
20574 command_size += qualifying_data_bytes.size();
20578 command_size += in_scheme_bytes.size();
20582 command_size += pcrselect_bytes.size();
20603 command_size += authorization_size_bytes.size() +
20616 command_size,
20628 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
20860 UINT32 command_size = 10; // Header size.
20923 command_size += privacy_admin_handle_bytes.size();
20927 command_size += sign_handle_bytes.size();
20931 command_size += session_handle_bytes.size();
20935 command_size += qualifying_data_bytes.size();
20939 command_size += in_scheme_bytes.size();
20960 command_size += authorization_size_bytes.size() +
20973 command_size,
20985 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
21227 UINT32 command_size = 10; // Header size.
21283 command_size += privacy_handle_bytes.size();
21287 command_size += sign_handle_bytes.size();
21291 command_size += qualifying_data_bytes.size();
21295 command_size += in_scheme_bytes.size();
21316 command_size += authorization_size_bytes.size() +
21329 command_size,
21341 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
21575 UINT32 command_size = 10; // Header size.
21631 command_size += privacy_admin_handle_bytes.size();
21635 command_size += sign_handle_bytes.size();
21639 command_size += qualifying_data_bytes.size();
21643 command_size += in_scheme_bytes.size();
21664 command_size += authorization_size_bytes.size() +
21677 command_size,
21689 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
21923 UINT32 command_size = 10; // Header size.
21978 command_size += sign_handle_bytes.size();
21982 command_size += param_size_bytes.size();
21986 command_size += p1_bytes.size();
21990 command_size += s2_bytes.size();
21994 command_size += y2_bytes.size();
22015 command_size += authorization_size_bytes.size() +
22028 command_size,
22040 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
22299 UINT32 command_size = 10; // Header size.
22333 command_size += param_size_bytes.size();
22337 command_size += curve_id_bytes.size();
22358 command_size += authorization_size_bytes.size() +
22371 command_size,
22383 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
22598 UINT32 command_size = 10; // Header size.
22647 command_size += key_handle_bytes.size();
22651 command_size += digest_bytes.size();
22655 command_size += signature_bytes.size();
22676 command_size += authorization_size_bytes.size() +
22689 command_size,
22701 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
22895 UINT32 command_size = 10; // Header size.
22951 command_size += key_handle_bytes.size();
22955 command_size += digest_bytes.size();
22959 command_size += in_scheme_bytes.size();
22963 command_size += validation_bytes.size();
22984 command_size += authorization_size_bytes.size() +
22997 command_size,
23009 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
23207 UINT32 command_size = 10; // Header size.
23255 command_size += auth_bytes.size();
23259 command_size += audit_alg_bytes.size();
23263 command_size += set_list_bytes.size();
23267 command_size += clear_list_bytes.size();
23288 command_size += authorization_size_bytes.size() +
23301 command_size,
23313 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
23494 UINT32 command_size = 10; // Header size.
23528 command_size += pcr_handle_bytes.size();
23532 command_size += digests_bytes.size();
23553 command_size += authorization_size_bytes.size() +
23566 command_size,
23578 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
23751 UINT32 command_size = 10; // Header size.
23793 command_size += pcr_handle_bytes.size();
23797 command_size += event_data_bytes.size();
23818 command_size += authorization_size_bytes.size() +
23831 command_size,
23843 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
24029 UINT32 command_size = 10; // Header size.
24056 command_size += pcr_selection_in_bytes.size();
24077 command_size += authorization_size_bytes.size() +
24090 command_size,
24102 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
24312 UINT32 command_size = 10; // Header size.
24346 command_size += auth_handle_bytes.size();
24350 command_size += pcr_allocation_bytes.size();
24371 command_size += authorization_size_bytes.size() +
24384 command_size,
24396 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
24632 UINT32 command_size = 10; // Header size.
24688 command_size += auth_handle_bytes.size();
24692 command_size += pcr_num_bytes.size();
24696 command_size += auth_policy_bytes.size();
24700 command_size += policy_digest_bytes.size();
24721 command_size += authorization_size_bytes.size() +
24734 command_size,
24746 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
24931 UINT32 command_size = 10; // Header size.
24973 command_size += pcr_handle_bytes.size();
24977 command_size += auth_bytes.size();
24998 command_size += authorization_size_bytes.size() +
25011 command_size,
25023 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
25195 UINT32 command_size = 10; // Header size.
25222 command_size += pcr_handle_bytes.size();
25243 command_size += authorization_size_bytes.size() +
25256 command_size,
25268 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
25443 UINT32 command_size = 10; // Header size.
25520 command_size += auth_object_bytes.size();
25524 command_size += policy_session_bytes.size();
25528 command_size += nonce_tpm_bytes.size();
25532 command_size += cp_hash_a_bytes.size();
25536 command_size += policy_ref_bytes.size();
25540 command_size += expiration_bytes.size();
25544 command_size += auth_bytes.size();
25565 command_size += authorization_size_bytes.size() +
25578 command_size,
25590 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
25838 command_size = 10; // Header size.
25908 command_size += auth_handle_bytes.size();
25912 command_size += policy_session_bytes.size();
25916 command_size += nonce_tpm_bytes.size();
25920 command_size += cp_hash_a_bytes.size();
25924 command_size += policy_ref_bytes.size();
25928 command_size += expiration_bytes.size();
25949 command_size += authorization_size_bytes.size() +
25962 command_size,
25974 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
26217 UINT32 command_size = 10; // Header size.
26287 command_size += policy_session_bytes.size();
26291 command_size += timeout_bytes.size();
26295 command_size += cp_hash_a_bytes.size();
26299 command_size += policy_ref_bytes.size();
26303 command_size += auth_name_bytes.size();
26307 command_size += ticket_bytes.size();
26328 command_size += authorization_size_bytes.size() +
26341 command_size,
26353 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
26542 UINT32 command_size = 10; // Header size.
26576 command_size += policy_session_bytes.size();
26580 command_size += p_hash_list_bytes.size();
26601 command_size += authorization_size_bytes.size() +
26614 command_size,
26626 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
26800 UINT32 command_size = 10; // Header size.
26849 command_size += policy_session_bytes.size();
26853 command_size += pcr_digest_bytes.size();
26857 command_size += pcrs_bytes.size();
26878 command_size += authorization_size_bytes.size() +
26891 command_size,
26903 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
27080 UINT32 command_size = 10; // Header size.
27114 command_size += policy_session_bytes.size();
27118 command_size += locality_bytes.size();
27139 command_size += authorization_size_bytes.size() +
27152 command_size,
27164 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
27343 UINT32 command_size = 10; // Header size.
27413 command_size += auth_handle_bytes.size();
27417 command_size += nv_index_bytes.size();
27421 command_size += policy_session_bytes.size();
27425 command_size += operand_b_bytes.size();
27429 command_size += offset_bytes.size();
27433 command_size += operation_bytes.size();
27454 command_size += authorization_size_bytes.size() +
27467 command_size,
27479 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
27678 UINT32 command_size = 10; // Header size.
27734 command_size += policy_session_bytes.size();
27738 command_size += operand_b_bytes.size();
27742 command_size += offset_bytes.size();
27746 command_size += operation_bytes.size();
27767 command_size += authorization_size_bytes.size() +
27780 command_size,
27792 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
27973 UINT32 command_size = 10; // Header size.
28007 command_size += policy_session_bytes.size();
28011 command_size += code_bytes.size();
28032 command_size += authorization_size_bytes.size() +
28045 command_size,
28057 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
28229 UINT32 command_size = 10; // Header size.
28256 command_size += policy_session_bytes.size();
28277 command_size += authorization_size_bytes.size() +
28290 command_size,
28302 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
28471 UINT32 command_size = 10; // Header size.
28513 command_size += policy_session_bytes.size();
28517 command_size += cp_hash_a_bytes.size();
28538 command_size += authorization_size_bytes.size() +
28551 command_size,
28563 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
28736 UINT32 command_size = 10; // Header size.
28778 command_size += policy_session_bytes.size();
28782 command_size += name_hash_bytes.size();
28803 command_size += authorization_size_bytes.size() +
28816 command_size,
28828 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
29003 UINT32 command_size = 10; // Header size.
29059 command_size += policy_session_bytes.size();
29063 command_size += object_name_bytes.size();
29067 command_size += new_parent_name_bytes.size();
29071 command_size += include_object_bytes.size();
29092 command_size += authorization_size_bytes.size() +
29105 command_size,
29117 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
29301 UINT32 command_size = 10; // Header size.
29364 command_size += policy_session_bytes.size();
29368 command_size += approved_policy_bytes.size();
29372 command_size += policy_ref_bytes.size();
29376 command_size += key_sign_bytes.size();
29380 command_size += check_ticket_bytes.size();
29401 command_size += authorization_size_bytes.size() +
29414 command_size,
29426 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
29610 UINT32 command_size = 10; // Header size.
29637 command_size += policy_session_bytes.size();
29658 command_size += authorization_size_bytes.size() +
29671 command_size,
29683 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
29851 UINT32 command_size = 10; // Header size.
29878 command_size += policy_session_bytes.size();
29899 command_size += authorization_size_bytes.size() +
29912 command_size,
29924 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
30092 UINT32 command_size = 10; // Header size.
30119 command_size += policy_session_bytes.size();
30140 command_size += authorization_size_bytes.size() +
30153 command_size,
30165 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
30365 UINT32 command_size = 10; // Header size.
30399 command_size += policy_session_bytes.size();
30403 command_size += written_set_bytes.size();
30424 command_size += authorization_size_bytes.size() +
30437 command_size,
30449 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
30625 UINT32 command_size = 10; // Header size.
30688 command_size += primary_handle_bytes.size();
30692 command_size += in_sensitive_bytes.size();
30696 command_size += in_public_bytes.size();
30700 command_size += outside_info_bytes.size();
30704 command_size += creation_pcr_bytes.size();
30725 command_size += authorization_size_bytes.size() +
30738 command_size,
30750 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
31042 UINT32 command_size = 10; // Header size.
31083 command_size += auth_handle_bytes.size();
31087 command_size += enable_bytes.size();
31091 command_size += state_bytes.size();
31112 command_size += authorization_size_bytes.size() +
31125 command_size,
31137 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
31315 UINT32 command_size = 10; // Header size.
31364 command_size += auth_handle_bytes.size();
31368 command_size += auth_policy_bytes.size();
31372 command_size += hash_alg_bytes.size();
31393 command_size += authorization_size_bytes.size() +
31406 command_size,
31418 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
31594 UINT32 command_size = 10; // Header size.
31621 command_size += auth_handle_bytes.size();
31642 command_size += authorization_size_bytes.size() +
31655 command_size,
31667 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
31835 UINT32 command_size = 10; // Header size.
31862 command_size += auth_handle_bytes.size();
31883 command_size += authorization_size_bytes.size() +
31896 command_size,
31908 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
32076 UINT32 command_size = 10; // Header size.
32103 command_size += auth_handle_bytes.size();
32124 command_size += authorization_size_bytes.size() +
32137 command_size,
32149 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
32318 UINT32 command_size = 10; // Header size.
32352 command_size += auth_bytes.size();
32356 command_size += disable_bytes.size();
32377 command_size += authorization_size_bytes.size() +
32390 command_size,
32402 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
32575 UINT32 command_size = 10; // Header size.
32617 command_size += auth_handle_bytes.size();
32621 command_size += new_auth_bytes.size();
32642 command_size += authorization_size_bytes.size() +
32655 command_size,
32667 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
32839 UINT32 command_size = 10; // Header size.
32866 command_size += lock_handle_bytes.size();
32887 command_size += authorization_size_bytes.size() +
32900 command_size,
32912 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
33083 UINT32 command_size = 10; // Header size.
33131 command_size += lock_handle_bytes.size();
33135 command_size += new_max_tries_bytes.size();
33139 command_size += new_recovery_time_bytes.size();
33143 command_size += lockout_recovery_bytes.size();
33164 command_size += authorization_size_bytes.size() +
33177 command_size,
33189 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
33371 UINT32 command_size = 10; // Header size.
33412 command_size += auth_bytes.size();
33416 command_size += set_list_bytes.size();
33420 command_size += clear_list_bytes.size();
33441 command_size += authorization_size_bytes.size() +
33454 command_size,
33466 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
33643 UINT32 command_size = 10; // Header size.
33677 command_size += auth_handle_bytes.size();
33681 command_size += algorithm_set_bytes.size();
33702 command_size += authorization_size_bytes.size() +
33715 command_size,
33727 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
33903 UINT32 command_size = 10; // Header size.
33959 command_size += authorization_bytes.size();
33963 command_size += key_handle_bytes.size();
33967 command_size += fu_digest_bytes.size();
33971 command_size += manifest_signature_bytes.size();
33992 command_size += authorization_size_bytes.size() +
34005 command_size,
34017 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
34200 UINT32 command_size = 10; // Header size.
34235 command_size += fu_data_bytes.size();
34256 command_size += authorization_size_bytes.size() +
34269 command_size,
34281 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
34474 UINT32 command_size = 10; // Header size.
34501 command_size += sequence_number_bytes.size();
34522 command_size += authorization_size_bytes.size() +
34535 command_size,
34547 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
34742 UINT32 command_size = 10; // Header size.
34769 command_size += save_handle_bytes.size();
34790 command_size += authorization_size_bytes.size() +
34803 command_size,
34815 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
34997 UINT32 command_size = 10; // Header size.
35024 command_size += context_bytes.size();
35045 command_size += authorization_size_bytes.size() +
35058 command_size,
35070 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
35248 UINT32 command_size = 10; // Header size.
35275 command_size += flush_handle_bytes.size();
35296 command_size += authorization_size_bytes.size() +
35309 command_size,
35321 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
35488 UINT32 command_size = 10; // Header size.
35529 command_size += auth_bytes.size();
35533 command_size += object_handle_bytes.size();
35537 command_size += persistent_handle_bytes.size();
35558 command_size += authorization_size_bytes.size() +
35571 command_size,
35583 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
35761 UINT32 command_size = 10; // Header size.
35798 command_size += authorization_size_bytes.size() +
35811 command_size,
35823 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
35999 UINT32 command_size = 10; // Header size.
36033 command_size += auth_bytes.size();
36037 command_size += new_time_bytes.size();
36058 command_size += authorization_size_bytes.size() +
36071 command_size,
36083 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
36256 UINT32 command_size = 10; // Header size.
36290 command_size += auth_bytes.size();
36294 command_size += rate_adjust_bytes.size();
36315 command_size += authorization_size_bytes.size() +
36328 command_size,
36340 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
36513 UINT32 command_size = 10; // Header size.
36554 command_size += capability_bytes.size();
36558 command_size += property_bytes.size();
36562 command_size += property_count_bytes.size();
36583 command_size += authorization_size_bytes.size() +
36596 command_size,
36608 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
36809 UINT32 command_size = 10; // Header size.
36836 command_size += parameters_bytes.size();
36857 command_size += authorization_size_bytes.size() +
36870 command_size,
36882 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
37048 UINT32 command_size = 10; // Header size.
37097 command_size += auth_handle_bytes.size();
37101 command_size += auth_bytes.size();
37105 command_size += public_info_bytes.size();
37126 command_size += authorization_size_bytes.size() +
37139 command_size,
37151 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
37329 UINT32 command_size = 10; // Header size.
37363 command_size += auth_handle_bytes.size();
37367 command_size += nv_index_bytes.size();
37388 command_size += authorization_size_bytes.size() +
37401 command_size,
37413 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
37591 UINT32 command_size = 10; // Header size.
37625 command_size += nv_index_bytes.size();
37629 command_size += platform_bytes.size();
37650 command_size += authorization_size_bytes.size() +
37663 command_size,
37675 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
37851 UINT32 command_size = 10; // Header size.
37878 command_size += nv_index_bytes.size();
37899 command_size += authorization_size_bytes.size() +
37912 command_size,
37924 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
38142 UINT32 command_size = 10; // Header size.
38198 command_size += auth_handle_bytes.size();
38202 command_size += nv_index_bytes.size();
38206 command_size += data_bytes.size();
38210 command_size += offset_bytes.size();
38231 command_size += authorization_size_bytes.size() +
38244 command_size,
38256 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
38442 UINT32 command_size = 10; // Header size.
38476 command_size += auth_handle_bytes.size();
38480 command_size += nv_index_bytes.size();
38501 command_size += authorization_size_bytes.size() +
38514 command_size,
38526 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
38705 UINT32 command_size = 10; // Header size.
38754 command_size += auth_handle_bytes.size();
38758 command_size += nv_index_bytes.size();
38762 command_size += data_bytes.size();
38783 command_size += authorization_size_bytes.size() +
38796 command_size,
38808 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
38991 UINT32 command_size = 10; // Header size.
39032 command_size += auth_handle_bytes.size();
39036 command_size += nv_index_bytes.size();
39040 command_size += bits_bytes.size();
39061 command_size += authorization_size_bytes.size() +
39074 command_size,
39086 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
39268 UINT32 command_size = 10; // Header size.
39302 command_size += auth_handle_bytes.size();
39306 command_size += nv_index_bytes.size();
39327 command_size += authorization_size_bytes.size() +
39340 command_size,
39352 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
39528 UINT32 command_size = 10; // Header size.
39555 command_size += auth_handle_bytes.size();
39576 command_size += authorization_size_bytes.size() +
39589 command_size,
39601 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
39773 UINT32 command_size = 10; // Header size.
39821 command_size += auth_handle_bytes.size();
39825 command_size += nv_index_bytes.size();
39829 command_size += size_bytes.size();
39833 command_size += offset_bytes.size();
39854 command_size += authorization_size_bytes.size() +
39867 command_size,
39879 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
40096 UINT32 command_size = 10; // Header size.
40130 command_size += auth_handle_bytes.size();
40134 command_size += nv_index_bytes.size();
40155 command_size += authorization_size_bytes.size() +
40168 command_size,
40180 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
40357 UINT32 command_size = 10; // Header size.
40399 command_size += nv_index_bytes.size();
40403 command_size += new_auth_bytes.size();
40424 command_size += authorization_size_bytes.size() +
40437 command_size,
40449 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";
40629 UINT32 command_size = 10; // Header size.
40706 command_size += sign_handle_bytes.size();
40710 command_size += auth_handle_bytes.size();
40714 command_size += nv_index_bytes.size();
40718 command_size += qualifying_data_bytes.size();
40722 command_size += in_scheme_bytes.size();
40726 command_size += size_bytes.size();
40730 command_size += offset_bytes.size();
40751 command_size += authorization_size_bytes.size() +
40764 command_size,
40776 CHECK(serialized_command->size() == command_size) << "Command size mismatch!";