1 // Copyright 2015 The Chromium OS Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 // THIS CODE IS GENERATED - DO NOT MODIFY! 6 7 #include "MemoryLib_fp.h" 8 #include "EncryptDecrypt_fp.h" 9 10 UINT16 EncryptDecrypt_Out_Marshal(EncryptDecrypt_Out* source, 11 TPMI_ST_COMMAND_TAG tag, 12 BYTE** buffer, 13 INT32* size) { 14 UINT16 total_size = 0; 15 UINT32 parameter_size = 0; 16 BYTE* parameter_size_location; 17 INT32 parameter_size_size = sizeof(UINT32); 18 UINT32 num_response_handles = 0; 19 // Add parameter_size=0 to indicate size of the parameter area. Will be 20 // replaced later by computed parameter_size. 21 if (tag == TPM_ST_SESSIONS) { 22 parameter_size_location = *buffer; 23 // Don't add to total_size, but increment *buffer and decrement *size. 24 UINT32_Marshal(¶meter_size, buffer, size); 25 } 26 // Marshal response parameters. 27 total_size += TPM2B_MAX_BUFFER_Marshal(&source->outData, buffer, size); 28 total_size += TPM2B_IV_Marshal(&source->ivOut, buffer, size); 29 // Compute actual parameter_size. Don't add result to total_size. 30 if (tag == TPM_ST_SESSIONS) { 31 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); 32 UINT32_Marshal(¶meter_size, ¶meter_size_location, 33 ¶meter_size_size); 34 } 35 return total_size; 36 } 37 38 TPM_RC EncryptDecrypt_In_Unmarshal(EncryptDecrypt_In* target, 39 TPM_HANDLE request_handles[], 40 BYTE** buffer, 41 INT32* size) { 42 TPM_RC result = TPM_RC_SUCCESS; 43 // Get request handles from request_handles array. 44 target->keyHandle = request_handles[0]; 45 // Unmarshal request parameters. 46 result = TPMI_YES_NO_Unmarshal(&target->decrypt, buffer, size); 47 if (result != TPM_RC_SUCCESS) { 48 return result; 49 } 50 result = TPMI_ALG_SYM_MODE_Unmarshal(&target->mode, buffer, size, TRUE); 51 if (result != TPM_RC_SUCCESS) { 52 return result; 53 } 54 result = TPM2B_IV_Unmarshal(&target->ivIn, buffer, size); 55 if (result != TPM_RC_SUCCESS) { 56 return result; 57 } 58 result = TPM2B_MAX_BUFFER_Unmarshal(&target->inData, buffer, size); 59 if (result != TPM_RC_SUCCESS) { 60 return result; 61 } 62 if ((result == TPM_RC_SUCCESS) && *size) { 63 result = TPM_RC_SIZE; 64 } 65 return result; 66 } 67 68 TPM_RC Exec_EncryptDecrypt(TPMI_ST_COMMAND_TAG tag, 69 BYTE** request_parameter_buffer, 70 INT32* request_parameter_buffer_size, 71 TPM_HANDLE request_handles[], 72 UINT32* response_handle_buffer_size, 73 UINT32* response_parameter_buffer_size) { 74 TPM_RC result = TPM_RC_SUCCESS; 75 EncryptDecrypt_In in; 76 EncryptDecrypt_Out out; 77 #ifdef TPM_CC_EncryptDecrypt 78 BYTE* response_buffer; 79 INT32 response_buffer_size; 80 UINT16 bytes_marshalled; 81 UINT16 num_response_handles = 0; 82 #endif 83 *response_handle_buffer_size = 0; 84 *response_parameter_buffer_size = 0; 85 // Unmarshal request parameters to input structure. 86 result = EncryptDecrypt_In_Unmarshal(&in, request_handles, 87 request_parameter_buffer, 88 request_parameter_buffer_size); 89 if (result != TPM_RC_SUCCESS) { 90 return result; 91 } 92 // Execute command. 93 result = TPM2_EncryptDecrypt(&in, &out); 94 if (result != TPM_RC_SUCCESS) { 95 return result; 96 } 97 // Marshal output structure to global response buffer. 98 #ifdef TPM_CC_EncryptDecrypt 99 response_buffer = MemoryGetResponseBuffer(TPM_CC_EncryptDecrypt) + 10; 100 response_buffer_size = MAX_RESPONSE_SIZE - 10; 101 bytes_marshalled = EncryptDecrypt_Out_Marshal(&out, tag, &response_buffer, 102 &response_buffer_size); 103 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); 104 *response_parameter_buffer_size = 105 bytes_marshalled - *response_handle_buffer_size; 106 return TPM_RC_SUCCESS; 107 #endif 108 return TPM_RC_COMMAND_CODE; 109 } 110