1 // Copyright 2015 The Chromium OS Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 // THIS CODE IS GENERATED - DO NOT MODIFY! 6 7 #include "MemoryLib_fp.h" 8 #include "PolicySecret_fp.h" 9 10 UINT16 PolicySecret_Out_Marshal(PolicySecret_Out* source, 11 TPMI_ST_COMMAND_TAG tag, 12 BYTE** buffer, 13 INT32* size) { 14 UINT16 total_size = 0; 15 UINT32 parameter_size = 0; 16 BYTE* parameter_size_location; 17 INT32 parameter_size_size = sizeof(UINT32); 18 UINT32 num_response_handles = 0; 19 // Add parameter_size=0 to indicate size of the parameter area. Will be 20 // replaced later by computed parameter_size. 21 if (tag == TPM_ST_SESSIONS) { 22 parameter_size_location = *buffer; 23 // Don't add to total_size, but increment *buffer and decrement *size. 24 UINT32_Marshal(¶meter_size, buffer, size); 25 } 26 // Marshal response parameters. 27 total_size += TPM2B_TIMEOUT_Marshal(&source->timeout, buffer, size); 28 total_size += TPMT_TK_AUTH_Marshal(&source->policyTicket, buffer, size); 29 // Compute actual parameter_size. Don't add result to total_size. 30 if (tag == TPM_ST_SESSIONS) { 31 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); 32 UINT32_Marshal(¶meter_size, ¶meter_size_location, 33 ¶meter_size_size); 34 } 35 return total_size; 36 } 37 38 TPM_RC PolicySecret_In_Unmarshal(PolicySecret_In* target, 39 TPM_HANDLE request_handles[], 40 BYTE** buffer, 41 INT32* size) { 42 TPM_RC result = TPM_RC_SUCCESS; 43 // Get request handles from request_handles array. 44 target->authHandle = request_handles[0]; 45 target->policySession = request_handles[1]; 46 // Unmarshal request parameters. 47 result = TPM2B_NONCE_Unmarshal(&target->nonceTPM, buffer, size); 48 if (result != TPM_RC_SUCCESS) { 49 return result; 50 } 51 result = TPM2B_DIGEST_Unmarshal(&target->cpHashA, buffer, size); 52 if (result != TPM_RC_SUCCESS) { 53 return result; 54 } 55 result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size); 56 if (result != TPM_RC_SUCCESS) { 57 return result; 58 } 59 result = INT32_Unmarshal(&target->expiration, buffer, size); 60 if (result != TPM_RC_SUCCESS) { 61 return result; 62 } 63 if ((result == TPM_RC_SUCCESS) && *size) { 64 result = TPM_RC_SIZE; 65 } 66 return result; 67 } 68 69 TPM_RC Exec_PolicySecret(TPMI_ST_COMMAND_TAG tag, 70 BYTE** request_parameter_buffer, 71 INT32* request_parameter_buffer_size, 72 TPM_HANDLE request_handles[], 73 UINT32* response_handle_buffer_size, 74 UINT32* response_parameter_buffer_size) { 75 TPM_RC result = TPM_RC_SUCCESS; 76 PolicySecret_In in; 77 PolicySecret_Out out; 78 #ifdef TPM_CC_PolicySecret 79 BYTE* response_buffer; 80 INT32 response_buffer_size; 81 UINT16 bytes_marshalled; 82 UINT16 num_response_handles = 0; 83 #endif 84 *response_handle_buffer_size = 0; 85 *response_parameter_buffer_size = 0; 86 // Unmarshal request parameters to input structure. 87 result = 88 PolicySecret_In_Unmarshal(&in, request_handles, request_parameter_buffer, 89 request_parameter_buffer_size); 90 if (result != TPM_RC_SUCCESS) { 91 return result; 92 } 93 // Execute command. 94 result = TPM2_PolicySecret(&in, &out); 95 if (result != TPM_RC_SUCCESS) { 96 return result; 97 } 98 // Marshal output structure to global response buffer. 99 #ifdef TPM_CC_PolicySecret 100 response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicySecret) + 10; 101 response_buffer_size = MAX_RESPONSE_SIZE - 10; 102 bytes_marshalled = PolicySecret_Out_Marshal(&out, tag, &response_buffer, 103 &response_buffer_size); 104 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); 105 *response_parameter_buffer_size = 106 bytes_marshalled - *response_handle_buffer_size; 107 return TPM_RC_SUCCESS; 108 #endif 109 return TPM_RC_COMMAND_CODE; 110 } 111