Home | History | Annotate | Download | only in tpm2
      1 // Copyright 2015 The Chromium OS Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 // THIS CODE IS GENERATED - DO NOT MODIFY!
      6 
      7 #include "MemoryLib_fp.h"
      8 #include "PolicySecret_fp.h"
      9 
     10 UINT16 PolicySecret_Out_Marshal(PolicySecret_Out* source,
     11                                 TPMI_ST_COMMAND_TAG tag,
     12                                 BYTE** buffer,
     13                                 INT32* size) {
     14   UINT16 total_size = 0;
     15   UINT32 parameter_size = 0;
     16   BYTE* parameter_size_location;
     17   INT32 parameter_size_size = sizeof(UINT32);
     18   UINT32 num_response_handles = 0;
     19   // Add parameter_size=0 to indicate size of the parameter area. Will be
     20   // replaced later by computed parameter_size.
     21   if (tag == TPM_ST_SESSIONS) {
     22     parameter_size_location = *buffer;
     23     // Don't add to total_size, but increment *buffer and decrement *size.
     24     UINT32_Marshal(&parameter_size, buffer, size);
     25   }
     26   // Marshal response parameters.
     27   total_size += TPM2B_TIMEOUT_Marshal(&source->timeout, buffer, size);
     28   total_size += TPMT_TK_AUTH_Marshal(&source->policyTicket, buffer, size);
     29   // Compute actual parameter_size. Don't add result to total_size.
     30   if (tag == TPM_ST_SESSIONS) {
     31     parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
     32     UINT32_Marshal(&parameter_size, &parameter_size_location,
     33                    &parameter_size_size);
     34   }
     35   return total_size;
     36 }
     37 
     38 TPM_RC PolicySecret_In_Unmarshal(PolicySecret_In* target,
     39                                  TPM_HANDLE request_handles[],
     40                                  BYTE** buffer,
     41                                  INT32* size) {
     42   TPM_RC result = TPM_RC_SUCCESS;
     43   // Get request handles from request_handles array.
     44   target->authHandle = request_handles[0];
     45   target->policySession = request_handles[1];
     46   // Unmarshal request parameters.
     47   result = TPM2B_NONCE_Unmarshal(&target->nonceTPM, buffer, size);
     48   if (result != TPM_RC_SUCCESS) {
     49     return result;
     50   }
     51   result = TPM2B_DIGEST_Unmarshal(&target->cpHashA, buffer, size);
     52   if (result != TPM_RC_SUCCESS) {
     53     return result;
     54   }
     55   result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size);
     56   if (result != TPM_RC_SUCCESS) {
     57     return result;
     58   }
     59   result = INT32_Unmarshal(&target->expiration, buffer, size);
     60   if (result != TPM_RC_SUCCESS) {
     61     return result;
     62   }
     63   if ((result == TPM_RC_SUCCESS) && *size) {
     64     result = TPM_RC_SIZE;
     65   }
     66   return result;
     67 }
     68 
     69 TPM_RC Exec_PolicySecret(TPMI_ST_COMMAND_TAG tag,
     70                          BYTE** request_parameter_buffer,
     71                          INT32* request_parameter_buffer_size,
     72                          TPM_HANDLE request_handles[],
     73                          UINT32* response_handle_buffer_size,
     74                          UINT32* response_parameter_buffer_size) {
     75   TPM_RC result = TPM_RC_SUCCESS;
     76   PolicySecret_In in;
     77   PolicySecret_Out out;
     78 #ifdef TPM_CC_PolicySecret
     79   BYTE* response_buffer;
     80   INT32 response_buffer_size;
     81   UINT16 bytes_marshalled;
     82   UINT16 num_response_handles = 0;
     83 #endif
     84   *response_handle_buffer_size = 0;
     85   *response_parameter_buffer_size = 0;
     86   // Unmarshal request parameters to input structure.
     87   result =
     88       PolicySecret_In_Unmarshal(&in, request_handles, request_parameter_buffer,
     89                                 request_parameter_buffer_size);
     90   if (result != TPM_RC_SUCCESS) {
     91     return result;
     92   }
     93   // Execute command.
     94   result = TPM2_PolicySecret(&in, &out);
     95   if (result != TPM_RC_SUCCESS) {
     96     return result;
     97   }
     98 // Marshal output structure to global response buffer.
     99 #ifdef TPM_CC_PolicySecret
    100   response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicySecret) + 10;
    101   response_buffer_size = MAX_RESPONSE_SIZE - 10;
    102   bytes_marshalled = PolicySecret_Out_Marshal(&out, tag, &response_buffer,
    103                                               &response_buffer_size);
    104   *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
    105   *response_parameter_buffer_size =
    106       bytes_marshalled - *response_handle_buffer_size;
    107   return TPM_RC_SUCCESS;
    108 #endif
    109   return TPM_RC_COMMAND_CODE;
    110 }
    111