/src/tpm2/Marshal_RSA_Decrypt.c
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright 2015 The Chromium OS Authors. All rights reserved. |
2 | | // Use of this source code is governed by a BSD-style license that can be |
3 | | // found in the LICENSE file. |
4 | | |
5 | | // THIS CODE IS GENERATED - DO NOT MODIFY! |
6 | | |
7 | | #include "MemoryLib_fp.h" |
8 | | #include "RSA_Decrypt_fp.h" |
9 | | |
10 | | #if IS_CC_ENABLED(RSA_Decrypt) |
11 | | static UINT16 RSA_Decrypt_Out_Marshal(RSA_Decrypt_Out* source, |
12 | | TPMI_ST_COMMAND_TAG tag, |
13 | | BYTE** buffer, |
14 | 0 | INT32* size) { |
15 | 0 | UINT16 total_size = 0; |
16 | 0 | UINT32 parameter_size = 0; |
17 | 0 | BYTE* parameter_size_location; |
18 | 0 | INT32 parameter_size_size = sizeof(UINT32); |
19 | 0 | UINT32 num_response_handles = 0; |
20 | | // Add parameter_size=0 to indicate size of the parameter area. Will be |
21 | | // replaced later by computed parameter_size. |
22 | 0 | if (tag == TPM_ST_SESSIONS) { |
23 | 0 | parameter_size_location = *buffer; |
24 | | // Don't add to total_size, but increment *buffer and decrement *size. |
25 | 0 | UINT32_Marshal(¶meter_size, buffer, size); |
26 | 0 | } |
27 | | // Marshal response parameters. |
28 | 0 | total_size += TPM2B_PUBLIC_KEY_RSA_Marshal(&source->message, buffer, size); |
29 | | // Compute actual parameter_size. Don't add result to total_size. |
30 | 0 | if (tag == TPM_ST_SESSIONS) { |
31 | 0 | parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); |
32 | 0 | UINT32_Marshal(¶meter_size, ¶meter_size_location, |
33 | 0 | ¶meter_size_size); |
34 | 0 | } |
35 | 0 | return total_size; |
36 | 0 | } |
37 | | #endif |
38 | | |
39 | | static TPM_RC RSA_Decrypt_In_Unmarshal(RSA_Decrypt_In* target, |
40 | | TPM_HANDLE request_handles[], |
41 | | BYTE** buffer, |
42 | 0 | INT32* size) { |
43 | 0 | TPM_RC result = TPM_RC_SUCCESS; |
44 | | // Get request handles from request_handles array. |
45 | 0 | target->keyHandle = request_handles[0]; |
46 | | // Unmarshal request parameters. |
47 | 0 | result = TPM2B_PUBLIC_KEY_RSA_Unmarshal(&target->cipherText, buffer, size); |
48 | 0 | if (result != TPM_RC_SUCCESS) { |
49 | 0 | return result; |
50 | 0 | } |
51 | 0 | result = TPMT_RSA_DECRYPT_Unmarshal(&target->inScheme, buffer, size); |
52 | 0 | if (result != TPM_RC_SUCCESS) { |
53 | 0 | return result; |
54 | 0 | } |
55 | 0 | result = TPM2B_DATA_Unmarshal(&target->label, buffer, size); |
56 | 0 | if (result != TPM_RC_SUCCESS) { |
57 | 0 | return result; |
58 | 0 | } |
59 | 0 | if ((result == TPM_RC_SUCCESS) && *size) { |
60 | 0 | result = TPM_RC_SIZE; |
61 | 0 | } |
62 | 0 | return result; |
63 | 0 | } |
64 | | |
65 | | TPM_RC Exec_RSA_Decrypt(TPMI_ST_COMMAND_TAG tag, |
66 | | BYTE** request_parameter_buffer, |
67 | | INT32* request_parameter_buffer_size, |
68 | | TPM_HANDLE request_handles[], |
69 | | UINT32* response_handle_buffer_size, |
70 | 0 | UINT32* response_parameter_buffer_size) { |
71 | 0 | TPM_RC result = TPM_RC_SUCCESS; |
72 | 0 | RSA_Decrypt_In in; |
73 | 0 | RSA_Decrypt_Out out; |
74 | 0 | #if IS_CC_ENABLED(RSA_Decrypt) |
75 | 0 | BYTE* response_buffer; |
76 | 0 | INT32 response_buffer_size; |
77 | 0 | UINT16 bytes_marshalled; |
78 | 0 | UINT16 num_response_handles = 0; |
79 | 0 | #endif |
80 | 0 | *response_handle_buffer_size = 0; |
81 | 0 | *response_parameter_buffer_size = 0; |
82 | | // Unmarshal request parameters to input structure. |
83 | 0 | result = |
84 | 0 | RSA_Decrypt_In_Unmarshal(&in, request_handles, request_parameter_buffer, |
85 | 0 | request_parameter_buffer_size); |
86 | 0 | if (result != TPM_RC_SUCCESS) { |
87 | 0 | return result; |
88 | 0 | } |
89 | | // Execute command. |
90 | 0 | result = TPM2_RSA_Decrypt(&in, &out); |
91 | 0 | if (result != TPM_RC_SUCCESS) { |
92 | 0 | return result; |
93 | 0 | } |
94 | | // Marshal output structure to global response buffer. |
95 | 0 | #if IS_CC_ENABLED(RSA_Decrypt) |
96 | 0 | response_buffer = MemoryGetResponseBuffer(TPM_CC_RSA_Decrypt) + 10; |
97 | 0 | response_buffer_size = MAX_RESPONSE_SIZE - 10; |
98 | 0 | bytes_marshalled = RSA_Decrypt_Out_Marshal(&out, tag, &response_buffer, |
99 | 0 | &response_buffer_size); |
100 | 0 | *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); |
101 | 0 | *response_parameter_buffer_size = |
102 | 0 | bytes_marshalled - *response_handle_buffer_size; |
103 | 0 | return TPM_RC_SUCCESS; |
104 | 0 | #endif |
105 | 0 | return TPM_RC_COMMAND_CODE; |
106 | 0 | } |