Coverage Report

Created: 2025-07-18 06:04

/src/tpm2/Marshal_PolicySigned.c
Line
Count
Source (jump to first uncovered line)
1
// Copyright 2015 The Chromium OS Authors. All rights reserved.
2
// Use of this source code is governed by a BSD-style license that can be
3
// found in the LICENSE file.
4
5
// THIS CODE IS GENERATED - DO NOT MODIFY!
6
7
#include "MemoryLib_fp.h"
8
#include "PolicySigned_fp.h"
9
10
#if IS_CC_ENABLED(PolicySigned)
11
static UINT16 PolicySigned_Out_Marshal(PolicySigned_Out* source,
12
                                       TPMI_ST_COMMAND_TAG tag,
13
                                       BYTE** buffer,
14
0
                                       INT32* size) {
15
0
  UINT16 total_size = 0;
16
0
  UINT32 parameter_size = 0;
17
0
  BYTE* parameter_size_location;
18
0
  INT32 parameter_size_size = sizeof(UINT32);
19
0
  UINT32 num_response_handles = 0;
20
  // Add parameter_size=0 to indicate size of the parameter area. Will be
21
  // replaced later by computed parameter_size.
22
0
  if (tag == TPM_ST_SESSIONS) {
23
0
    parameter_size_location = *buffer;
24
    // Don't add to total_size, but increment *buffer and decrement *size.
25
0
    UINT32_Marshal(&parameter_size, buffer, size);
26
0
  }
27
  // Marshal response parameters.
28
0
  total_size += TPM2B_TIMEOUT_Marshal(&source->timeout, buffer, size);
29
0
  total_size += TPMT_TK_AUTH_Marshal(&source->policyTicket, buffer, size);
30
  // Compute actual parameter_size. Don't add result to total_size.
31
0
  if (tag == TPM_ST_SESSIONS) {
32
0
    parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
33
0
    UINT32_Marshal(&parameter_size, &parameter_size_location,
34
0
                   &parameter_size_size);
35
0
  }
36
0
  return total_size;
37
0
}
38
#endif
39
40
static TPM_RC PolicySigned_In_Unmarshal(PolicySigned_In* target,
41
                                        TPM_HANDLE request_handles[],
42
                                        BYTE** buffer,
43
0
                                        INT32* size) {
44
0
  TPM_RC result = TPM_RC_SUCCESS;
45
  // Get request handles from request_handles array.
46
0
  target->authObject = request_handles[0];
47
0
  target->policySession = request_handles[1];
48
  // Unmarshal request parameters.
49
0
  result = TPM2B_NONCE_Unmarshal(&target->nonceTPM, buffer, size);
50
0
  if (result != TPM_RC_SUCCESS) {
51
0
    return result;
52
0
  }
53
0
  result = TPM2B_DIGEST_Unmarshal(&target->cpHashA, buffer, size);
54
0
  if (result != TPM_RC_SUCCESS) {
55
0
    return result;
56
0
  }
57
0
  result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size);
58
0
  if (result != TPM_RC_SUCCESS) {
59
0
    return result;
60
0
  }
61
0
  result = INT32_Unmarshal(&target->expiration, buffer, size);
62
0
  if (result != TPM_RC_SUCCESS) {
63
0
    return result;
64
0
  }
65
0
  result = TPMT_SIGNATURE_Unmarshal(&target->auth, buffer, size);
66
0
  if (result != TPM_RC_SUCCESS) {
67
0
    return result;
68
0
  }
69
0
  if ((result == TPM_RC_SUCCESS) && *size) {
70
0
    result = TPM_RC_SIZE;
71
0
  }
72
0
  return result;
73
0
}
74
75
TPM_RC Exec_PolicySigned(TPMI_ST_COMMAND_TAG tag,
76
                         BYTE** request_parameter_buffer,
77
                         INT32* request_parameter_buffer_size,
78
                         TPM_HANDLE request_handles[],
79
                         UINT32* response_handle_buffer_size,
80
0
                         UINT32* response_parameter_buffer_size) {
81
0
  TPM_RC result = TPM_RC_SUCCESS;
82
0
  PolicySigned_In in;
83
0
  PolicySigned_Out out;
84
0
#if IS_CC_ENABLED(PolicySigned)
85
0
  BYTE* response_buffer;
86
0
  INT32 response_buffer_size;
87
0
  UINT16 bytes_marshalled;
88
0
  UINT16 num_response_handles = 0;
89
0
#endif
90
0
  *response_handle_buffer_size = 0;
91
0
  *response_parameter_buffer_size = 0;
92
  // Unmarshal request parameters to input structure.
93
0
  result =
94
0
      PolicySigned_In_Unmarshal(&in, request_handles, request_parameter_buffer,
95
0
                                request_parameter_buffer_size);
96
0
  if (result != TPM_RC_SUCCESS) {
97
0
    return result;
98
0
  }
99
  // Execute command.
100
0
  result = TPM2_PolicySigned(&in, &out);
101
0
  if (result != TPM_RC_SUCCESS) {
102
0
    return result;
103
0
  }
104
// Marshal output structure to global response buffer.
105
0
#if IS_CC_ENABLED(PolicySigned)
106
0
  response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicySigned) + 10;
107
0
  response_buffer_size = MAX_RESPONSE_SIZE - 10;
108
0
  bytes_marshalled = PolicySigned_Out_Marshal(&out, tag, &response_buffer,
109
0
                                              &response_buffer_size);
110
0
  *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
111
0
  *response_parameter_buffer_size =
112
0
      bytes_marshalled - *response_handle_buffer_size;
113
0
  return TPM_RC_SUCCESS;
114
0
#endif
115
0
  return TPM_RC_COMMAND_CODE;
116
0
}