/src/tpm2/Marshal_PolicySigned.c
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright 2015 The Chromium OS Authors. All rights reserved. |
2 | | // Use of this source code is governed by a BSD-style license that can be |
3 | | // found in the LICENSE file. |
4 | | |
5 | | // THIS CODE IS GENERATED - DO NOT MODIFY! |
6 | | |
7 | | #include "MemoryLib_fp.h" |
8 | | #include "PolicySigned_fp.h" |
9 | | |
10 | | #if IS_CC_ENABLED(PolicySigned) |
11 | | static UINT16 PolicySigned_Out_Marshal(PolicySigned_Out* source, |
12 | | TPMI_ST_COMMAND_TAG tag, |
13 | | BYTE** buffer, |
14 | 0 | INT32* size) { |
15 | 0 | UINT16 total_size = 0; |
16 | 0 | UINT32 parameter_size = 0; |
17 | 0 | BYTE* parameter_size_location; |
18 | 0 | INT32 parameter_size_size = sizeof(UINT32); |
19 | 0 | UINT32 num_response_handles = 0; |
20 | | // Add parameter_size=0 to indicate size of the parameter area. Will be |
21 | | // replaced later by computed parameter_size. |
22 | 0 | if (tag == TPM_ST_SESSIONS) { |
23 | 0 | parameter_size_location = *buffer; |
24 | | // Don't add to total_size, but increment *buffer and decrement *size. |
25 | 0 | UINT32_Marshal(¶meter_size, buffer, size); |
26 | 0 | } |
27 | | // Marshal response parameters. |
28 | 0 | total_size += TPM2B_TIMEOUT_Marshal(&source->timeout, buffer, size); |
29 | 0 | total_size += TPMT_TK_AUTH_Marshal(&source->policyTicket, buffer, size); |
30 | | // Compute actual parameter_size. Don't add result to total_size. |
31 | 0 | if (tag == TPM_ST_SESSIONS) { |
32 | 0 | parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); |
33 | 0 | UINT32_Marshal(¶meter_size, ¶meter_size_location, |
34 | 0 | ¶meter_size_size); |
35 | 0 | } |
36 | 0 | return total_size; |
37 | 0 | } |
38 | | #endif |
39 | | |
40 | | static TPM_RC PolicySigned_In_Unmarshal(PolicySigned_In* target, |
41 | | TPM_HANDLE request_handles[], |
42 | | BYTE** buffer, |
43 | 0 | INT32* size) { |
44 | 0 | TPM_RC result = TPM_RC_SUCCESS; |
45 | | // Get request handles from request_handles array. |
46 | 0 | target->authObject = request_handles[0]; |
47 | 0 | target->policySession = request_handles[1]; |
48 | | // Unmarshal request parameters. |
49 | 0 | result = TPM2B_NONCE_Unmarshal(&target->nonceTPM, buffer, size); |
50 | 0 | if (result != TPM_RC_SUCCESS) { |
51 | 0 | return result; |
52 | 0 | } |
53 | 0 | result = TPM2B_DIGEST_Unmarshal(&target->cpHashA, buffer, size); |
54 | 0 | if (result != TPM_RC_SUCCESS) { |
55 | 0 | return result; |
56 | 0 | } |
57 | 0 | result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size); |
58 | 0 | if (result != TPM_RC_SUCCESS) { |
59 | 0 | return result; |
60 | 0 | } |
61 | 0 | result = INT32_Unmarshal(&target->expiration, buffer, size); |
62 | 0 | if (result != TPM_RC_SUCCESS) { |
63 | 0 | return result; |
64 | 0 | } |
65 | 0 | result = TPMT_SIGNATURE_Unmarshal(&target->auth, buffer, size); |
66 | 0 | if (result != TPM_RC_SUCCESS) { |
67 | 0 | return result; |
68 | 0 | } |
69 | 0 | if ((result == TPM_RC_SUCCESS) && *size) { |
70 | 0 | result = TPM_RC_SIZE; |
71 | 0 | } |
72 | 0 | return result; |
73 | 0 | } |
74 | | |
75 | | TPM_RC Exec_PolicySigned(TPMI_ST_COMMAND_TAG tag, |
76 | | BYTE** request_parameter_buffer, |
77 | | INT32* request_parameter_buffer_size, |
78 | | TPM_HANDLE request_handles[], |
79 | | UINT32* response_handle_buffer_size, |
80 | 0 | UINT32* response_parameter_buffer_size) { |
81 | 0 | TPM_RC result = TPM_RC_SUCCESS; |
82 | 0 | PolicySigned_In in; |
83 | 0 | PolicySigned_Out out; |
84 | 0 | #if IS_CC_ENABLED(PolicySigned) |
85 | 0 | BYTE* response_buffer; |
86 | 0 | INT32 response_buffer_size; |
87 | 0 | UINT16 bytes_marshalled; |
88 | 0 | UINT16 num_response_handles = 0; |
89 | 0 | #endif |
90 | 0 | *response_handle_buffer_size = 0; |
91 | 0 | *response_parameter_buffer_size = 0; |
92 | | // Unmarshal request parameters to input structure. |
93 | 0 | result = |
94 | 0 | PolicySigned_In_Unmarshal(&in, request_handles, request_parameter_buffer, |
95 | 0 | request_parameter_buffer_size); |
96 | 0 | if (result != TPM_RC_SUCCESS) { |
97 | 0 | return result; |
98 | 0 | } |
99 | | // Execute command. |
100 | 0 | result = TPM2_PolicySigned(&in, &out); |
101 | 0 | if (result != TPM_RC_SUCCESS) { |
102 | 0 | return result; |
103 | 0 | } |
104 | | // Marshal output structure to global response buffer. |
105 | 0 | #if IS_CC_ENABLED(PolicySigned) |
106 | 0 | response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicySigned) + 10; |
107 | 0 | response_buffer_size = MAX_RESPONSE_SIZE - 10; |
108 | 0 | bytes_marshalled = PolicySigned_Out_Marshal(&out, tag, &response_buffer, |
109 | 0 | &response_buffer_size); |
110 | 0 | *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); |
111 | 0 | *response_parameter_buffer_size = |
112 | 0 | bytes_marshalled - *response_handle_buffer_size; |
113 | 0 | return TPM_RC_SUCCESS; |
114 | 0 | #endif |
115 | 0 | return TPM_RC_COMMAND_CODE; |
116 | 0 | } |