Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 1 | // Copyright 2015 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | // THIS CODE IS GENERATED - DO NOT MODIFY! |
| 6 | |
| 7 | #include "MemoryLib_fp.h" |
| 8 | #include "PolicySigned_fp.h" |
| 9 | |
Vadim Bendebury | c3730f6 | 2019-01-15 19:59:05 | [diff] [blame] | 10 | #if IS_CC_ENABLED(PolicySigned) |
Vadim Bendebury | 56abbbf | 2018-08-28 22:34:31 | [diff] [blame] | 11 | static UINT16 PolicySigned_Out_Marshal(PolicySigned_Out* source, |
| 12 | TPMI_ST_COMMAND_TAG tag, |
| 13 | BYTE** buffer, |
| 14 | INT32* size) { |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 15 | UINT16 total_size = 0; |
| 16 | UINT32 parameter_size = 0; |
| 17 | BYTE* parameter_size_location; |
| 18 | INT32 parameter_size_size = sizeof(UINT32); |
| 19 | UINT32 num_response_handles = 0; |
| 20 | // Add parameter_size=0 to indicate size of the parameter area. Will be |
| 21 | // replaced later by computed parameter_size. |
| 22 | if (tag == TPM_ST_SESSIONS) { |
| 23 | parameter_size_location = *buffer; |
| 24 | // Don't add to total_size, but increment *buffer and decrement *size. |
| 25 | UINT32_Marshal(¶meter_size, buffer, size); |
| 26 | } |
| 27 | // Marshal response parameters. |
| 28 | total_size += TPM2B_TIMEOUT_Marshal(&source->timeout, buffer, size); |
| 29 | total_size += TPMT_TK_AUTH_Marshal(&source->policyTicket, buffer, size); |
| 30 | // Compute actual parameter_size. Don't add result to total_size. |
| 31 | if (tag == TPM_ST_SESSIONS) { |
| 32 | parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); |
| 33 | UINT32_Marshal(¶meter_size, ¶meter_size_location, |
| 34 | ¶meter_size_size); |
| 35 | } |
| 36 | return total_size; |
| 37 | } |
Vadim Bendebury | 56abbbf | 2018-08-28 22:34:31 | [diff] [blame] | 38 | #endif |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 39 | |
Vadim Bendebury | 56abbbf | 2018-08-28 22:34:31 | [diff] [blame] | 40 | static TPM_RC PolicySigned_In_Unmarshal(PolicySigned_In* target, |
| 41 | TPM_HANDLE request_handles[], |
| 42 | BYTE** buffer, |
| 43 | INT32* size) { |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 44 | TPM_RC result = TPM_RC_SUCCESS; |
| 45 | // Get request handles from request_handles array. |
| 46 | target->authObject = request_handles[0]; |
| 47 | target->policySession = request_handles[1]; |
| 48 | // Unmarshal request parameters. |
| 49 | result = TPM2B_NONCE_Unmarshal(&target->nonceTPM, buffer, size); |
| 50 | if (result != TPM_RC_SUCCESS) { |
| 51 | return result; |
| 52 | } |
| 53 | result = TPM2B_DIGEST_Unmarshal(&target->cpHashA, buffer, size); |
| 54 | if (result != TPM_RC_SUCCESS) { |
| 55 | return result; |
| 56 | } |
| 57 | result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size); |
| 58 | if (result != TPM_RC_SUCCESS) { |
| 59 | return result; |
| 60 | } |
| 61 | result = INT32_Unmarshal(&target->expiration, buffer, size); |
| 62 | if (result != TPM_RC_SUCCESS) { |
| 63 | return result; |
| 64 | } |
| 65 | result = TPMT_SIGNATURE_Unmarshal(&target->auth, buffer, size); |
| 66 | if (result != TPM_RC_SUCCESS) { |
| 67 | return result; |
| 68 | } |
Vadim Bendebury | 3dfffca | 2015-10-21 00:17:54 | [diff] [blame] | 69 | if ((result == TPM_RC_SUCCESS) && *size) { |
| 70 | result = TPM_RC_SIZE; |
| 71 | } |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 72 | return result; |
| 73 | } |
| 74 | |
| 75 | TPM_RC Exec_PolicySigned(TPMI_ST_COMMAND_TAG tag, |
| 76 | BYTE** request_parameter_buffer, |
| 77 | INT32* request_parameter_buffer_size, |
| 78 | TPM_HANDLE request_handles[], |
| 79 | UINT32* response_handle_buffer_size, |
| 80 | UINT32* response_parameter_buffer_size) { |
| 81 | TPM_RC result = TPM_RC_SUCCESS; |
| 82 | PolicySigned_In in; |
| 83 | PolicySigned_Out out; |
Vadim Bendebury | c3730f6 | 2019-01-15 19:59:05 | [diff] [blame] | 84 | #if IS_CC_ENABLED(PolicySigned) |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 85 | BYTE* response_buffer; |
| 86 | INT32 response_buffer_size; |
| 87 | UINT16 bytes_marshalled; |
| 88 | UINT16 num_response_handles = 0; |
| 89 | #endif |
| 90 | *response_handle_buffer_size = 0; |
| 91 | *response_parameter_buffer_size = 0; |
| 92 | // Unmarshal request parameters to input structure. |
| 93 | result = |
| 94 | PolicySigned_In_Unmarshal(&in, request_handles, request_parameter_buffer, |
| 95 | request_parameter_buffer_size); |
| 96 | if (result != TPM_RC_SUCCESS) { |
| 97 | return result; |
| 98 | } |
| 99 | // Execute command. |
| 100 | result = TPM2_PolicySigned(&in, &out); |
| 101 | if (result != TPM_RC_SUCCESS) { |
| 102 | return result; |
| 103 | } |
| 104 | // Marshal output structure to global response buffer. |
Vadim Bendebury | c3730f6 | 2019-01-15 19:59:05 | [diff] [blame] | 105 | #if IS_CC_ENABLED(PolicySigned) |
Jocelyn Bohr | a4ed3aa | 2015-07-30 17:44:16 | [diff] [blame] | 106 | response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicySigned) + 10; |
| 107 | response_buffer_size = MAX_RESPONSE_SIZE - 10; |
| 108 | bytes_marshalled = PolicySigned_Out_Marshal(&out, tag, &response_buffer, |
| 109 | &response_buffer_size); |
| 110 | *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); |
| 111 | *response_parameter_buffer_size = |
| 112 | bytes_marshalled - *response_handle_buffer_size; |
| 113 | return TPM_RC_SUCCESS; |
| 114 | #endif |
| 115 | return TPM_RC_COMMAND_CODE; |
| 116 | } |