1 // Copyright 2015 The Chromium OS Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 // THIS CODE IS GENERATED - DO NOT MODIFY!
6
7 #include "MemoryLib_fp.h"
8 #include "ActivateCredential_fp.h"
9
ActivateCredential_Out_Marshal(ActivateCredential_Out * source,TPMI_ST_COMMAND_TAG tag,BYTE ** buffer,INT32 * size)10 UINT16 ActivateCredential_Out_Marshal(ActivateCredential_Out* source,
11 TPMI_ST_COMMAND_TAG tag,
12 BYTE** buffer,
13 INT32* size) {
14 UINT16 total_size = 0;
15 UINT32 parameter_size = 0;
16 BYTE* parameter_size_location;
17 INT32 parameter_size_size = sizeof(UINT32);
18 UINT32 num_response_handles = 0;
19 // Add parameter_size=0 to indicate size of the parameter area. Will be
20 // replaced later by computed parameter_size.
21 if (tag == TPM_ST_SESSIONS) {
22 parameter_size_location = *buffer;
23 // Don't add to total_size, but increment *buffer and decrement *size.
24 UINT32_Marshal(¶meter_size, buffer, size);
25 }
26 // Marshal response parameters.
27 total_size += TPM2B_DIGEST_Marshal(&source->certInfo, buffer, size);
28 // Compute actual parameter_size. Don't add result to total_size.
29 if (tag == TPM_ST_SESSIONS) {
30 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
31 UINT32_Marshal(¶meter_size, ¶meter_size_location,
32 ¶meter_size_size);
33 }
34 return total_size;
35 }
36
ActivateCredential_In_Unmarshal(ActivateCredential_In * target,TPM_HANDLE request_handles[],BYTE ** buffer,INT32 * size)37 TPM_RC ActivateCredential_In_Unmarshal(ActivateCredential_In* target,
38 TPM_HANDLE request_handles[],
39 BYTE** buffer,
40 INT32* size) {
41 TPM_RC result = TPM_RC_SUCCESS;
42 // Get request handles from request_handles array.
43 target->activateHandle = request_handles[0];
44 target->keyHandle = request_handles[1];
45 // Unmarshal request parameters.
46 result = TPM2B_ID_OBJECT_Unmarshal(&target->credentialBlob, buffer, size);
47 if (result != TPM_RC_SUCCESS) {
48 return result;
49 }
50 result = TPM2B_ENCRYPTED_SECRET_Unmarshal(&target->secret, buffer, size);
51 if (result != TPM_RC_SUCCESS) {
52 return result;
53 }
54 if ((result == TPM_RC_SUCCESS) && *size) {
55 result = TPM_RC_SIZE;
56 }
57 return result;
58 }
59
Exec_ActivateCredential(TPMI_ST_COMMAND_TAG tag,BYTE ** request_parameter_buffer,INT32 * request_parameter_buffer_size,TPM_HANDLE request_handles[],UINT32 * response_handle_buffer_size,UINT32 * response_parameter_buffer_size)60 TPM_RC Exec_ActivateCredential(TPMI_ST_COMMAND_TAG tag,
61 BYTE** request_parameter_buffer,
62 INT32* request_parameter_buffer_size,
63 TPM_HANDLE request_handles[],
64 UINT32* response_handle_buffer_size,
65 UINT32* response_parameter_buffer_size) {
66 TPM_RC result = TPM_RC_SUCCESS;
67 ActivateCredential_In in;
68 ActivateCredential_Out out;
69 #ifdef TPM_CC_ActivateCredential
70 BYTE* response_buffer;
71 INT32 response_buffer_size;
72 UINT16 bytes_marshalled;
73 UINT16 num_response_handles = 0;
74 #endif
75 *response_handle_buffer_size = 0;
76 *response_parameter_buffer_size = 0;
77 // Unmarshal request parameters to input structure.
78 result = ActivateCredential_In_Unmarshal(&in, request_handles,
79 request_parameter_buffer,
80 request_parameter_buffer_size);
81 if (result != TPM_RC_SUCCESS) {
82 return result;
83 }
84 // Execute command.
85 result = TPM2_ActivateCredential(&in, &out);
86 if (result != TPM_RC_SUCCESS) {
87 return result;
88 }
89 // Marshal output structure to global response buffer.
90 #ifdef TPM_CC_ActivateCredential
91 response_buffer = MemoryGetResponseBuffer(TPM_CC_ActivateCredential) + 10;
92 response_buffer_size = MAX_RESPONSE_SIZE - 10;
93 bytes_marshalled = ActivateCredential_Out_Marshal(&out, tag, &response_buffer,
94 &response_buffer_size);
95 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
96 *response_parameter_buffer_size =
97 bytes_marshalled - *response_handle_buffer_size;
98 return TPM_RC_SUCCESS;
99 #endif
100 return TPM_RC_COMMAND_CODE;
101 }
102