1 // Copyright 2015 The Chromium OS Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 // THIS CODE IS GENERATED - DO NOT MODIFY!
6
7 #include "MemoryLib_fp.h"
8 #include "PolicyAuthorize_fp.h"
9
PolicyAuthorize_In_Unmarshal(PolicyAuthorize_In * target,TPM_HANDLE request_handles[],BYTE ** buffer,INT32 * size)10 TPM_RC PolicyAuthorize_In_Unmarshal(PolicyAuthorize_In* target,
11 TPM_HANDLE request_handles[],
12 BYTE** buffer,
13 INT32* size) {
14 TPM_RC result = TPM_RC_SUCCESS;
15 // Get request handles from request_handles array.
16 target->policySession = request_handles[0];
17 // Unmarshal request parameters.
18 result = TPM2B_DIGEST_Unmarshal(&target->approvedPolicy, buffer, size);
19 if (result != TPM_RC_SUCCESS) {
20 return result;
21 }
22 result = TPM2B_NONCE_Unmarshal(&target->policyRef, buffer, size);
23 if (result != TPM_RC_SUCCESS) {
24 return result;
25 }
26 result = TPM2B_NAME_Unmarshal(&target->keySign, buffer, size);
27 if (result != TPM_RC_SUCCESS) {
28 return result;
29 }
30 result = TPMT_TK_VERIFIED_Unmarshal(&target->checkTicket, buffer, size);
31 if (result != TPM_RC_SUCCESS) {
32 return result;
33 }
34 if ((result == TPM_RC_SUCCESS) && *size) {
35 result = TPM_RC_SIZE;
36 }
37 return result;
38 }
39
Exec_PolicyAuthorize(TPMI_ST_COMMAND_TAG tag,BYTE ** request_parameter_buffer,INT32 * request_parameter_buffer_size,TPM_HANDLE request_handles[],UINT32 * response_handle_buffer_size,UINT32 * response_parameter_buffer_size)40 TPM_RC Exec_PolicyAuthorize(TPMI_ST_COMMAND_TAG tag,
41 BYTE** request_parameter_buffer,
42 INT32* request_parameter_buffer_size,
43 TPM_HANDLE request_handles[],
44 UINT32* response_handle_buffer_size,
45 UINT32* response_parameter_buffer_size) {
46 TPM_RC result = TPM_RC_SUCCESS;
47 PolicyAuthorize_In in;
48 #ifdef TPM_CC_PolicyAuthorize
49 BYTE* response_buffer;
50 INT32 response_buffer_size;
51 #endif
52 *response_handle_buffer_size = 0;
53 *response_parameter_buffer_size = 0;
54 // Unmarshal request parameters to input structure.
55 result = PolicyAuthorize_In_Unmarshal(&in, request_handles,
56 request_parameter_buffer,
57 request_parameter_buffer_size);
58 if (result != TPM_RC_SUCCESS) {
59 return result;
60 }
61 // Execute command.
62 result = TPM2_PolicyAuthorize(&in);
63 if (result != TPM_RC_SUCCESS) {
64 return result;
65 }
66 #ifdef TPM_CC_PolicyAuthorize
67 response_buffer = MemoryGetResponseBuffer(TPM_CC_PolicyAuthorize) + 10;
68 response_buffer_size = MAX_RESPONSE_SIZE - 10;
69 // Add parameter_size field, always equal to 0 here.
70 if (tag == TPM_ST_SESSIONS) {
71 UINT32_Marshal(response_parameter_buffer_size, &response_buffer,
72 &response_buffer_size);
73 }
74 return TPM_RC_SUCCESS;
75 #endif
76 return TPM_RC_COMMAND_CODE;
77 }
78