blob: 060c7e61c893dfcb9986c715801e1edef3aa3b81 [file] [log] [blame]
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -07001// Copyright 2015 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5// THIS CODE IS GENERATED - DO NOT MODIFY!
6
7#include "MemoryLib_fp.h"
8#include "VerifySignature_fp.h"
9
10UINT16 VerifySignature_Out_Marshal(VerifySignature_Out* source,
11 TPMI_ST_COMMAND_TAG tag,
12 BYTE** buffer,
13 INT32* size) {
14 UINT16 total_size = 0;
15 UINT32 parameter_size = 0;
16 BYTE* parameter_size_location;
17 INT32 parameter_size_size = sizeof(UINT32);
18 UINT32 num_response_handles = 0;
19 // Add parameter_size=0 to indicate size of the parameter area. Will be
20 // replaced later by computed parameter_size.
21 if (tag == TPM_ST_SESSIONS) {
22 parameter_size_location = *buffer;
23 // Don't add to total_size, but increment *buffer and decrement *size.
24 UINT32_Marshal(&parameter_size, buffer, size);
25 }
26 // Marshal response parameters.
27 total_size += TPMT_TK_VERIFIED_Marshal(&source->validation, buffer, size);
28 // Compute actual parameter_size. Don't add result to total_size.
29 if (tag == TPM_ST_SESSIONS) {
30 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
31 UINT32_Marshal(&parameter_size, &parameter_size_location,
32 &parameter_size_size);
33 }
34 return total_size;
35}
36
37TPM_RC VerifySignature_In_Unmarshal(VerifySignature_In* target,
38 TPM_HANDLE request_handles[],
39 BYTE** buffer,
40 INT32* size) {
41 TPM_RC result = TPM_RC_SUCCESS;
42 // Get request handles from request_handles array.
43 target->keyHandle = request_handles[0];
44 // Unmarshal request parameters.
45 result = TPM2B_DIGEST_Unmarshal(&target->digest, buffer, size);
46 if (result != TPM_RC_SUCCESS) {
47 return result;
48 }
49 result = TPMT_SIGNATURE_Unmarshal(&target->signature, buffer, size);
50 if (result != TPM_RC_SUCCESS) {
51 return result;
52 }
Vadim Bendebury3dfffca2015-10-20 17:17:54 -070053 if ((result == TPM_RC_SUCCESS) && *size) {
54 result = TPM_RC_SIZE;
55 }
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070056 return result;
57}
58
59TPM_RC Exec_VerifySignature(TPMI_ST_COMMAND_TAG tag,
60 BYTE** request_parameter_buffer,
61 INT32* request_parameter_buffer_size,
62 TPM_HANDLE request_handles[],
63 UINT32* response_handle_buffer_size,
64 UINT32* response_parameter_buffer_size) {
65 TPM_RC result = TPM_RC_SUCCESS;
66 VerifySignature_In in;
67 VerifySignature_Out out;
68#ifdef TPM_CC_VerifySignature
69 BYTE* response_buffer;
70 INT32 response_buffer_size;
71 UINT16 bytes_marshalled;
72 UINT16 num_response_handles = 0;
73#endif
74 *response_handle_buffer_size = 0;
75 *response_parameter_buffer_size = 0;
76 // Unmarshal request parameters to input structure.
77 result = VerifySignature_In_Unmarshal(&in, request_handles,
78 request_parameter_buffer,
79 request_parameter_buffer_size);
80 if (result != TPM_RC_SUCCESS) {
81 return result;
82 }
83 // Execute command.
84 result = TPM2_VerifySignature(&in, &out);
85 if (result != TPM_RC_SUCCESS) {
86 return result;
87 }
88// Marshal output structure to global response buffer.
89#ifdef TPM_CC_VerifySignature
90 response_buffer = MemoryGetResponseBuffer(TPM_CC_VerifySignature) + 10;
91 response_buffer_size = MAX_RESPONSE_SIZE - 10;
92 bytes_marshalled = VerifySignature_Out_Marshal(&out, tag, &response_buffer,
93 &response_buffer_size);
94 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
95 *response_parameter_buffer_size =
96 bytes_marshalled - *response_handle_buffer_size;
97 return TPM_RC_SUCCESS;
98#endif
99 return TPM_RC_COMMAND_CODE;
100}