1 // Copyright 2015 The Chromium OS Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 // THIS CODE IS GENERATED - DO NOT MODIFY!
6
7 #include "MemoryLib_fp.h"
8 #include "VerifySignature_fp.h"
9
VerifySignature_Out_Marshal(VerifySignature_Out * source,TPMI_ST_COMMAND_TAG tag,BYTE ** buffer,INT32 * size)10 UINT16 VerifySignature_Out_Marshal(VerifySignature_Out* source,
11 TPMI_ST_COMMAND_TAG tag,
12 BYTE** buffer,
13 INT32* size) {
14 UINT16 total_size = 0;
15 UINT32 parameter_size = 0;
16 BYTE* parameter_size_location;
17 INT32 parameter_size_size = sizeof(UINT32);
18 UINT32 num_response_handles = 0;
19 // Add parameter_size=0 to indicate size of the parameter area. Will be
20 // replaced later by computed parameter_size.
21 if (tag == TPM_ST_SESSIONS) {
22 parameter_size_location = *buffer;
23 // Don't add to total_size, but increment *buffer and decrement *size.
24 UINT32_Marshal(¶meter_size, buffer, size);
25 }
26 // Marshal response parameters.
27 total_size += TPMT_TK_VERIFIED_Marshal(&source->validation, buffer, size);
28 // Compute actual parameter_size. Don't add result to total_size.
29 if (tag == TPM_ST_SESSIONS) {
30 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
31 UINT32_Marshal(¶meter_size, ¶meter_size_location,
32 ¶meter_size_size);
33 }
34 return total_size;
35 }
36
VerifySignature_In_Unmarshal(VerifySignature_In * target,TPM_HANDLE request_handles[],BYTE ** buffer,INT32 * size)37 TPM_RC VerifySignature_In_Unmarshal(VerifySignature_In* target,
38 TPM_HANDLE request_handles[],
39 BYTE** buffer,
40 INT32* size) {
41 TPM_RC result = TPM_RC_SUCCESS;
42 // Get request handles from request_handles array.
43 target->keyHandle = request_handles[0];
44 // Unmarshal request parameters.
45 result = TPM2B_DIGEST_Unmarshal(&target->digest, buffer, size);
46 if (result != TPM_RC_SUCCESS) {
47 return result;
48 }
49 result = TPMT_SIGNATURE_Unmarshal(&target->signature, buffer, size);
50 if (result != TPM_RC_SUCCESS) {
51 return result;
52 }
53 if ((result == TPM_RC_SUCCESS) && *size) {
54 result = TPM_RC_SIZE;
55 }
56 return result;
57 }
58
Exec_VerifySignature(TPMI_ST_COMMAND_TAG tag,BYTE ** request_parameter_buffer,INT32 * request_parameter_buffer_size,TPM_HANDLE request_handles[],UINT32 * response_handle_buffer_size,UINT32 * response_parameter_buffer_size)59 TPM_RC Exec_VerifySignature(TPMI_ST_COMMAND_TAG tag,
60 BYTE** request_parameter_buffer,
61 INT32* request_parameter_buffer_size,
62 TPM_HANDLE request_handles[],
63 UINT32* response_handle_buffer_size,
64 UINT32* response_parameter_buffer_size) {
65 TPM_RC result = TPM_RC_SUCCESS;
66 VerifySignature_In in;
67 VerifySignature_Out out;
68 #ifdef TPM_CC_VerifySignature
69 BYTE* response_buffer;
70 INT32 response_buffer_size;
71 UINT16 bytes_marshalled;
72 UINT16 num_response_handles = 0;
73 #endif
74 *response_handle_buffer_size = 0;
75 *response_parameter_buffer_size = 0;
76 // Unmarshal request parameters to input structure.
77 result = VerifySignature_In_Unmarshal(&in, request_handles,
78 request_parameter_buffer,
79 request_parameter_buffer_size);
80 if (result != TPM_RC_SUCCESS) {
81 return result;
82 }
83 // Execute command.
84 result = TPM2_VerifySignature(&in, &out);
85 if (result != TPM_RC_SUCCESS) {
86 return result;
87 }
88 // Marshal output structure to global response buffer.
89 #ifdef TPM_CC_VerifySignature
90 response_buffer = MemoryGetResponseBuffer(TPM_CC_VerifySignature) + 10;
91 response_buffer_size = MAX_RESPONSE_SIZE - 10;
92 bytes_marshalled = VerifySignature_Out_Marshal(&out, tag, &response_buffer,
93 &response_buffer_size);
94 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
95 *response_parameter_buffer_size =
96 bytes_marshalled - *response_handle_buffer_size;
97 return TPM_RC_SUCCESS;
98 #endif
99 return TPM_RC_COMMAND_CODE;
100 }
101