blob: 03c9bcfff65f01f718916eb9a8a7f2ce06a19d49 [file] [log] [blame]
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -07001// Copyright 2015 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5// THIS CODE IS GENERATED - DO NOT MODIFY!
6
7#include "MemoryLib_fp.h"
8#include "EncryptDecrypt_fp.h"
9
10UINT16 EncryptDecrypt_Out_Marshal(EncryptDecrypt_Out* source,
11 TPMI_ST_COMMAND_TAG tag,
12 BYTE** buffer,
13 INT32* size) {
14 UINT16 total_size = 0;
15 UINT32 parameter_size = 0;
16 BYTE* parameter_size_location;
17 INT32 parameter_size_size = sizeof(UINT32);
18 UINT32 num_response_handles = 0;
19 // Add parameter_size=0 to indicate size of the parameter area. Will be
20 // replaced later by computed parameter_size.
21 if (tag == TPM_ST_SESSIONS) {
22 parameter_size_location = *buffer;
23 // Don't add to total_size, but increment *buffer and decrement *size.
24 UINT32_Marshal(&parameter_size, buffer, size);
25 }
26 // Marshal response parameters.
27 total_size += TPM2B_MAX_BUFFER_Marshal(&source->outData, buffer, size);
28 total_size += TPM2B_IV_Marshal(&source->ivOut, buffer, size);
29 // Compute actual parameter_size. Don't add result to total_size.
30 if (tag == TPM_ST_SESSIONS) {
31 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE);
32 UINT32_Marshal(&parameter_size, &parameter_size_location,
33 &parameter_size_size);
34 }
35 return total_size;
36}
37
38TPM_RC EncryptDecrypt_In_Unmarshal(EncryptDecrypt_In* target,
39 TPM_HANDLE request_handles[],
40 BYTE** buffer,
41 INT32* size) {
42 TPM_RC result = TPM_RC_SUCCESS;
43 // Get request handles from request_handles array.
44 target->keyHandle = request_handles[0];
45 // Unmarshal request parameters.
46 result = TPMI_YES_NO_Unmarshal(&target->decrypt, buffer, size);
47 if (result != TPM_RC_SUCCESS) {
48 return result;
49 }
50 result = TPMI_ALG_SYM_MODE_Unmarshal(&target->mode, buffer, size, TRUE);
51 if (result != TPM_RC_SUCCESS) {
52 return result;
53 }
54 result = TPM2B_IV_Unmarshal(&target->ivIn, buffer, size);
55 if (result != TPM_RC_SUCCESS) {
56 return result;
57 }
58 result = TPM2B_MAX_BUFFER_Unmarshal(&target->inData, buffer, size);
59 if (result != TPM_RC_SUCCESS) {
60 return result;
61 }
62 return result;
63}
64
65TPM_RC Exec_EncryptDecrypt(TPMI_ST_COMMAND_TAG tag,
66 BYTE** request_parameter_buffer,
67 INT32* request_parameter_buffer_size,
68 TPM_HANDLE request_handles[],
69 UINT32* response_handle_buffer_size,
70 UINT32* response_parameter_buffer_size) {
71 TPM_RC result = TPM_RC_SUCCESS;
72 EncryptDecrypt_In in;
73 EncryptDecrypt_Out out;
74#ifdef TPM_CC_EncryptDecrypt
75 BYTE* response_buffer;
76 INT32 response_buffer_size;
77 UINT16 bytes_marshalled;
78 UINT16 num_response_handles = 0;
79#endif
80 *response_handle_buffer_size = 0;
81 *response_parameter_buffer_size = 0;
82 // Unmarshal request parameters to input structure.
83 result = EncryptDecrypt_In_Unmarshal(&in, request_handles,
84 request_parameter_buffer,
85 request_parameter_buffer_size);
86 if (result != TPM_RC_SUCCESS) {
87 return result;
88 }
89 // Execute command.
90 result = TPM2_EncryptDecrypt(&in, &out);
91 if (result != TPM_RC_SUCCESS) {
92 return result;
93 }
94// Marshal output structure to global response buffer.
95#ifdef TPM_CC_EncryptDecrypt
96 response_buffer = MemoryGetResponseBuffer(TPM_CC_EncryptDecrypt) + 10;
97 response_buffer_size = MAX_RESPONSE_SIZE - 10;
98 bytes_marshalled = EncryptDecrypt_Out_Marshal(&out, tag, &response_buffer,
99 &response_buffer_size);
100 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE);
101 *response_parameter_buffer_size =
102 bytes_marshalled - *response_handle_buffer_size;
103 return TPM_RC_SUCCESS;
104#endif
105 return TPM_RC_COMMAND_CODE;
106}