1// Copyright 2015 The Chromium OS Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5// THIS CODE IS GENERATED - DO NOT MODIFY! 6 7#include "MemoryLib_fp.h" 8#include "GetSessionAuditDigest_fp.h" 9 10UINT16 GetSessionAuditDigest_Out_Marshal(GetSessionAuditDigest_Out* source, 11 TPMI_ST_COMMAND_TAG tag, 12 BYTE** buffer, 13 INT32* size) { 14 UINT16 total_size = 0; 15 UINT32 parameter_size = 0; 16 BYTE* parameter_size_location; 17 INT32 parameter_size_size = sizeof(UINT32); 18 UINT32 num_response_handles = 0; 19 // Add parameter_size=0 to indicate size of the parameter area. Will be 20 // replaced later by computed parameter_size. 21 if (tag == TPM_ST_SESSIONS) { 22 parameter_size_location = *buffer; 23 // Don't add to total_size, but increment *buffer and decrement *size. 24 UINT32_Marshal(¶meter_size, buffer, size); 25 } 26 // Marshal response parameters. 27 total_size += TPM2B_ATTEST_Marshal(&source->auditInfo, buffer, size); 28 total_size += TPMT_SIGNATURE_Marshal(&source->signature, buffer, size); 29 // Compute actual parameter_size. Don't add result to total_size. 30 if (tag == TPM_ST_SESSIONS) { 31 parameter_size = total_size - num_response_handles * sizeof(TPM_HANDLE); 32 UINT32_Marshal(¶meter_size, ¶meter_size_location, 33 ¶meter_size_size); 34 } 35 return total_size; 36} 37 38TPM_RC GetSessionAuditDigest_In_Unmarshal(GetSessionAuditDigest_In* target, 39 TPM_HANDLE request_handles[], 40 BYTE** buffer, 41 INT32* size) { 42 TPM_RC result = TPM_RC_SUCCESS; 43 // Get request handles from request_handles array. 44 target->privacyAdminHandle = request_handles[0]; 45 target->signHandle = request_handles[1]; 46 target->sessionHandle = request_handles[2]; 47 // Unmarshal request parameters. 48 result = TPM2B_DATA_Unmarshal(&target->qualifyingData, buffer, size); 49 if (result != TPM_RC_SUCCESS) { 50 return result; 51 } 52 result = TPMT_SIG_SCHEME_Unmarshal(&target->inScheme, buffer, size); 53 if (result != TPM_RC_SUCCESS) { 54 return result; 55 } 56 if ((result == TPM_RC_SUCCESS) && *size) { 57 result = TPM_RC_SIZE; 58 } 59 return result; 60} 61 62TPM_RC Exec_GetSessionAuditDigest(TPMI_ST_COMMAND_TAG tag, 63 BYTE** request_parameter_buffer, 64 INT32* request_parameter_buffer_size, 65 TPM_HANDLE request_handles[], 66 UINT32* response_handle_buffer_size, 67 UINT32* response_parameter_buffer_size) { 68 TPM_RC result = TPM_RC_SUCCESS; 69 GetSessionAuditDigest_In in; 70 GetSessionAuditDigest_Out out; 71#ifdef TPM_CC_GetSessionAuditDigest 72 BYTE* response_buffer; 73 INT32 response_buffer_size; 74 UINT16 bytes_marshalled; 75 UINT16 num_response_handles = 0; 76#endif 77 *response_handle_buffer_size = 0; 78 *response_parameter_buffer_size = 0; 79 // Unmarshal request parameters to input structure. 80 result = GetSessionAuditDigest_In_Unmarshal(&in, request_handles, 81 request_parameter_buffer, 82 request_parameter_buffer_size); 83 if (result != TPM_RC_SUCCESS) { 84 return result; 85 } 86 // Execute command. 87 result = TPM2_GetSessionAuditDigest(&in, &out); 88 if (result != TPM_RC_SUCCESS) { 89 return result; 90 } 91// Marshal output structure to global response buffer. 92#ifdef TPM_CC_GetSessionAuditDigest 93 response_buffer = MemoryGetResponseBuffer(TPM_CC_GetSessionAuditDigest) + 10; 94 response_buffer_size = MAX_RESPONSE_SIZE - 10; 95 bytes_marshalled = GetSessionAuditDigest_Out_Marshal( 96 &out, tag, &response_buffer, &response_buffer_size); 97 *response_handle_buffer_size = num_response_handles * sizeof(TPM_HANDLE); 98 *response_parameter_buffer_size = 99 bytes_marshalled - *response_handle_buffer_size; 100 return TPM_RC_SUCCESS; 101#endif 102 return TPM_RC_COMMAND_CODE; 103} 104