| /* SPDX-License-Identifier: BSD-2-Clause */ |
| /***********************************************************************; |
| * Copyright (c) 2015 - 2017, Intel Corporation |
| * All rights reserved. |
| ***********************************************************************/ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include "tss2_tpm2_types.h" |
| #include "tss2_mu.h" |
| #include "sysapi_util.h" |
| |
| TSS2_RC Tss2_Sys_Duplicate_Prepare( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPMI_DH_OBJECT objectHandle, |
| TPMI_DH_OBJECT newParentHandle, |
| const TPM2B_DATA *encryptionKeyIn, |
| const TPMT_SYM_DEF_OBJECT *symmetricAlg) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!ctx || !symmetricAlg) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = CommonPreparePrologue(ctx, TPM2_CC_Duplicate); |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_UINT32_Marshal(objectHandle, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_UINT32_Marshal(newParentHandle, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| if (rval) |
| return rval; |
| |
| if (!encryptionKeyIn) { |
| ctx->decryptNull = 1; |
| |
| rval = Tss2_MU_UINT16_Marshal(0, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| } else { |
| |
| rval = Tss2_MU_TPM2B_DATA_Marshal(encryptionKeyIn, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| } |
| |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_TPMT_SYM_DEF_OBJECT_Marshal(symmetricAlg, |
| ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| if (rval) |
| return rval; |
| |
| ctx->decryptAllowed = 1; |
| ctx->encryptAllowed = 1; |
| ctx->authAllowed = 1; |
| |
| return CommonPrepareEpilogue(ctx); |
| } |
| |
| TSS2_RC Tss2_Sys_Duplicate_Complete( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPM2B_DATA *encryptionKeyOut, |
| TPM2B_PRIVATE *duplicate, |
| TPM2B_ENCRYPTED_SECRET *outSymSeed) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!ctx) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = CommonComplete(ctx); |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_TPM2B_DATA_Unmarshal(ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData, |
| encryptionKeyOut); |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_TPM2B_PRIVATE_Unmarshal(ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData, |
| duplicate); |
| if (rval) |
| return rval; |
| |
| return Tss2_MU_TPM2B_ENCRYPTED_SECRET_Unmarshal(ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData, |
| outSymSeed); |
| } |
| |
| TSS2_RC Tss2_Sys_Duplicate( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPMI_DH_OBJECT objectHandle, |
| TPMI_DH_OBJECT newParentHandle, |
| TSS2L_SYS_AUTH_COMMAND const *cmdAuthsArray, |
| const TPM2B_DATA *encryptionKeyIn, |
| const TPMT_SYM_DEF_OBJECT *symmetricAlg, |
| TPM2B_DATA *encryptionKeyOut, |
| TPM2B_PRIVATE *duplicate, |
| TPM2B_ENCRYPTED_SECRET *outSymSeed, |
| TSS2L_SYS_AUTH_RESPONSE *rspAuthsArray) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!symmetricAlg) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = Tss2_Sys_Duplicate_Prepare(sysContext, objectHandle, |
| newParentHandle, encryptionKeyIn, |
| symmetricAlg); |
| if (rval) |
| return rval; |
| |
| rval = CommonOneCall(ctx, cmdAuthsArray, rspAuthsArray); |
| if (rval) |
| return rval; |
| |
| return Tss2_Sys_Duplicate_Complete(sysContext, encryptionKeyOut, |
| duplicate, outSymSeed); |
| } |