| /* SPDX-License-Identifier: BSD-2-Clause */ |
| /***********************************************************************; |
| * Copyright (c) 2015 - 2017, Intel Corporation |
| * All rights reserved. |
| ***********************************************************************/ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include "tss2_tpm2_types.h" |
| #include "tss2_mu.h" |
| #include "sysapi_util.h" |
| |
| TSS2_RC Tss2_Sys_VerifySignature_Prepare( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPMI_DH_OBJECT keyHandle, |
| const TPM2B_DIGEST *digest, |
| const TPMT_SIGNATURE *signature) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!ctx || !signature) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = CommonPreparePrologue(ctx, TPM2_CC_VerifySignature); |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_UINT32_Marshal(keyHandle, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| if (rval) |
| return rval; |
| |
| if (!digest) { |
| ctx->decryptNull = 1; |
| |
| rval = Tss2_MU_UINT16_Marshal(0, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| } else { |
| |
| rval = Tss2_MU_TPM2B_DIGEST_Marshal(digest, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| } |
| |
| if (rval) |
| return rval; |
| |
| rval = Tss2_MU_TPMT_SIGNATURE_Marshal(signature, ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData); |
| if (rval) |
| return rval; |
| |
| ctx->decryptAllowed = 1; |
| ctx->encryptAllowed = 0; |
| ctx->authAllowed = 1; |
| |
| return CommonPrepareEpilogue(ctx); |
| } |
| |
| TSS2_RC Tss2_Sys_VerifySignature_Complete( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPMT_TK_VERIFIED *validation) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!ctx) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = CommonComplete(ctx); |
| if (rval) |
| return rval; |
| |
| return Tss2_MU_TPMT_TK_VERIFIED_Unmarshal(ctx->cmdBuffer, |
| ctx->maxCmdSize, |
| &ctx->nextData, validation); |
| } |
| |
| TSS2_RC Tss2_Sys_VerifySignature( |
| TSS2_SYS_CONTEXT *sysContext, |
| TPMI_DH_OBJECT keyHandle, |
| TSS2L_SYS_AUTH_COMMAND const *cmdAuthsArray, |
| const TPM2B_DIGEST *digest, |
| const TPMT_SIGNATURE *signature, |
| TPMT_TK_VERIFIED *validation, |
| TSS2L_SYS_AUTH_RESPONSE *rspAuthsArray) |
| { |
| _TSS2_SYS_CONTEXT_BLOB *ctx = syscontext_cast(sysContext); |
| TSS2_RC rval; |
| |
| if (!signature) |
| return TSS2_SYS_RC_BAD_REFERENCE; |
| |
| rval = Tss2_Sys_VerifySignature_Prepare(sysContext, keyHandle, digest, signature); |
| if (rval) |
| return rval; |
| |
| rval = CommonOneCall(ctx, cmdAuthsArray, rspAuthsArray); |
| if (rval) |
| return rval; |
| |
| return Tss2_Sys_VerifySignature_Complete(sysContext, validation); |
| } |