Esys_PolicyAuthorize.3 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. .TH "Esys_PolicyAuthorize" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_PolicyAuthorize
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_PolicyAuthorize_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST *approvedPolicy, const TPM2B_NONCE *policyRef, const TPM2B_NAME *keySign, const TPMT_TK_VERIFIED *checkTicket)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_PolicyAuthorize\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST *approvedPolicy, const TPM2B_NONCE *policyRef, const TPM2B_NAME *keySign, const TPMT_TK_VERIFIED *checkTicket)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_PolicyAuthorize_Finish\fP (\fBESYS_CONTEXT\fP *esysContext)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_PolicyAuthorize command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_PolicyAuthorize (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST * approvedPolicy, const TPM2B_NONCE * policyRef, const TPM2B_NAME * keySign, const TPMT_TK_VERIFIED * checkTicket)"
  27. One-Call function for TPM2_PolicyAuthorize
  28. .PP
  29. This function invokes the TPM2_PolicyAuthorize command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIpolicySession\fP Handle for the policy session being extended\&.
  36. .br
  37. \fIshandle1\fP First session handle\&.
  38. .br
  39. \fIshandle2\fP Second session handle\&.
  40. .br
  41. \fIshandle3\fP Third session handle\&.
  42. .br
  43. \fIapprovedPolicy\fP Digest of the policy being approved\&.
  44. .br
  45. \fIpolicyRef\fP A policy qualifier\&.
  46. .br
  47. \fIkeySign\fP Name of a key that can sign a policy addition\&.
  48. .br
  49. \fIcheckTicket\fP Ticket validating that approvedPolicy and policyRef were signed by keySign\&.
  50. .RE
  51. .PP
  52. \fBReturn values:\fP
  53. .RS 4
  54. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  55. .br
  56. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  57. .br
  58. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  59. .br
  60. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  61. .br
  62. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  63. .br
  64. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  65. .br
  66. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  67. .br
  68. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  69. .br
  70. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  71. .br
  72. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  73. .br
  74. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  75. .br
  76. \fITSS2_ESYS_RC_NO_DECRYPT_PARAM\fP if one of the sessions has the 'decrypt' attribute set and the command does not support encryption of the first command parameter\&.
  77. .br
  78. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  79. .br
  80. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  81. .RE
  82. .PP
  83. .SS "TSS2_RC Esys_PolicyAuthorize_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST * approvedPolicy, const TPM2B_NONCE * policyRef, const TPM2B_NAME * keySign, const TPMT_TK_VERIFIED * checkTicket)"
  84. Asynchronous function for TPM2_PolicyAuthorize
  85. .PP
  86. This function invokes the TPM2_PolicyAuthorize command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_PolicyAuthorize_Finish\&.
  87. .PP
  88. \fBParameters:\fP
  89. .RS 4
  90. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  91. .br
  92. \fIpolicySession\fP Handle for the policy session being extended\&.
  93. .br
  94. \fIshandle1\fP First session handle\&.
  95. .br
  96. \fIshandle2\fP Second session handle\&.
  97. .br
  98. \fIshandle3\fP Third session handle\&.
  99. .br
  100. \fIapprovedPolicy\fP Digest of the policy being approved\&.
  101. .br
  102. \fIpolicyRef\fP A policy qualifier\&.
  103. .br
  104. \fIkeySign\fP Name of a key that can sign a policy addition\&.
  105. .br
  106. \fIcheckTicket\fP Ticket validating that approvedPolicy and policyRef were signed by keySign\&.
  107. .RE
  108. .PP
  109. \fBReturn values:\fP
  110. .RS 4
  111. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  112. .br
  113. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  114. .br
  115. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  116. .br
  117. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  118. .br
  119. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  120. .br
  121. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  122. .br
  123. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  124. .br
  125. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  126. .br
  127. \fITSS2_ESYS_RC_NO_DECRYPT_PARAM\fP if one of the sessions has the 'decrypt' attribute set and the command does not support encryption of the first command parameter\&.
  128. .br
  129. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  130. .RE
  131. .PP
  132. .SS "TSS2_RC Esys_PolicyAuthorize_Finish (\fBESYS_CONTEXT\fP * esysContext)"
  133. Asynchronous finish function for TPM2_PolicyAuthorize
  134. .PP
  135. This function returns the results of a TPM2_PolicyAuthorize command invoked via Esys_PolicyAuthorize_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  136. .PP
  137. \fBParameters:\fP
  138. .RS 4
  139. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  140. .RE
  141. .PP
  142. \fBReturn values:\fP
  143. .RS 4
  144. \fITSS2_RC_SUCCESS\fP on success
  145. .br
  146. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  147. .br
  148. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  149. .br
  150. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  151. .br
  152. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  153. .br
  154. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  155. .br
  156. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  157. .br
  158. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  159. .br
  160. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  161. .br
  162. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  163. .br
  164. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  165. .RE
  166. .PP
  167. .SH "Author"
  168. .PP
  169. Generated automatically by Doxygen for tpm2-tss from the source code\&.