Esys_PolicyNV.3 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. .TH "Esys_PolicyNV" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_PolicyNV
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_PolicyNV_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_OPERAND *operandB, UINT16 offset, TPM2_EO operation)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_PolicyNV\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_OPERAND *operandB, UINT16 offset, TPM2_EO operation)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_PolicyNV_Finish\fP (\fBESYS_CONTEXT\fP *esysContext)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_PolicyNV command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_PolicyNV (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_OPERAND * operandB, UINT16 offset, TPM2_EO operation)"
  27. One-Call function for TPM2_PolicyNV
  28. .PP
  29. This function invokes the TPM2_PolicyNV command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIauthHandle\fP Handle indicating the source of the authorization value\&.
  36. .br
  37. \fInvIndex\fP The NV Index of the area to read\&.
  38. .br
  39. \fIpolicySession\fP Handle for the policy session being extended\&.
  40. .br
  41. \fIshandle1\fP Session handle for authorization of authHandle
  42. .br
  43. \fIshandle2\fP Second session handle\&.
  44. .br
  45. \fIshandle3\fP Third session handle\&.
  46. .br
  47. \fIoperandB\fP The second operand\&.
  48. .br
  49. \fIoffset\fP The offset in the NV Index for the start of operand A\&.
  50. .br
  51. \fIoperation\fP The comparison to make\&.
  52. .RE
  53. .PP
  54. \fBReturn values:\fP
  55. .RS 4
  56. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  57. .br
  58. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  59. .br
  60. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  61. .br
  62. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  63. .br
  64. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  65. .br
  66. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  67. .br
  68. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  69. .br
  70. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  71. .br
  72. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  73. .br
  74. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  75. .br
  76. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  77. .br
  78. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  79. .br
  80. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  81. .RE
  82. .PP
  83. .SS "TSS2_RC Esys_PolicyNV_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_OPERAND * operandB, UINT16 offset, TPM2_EO operation)"
  84. Asynchronous function for TPM2_PolicyNV
  85. .PP
  86. This function invokes the TPM2_PolicyNV command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_PolicyNV_Finish\&.
  87. .PP
  88. \fBParameters:\fP
  89. .RS 4
  90. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  91. .br
  92. \fIauthHandle\fP Handle indicating the source of the authorization value\&.
  93. .br
  94. \fInvIndex\fP The NV Index of the area to read\&.
  95. .br
  96. \fIpolicySession\fP Handle for the policy session being extended\&.
  97. .br
  98. \fIshandle1\fP Session handle for authorization of authHandle
  99. .br
  100. \fIshandle2\fP Second session handle\&.
  101. .br
  102. \fIshandle3\fP Third session handle\&.
  103. .br
  104. \fIoperandB\fP The second operand\&.
  105. .br
  106. \fIoffset\fP The offset in the NV Index for the start of operand A\&.
  107. .br
  108. \fIoperation\fP The comparison to make\&.
  109. .RE
  110. .PP
  111. \fBReturn values:\fP
  112. .RS 4
  113. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  114. .br
  115. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  116. .br
  117. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  118. .br
  119. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  120. .br
  121. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  122. .br
  123. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  124. .br
  125. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  126. .br
  127. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  128. .br
  129. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  130. .RE
  131. .PP
  132. .SS "TSS2_RC Esys_PolicyNV_Finish (\fBESYS_CONTEXT\fP * esysContext)"
  133. Asynchronous finish function for TPM2_PolicyNV
  134. .PP
  135. This function returns the results of a TPM2_PolicyNV command invoked via Esys_PolicyNV_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  136. .PP
  137. \fBParameters:\fP
  138. .RS 4
  139. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  140. .RE
  141. .PP
  142. \fBReturn values:\fP
  143. .RS 4
  144. \fITSS2_RC_SUCCESS\fP on success
  145. .br
  146. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  147. .br
  148. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  149. .br
  150. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  151. .br
  152. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  153. .br
  154. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  155. .br
  156. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  157. .br
  158. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  159. .br
  160. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  161. .br
  162. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  163. .br
  164. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  165. .RE
  166. .PP
  167. .SH "Author"
  168. .PP
  169. Generated automatically by Doxygen for tpm2-tss from the source code\&.