Esys_PolicySecret.3 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. .TH "Esys_PolicySecret" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_PolicySecret
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_PolicySecret_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE *nonceTPM, const TPM2B_DIGEST *cpHashA, const TPM2B_NONCE *policyRef, INT32 expiration)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_PolicySecret\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE *nonceTPM, const TPM2B_DIGEST *cpHashA, const TPM2B_NONCE *policyRef, INT32 expiration, TPM2B_TIMEOUT **timeout, TPMT_TK_AUTH **policyTicket)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_PolicySecret_Finish\fP (\fBESYS_CONTEXT\fP *esysContext, TPM2B_TIMEOUT **timeout, TPMT_TK_AUTH **policyTicket)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_PolicySecret command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_PolicySecret (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE * nonceTPM, const TPM2B_DIGEST * cpHashA, const TPM2B_NONCE * policyRef, INT32 expiration, TPM2B_TIMEOUT ** timeout, TPMT_TK_AUTH ** policyTicket)"
  27. One-Call function for TPM2_PolicySecret
  28. .PP
  29. This function invokes the TPM2_PolicySecret command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIauthHandle\fP Handle for an entity providing the authorization\&.
  36. .br
  37. \fIpolicySession\fP Handle for the policy session being extended\&.
  38. .br
  39. \fIshandle1\fP Session handle for authorization of authHandle
  40. .br
  41. \fIshandle2\fP Second session handle\&.
  42. .br
  43. \fIshandle3\fP Third session handle\&.
  44. .br
  45. \fInonceTPM\fP The policy nonce for the session\&.
  46. .br
  47. \fIcpHashA\fP Digest of the command parameters to which this authorization is limited\&.
  48. .br
  49. \fIpolicyRef\fP A reference to a policy relating to the authorization
  50. .IP "\(bu" 2
  51. may be the Empty Buffer\&.
  52. .PP
  53. .br
  54. \fIexpiration\fP Time when authorization will expire, measured in seconds from the time that nonceTPM was generated\&.
  55. .br
  56. \fItimeout\fP Implementation-specific time value used to indicate to the TPM when the ticket expires; this ticket will use the TPMT_ST_AUTH_SECRET structure tag\&. (callee-allocated)
  57. .br
  58. \fIpolicyTicket\fP Produced if the command succeeds and expiration in the command was non-zero ( See 23\&.2\&.5)\&. (callee-allocated)
  59. .RE
  60. .PP
  61. \fBReturn values:\fP
  62. .RS 4
  63. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  64. .br
  65. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  66. .br
  67. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  68. .br
  69. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  70. .br
  71. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  72. .br
  73. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  74. .br
  75. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  76. .br
  77. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  78. .br
  79. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  80. .br
  81. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  82. .br
  83. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  84. .br
  85. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  86. .RE
  87. .PP
  88. .SS "TSS2_RC Esys_PolicySecret_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE * nonceTPM, const TPM2B_DIGEST * cpHashA, const TPM2B_NONCE * policyRef, INT32 expiration)"
  89. Asynchronous function for TPM2_PolicySecret
  90. .PP
  91. This function invokes the TPM2_PolicySecret command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_PolicySecret_Finish\&.
  92. .PP
  93. \fBParameters:\fP
  94. .RS 4
  95. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  96. .br
  97. \fIauthHandle\fP Handle for an entity providing the authorization\&.
  98. .br
  99. \fIpolicySession\fP Handle for the policy session being extended\&.
  100. .br
  101. \fIshandle1\fP Session handle for authorization of authHandle
  102. .br
  103. \fIshandle2\fP Second session handle\&.
  104. .br
  105. \fIshandle3\fP Third session handle\&.
  106. .br
  107. \fInonceTPM\fP The policy nonce for the session\&.
  108. .br
  109. \fIcpHashA\fP Digest of the command parameters to which this authorization is limited\&.
  110. .br
  111. \fIpolicyRef\fP A reference to a policy relating to the authorization
  112. .IP "\(bu" 2
  113. may be the Empty Buffer\&.
  114. .PP
  115. .br
  116. \fIexpiration\fP Time when authorization will expire, measured in seconds from the time that nonceTPM was generated\&.
  117. .RE
  118. .PP
  119. \fBReturn values:\fP
  120. .RS 4
  121. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  122. .br
  123. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  124. .br
  125. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  126. .br
  127. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  128. .br
  129. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  130. .br
  131. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  132. .br
  133. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  134. .br
  135. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  136. .RE
  137. .PP
  138. .SS "TSS2_RC Esys_PolicySecret_Finish (\fBESYS_CONTEXT\fP * esysContext, TPM2B_TIMEOUT ** timeout, TPMT_TK_AUTH ** policyTicket)"
  139. Asynchronous finish function for TPM2_PolicySecret
  140. .PP
  141. This function returns the results of a TPM2_PolicySecret command invoked via Esys_PolicySecret_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  142. .PP
  143. \fBParameters:\fP
  144. .RS 4
  145. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  146. .br
  147. \fItimeout\fP Implementation-specific time value used to indicate to the TPM when the ticket expires; this ticket will use the TPMT_ST_AUTH_SECRET structure tag\&. (callee-allocated)
  148. .br
  149. \fIpolicyTicket\fP Produced if the command succeeds and expiration in the command was non-zero ( See 23\&.2\&.5)\&. (callee-allocated)
  150. .RE
  151. .PP
  152. \fBReturn values:\fP
  153. .RS 4
  154. \fITSS2_RC_SUCCESS\fP on success
  155. .br
  156. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  157. .br
  158. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  159. .br
  160. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  161. .br
  162. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  163. .br
  164. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  165. .br
  166. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  167. .br
  168. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  169. .br
  170. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  171. .br
  172. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  173. .br
  174. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  175. .RE
  176. .PP
  177. .SH "Author"
  178. .PP
  179. Generated automatically by Doxygen for tpm2-tss from the source code\&.