Esys_PolicySigned.3 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. .TH "Esys_PolicySigned" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_PolicySigned
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_PolicySigned_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authObject, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE *nonceTPM, const TPM2B_DIGEST *cpHashA, const TPM2B_NONCE *policyRef, INT32 expiration, const TPMT_SIGNATURE *auth)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_PolicySigned\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authObject, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE *nonceTPM, const TPM2B_DIGEST *cpHashA, const TPM2B_NONCE *policyRef, INT32 expiration, const TPMT_SIGNATURE *auth, TPM2B_TIMEOUT **timeout, TPMT_TK_AUTH **policyTicket)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_PolicySigned_Finish\fP (\fBESYS_CONTEXT\fP *esysContext, TPM2B_TIMEOUT **timeout, TPMT_TK_AUTH **policyTicket)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_PolicySigned command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_PolicySigned (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authObject, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE * nonceTPM, const TPM2B_DIGEST * cpHashA, const TPM2B_NONCE * policyRef, INT32 expiration, const TPMT_SIGNATURE * auth, TPM2B_TIMEOUT ** timeout, TPMT_TK_AUTH ** policyTicket)"
  27. One-Call function for TPM2_PolicySigned
  28. .PP
  29. This function invokes the TPM2_PolicySigned command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIauthObject\fP Handle for a key that will validate the signature\&.
  36. .br
  37. \fIpolicySession\fP Handle for the policy session being extended\&.
  38. .br
  39. \fIshandle1\fP First session handle\&.
  40. .br
  41. \fIshandle2\fP Second session handle\&.
  42. .br
  43. \fIshandle3\fP Third session handle\&.
  44. .br
  45. \fInonceTPM\fP The policy nonce for the session\&.
  46. .br
  47. \fIcpHashA\fP Digest of the command parameters to which this authorization is limited\&.
  48. .br
  49. \fIpolicyRef\fP A reference to a policy relating to the authorization
  50. .IP "\(bu" 2
  51. may be the Empty Buffer\&.
  52. .PP
  53. .br
  54. \fIexpiration\fP Time when authorization will expire, measured in seconds from the time that nonceTPM was generated\&.
  55. .br
  56. \fIauth\fP Signed authorization (not optional)\&.
  57. .br
  58. \fItimeout\fP Implementation-specific time value, used to indicate to the TPM when the ticket expires\&. (callee-allocated)
  59. .br
  60. \fIpolicyTicket\fP Produced if the command succeeds and expiration in the command was non-zero; this ticket will use the TPMT_ST_AUTH_SIGNED structure tag\&. See 23\&.2\&.5\&. (callee-allocated)
  61. .RE
  62. .PP
  63. \fBReturn values:\fP
  64. .RS 4
  65. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  66. .br
  67. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  68. .br
  69. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  70. .br
  71. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  72. .br
  73. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  74. .br
  75. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  76. .br
  77. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  78. .br
  79. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  80. .br
  81. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  82. .br
  83. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  84. .br
  85. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  86. .br
  87. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  88. .RE
  89. .PP
  90. .SS "TSS2_RC Esys_PolicySigned_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authObject, \fBESYS_TR\fP policySession, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_NONCE * nonceTPM, const TPM2B_DIGEST * cpHashA, const TPM2B_NONCE * policyRef, INT32 expiration, const TPMT_SIGNATURE * auth)"
  91. Asynchronous function for TPM2_PolicySigned
  92. .PP
  93. This function invokes the TPM2_PolicySigned command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_PolicySigned_Finish\&.
  94. .PP
  95. \fBParameters:\fP
  96. .RS 4
  97. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  98. .br
  99. \fIauthObject\fP Handle for a key that will validate the signature\&.
  100. .br
  101. \fIpolicySession\fP Handle for the policy session being extended\&.
  102. .br
  103. \fIshandle1\fP First session handle\&.
  104. .br
  105. \fIshandle2\fP Second session handle\&.
  106. .br
  107. \fIshandle3\fP Third session handle\&.
  108. .br
  109. \fInonceTPM\fP The policy nonce for the session\&.
  110. .br
  111. \fIcpHashA\fP Digest of the command parameters to which this authorization is limited\&.
  112. .br
  113. \fIpolicyRef\fP A reference to a policy relating to the authorization
  114. .IP "\(bu" 2
  115. may be the Empty Buffer\&.
  116. .PP
  117. .br
  118. \fIexpiration\fP Time when authorization will expire, measured in seconds from the time that nonceTPM was generated\&.
  119. .br
  120. \fIauth\fP Signed authorization (not optional)\&.
  121. .RE
  122. .PP
  123. \fBReturn values:\fP
  124. .RS 4
  125. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  126. .br
  127. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  128. .br
  129. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  130. .br
  131. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  132. .br
  133. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  134. .br
  135. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  136. .br
  137. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  138. .br
  139. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  140. .RE
  141. .PP
  142. .SS "TSS2_RC Esys_PolicySigned_Finish (\fBESYS_CONTEXT\fP * esysContext, TPM2B_TIMEOUT ** timeout, TPMT_TK_AUTH ** policyTicket)"
  143. Asynchronous finish function for TPM2_PolicySigned
  144. .PP
  145. This function returns the results of a TPM2_PolicySigned command invoked via Esys_PolicySigned_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  146. .PP
  147. \fBParameters:\fP
  148. .RS 4
  149. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  150. .br
  151. \fItimeout\fP Implementation-specific time value, used to indicate to the TPM when the ticket expires\&. (callee-allocated)
  152. .br
  153. \fIpolicyTicket\fP Produced if the command succeeds and expiration in the command was non-zero; this ticket will use the TPMT_ST_AUTH_SIGNED structure tag\&. See 23\&.2\&.5\&. (callee-allocated)
  154. .RE
  155. .PP
  156. \fBReturn values:\fP
  157. .RS 4
  158. \fITSS2_RC_SUCCESS\fP on success
  159. .br
  160. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  161. .br
  162. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  163. .br
  164. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  165. .br
  166. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  167. .br
  168. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  169. .br
  170. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  171. .br
  172. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  173. .br
  174. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  175. .br
  176. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  177. .br
  178. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  179. .RE
  180. .PP
  181. .SH "Author"
  182. .PP
  183. Generated automatically by Doxygen for tpm2-tss from the source code\&.