Esys_SetPrimaryPolicy.3 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. .TH "Esys_SetPrimaryPolicy" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_SetPrimaryPolicy
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_SetPrimaryPolicy_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST *authPolicy, TPMI_ALG_HASH hashAlg)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_SetPrimaryPolicy\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST *authPolicy, TPMI_ALG_HASH hashAlg)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_SetPrimaryPolicy_Finish\fP (\fBESYS_CONTEXT\fP *esysContext)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_SetPrimaryPolicy command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_SetPrimaryPolicy (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST * authPolicy, TPMI_ALG_HASH hashAlg)"
  27. One-Call function for TPM2_SetPrimaryPolicy
  28. .PP
  29. This function invokes the TPM2_SetPrimaryPolicy command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIauthHandle\fP TPM2_RH_LOCKOUT, TPM2_RH_ENDORSEMENT, TPM2_RH_OWNER or TPM2_RH_PLATFORM+{PP}\&.
  36. .br
  37. \fIshandle1\fP Session handle for authorization of authHandle
  38. .br
  39. \fIshandle2\fP Second session handle\&.
  40. .br
  41. \fIshandle3\fP Third session handle\&.
  42. .br
  43. \fIauthPolicy\fP An authorization policy digest; may be the Empty Buffer\&.
  44. .br
  45. \fIhashAlg\fP The hash algorithm to use for the policy\&.
  46. .RE
  47. .PP
  48. \fBReturn values:\fP
  49. .RS 4
  50. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  51. .br
  52. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  53. .br
  54. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  55. .br
  56. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  57. .br
  58. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  59. .br
  60. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  61. .br
  62. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  63. .br
  64. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  65. .br
  66. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  67. .br
  68. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  69. .br
  70. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  71. .br
  72. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  73. .br
  74. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  75. .RE
  76. .PP
  77. .SS "TSS2_RC Esys_SetPrimaryPolicy_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DIGEST * authPolicy, TPMI_ALG_HASH hashAlg)"
  78. Asynchronous function for TPM2_SetPrimaryPolicy
  79. .PP
  80. This function invokes the TPM2_SetPrimaryPolicy command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_SetPrimaryPolicy_Finish\&.
  81. .PP
  82. \fBParameters:\fP
  83. .RS 4
  84. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  85. .br
  86. \fIauthHandle\fP TPM2_RH_LOCKOUT, TPM2_RH_ENDORSEMENT, TPM2_RH_OWNER or TPM2_RH_PLATFORM+{PP}\&.
  87. .br
  88. \fIshandle1\fP Session handle for authorization of authHandle
  89. .br
  90. \fIshandle2\fP Second session handle\&.
  91. .br
  92. \fIshandle3\fP Third session handle\&.
  93. .br
  94. \fIauthPolicy\fP An authorization policy digest; may be the Empty Buffer\&.
  95. .br
  96. \fIhashAlg\fP The hash algorithm to use for the policy\&.
  97. .RE
  98. .PP
  99. \fBReturn values:\fP
  100. .RS 4
  101. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  102. .br
  103. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  104. .br
  105. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  106. .br
  107. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  108. .br
  109. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  110. .br
  111. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  112. .br
  113. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  114. .br
  115. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  116. .br
  117. \fITSS2_ESYS_RC_NO_ENCRYPT_PARAM\fP if one of the sessions has the 'encrypt' attribute set and the command does not support encryption of the first response parameter\&.
  118. .RE
  119. .PP
  120. .SS "TSS2_RC Esys_SetPrimaryPolicy_Finish (\fBESYS_CONTEXT\fP * esysContext)"
  121. Asynchronous finish function for TPM2_SetPrimaryPolicy
  122. .PP
  123. This function returns the results of a TPM2_SetPrimaryPolicy command invoked via Esys_SetPrimaryPolicy_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  124. .PP
  125. \fBParameters:\fP
  126. .RS 4
  127. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  128. .RE
  129. .PP
  130. \fBReturn values:\fP
  131. .RS 4
  132. \fITSS2_RC_SUCCESS\fP on success
  133. .br
  134. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  135. .br
  136. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  137. .br
  138. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  139. .br
  140. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  141. .br
  142. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  143. .br
  144. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  145. .br
  146. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  147. .br
  148. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  149. .br
  150. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  151. .br
  152. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  153. .RE
  154. .PP
  155. .SH "Author"
  156. .PP
  157. Generated automatically by Doxygen for tpm2-tss from the source code\&.