1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
|
/*
* Licensed Materials - Property of IBM
*
* trousers - An open source TCG Software Stack
*
* (C) Copyright International Business Machines Corp. 2004
*
*/
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <inttypes.h>
#include "trousers/tss.h"
#include "trousers_types.h"
#include "tcs_tsp.h"
#include "tcsps.h"
#include "tcs_utils.h"
#include "tcs_int_literals.h"
#include "capabilities.h"
#include "tcslog.h"
#include "req_mgr.h"
#include "tcsd_wrap.h"
#include "tcsd.h"
TSS_RESULT
TCSP_CertifyKey_Internal(TCS_CONTEXT_HANDLE hContext, /* in */
TCS_KEY_HANDLE certHandle, /* in */
TCS_KEY_HANDLE keyHandle, /* in */
TCPA_NONCE antiReplay, /* in */
TPM_AUTH * certAuth, /* in, out */
TPM_AUTH * keyAuth, /* in, out */
UINT32 * CertifyInfoSize, /* out */
BYTE ** CertifyInfo, /* out */
UINT32 * outDataSize, /* out */
BYTE ** outData) /* out */
{
UINT64 offset = 0;
UINT32 paramSize;
TSS_RESULT result;
TCPA_KEY_HANDLE certKeySlot, keySlot;
BYTE txBlob[TSS_TPM_TXBLOB_SIZE];
LogDebug("Entering Certify Key");
if ((result = ctx_verify_context(hContext)))
goto done;
if (certAuth != NULL) {
LogDebug("Auth Used for Cert signing key");
if ((result = auth_mgr_check(hContext, &certAuth->AuthHandle)))
goto done;
} else {
LogDebug("No Auth used for Cert signing key");
}
if (keyAuth != NULL) {
LogDebug("Auth Used for Key being signed");
if ((result = auth_mgr_check(hContext, &keyAuth->AuthHandle)))
goto done;
} else {
LogDebug("No Auth used for Key being signed");
}
if ((result = ensureKeyIsLoaded(hContext, certHandle, &certKeySlot)))
goto done;
if ((result = ensureKeyIsLoaded(hContext, keyHandle, &keySlot)))
goto done;
if ((result = tpm_rqu_build(TPM_ORD_CertifyKey, &offset, txBlob, certKeySlot, keySlot,
antiReplay.nonce, certAuth, keyAuth)))
goto done;
if ((result = req_mgr_submit_req(txBlob)))
goto done;
result = UnloadBlob_Header(txBlob, ¶mSize);
if (!result) {
result = tpm_rsp_parse(TPM_ORD_CertifyKey, txBlob, paramSize, CertifyInfoSize,
CertifyInfo, outDataSize, outData, certAuth, keyAuth);
}
LogResult("Certify Key", result);
done:
auth_mgr_release_auth(certAuth, keyAuth, hContext);
return result;
}
|