tpm2-tss  master
TPM Software stack 2.0 TCG spec compliant implementation
The ESAPI function for the TPM2_SequenceComplete command.

Functions

TSS2_RC Esys_SequenceComplete_Finish (ESYS_CONTEXT *esysContext, TPM2B_DIGEST **result, TPMT_TK_HASHCHECK **validation)
 

Detailed Description

ESAPI function to invoke the TPM2_SequenceComplete command either as a one-call or in an asynchronous manner.

Function Documentation

◆ Esys_SequenceComplete_Finish()

TSS2_RC Esys_SequenceComplete_Finish ( ESYS_CONTEXT esysContext,
TPM2B_DIGEST **  result,
TPMT_TK_HASHCHECK **  validation 
)

Asynchronous finish function for TPM2_SequenceComplete

This function returns the results of a TPM2_SequenceComplete command invoked via Esys_SequenceComplete_Finish. All non-simple output parameters are allocated by the function's implementation. NULL can be passed for every output parameter if the value is not required.

Parameters
[in,out]esysContextThe ESYS_CONTEXT.
[out]resultThe returned HMAC or digest in a sized buffer. (callee-allocated)
[out]validationTPM2_Ticket indicating that the sequence of octets used to compute outDigest did not start with TPM2_GENERATED_VALUE. (callee-allocated)
Return values
TSS2_RC_SUCCESSon success
ESYS_RC_SUCCESSif the function call was a success.
TSS2_ESYS_RC_BAD_REFERENCEif the esysContext or required input pointers or required output handle references are NULL.
TSS2_ESYS_RC_BAD_CONTEXTif esysContext corruption is detected.
TSS2_ESYS_RC_MEMORYif the ESAPI cannot allocate enough memory for internal operations or return parameters.
TSS2_ESYS_RC_BAD_SEQUENCEif the context has an asynchronous operation already pending.
TSS2_ESYS_RC_TRY_AGAINif the timeout counter expires before the TPM response is received.
TSS2_ESYS_RC_INSUFFICIENT_RESPONSEif the TPM's response does not at least contain the tag, response length, and response code.
TSS2_ESYS_RC_RSP_AUTH_FAILEDif the response HMAC from the TPM did not verify.
TSS2_ESYS_RC_MALFORMED_RESPONSEif the TPM's response is corrupted.
TSS2_RCsproduced by lower layers of the software stack may be returned to the caller unaltered unless handled internally.