blob: 8e428773ec9a1c65846a16361a9bfa6a2af2bd51 [file] [log] [blame]
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -07001// Copyright 2015 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
Vadim Bendeburya44f6e82015-05-29 22:59:34 -07004
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -07005// THIS CODE IS GENERATED - DO NOT MODIFY!
6
Vadim Bendebury776e2362015-09-04 16:14:53 -07007#ifndef TPM2_GETSESSIONAUDITDIGEST_FP_H_
8#define TPM2_GETSESSIONAUDITDIGEST_FP_H_
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -07009
10#include "tpm_generated.h"
Vadim Bendeburya44f6e82015-05-29 22:59:34 -070011
12typedef struct {
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070013 TPMI_RH_ENDORSEMENT privacyAdminHandle;
Vadim Bendeburyf788ffb2015-06-05 12:57:27 -070014 TPMI_DH_OBJECT signHandle;
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070015 TPMI_SH_HMAC sessionHandle;
Vadim Bendeburyf788ffb2015-06-05 12:57:27 -070016 TPM2B_DATA qualifyingData;
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070017 TPMT_SIG_SCHEME inScheme;
Vadim Bendeburya44f6e82015-05-29 22:59:34 -070018} GetSessionAuditDigest_In;
19
20typedef struct {
Vadim Bendeburyf788ffb2015-06-05 12:57:27 -070021 TPM2B_ATTEST auditInfo;
22 TPMT_SIGNATURE signature;
Vadim Bendeburya44f6e82015-05-29 22:59:34 -070023} GetSessionAuditDigest_Out;
24
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070025// Executes GetSessionAuditDigest with request handles and parameters from
26// |in| and computes response handles and parameters to |out|.
27TPM_RC TPM2_GetSessionAuditDigest(GetSessionAuditDigest_In* in,
28 GetSessionAuditDigest_Out* out);
Vadim Bendeburya44f6e82015-05-29 22:59:34 -070029
Vadim Bendebury776e2362015-09-04 16:14:53 -070030// Initializes handle fields in |target| from |request_handles|. Unmarshals
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070031// parameter fields in |target| from |buffer|.
32TPM_RC GetSessionAuditDigest_In_Unmarshal(GetSessionAuditDigest_In* target,
Vadim Bendebury776e2362015-09-04 16:14:53 -070033 TPM_HANDLE request_handles[],
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070034 BYTE** buffer,
35 INT32* size);
36
37// Marshals response handles and parameters from |source| to |buffer|. Computes
38// and marshals the size of the parameter area (parameter_size) if |tag| ==
39// TPM_ST_SESSIONS. Returns size of (parameter area + handle area) in bytes.
Vadim Bendebury776e2362015-09-04 16:14:53 -070040// Return value does not include parameter_size field.
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070041UINT16 GetSessionAuditDigest_Out_Marshal(GetSessionAuditDigest_Out* source,
42 TPMI_ST_COMMAND_TAG tag,
43 BYTE** buffer,
44 INT32* size);
45
Vadim Bendebury776e2362015-09-04 16:14:53 -070046// Unmarshals any request parameters starting at |request_parameter_buffer|.
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070047// Executes command. Marshals any response handles and parameters to the
Vadim Bendebury776e2362015-09-04 16:14:53 -070048// global response buffer and computes |*response_handle_buffer_size| and
49// |*response_parameter_buffer_size|. If |tag| == TPM_ST_SESSIONS, marshals
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070050// parameter_size indicating the size of the parameter area. parameter_size
51// field is located between the handle area and parameter area.
52TPM_RC Exec_GetSessionAuditDigest(TPMI_ST_COMMAND_TAG tag,
Vadim Bendebury776e2362015-09-04 16:14:53 -070053 BYTE** request_parameter_buffer,
54 INT32* request_parameter_buffer_size,
55 TPM_HANDLE request_handles[],
56 UINT32* response_handle_buffer_size,
57 UINT32* response_parameter_buffer_size);
Jocelyn Bohra4ed3aa2015-07-30 10:44:16 -070058
59#endif // TPM2_GETSESSIONAUDITDIGEST_FP_H