Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 1 | // Copyright 2015 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
Vadim Bendebury | bc470c7 | 2015-05-29 22:58:33 -0700 | [diff] [blame] | 4 | |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 5 | // THIS CODE IS GENERATED - DO NOT MODIFY! |
| 6 | |
Vadim Bendebury | 776e236 | 2015-09-04 16:14:53 -0700 | [diff] [blame] | 7 | #ifndef TPM2_GETCOMMANDAUDITDIGEST_FP_H_ |
| 8 | #define TPM2_GETCOMMANDAUDITDIGEST_FP_H_ |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 9 | |
| 10 | #include "tpm_generated.h" |
Vadim Bendebury | bc470c7 | 2015-05-29 22:58:33 -0700 | [diff] [blame] | 11 | |
| 12 | typedef struct { |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 13 | TPMI_RH_ENDORSEMENT privacyHandle; |
Vadim Bendebury | f788ffb | 2015-06-05 12:57:27 -0700 | [diff] [blame] | 14 | TPMI_DH_OBJECT signHandle; |
Vadim Bendebury | f788ffb | 2015-06-05 12:57:27 -0700 | [diff] [blame] | 15 | TPM2B_DATA qualifyingData; |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 16 | TPMT_SIG_SCHEME inScheme; |
Vadim Bendebury | bc470c7 | 2015-05-29 22:58:33 -0700 | [diff] [blame] | 17 | } GetCommandAuditDigest_In; |
| 18 | |
| 19 | typedef struct { |
Vadim Bendebury | f788ffb | 2015-06-05 12:57:27 -0700 | [diff] [blame] | 20 | TPM2B_ATTEST auditInfo; |
| 21 | TPMT_SIGNATURE signature; |
Vadim Bendebury | bc470c7 | 2015-05-29 22:58:33 -0700 | [diff] [blame] | 22 | } GetCommandAuditDigest_Out; |
| 23 | |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 24 | // Executes GetCommandAuditDigest with request handles and parameters from |
| 25 | // |in| and computes response handles and parameters to |out|. |
| 26 | TPM_RC TPM2_GetCommandAuditDigest(GetCommandAuditDigest_In* in, |
| 27 | GetCommandAuditDigest_Out* out); |
Vadim Bendebury | bc470c7 | 2015-05-29 22:58:33 -0700 | [diff] [blame] | 28 | |
Vadim Bendebury | 776e236 | 2015-09-04 16:14:53 -0700 | [diff] [blame] | 29 | // Unmarshals any request parameters starting at |request_parameter_buffer|. |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 30 | // Executes command. Marshals any response handles and parameters to the |
Vadim Bendebury | 776e236 | 2015-09-04 16:14:53 -0700 | [diff] [blame] | 31 | // global response buffer and computes |*response_handle_buffer_size| and |
| 32 | // |*response_parameter_buffer_size|. If |tag| == TPM_ST_SESSIONS, marshals |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 33 | // parameter_size indicating the size of the parameter area. parameter_size |
| 34 | // field is located between the handle area and parameter area. |
| 35 | TPM_RC Exec_GetCommandAuditDigest(TPMI_ST_COMMAND_TAG tag, |
Vadim Bendebury | 776e236 | 2015-09-04 16:14:53 -0700 | [diff] [blame] | 36 | BYTE** request_parameter_buffer, |
| 37 | INT32* request_parameter_buffer_size, |
| 38 | TPM_HANDLE request_handles[], |
| 39 | UINT32* response_handle_buffer_size, |
| 40 | UINT32* response_parameter_buffer_size); |
Jocelyn Bohr | a4ed3aa | 2015-07-30 10:44:16 -0700 | [diff] [blame] | 41 | |
| 42 | #endif // TPM2_GETCOMMANDAUDITDIGEST_FP_H |