1a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// Copyright 2015 The Chromium OS Authors. All rights reserved.
2a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// Use of this source code is governed by a BSD-style license that can be
3a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// found in the LICENSE file.
4163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury
5a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// THIS CODE IS GENERATED - DO NOT MODIFY!
6a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr
7776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury#ifndef TPM2_STARTAUTHSESSION_FP_H_
8776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury#define TPM2_STARTAUTHSESSION_FP_H_
9a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr
10a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr#include "tpm_generated.h"
11163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury
12163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendeburytypedef struct {
13a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPMI_DH_OBJECT tpmKey;
14f788ffb5e5b4493cb4c1deaa12a97c80c2694b01Vadim Bendebury  TPMI_DH_ENTITY bind;
15a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPM2B_NONCE nonceCaller;
16f788ffb5e5b4493cb4c1deaa12a97c80c2694b01Vadim Bendebury  TPM2B_ENCRYPTED_SECRET encryptedSalt;
17a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPM_SE sessionType;
18a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPMT_SYM_DEF symmetric;
19a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPMI_ALG_HASH authHash;
20163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury} StartAuthSession_In;
21163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury
22163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendeburytypedef struct {
23a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr  TPMI_SH_AUTH_SESSION sessionHandle;
24f788ffb5e5b4493cb4c1deaa12a97c80c2694b01Vadim Bendebury  TPM2B_NONCE nonceTPM;
25163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury} StartAuthSession_Out;
26163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury
27a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// Executes StartAuthSession with request handles and parameters from
28a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// |in| and computes response handles and parameters to |out|.
29a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn BohrTPM_RC TPM2_StartAuthSession(StartAuthSession_In* in,
30a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                             StartAuthSession_Out* out);
31a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr
32776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury// Initializes handle fields in |target| from |request_handles|. Unmarshals
33a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// parameter fields in |target| from |buffer|.
34a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn BohrTPM_RC StartAuthSession_In_Unmarshal(StartAuthSession_In* target,
35776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                                     TPM_HANDLE request_handles[],
36a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                                     BYTE** buffer,
37a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                                     INT32* size);
38a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr
39a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// Marshals response handles and parameters from |source| to |buffer|. Computes
40a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// and marshals the size of the parameter area (parameter_size) if |tag| ==
41a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// TPM_ST_SESSIONS. Returns size of (parameter area + handle area) in bytes.
42776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury// Return value does not include parameter_size field.
43a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn BohrUINT16 StartAuthSession_Out_Marshal(StartAuthSession_Out* source,
44a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                                    TPMI_ST_COMMAND_TAG tag,
45a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                                    BYTE** buffer,
46a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr                                    INT32* size);
47a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr
48776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury// Unmarshals any request parameters starting at |request_parameter_buffer|.
49a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// Executes command. Marshals any response handles and parameters to the
50776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury// global response buffer and computes |*response_handle_buffer_size| and
51776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury// |*response_parameter_buffer_size|. If |tag| == TPM_ST_SESSIONS, marshals
52a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// parameter_size indicating the size of the parameter area. parameter_size
53a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr// field is located between the handle area and parameter area.
54a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn BohrTPM_RC Exec_StartAuthSession(TPMI_ST_COMMAND_TAG tag,
55776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                             BYTE** request_parameter_buffer,
56776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                             INT32* request_parameter_buffer_size,
57776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                             TPM_HANDLE request_handles[],
58776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                             UINT32* response_handle_buffer_size,
59776e23689ddfb58cf6d6a111a3741a308e3fe60fVadim Bendebury                             UINT32* response_parameter_buffer_size);
60163cddf19bd5e599e6e35f63872fee31da679589Vadim Bendebury
61a4ed3aa64664a1241ea982d685db744caaae3ffaJocelyn Bohr#endif  // TPM2_STARTAUTHSESSION_FP_H
62