📄 tcg.h
字号:
#define TPM_ORD_GetRandom (70UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_StirRandom (71UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SelfTestFull (80UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SelfTestStartup (81UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_CertifySelfTest (82UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_ContinueSelfTest (83UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetTestResult (84UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_Reset (90UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_OwnerClear (91UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_DisableOwnerClear (92UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_ForceClear (93UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_DisableForceClear (94UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetCapabilitySigned (100UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetCapability (101UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetCapabilityOwner (102UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_OwnerSetDisable (110UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_PhysicalEnable (111UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_PhysicalDisable (112UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SetOwnerInstall (113UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_PhysicalSetDeactivated (114UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SetTempDeactivated (115UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_CreateEndorsementKeyPair (120UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_MakeIdentity (121UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_ActivateIdentity (122UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_ReadPubek (124UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_OwnerReadPubek (125UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_DisablePubekRead (126UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetAuditEvent (130UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetAuditEventSigned (131UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_GetOrdinalAuditStatus (140UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SetOrdinalAuditStatus (141UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_Terminate_Handle (150UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_Init (151UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SaveState (152UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_Startup (153UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SetRedirection (154UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SHA1Start (160UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SHA1Update (161UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SHA1Complete (162UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SHA1CompleteExtend (163UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_FieldUpgrade (170UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SaveKeyContext (180UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_LoadKeyContext (181UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_SaveAuthContext (182UL + TPM_PROTECTED_ORDINAL)#define TPM_ORD_LoadAuthContext (183UL + TPM_PROTECTED_ORDINAL)#define TSC_ORD_PhysicalPresence (10UL + TPM_CONNECTION_ORDINAL)//// TPM_RESULT values//// just put in the whole table from spec 1.2 #define TPM_BASE 0x0 // The start of TPM return codes#define TPM_VENDOR_ERROR 0x00000400 // Mask to indicate that the error code is vendor specific for vendor specific commands#define TPM_NON_FATAL 0x00000800 // Mask to indicate that the error code is a non-fatal failure.#define TPM_SUCCESS TPM_BASE // Successful completion of the operation#define TPM_AUTHFAIL TPM_BASE + 1 // Authentication failed#define TPM_BADINDEX TPM_BASE + 2 // The index to a PCR, DIR or other register is incorrect#define TPM_BAD_PARAMETER TPM_BASE + 3 // One or more parameter is bad#define TPM_AUDITFAILURE TPM_BASE + 4 // An operation completed successfully but the auditing of that operation failed.#define TPM_CLEAR_DISABLED TPM_BASE + 5 // The clear disable flag is set and all clear operations now require physical access#define TPM_DEACTIVATED TPM_BASE + 6 // The TPM is deactivated#define TPM_DISABLED TPM_BASE + 7 // The TPM is disabled#define TPM_DISABLED_CMD TPM_BASE + 8 // The target command has been disabled#define TPM_FAIL TPM_BASE + 9 // The operation failed#define TPM_BAD_ORDINAL TPM_BASE + 10 // The ordinal was unknown or inconsistent#define TPM_INSTALL_DISABLED TPM_BASE + 11 // The ability to install an owner is disabled#define TPM_INVALID_KEYHANDLE TPM_BASE + 12 // The key handle presented was invalid#define TPM_KEYNOTFOUND TPM_BASE + 13 // The target key was not found#define TPM_INAPPROPRIATE_ENC TPM_BASE + 14 // Unacceptable encryption scheme#define TPM_MIGRATEFAIL TPM_BASE + 15 // Migration authorization failed#define TPM_INVALID_PCR_INFO TPM_BASE + 16 // PCR information could not be interpreted#define TPM_NOSPACE TPM_BASE + 17 // No room to load key.#define TPM_NOSRK TPM_BASE + 18 // There is no SRK set#define TPM_NOTSEALED_BLOB TPM_BASE + 19 // An encrypted blob is invalid or was not created by this TPM#define TPM_OWNER_SET TPM_BASE + 20 // There is already an Owner#define TPM_RESOURCES TPM_BASE + 21 // The TPM has insufficient internal resources to perform the requested action.#define TPM_SHORTRANDOM TPM_BASE + 22 // A random string was too short#define TPM_SIZE TPM_BASE + 23 // The TPM does not have the space to perform the operation.#define TPM_WRONGPCRVAL TPM_BASE + 24 // The named PCR value does not match the current PCR value.#define TPM_BAD_PARAM_SIZE TPM_BASE + 25 // The paramSize argument to the command has the incorrect value#define TPM_SHA_THREAD TPM_BASE + 26 // There is no existing SHA-1 thread.#define TPM_SHA_ERROR TPM_BASE + 27 // The calculation is unable to proceed because the existing SHA-1 thread has already encountered an error.#define TPM_FAILEDSELFTEST TPM_BASE + 28 // Self-test has failed and the TPM has shutdown.#define TPM_AUTH2FAIL TPM_BASE + 29 // The authorization for the second key in a 2 key function failed authorization#define TPM_BADTAG TPM_BASE + 30 // The tag value sent to for a command is invalid#define TPM_IOERROR TPM_BASE + 31 // An IO error occurred transmitting information to the TPM#define TPM_ENCRYPT_ERROR TPM_BASE + 32 // The encryption process had a problem.#define TPM_DECRYPT_ERROR TPM_BASE + 33 // The decryption process did not complete.#define TPM_INVALID_AUTHHANDLE TPM_BASE + 34 // An invalid handle was used.#define TPM_NO_ENDORSEMENT TPM_BASE + 35 // The TPM does not a EK installed#define TPM_INVALID_KEYUSAGE TPM_BASE + 36 // The usage of a key is not allowed#define TPM_WRONG_ENTITYTYPE TPM_BASE + 37 // The submitted entity type is not allowed#define TPM_INVALID_POSTINIT TPM_BASE + 38 // The command was received in the wrong sequence relative to TPM_Init and a subsequent TPM_Startup#define TPM_INAPPROPRIATE_SIG TPM_BASE + 39 // Signed data cannot include additional DER information#define TPM_BAD_KEY_PROPERTY TPM_BASE + 40 // The key properties in TPM_KEY_PARMs are not supported by this TPM#define TPM_BAD_MIGRATION TPM_BASE + 41 // The migration properties of this key are incorrect.#define TPM_BAD_SCHEME TPM_BASE + 42 // The signature or encryption scheme for this key is incorrect or not permitted in this situation.#define TPM_BAD_DATASIZE TPM_BASE + 43 // The size of the data (or blob) parameter is bad or inconsistent with the referenced key#define TPM_BAD_MODE TPM_BASE + 44 // A mode parameter is bad, such as capArea or subCapArea for TPM_GetCapability, phsicalPresence parameter for TPM_PhysicalPresence, or migrationType for TPM_CreateMigrationBlob.#define TPM_BAD_PRESENCE TPM_BASE + 45 // Either the physicalPresence or physicalPresenceLock bits have the wrong value#define TPM_BAD_VERSION TPM_BASE + 46 // The TPM cannot perform this version of the capability#define TPM_NO_WRAP_TRANSPORT TPM_BASE + 47 // The TPM does not allow for wrapped transport sessions#define TPM_AUDITFAIL_UNSUCCESSFUL TPM_BASE + 48 // TPM audit construction failed and the underlying command was returning a failure code also#define TPM_AUDITFAIL_SUCCESSFUL TPM_BASE + 49 // TPM audit construction failed and the underlying command was returning success#define TPM_NOTRESETABLE TPM_BASE + 50 // Attempt to reset a PCR register that does not have the resettable attribute#define TPM_NOTLOCAL TPM_BASE + 51 // Attempt to reset a PCR register that requires locality and locality modifier not part of command transport#define TPM_BAD_TYPE TPM_BASE + 52 // Make identity blob not properly typed#define TPM_INVALID_RESOURCE TPM_BASE + 53 // When saving context identified resource type does not match actual resource#define TPM_NOTFIPS TPM_BASE + 54 // The TPM is attempting to execute a command only available when in FIPS mode#define TPM_INVALID_FAMILY TPM_BASE + 55 // The command is attempting to use an invalid family ID#define TPM_NO_NV_PERMISSION TPM_BASE + 56 // The permission to manipulate the NV storage is not available#define TPM_REQUIRES_SIGN TPM_BASE + 57 // The operation requires a signed command#define TPM_KEY_NOTSUPPORTED TPM_BASE + 58 // Wrong operation to load an NV key#define TPM_AUTH_CONFLICT TPM_BASE + 59 // NV_LoadKey blob requires both owner and blob authorization#define TPM_AREA_LOCKED TPM_BASE + 60 // The NV area is locked and not writtable#define TPM_BAD_LOCALITY TPM_BASE + 61 // The locality is incorrect for the attempted operation#define TPM_READ_ONLY TPM_BASE + 62 // The NV area is read only and can't be written to#define TPM_PER_NOWRITE TPM_BASE + 63 // There is no protection on the write to the NV area#define TPM_FAMILYCOUNT TPM_BASE + 64 // The family count value does not match#define TPM_WRITE_LOCKED TPM_BASE + 65 // The NV area has already been written to#define TPM_BAD_ATTRIBUTES TPM_BASE + 66 // The NV area attributes conflict#define TPM_INVALID_STRUCTURE TPM_BASE + 67 // The structure tag and version are invalid or inconsistent#define TPM_KEY_OWNER_CONTROL TPM_BASE + 68 // The key is under control of the TPM Owner and can only be evicted by the TPM Owner.#define TPM_BAD_COUNTER TPM_BASE + 69 // The counter handle is incorrect#define TPM_NOT_FULLWRITE TPM_BASE + 70 // The write is not a complete write of the area#define TPM_CONTEXT_GAP TPM_BASE + 71 // The gap between saved context counts is too large#define TPM_MAXNVWRITES TPM_BASE + 72 // The maximum number of NV writes without an owner has been exceeded#define TPM_NOOPERATOR TPM_BASE + 73 // No operator authorization value is set#define TPM_RESOURCEMISSING TPM_BASE + 74 // The resource pointed to by context is not loaded#define TPM_DELEGATE_LOCK TPM_BASE + 75 // The delegate administration is locked#define TPM_DELEGATE_FAMILY TPM_BASE + 76 // Attempt to manage a family other then the delegated family#define TPM_DELEGATE_ADMIN TPM_BASE + 77 // Delegation table management not enabled#define TPM_TRANSPORT_EXCLUSIVE TPM_BASE + 78 // There was a command executed outside of an exclusive transport session// TPM_STARTUP_TYPE values#define TPM_ST_CLEAR 0x0001#define TPM_ST_STATE 0x0002#define TPM_ST_DEACTIVATED 0x003// TPM_TAG values#define TPM_TAG_RQU_COMMAND 0x00c1#define TPM_TAG_RQU_AUTH1_COMMAND 0x00c2#define TPM_TAG_RQU_AUTH2_COMMAND 0x00c3#define TPM_TAG_RSP_COMMAND 0x00c4#define TPM_TAG_RSP_AUTH1_COMMAND 0x00c5#define TPM_TAG_RSP_AUTH2_COMMAND 0x00c6// TPM_PAYLOAD_TYPE values#define TPM_PT_ASYM 0x01#define TPM_PT_BIND 0x02#define TPM_PT_MIGRATE 0x03#define TPM_PT_MAINT 0x04#define TPM_PT_SEAL 0x05// TPM_ENTITY_TYPE values#define TPM_ET_KEYHANDLE 0x0001#define TPM_ET_OWNER 0x0002#define TPM_ET_DATA 0x0003#define TPM_ET_SRK 0x0004#define TPM_ET_KEY 0x0005/// TPM_ResourceTypes#define TPM_RT_KEY 0x00000001#define TPM_RT_AUTH 0x00000002#define TPM_RT_TRANS 0x00000004#define TPM_RT_CONTEXT 0x00000005// TPM_PROTOCOL_ID values#define TPM_PID_OIAP 0x0001#define TPM_PID_OSAP 0x0002#define TPM_PID_ADIP 0x0003#define TPM_PID_ADCP 0x0004#define TPM_PID_OWNER 0x0005// TPM_ALGORITHM_ID values#define TPM_ALG_RSA 0x00000001#define TPM_ALG_DES 0x00000002#define TPM_ALG_3DES 0X00000003#define TPM_ALG_SHA 0x00000004#define TPM_ALG_HMAC 0x00000005#define TCPA_ALG_AES 0x00000006// TPM_ENC_SCHEME values#define TPM_ES_NONE 0x0001#define TPM_ES_RSAESPKCSv15 0x0002#define TPM_ES_RSAESOAEP_SHA1_MGF1 0x0003// TPM_SIG_SCHEME values#define TPM_SS_NONE 0x0001#define TPM_SS_RSASSAPKCS1v15_SHA1 0x0002#define TPM_SS_RSASSAPKCS1v15_DER 0x0003// TPM_KEY_USAGE values#define TPM_KEY_EK 0x0000 #define TPM_KEY_SIGNING 0x0010#define TPM_KEY_STORAGE 0x0011#define TPM_KEY_IDENTITY 0x0012#define TPM_KEY_AUTHCHANGE 0X0013#define TPM_KEY_BIND 0x0014#define TPM_KEY_LEGACY 0x0015// TPM_AUTH_DATA_USAGE values#define TPM_AUTH_NEVER 0x00#define TPM_AUTH_ALWAYS 0x01// Key Handle of owner and srk#define TPM_OWNER_KEYHANDLE 0x40000001#define TPM_SRK_KEYHANDLE 0x40000000// ---------------------- Functions for checking TPM_RESULTs -----------------#include <stdio.h>// FIXME: Review use of these and delete unneeded ones.// these are really badly dependent on local structure:// DEPENDS: local var 'status' of type TPM_RESULT// DEPENDS: label 'abort_egress' which cleans up and returns the status#define ERRORDIE(s) do { status = s; \ fprintf (stderr, "*** ERRORDIE in %s at %s: %i\n", __func__, __FILE__, __LINE__); \ goto abort_egress; } \ while (0)// DEPENDS: local var 'status' of type TPM_RESULT// DEPENDS: label 'abort_egress' which cleans up and returns the status// Try command c. If it fails, set status to s and goto abort.#define TPMTRY(s,c) if (c != TPM_SUCCESS) { \ status = s; \ printf("ERROR in %s at %s:%i code: %s.\n", __func__, __FILE__, __LINE__, tpm_get_error_name(status)); \ goto abort_egress; \ } else {\ status = c; \ }// Try command c. If it fails, print error message, set status to actual return code. Goto abort#define TPMTRYRETURN(c) do { status = c; \ if (status != TPM_SUCCESS) { \ fprintf(stderr, "ERROR in %s at %s:%i code: %s.\n", __func__, __FILE__, __LINE__, tpm_get_error_name(status)); \ goto abort_egress; \ } \ } while(0) #pragma pack(pop)#endif //__TCPA_H__
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -