]>
Commit | Line | Data |
---|---|---|
42eedea9 | 1 | /** @file \r |
267669ba | 2 | TPM Specification data structures (TCG TPM Specification Version 1.2 Revision 94)\r |
267669ba LG |
3 | See http://trustedcomputinggroup.org for latest specification updates\r |
4 | \r | |
4135253b | 5 | Copyright (c) 2006 - 2008, Intel Corporation\r |
8069d49e LG |
6 | All rights reserved. This program and the accompanying materials \r |
7 | are licensed and made available under the terms and conditions of the BSD License \r | |
8 | which accompanies this distribution. The full text of the license may be found at \r | |
9 | http://opensource.org/licenses/bsd-license.php \r | |
10 | \r | |
11 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r | |
12 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r | |
13 | **/\r | |
14 | \r | |
267669ba LG |
15 | \r |
16 | #ifndef _TPM12_H_\r | |
17 | #define _TPM12_H_\r | |
18 | \r | |
ec8432e5 | 19 | ///\r |
20 | /// The start of TPM return codes\r | |
21 | ///\r | |
07636730 | 22 | #define TPM_BASE (MAX_BIT + (MAX_BIT >> 1))\r |
267669ba LG |
23 | \r |
24 | //\r | |
427987f5 | 25 | // All structures MUST be packed on a byte boundary.\r |
267669ba | 26 | //\r |
766f4bc1 | 27 | \r |
a04ad3f0 | 28 | #pragma pack (1)\r |
267669ba LG |
29 | \r |
30 | //\r | |
4135253b | 31 | // Part 2, section 2.2.3: Helper redefinitions\r |
267669ba | 32 | //\r |
cc078d72 | 33 | ///\r |
34 | /// Indicates the conditions where it is required that authorization be presented\r | |
35 | ///\r | |
267669ba | 36 | typedef UINT8 TPM_AUTH_DATA_USAGE;\r |
cc078d72 | 37 | ///\r |
38 | /// The information as to what the payload is in an encrypted structure\r | |
39 | ///\r | |
267669ba | 40 | typedef UINT8 TPM_PAYLOAD_TYPE;\r |
cc078d72 | 41 | ///\r |
42 | /// The version info breakdown\r | |
43 | ///\r | |
267669ba | 44 | typedef UINT8 TPM_VERSION_BYTE;\r |
cc078d72 | 45 | ///\r |
46 | /// The request or response authorization type\r | |
47 | ///\r | |
267669ba | 48 | typedef UINT16 TPM_TAG;\r |
cc078d72 | 49 | ///\r |
50 | /// The protocol in use\r | |
51 | ///\r | |
267669ba | 52 | typedef UINT16 TPM_PROTOCOL_ID;\r |
cc078d72 | 53 | ///\r |
54 | /// Indicates the start state\r | |
55 | ///\r | |
267669ba | 56 | typedef UINT16 TPM_STARTUP_TYPE;\r |
cc078d72 | 57 | ///\r |
58 | /// The definition of the encryption scheme\r | |
59 | ///\r | |
267669ba | 60 | typedef UINT16 TPM_ENC_SCHEME;\r |
cc078d72 | 61 | ///\r |
62 | /// The definition of the signature scheme\r | |
63 | ///\r | |
267669ba | 64 | typedef UINT16 TPM_SIG_SCHEME;\r |
cc078d72 | 65 | ///\r |
66 | /// The definition of the migration scheme\r | |
67 | ///\r | |
267669ba | 68 | typedef UINT16 TPM_MIGRATE_SCHEME;\r |
cc078d72 | 69 | ///\r |
70 | /// Sets the state of the physical presence mechanism\r | |
71 | ///\r | |
267669ba | 72 | typedef UINT16 TPM_PHYSICAL_PRESENCE;\r |
cc078d72 | 73 | ///\r |
74 | /// Indicates the types of entity that are supported by the TPM\r | |
75 | ///\r | |
267669ba | 76 | typedef UINT16 TPM_ENTITY_TYPE;\r |
cc078d72 | 77 | ///\r |
78 | /// Indicates the permitted usage of the key\r | |
79 | ///\r | |
267669ba | 80 | typedef UINT16 TPM_KEY_USAGE;\r |
cc078d72 | 81 | ///\r |
82 | /// The type of asymmetric encrypted structure in use by the endorsement key\r | |
83 | ///\r | |
267669ba | 84 | typedef UINT16 TPM_EK_TYPE;\r |
cc078d72 | 85 | ///\r |
86 | /// The tag for the structure\r | |
87 | ///\r | |
267669ba | 88 | typedef UINT16 TPM_STRUCTURE_TAG;\r |
cc078d72 | 89 | ///\r |
90 | /// The platform specific spec to which the information relates to\r | |
91 | ///\r | |
267669ba | 92 | typedef UINT16 TPM_PLATFORM_SPECIFIC;\r |
cc078d72 | 93 | ///\r |
94 | /// The command ordinal\r | |
95 | ///\r | |
267669ba | 96 | typedef UINT32 TPM_COMMAND_CODE;\r |
cc078d72 | 97 | ///\r |
98 | /// Identifies a TPM capability area\r | |
99 | ///\r | |
267669ba | 100 | typedef UINT32 TPM_CAPABILITY_AREA;\r |
cc078d72 | 101 | ///\r |
102 | /// Indicates information regarding a key\r | |
103 | ///\r | |
267669ba | 104 | typedef UINT32 TPM_KEY_FLAGS;\r |
cc078d72 | 105 | ///\r |
106 | /// Indicates the type of algorithm\r | |
107 | ///\r | |
267669ba | 108 | typedef UINT32 TPM_ALGORITHM_ID;\r |
cc078d72 | 109 | ///\r |
110 | /// The locality modifier\r | |
111 | ///\r | |
267669ba | 112 | typedef UINT32 TPM_MODIFIER_INDICATOR;\r |
cc078d72 | 113 | ///\r |
114 | /// The actual number of a counter\r | |
115 | ///\r | |
267669ba | 116 | typedef UINT32 TPM_ACTUAL_COUNT;\r |
cc078d72 | 117 | ///\r |
118 | /// Attributes that define what options are in use for a transport session\r | |
119 | ///\r | |
267669ba | 120 | typedef UINT32 TPM_TRANSPORT_ATTRIBUTES;\r |
cc078d72 | 121 | ///\r |
122 | /// Handle to an authorization session\r | |
123 | ///\r | |
267669ba | 124 | typedef UINT32 TPM_AUTHHANDLE;\r |
cc078d72 | 125 | ///\r |
126 | /// Index to a DIR register\r | |
127 | ///\r | |
267669ba | 128 | typedef UINT32 TPM_DIRINDEX;\r |
cc078d72 | 129 | ///\r |
130 | /// The area where a key is held assigned by the TPM\r | |
131 | ///\r | |
267669ba | 132 | typedef UINT32 TPM_KEY_HANDLE;\r |
cc078d72 | 133 | ///\r |
134 | /// Index to a PCR register\r | |
135 | ///\r | |
267669ba | 136 | typedef UINT32 TPM_PCRINDEX;\r |
cc078d72 | 137 | ///\r |
138 | /// The return code from a function\r | |
139 | ///\r | |
267669ba | 140 | typedef UINT32 TPM_RESULT;\r |
cc078d72 | 141 | ///\r |
142 | /// The types of resources that a TPM may have using internal resources\r | |
143 | ///\r | |
267669ba | 144 | typedef UINT32 TPM_RESOURCE_TYPE;\r |
cc078d72 | 145 | ///\r |
146 | /// Allows for controlling of the key when loaded and how to handle TPM_Startup issues\r | |
147 | ///\r | |
267669ba | 148 | typedef UINT32 TPM_KEY_CONTROL;\r |
cc078d72 | 149 | ///\r |
150 | /// The index into the NV storage area\r | |
151 | ///\r | |
267669ba | 152 | typedef UINT32 TPM_NV_INDEX;\r |
cc078d72 | 153 | ///\r |
1bf79370 | 154 | /// The family ID. Families ID's are automatically assigned a sequence number by the TPM. \r |
cc078d72 | 155 | /// A trusted process can set the FamilyID value in an individual row to NULL, which \r |
156 | /// invalidates that row. The family ID resets to NULL on each change of TPM Owner.\r | |
157 | ///\r | |
267669ba | 158 | typedef UINT32 TPM_FAMILY_ID;\r |
cc078d72 | 159 | ///\r |
160 | /// IA value used as a label for the most recent verification of this family. Set to zero when not in use.\r | |
161 | ///\r | |
267669ba | 162 | typedef UINT32 TPM_FAMILY_VERIFICATION;\r |
cc078d72 | 163 | ///\r |
164 | /// How the TPM handles var\r | |
165 | ///\r | |
267669ba | 166 | typedef UINT32 TPM_STARTUP_EFFECTS;\r |
cc078d72 | 167 | ///\r |
168 | /// The mode of a symmetric encryption\r | |
169 | ///\r | |
267669ba | 170 | typedef UINT32 TPM_SYM_MODE;\r |
cc078d72 | 171 | ///\r |
172 | /// The family flags\r | |
173 | ///\r | |
267669ba | 174 | typedef UINT32 TPM_FAMILY_FLAGS;\r |
cc078d72 | 175 | ///\r |
176 | /// The index value for the delegate NV table\r | |
177 | ///\r | |
267669ba | 178 | typedef UINT32 TPM_DELEGATE_INDEX;\r |
cc078d72 | 179 | ///\r |
180 | /// The restrictions placed on delegation of CMK commands\r | |
181 | ///\r | |
267669ba | 182 | typedef UINT32 TPM_CMK_DELEGATE;\r |
cc078d72 | 183 | ///\r |
184 | /// The ID value of a monotonic counter\r | |
185 | ///\r | |
267669ba | 186 | typedef UINT32 TPM_COUNT_ID;\r |
cc078d72 | 187 | ///\r |
188 | /// A command to execute\r | |
189 | ///\r | |
267669ba | 190 | typedef UINT32 TPM_REDIT_COMMAND;\r |
cc078d72 | 191 | ///\r |
192 | /// A transport session handle\r | |
193 | ///\r | |
267669ba | 194 | typedef UINT32 TPM_TRANSHANDLE;\r |
cc078d72 | 195 | ///\r |
196 | /// A generic handle could be key, transport etc\r | |
197 | ///\r | |
267669ba | 198 | typedef UINT32 TPM_HANDLE;\r |
cc078d72 | 199 | ///\r |
200 | /// What operation is happening\r | |
201 | ///\r | |
267669ba LG |
202 | typedef UINT32 TPM_FAMILY_OPERATION;\r |
203 | \r | |
204 | //\r | |
205 | // Part 2, section 2.2.4: Vendor specific\r | |
206 | // The following defines allow for the quick specification of a\r | |
207 | // vendor specific item.\r | |
208 | //\r | |
209 | #define TPM_Vendor_Specific32 ((UINT32) 0x00000400)\r | |
210 | #define TPM_Vendor_Specific8 ((UINT8) 0x80)\r | |
211 | \r | |
212 | //\r | |
4135253b | 213 | // Part 2, section 3.1: TPM_STRUCTURE_TAG\r |
267669ba LG |
214 | //\r |
215 | #define TPM_TAG_CONTEXTBLOB ((TPM_STRUCTURE_TAG) 0x0001)\r | |
216 | #define TPM_TAG_CONTEXT_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0002)\r | |
217 | #define TPM_TAG_CONTEXTPOINTER ((TPM_STRUCTURE_TAG) 0x0003)\r | |
218 | #define TPM_TAG_CONTEXTLIST ((TPM_STRUCTURE_TAG) 0x0004)\r | |
219 | #define TPM_TAG_SIGNINFO ((TPM_STRUCTURE_TAG) 0x0005)\r | |
220 | #define TPM_TAG_PCR_INFO_LONG ((TPM_STRUCTURE_TAG) 0x0006)\r | |
221 | #define TPM_TAG_PERSISTENT_FLAGS ((TPM_STRUCTURE_TAG) 0x0007)\r | |
222 | #define TPM_TAG_VOLATILE_FLAGS ((TPM_STRUCTURE_TAG) 0x0008)\r | |
223 | #define TPM_TAG_PERSISTENT_DATA ((TPM_STRUCTURE_TAG) 0x0009)\r | |
224 | #define TPM_TAG_VOLATILE_DATA ((TPM_STRUCTURE_TAG) 0x000A)\r | |
225 | #define TPM_TAG_SV_DATA ((TPM_STRUCTURE_TAG) 0x000B)\r | |
226 | #define TPM_TAG_EK_BLOB ((TPM_STRUCTURE_TAG) 0x000C)\r | |
227 | #define TPM_TAG_EK_BLOB_AUTH ((TPM_STRUCTURE_TAG) 0x000D)\r | |
228 | #define TPM_TAG_COUNTER_VALUE ((TPM_STRUCTURE_TAG) 0x000E)\r | |
229 | #define TPM_TAG_TRANSPORT_INTERNAL ((TPM_STRUCTURE_TAG) 0x000F)\r | |
230 | #define TPM_TAG_TRANSPORT_LOG_IN ((TPM_STRUCTURE_TAG) 0x0010)\r | |
231 | #define TPM_TAG_TRANSPORT_LOG_OUT ((TPM_STRUCTURE_TAG) 0x0011)\r | |
232 | #define TPM_TAG_AUDIT_EVENT_IN ((TPM_STRUCTURE_TAG) 0x0012)\r | |
233 | #define TPM_TAG_AUDIT_EVENT_OUT ((TPM_STRUCTURE_TAG) 0x0013)\r | |
234 | #define TPM_TAG_CURRENT_TICKS ((TPM_STRUCTURE_TAG) 0x0014)\r | |
235 | #define TPM_TAG_KEY ((TPM_STRUCTURE_TAG) 0x0015)\r | |
236 | #define TPM_TAG_STORED_DATA12 ((TPM_STRUCTURE_TAG) 0x0016)\r | |
237 | #define TPM_TAG_NV_ATTRIBUTES ((TPM_STRUCTURE_TAG) 0x0017)\r | |
238 | #define TPM_TAG_NV_DATA_PUBLIC ((TPM_STRUCTURE_TAG) 0x0018)\r | |
239 | #define TPM_TAG_NV_DATA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0019)\r | |
240 | #define TPM_TAG_DELEGATIONS ((TPM_STRUCTURE_TAG) 0x001A)\r | |
241 | #define TPM_TAG_DELEGATE_PUBLIC ((TPM_STRUCTURE_TAG) 0x001B)\r | |
242 | #define TPM_TAG_DELEGATE_TABLE_ROW ((TPM_STRUCTURE_TAG) 0x001C)\r | |
243 | #define TPM_TAG_TRANSPORT_AUTH ((TPM_STRUCTURE_TAG) 0x001D)\r | |
244 | #define TPM_TAG_TRANSPORT_PUBLIC ((TPM_STRUCTURE_TAG) 0x001E)\r | |
245 | #define TPM_TAG_PERMANENT_FLAGS ((TPM_STRUCTURE_TAG) 0x001F)\r | |
246 | #define TPM_TAG_STCLEAR_FLAGS ((TPM_STRUCTURE_TAG) 0x0020)\r | |
247 | #define TPM_TAG_STANY_FLAGS ((TPM_STRUCTURE_TAG) 0x0021)\r | |
248 | #define TPM_TAG_PERMANENT_DATA ((TPM_STRUCTURE_TAG) 0x0022)\r | |
249 | #define TPM_TAG_STCLEAR_DATA ((TPM_STRUCTURE_TAG) 0x0023)\r | |
250 | #define TPM_TAG_STANY_DATA ((TPM_STRUCTURE_TAG) 0x0024)\r | |
251 | #define TPM_TAG_FAMILY_TABLE_ENTRY ((TPM_STRUCTURE_TAG) 0x0025)\r | |
252 | #define TPM_TAG_DELEGATE_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0026)\r | |
253 | #define TPM_TAG_DELG_KEY_BLOB ((TPM_STRUCTURE_TAG) 0x0027)\r | |
254 | #define TPM_TAG_KEY12 ((TPM_STRUCTURE_TAG) 0x0028)\r | |
255 | #define TPM_TAG_CERTIFY_INFO2 ((TPM_STRUCTURE_TAG) 0x0029)\r | |
256 | #define TPM_TAG_DELEGATE_OWNER_BLOB ((TPM_STRUCTURE_TAG) 0x002A)\r | |
257 | #define TPM_TAG_EK_BLOB_ACTIVATE ((TPM_STRUCTURE_TAG) 0x002B)\r | |
258 | #define TPM_TAG_DAA_BLOB ((TPM_STRUCTURE_TAG) 0x002C)\r | |
259 | #define TPM_TAG_DAA_CONTEXT ((TPM_STRUCTURE_TAG) 0x002D)\r | |
260 | #define TPM_TAG_DAA_ENFORCE ((TPM_STRUCTURE_TAG) 0x002E)\r | |
261 | #define TPM_TAG_DAA_ISSUER ((TPM_STRUCTURE_TAG) 0x002F)\r | |
262 | #define TPM_TAG_CAP_VERSION_INFO ((TPM_STRUCTURE_TAG) 0x0030)\r | |
263 | #define TPM_TAG_DAA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0031)\r | |
264 | #define TPM_TAG_DAA_TPM ((TPM_STRUCTURE_TAG) 0x0032)\r | |
265 | #define TPM_TAG_CMK_MIGAUTH ((TPM_STRUCTURE_TAG) 0x0033)\r | |
266 | #define TPM_TAG_CMK_SIGTICKET ((TPM_STRUCTURE_TAG) 0x0034)\r | |
267 | #define TPM_TAG_CMK_MA_APPROVAL ((TPM_STRUCTURE_TAG) 0x0035)\r | |
268 | #define TPM_TAG_QUOTE_INFO2 ((TPM_STRUCTURE_TAG) 0x0036)\r | |
269 | \r | |
270 | //\r | |
271 | // Part 2, section 4: TPM Types\r | |
272 | //\r | |
273 | \r | |
274 | //\r | |
275 | // Part 2, section 4.1: TPM_RESOURCE_TYPE\r | |
276 | //\r | |
4135253b | 277 | #define TPM_RT_KEY ((TPM_RESOURCE_TYPE) 0x00000001) ///< The handle is a key handle and is the result of a LoadKey type operation\r |
278 | #define TPM_RT_AUTH ((TPM_RESOURCE_TYPE) 0x00000002) ///< The handle is an authorization handle. Auth handles come from TPM_OIAP, TPM_OSAP and TPM_DSAP\r | |
279 | #define TPM_RT_HASH ((TPM_RESOURCE_TYPE) 0x00000003) ///< Reserved for hashes\r | |
280 | #define TPM_RT_TRANS ((TPM_RESOURCE_TYPE) 0x00000004) ///< The handle is for a transport session. Transport handles come from TPM_EstablishTransport\r | |
281 | #define TPM_RT_CONTEXT ((TPM_RESOURCE_TYPE) 0x00000005) ///< Resource wrapped and held outside the TPM using the context save/restore commands\r | |
282 | #define TPM_RT_COUNTER ((TPM_RESOURCE_TYPE) 0x00000006) ///< Reserved for counters\r | |
283 | #define TPM_RT_DELEGATE ((TPM_RESOURCE_TYPE) 0x00000007) ///< The handle is for a delegate row. These are the internal rows held in NV storage by the TPM\r | |
284 | #define TPM_RT_DAA_TPM ((TPM_RESOURCE_TYPE) 0x00000008) ///< The value is a DAA TPM specific blob\r | |
285 | #define TPM_RT_DAA_V0 ((TPM_RESOURCE_TYPE) 0x00000009) ///< The value is a DAA V0 parameter\r | |
286 | #define TPM_RT_DAA_V1 ((TPM_RESOURCE_TYPE) 0x0000000A) ///< The value is a DAA V1 parameter\r | |
267669ba LG |
287 | \r |
288 | //\r | |
289 | // Part 2, section 4.2: TPM_PAYLOAD_TYPE\r | |
290 | //\r | |
4135253b | 291 | #define TPM_PT_ASYM ((TPM_PAYLOAD_TYPE) 0x01) ///< The entity is an asymmetric key\r |
292 | #define TPM_PT_BIND ((TPM_PAYLOAD_TYPE) 0x02) ///< The entity is bound data\r | |
293 | #define TPM_PT_MIGRATE ((TPM_PAYLOAD_TYPE) 0x03) ///< The entity is a migration blob\r | |
294 | #define TPM_PT_MAINT ((TPM_PAYLOAD_TYPE) 0x04) ///< The entity is a maintenance blob\r | |
295 | #define TPM_PT_SEAL ((TPM_PAYLOAD_TYPE) 0x05) ///< The entity is sealed data\r | |
296 | #define TPM_PT_MIGRATE_RESTRICTED ((TPM_PAYLOAD_TYPE) 0x06) ///< The entity is a restricted-migration asymmetric key\r | |
297 | #define TPM_PT_MIGRATE_EXTERNAL ((TPM_PAYLOAD_TYPE) 0x07) ///< The entity is a external migratable key\r | |
298 | #define TPM_PT_CMK_MIGRATE ((TPM_PAYLOAD_TYPE) 0x08) ///< The entity is a CMK migratable blob\r | |
299 | #define TPM_PT_VENDOR_SPECIFIC ((TPM_PAYLOAD_TYPE) 0x80) ///< 0x80 - 0xFF Vendor specific payloads\r | |
300 | \r | |
301 | //\r | |
302 | // Part 2, section 4.3: TPM_ENTITY_TYPE\r | |
303 | //\r | |
304 | #define TPM_ET_KEYHANDLE ((UINT16) 0x0001) ///< The entity is a keyHandle or key\r | |
305 | #define TPM_ET_OWNER ((UINT16) 0x0002) ///< The entity is the TPM Owner\r | |
306 | #define TPM_ET_DATA ((UINT16) 0x0003) ///< The entity is some data\r | |
307 | #define TPM_ET_SRK ((UINT16) 0x0004) ///< The entity is the SRK\r | |
308 | #define TPM_ET_KEY ((UINT16) 0x0005) ///< The entity is a key or keyHandle\r | |
309 | #define TPM_ET_REVOKE ((UINT16) 0x0006) ///< The entity is the RevokeTrust value\r | |
310 | #define TPM_ET_DEL_OWNER_BLOB ((UINT16) 0x0007) ///< The entity is a delegate owner blob\r | |
311 | #define TPM_ET_DEL_ROW ((UINT16) 0x0008) ///< The entity is a delegate row\r | |
312 | #define TPM_ET_DEL_KEY_BLOB ((UINT16) 0x0009) ///< The entity is a delegate key blob\r | |
313 | #define TPM_ET_COUNTER ((UINT16) 0x000A) ///< The entity is a counter\r | |
314 | #define TPM_ET_NV ((UINT16) 0x000B) ///< The entity is a NV index\r | |
315 | #define TPM_ET_RESERVED_HANDLE ((UINT16) 0x0040) ///< Reserved. This value avoids collisions with the handle MSB setting.\r | |
267669ba LG |
316 | //\r |
317 | // TPM_ENTITY_TYPE MSB Values: The MSB is used to indicate the ADIP encryption sheme when applicable\r | |
318 | //\r | |
4135253b | 319 | #define TPM_ET_XOR ((UINT16) 0x0000) ///< ADIP encryption scheme: XOR\r |
320 | #define TPM_ET_AES128 ((UINT16) 0x0006) ///< ADIP encryption scheme: AES 128 bits\r | |
267669ba LG |
321 | \r |
322 | //\r | |
323 | // Part 2, section 4.4.1: Reserved Key Handles\r | |
324 | //\r | |
4135253b | 325 | #define TPM_KH_SRK ((TPM_KEY_HANDLE) 0x40000000) ///< The handle points to the SRK\r |
326 | #define TPM_KH_OWNER ((TPM_KEY_HANDLE) 0x40000001) ///< The handle points to the TPM Owner\r | |
327 | #define TPM_KH_REVOKE ((TPM_KEY_HANDLE) 0x40000002) ///< The handle points to the RevokeTrust value\r | |
328 | #define TPM_KH_TRANSPORT ((TPM_KEY_HANDLE) 0x40000003) ///< The handle points to the EstablishTransport static authorization\r | |
329 | #define TPM_KH_OPERATOR ((TPM_KEY_HANDLE) 0x40000004) ///< The handle points to the Operator auth\r | |
330 | #define TPM_KH_ADMIN ((TPM_KEY_HANDLE) 0x40000005) ///< The handle points to the delegation administration auth\r | |
331 | #define TPM_KH_EK ((TPM_KEY_HANDLE) 0x40000006) ///< The handle points to the PUBEK, only usable with TPM_OwnerReadInternalPub\r | |
267669ba LG |
332 | \r |
333 | //\r | |
334 | // Part 2, section 4.5: TPM_STARTUP_TYPE\r | |
335 | //\r | |
4135253b | 336 | #define TPM_ST_CLEAR ((TPM_STARTUP_TYPE) 0x0001) ///< The TPM is starting up from a clean state\r |
337 | #define TPM_ST_STATE ((TPM_STARTUP_TYPE) 0x0002) ///< The TPM is starting up from a saved state\r | |
338 | #define TPM_ST_DEACTIVATED ((TPM_STARTUP_TYPE) 0x0003) ///< The TPM is to startup and set the deactivated flag to TRUE\r | |
267669ba LG |
339 | \r |
340 | //\r | |
341 | // Part 2, section 4.6: TPM_STATUP_EFFECTS\r | |
342 | // The table makeup is still an open issue.\r | |
343 | //\r | |
344 | \r | |
345 | //\r | |
346 | // Part 2, section 4.7: TPM_PROTOCOL_ID\r | |
347 | //\r | |
4135253b | 348 | #define TPM_PID_OIAP ((TPM_PROTOCOL_ID) 0x0001) ///< The OIAP protocol.\r |
349 | #define TPM_PID_OSAP ((TPM_PROTOCOL_ID) 0x0002) ///< The OSAP protocol.\r | |
350 | #define TPM_PID_ADIP ((TPM_PROTOCOL_ID) 0x0003) ///< The ADIP protocol.\r | |
351 | #define TPM_PID_ADCP ((TPM_PROTOCOL_ID) 0x0004) ///< The ADCP protocol.\r | |
352 | #define TPM_PID_OWNER ((TPM_PROTOCOL_ID) 0x0005) ///< The protocol for taking ownership of a TPM.\r | |
353 | #define TPM_PID_DSAP ((TPM_PROTOCOL_ID) 0x0006) ///< The DSAP protocol\r | |
354 | #define TPM_PID_TRANSPORT ((TPM_PROTOCOL_ID) 0x0007) ///< The transport protocol\r | |
267669ba LG |
355 | \r |
356 | //\r | |
357 | // Part 2, section 4.8: TPM_ALGORITHM_ID\r | |
358 | // The TPM MUST support the algorithms TPM_ALG_RSA, TPM_ALG_SHA, TPM_ALG_HMAC,\r | |
359 | // TPM_ALG_MGF1\r | |
360 | //\r | |
4135253b | 361 | #define TPM_ALG_RSA ((TPM_ALGORITHM_ID) 0x00000001) ///< The RSA algorithm.\r |
362 | #define TPM_ALG_DES ((TPM_ALGORITHM_ID) 0x00000002) ///< The DES algorithm\r | |
363 | #define TPM_ALG_3DES ((TPM_ALGORITHM_ID) 0x00000003) ///< The 3DES algorithm in EDE mode\r | |
364 | #define TPM_ALG_SHA ((TPM_ALGORITHM_ID) 0x00000004) ///< The SHA1 algorithm\r | |
365 | #define TPM_ALG_HMAC ((TPM_ALGORITHM_ID) 0x00000005) ///< The RFC 2104 HMAC algorithm\r | |
366 | #define TPM_ALG_AES128 ((TPM_ALGORITHM_ID) 0x00000006) ///< The AES algorithm, key size 128\r | |
367 | #define TPM_ALG_MGF1 ((TPM_ALGORITHM_ID) 0x00000007) ///< The XOR algorithm using MGF1 to create a string the size of the encrypted block\r | |
368 | #define TPM_ALG_AES192 ((TPM_ALGORITHM_ID) 0x00000008) ///< AES, key size 192\r | |
369 | #define TPM_ALG_AES256 ((TPM_ALGORITHM_ID) 0x00000009) ///< AES, key size 256\r | |
370 | #define TPM_ALG_XOR ((TPM_ALGORITHM_ID) 0x0000000A) ///< XOR using the rolling nonces\r | |
267669ba LG |
371 | \r |
372 | //\r | |
373 | // Part 2, section 4.9: TPM_PHYSICAL_PRESENCE\r | |
374 | //\r | |
4135253b | 375 | #define TPM_PHYSICAL_PRESENCE_HW_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0200) ///< Sets the physicalPresenceHWEnable to FALSE\r |
376 | #define TPM_PHYSICAL_PRESENCE_CMD_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0100) ///< Sets the physicalPresenceCMDEnable to FALSE\r | |
377 | #define TPM_PHYSICAL_PRESENCE_LIFETIME_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0080) ///< Sets the physicalPresenceLifetimeLock to TRUE\r | |
378 | #define TPM_PHYSICAL_PRESENCE_HW_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0040) ///< Sets the physicalPresenceHWEnable to TRUE\r | |
379 | #define TPM_PHYSICAL_PRESENCE_CMD_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0020) ///< Sets the physicalPresenceCMDEnable to TRUE\r | |
380 | #define TPM_PHYSICAL_PRESENCE_NOTPRESENT ((TPM_PHYSICAL_PRESENCE) 0x0010) ///< Sets PhysicalPresence = FALSE\r | |
381 | #define TPM_PHYSICAL_PRESENCE_PRESENT ((TPM_PHYSICAL_PRESENCE) 0x0008) ///< Sets PhysicalPresence = TRUE\r | |
382 | #define TPM_PHYSICAL_PRESENCE_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0004) ///< Sets PhysicalPresenceLock = TRUE\r | |
267669ba LG |
383 | \r |
384 | //\r | |
385 | // Part 2, section 4.10: TPM_MIGRATE_SCHEME\r | |
386 | //\r | |
4135253b | 387 | #define TPM_MS_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0001) ///< A public key that can be used with all TPM migration commands other than 'ReWrap' mode.\r |
388 | #define TPM_MS_REWRAP ((TPM_MIGRATE_SCHEME) 0x0002) ///< A public key that can be used for the ReWrap mode of TPM_CreateMigrationBlob.\r | |
389 | #define TPM_MS_MAINT ((TPM_MIGRATE_SCHEME) 0x0003) ///< A public key that can be used for the Maintenance commands\r | |
390 | #define TPM_MS_RESTRICT_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0004) ///< The key is to be migrated to a Migration Authority.\r | |
391 | #define TPM_MS_RESTRICT_APPROVE_DOUBLE ((TPM_MIGRATE_SCHEME) 0x0005) ///< The key is to be migrated to an entity approved by a Migration Authority using double wrapping\r | |
267669ba LG |
392 | \r |
393 | //\r | |
394 | // Part 2, section 4.11: TPM_EK_TYPE\r | |
395 | //\r | |
4135253b | 396 | #define TPM_EK_TYPE_ACTIVATE ((TPM_EK_TYPE) 0x0001) ///< The blob MUST be TPM_EK_BLOB_ACTIVATE\r |
397 | #define TPM_EK_TYPE_AUTH ((TPM_EK_TYPE) 0x0002) ///< The blob MUST be TPM_EK_BLOB_AUTH\r | |
267669ba LG |
398 | \r |
399 | //\r | |
400 | // Part 2, section 4.12: TPM_PLATFORM_SPECIFIC\r | |
401 | //\r | |
4135253b | 402 | #define TPM_PS_PC_11 ((TPM_PLATFORM_SPECIFIC) 0x0001) ///< PC Specific version 1.1\r |
403 | #define TPM_PS_PC_12 ((TPM_PLATFORM_SPECIFIC) 0x0002) ///< PC Specific version 1.2\r | |
404 | #define TPM_PS_PDA_12 ((TPM_PLATFORM_SPECIFIC) 0x0003) ///< PDA Specific version 1.2\r | |
405 | #define TPM_PS_Server_12 ((TPM_PLATFORM_SPECIFIC) 0x0004) ///< Server Specific version 1.2\r | |
406 | #define TPM_PS_Mobile_12 ((TPM_PLATFORM_SPECIFIC) 0x0005) ///< Mobil Specific version 1.2\r | |
267669ba LG |
407 | \r |
408 | //\r | |
409 | // Part 2, section 5: Basic Structures\r | |
410 | //\r | |
411 | \r | |
427987f5 | 412 | ///\r |
413 | /// Part 2, section 5.1: TPM_STRUCT_VER\r | |
414 | ///\r | |
267669ba LG |
415 | typedef struct tdTPM_STRUCT_VER {\r |
416 | UINT8 major;\r | |
417 | UINT8 minor;\r | |
418 | UINT8 revMajor;\r | |
419 | UINT8 revMinor;\r | |
420 | } TPM_STRUCT_VER;\r | |
421 | \r | |
427987f5 | 422 | ///\r |
423 | /// Part 2, section 5.3: TPM_VERSION\r | |
424 | ///\r | |
267669ba LG |
425 | typedef struct tdTPM_VERSION {\r |
426 | TPM_VERSION_BYTE major;\r | |
427 | TPM_VERSION_BYTE minor;\r | |
428 | UINT8 revMajor;\r | |
429 | UINT8 revMinor;\r | |
430 | } TPM_VERSION;\r | |
431 | \r | |
267669ba | 432 | \r |
9cf53f00 | 433 | #define TPM_SHA1_160_HASH_LEN 0x14\r |
434 | #define TPM_SHA1BASED_NONCE_LEN TPM_SHA1_160_HASH_LEN\r | |
435 | \r | |
cc078d72 | 436 | ///\r |
437 | /// Part 2, section 5.4: TPM_DIGEST\r | |
438 | ///\r | |
267669ba LG |
439 | typedef struct tdTPM_DIGEST{\r |
440 | UINT8 digest[TPM_SHA1_160_HASH_LEN];\r | |
441 | } TPM_DIGEST;\r | |
442 | \r | |
cc078d72 | 443 | ///\r |
444 | /// This SHALL be the digest of the chosen identityLabel and privacyCA for a new TPM identity\r | |
445 | ///\r | |
4135253b | 446 | typedef TPM_DIGEST TPM_CHOSENID_HASH;\r |
cc078d72 | 447 | ///\r |
448 | /// This SHALL be the hash of a list of PCR indexes and PCR values that a key or data is bound to\r | |
449 | ///\r | |
4135253b | 450 | typedef TPM_DIGEST TPM_COMPOSITE_HASH;\r |
cc078d72 | 451 | ///\r |
452 | /// This SHALL be the value of a DIR register\r | |
453 | ///\r | |
4135253b | 454 | typedef TPM_DIGEST TPM_DIRVALUE;\r |
cc078d72 | 455 | \r |
267669ba | 456 | typedef TPM_DIGEST TPM_HMAC;\r |
cc078d72 | 457 | ///\r |
458 | /// The value inside of the PCR\r | |
459 | ///\r | |
4135253b | 460 | typedef TPM_DIGEST TPM_PCRVALUE;\r |
cc078d72 | 461 | ///\r |
462 | /// This SHALL be the value of the current internal audit state\r | |
463 | ///\r | |
4135253b | 464 | typedef TPM_DIGEST TPM_AUDITDIGEST;\r |
cc078d72 | 465 | ///\r |
466 | /// This SHALL be a random value generated by a TPM immediately after the EK is installed\r | |
467 | /// in that TPM, whenever an EK is installed in that TPM\r | |
468 | ///\r | |
4135253b | 469 | typedef TPM_DIGEST TPM_DAA_TPM_SEED;\r |
cc078d72 | 470 | ///\r |
471 | /// This SHALL be a random value\r | |
472 | ///\r | |
4135253b | 473 | typedef TPM_DIGEST TPM_DAA_CONTEXT_SEED;\r |
267669ba | 474 | \r |
427987f5 | 475 | ///\r |
476 | /// Part 2, section 5.5: TPM_NONCE\r | |
477 | ///\r | |
267669ba LG |
478 | typedef struct tdTPM_NONCE{\r |
479 | UINT8 nonce[20];\r | |
480 | } TPM_NONCE;\r | |
481 | \r | |
482 | //\r | |
483 | // Part 2, section 5.6: TPM_AUTHDATA\r | |
484 | //\r | |
cc078d72 | 485 | ///\r |
486 | /// The AuthData data is the information that is saved or passed to provide proof of ownership\r | |
487 | /// 296 of an entity\r | |
488 | ///\r | |
267669ba | 489 | typedef UINT8 tdTPM_AUTHDATA[20];\r |
cc078d72 | 490 | \r |
267669ba | 491 | typedef tdTPM_AUTHDATA TPM_AUTHDATA;\r |
cc078d72 | 492 | ///\r |
493 | /// A secret plaintext value used in the authorization process\r | |
494 | ///\r | |
267669ba | 495 | typedef TPM_AUTHDATA TPM_SECRET;\r |
cc078d72 | 496 | ///\r |
497 | /// A ciphertext (encrypted) version of AuthData data. The encryption mechanism depends on the context\r | |
498 | ///\r | |
267669ba LG |
499 | typedef TPM_AUTHDATA TPM_ENCAUTH;\r |
500 | \r | |
427987f5 | 501 | ///\r |
502 | /// Part 2, section 5.7: TPM_KEY_HANDLE_LIST\r | |
503 | /// Size of handle is loaded * sizeof(TPM_KEY_HANDLE)\r | |
504 | ///\r | |
267669ba LG |
505 | typedef struct tdTPM_KEY_HANDLE_LIST {\r |
506 | UINT16 loaded;\r | |
507 | TPM_KEY_HANDLE handle[1];\r | |
508 | } TPM_KEY_HANDLE_LIST;\r | |
509 | \r | |
510 | //\r | |
511 | // Part 2, section 5.8: TPM_KEY_USAGE values\r | |
512 | //\r | |
4135253b | 513 | ///\r |
514 | /// TPM_KEY_SIGNING SHALL indicate a signing key. The [private] key SHALL be\r | |
515 | /// used for signing operations, only. This means that it MUST be a leaf of the\r | |
516 | /// Protected Storage key hierarchy.\r | |
517 | ///\r | |
267669ba | 518 | #define TPM_KEY_SIGNING ((UINT16) 0x0010)\r |
4135253b | 519 | ///\r |
520 | /// TPM_KEY_STORAGE SHALL indicate a storage key. The key SHALL be used to wrap\r | |
521 | /// and unwrap other keys in the Protected Storage hierarchy\r | |
522 | ///\r | |
267669ba | 523 | #define TPM_KEY_STORAGE ((UINT16) 0x0011)\r |
4135253b | 524 | ///\r |
525 | /// TPM_KEY_IDENTITY SHALL indicate an identity key. The key SHALL be used for\r | |
526 | /// operations that require a TPM identity, only.\r | |
527 | ///\r | |
267669ba | 528 | #define TPM_KEY_IDENTITY ((UINT16) 0x0012)\r |
4135253b | 529 | ///\r |
530 | /// TPM_KEY_AUTHCHANGE SHALL indicate an ephemeral key that is in use during\r | |
531 | /// the ChangeAuthAsym process, only.\r | |
532 | ///\r | |
267669ba | 533 | #define TPM_KEY_AUTHCHANGE ((UINT16) 0x0013)\r |
4135253b | 534 | ///\r |
535 | /// TPM_KEY_BIND SHALL indicate a key that can be used for TPM_Bind and\r | |
536 | /// TPM_Unbind operations only.\r | |
537 | ///\r | |
267669ba | 538 | #define TPM_KEY_BIND ((UINT16) 0x0014)\r |
4135253b | 539 | ///\r |
540 | /// TPM_KEY_LEGACY SHALL indicate a key that can perform signing and binding\r | |
541 | /// operations. The key MAY be used for both signing and binding operations.\r | |
542 | /// The TPM_KEY_LEGACY key type is to allow for use by applications where both\r | |
543 | /// signing and encryption operations occur with the same key. The use of this\r | |
544 | /// key type is not recommended TPM_KEY_MIGRATE 0x0016 This SHALL indicate a\r | |
545 | /// key in use for TPM_MigrateKey\r | |
546 | ///\r | |
267669ba | 547 | #define TPM_KEY_LEGACY ((UINT16) 0x0015)\r |
4135253b | 548 | ///\r |
549 | /// TPM_KEY_MIGRAGE SHALL indicate a key in use for TPM_MigrateKey\r | |
550 | ///\r | |
267669ba | 551 | #define TPM_KEY_MIGRATE ((UINT16) 0x0016)\r |
267669ba LG |
552 | \r |
553 | //\r | |
4135253b | 554 | // Part 2, section 5.8.1: Mandatory Key Usage Schemes\r |
267669ba LG |
555 | //\r |
556 | \r | |
557 | #define TPM_ES_NONE ((TPM_ENC_SCHEME) 0x0001)\r | |
558 | #define TPM_ES_RSAESPKCSv15 ((TPM_ENC_SCHEME) 0x0002)\r | |
559 | #define TPM_ES_RSAESOAEP_SHA1_MGF1 ((TPM_ENC_SCHEME) 0x0003)\r | |
560 | #define TPM_ES_SYM_CNT ((TPM_ENC_SCHEME) 0x0004)\r | |
561 | #define TPM_ES_SYM_OFB ((TPM_ENC_SCHEME) 0x0005)\r | |
562 | \r | |
563 | #define TPM_SS_NONE ((TPM_SIG_SCHEME) 0x0001)\r | |
564 | #define TPM_SS_RSASSAPKCS1v15_SHA1 ((TPM_SIG_SCHEME) 0x0002)\r | |
565 | #define TPM_SS_RSASSAPKCS1v15_DER ((TPM_SIG_SCHEME) 0x0003)\r | |
566 | #define TPM_SS_RSASSAPKCS1v15_INFO ((TPM_SIG_SCHEME) 0x0004)\r | |
567 | \r | |
568 | //\r | |
569 | // Part 2, section 5.9: TPM_AUTH_DATA_USAGE values\r | |
570 | //\r | |
571 | #define TPM_AUTH_NEVER ((TPM_AUTH_DATA_USAGE) 0x00)\r | |
572 | #define TPM_AUTH_ALWAYS ((TPM_AUTH_DATA_USAGE) 0x01)\r | |
573 | #define TPM_AUTH_PRIV_USE_ONLY ((TPM_AUTH_DATA_USAGE) 0x03)\r | |
574 | \r | |
427987f5 | 575 | ///\r |
576 | /// Part 2, section 5.10: TPM_KEY_FLAGS\r | |
577 | ///\r | |
373b5cf9 | 578 | typedef enum tdTPM_KEY_FLAGS {\r |
267669ba LG |
579 | redirection = 0x00000001,\r |
580 | migratable = 0x00000002,\r | |
581 | isVolatile = 0x00000004,\r | |
582 | pcrIgnoredOnRead = 0x00000008,\r | |
583 | migrateAuthority = 0x00000010\r | |
3e7b340f | 584 | } TPM_KEY_FLAGS_BITS;\r |
267669ba | 585 | \r |
427987f5 | 586 | ///\r |
587 | /// Part 2, section 5.11: TPM_CHANGEAUTH_VALIDATE\r | |
588 | ///\r | |
267669ba LG |
589 | typedef struct tdTPM_CHANGEAUTH_VALIDATE {\r |
590 | TPM_SECRET newAuthSecret;\r | |
591 | TPM_NONCE n1;\r | |
592 | } TPM_CHANGEAUTH_VALIDATE;\r | |
593 | \r | |
427987f5 | 594 | ///\r |
595 | /// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r | |
596 | /// decalared after section 10 to catch declaration of TPM_PUBKEY\r | |
597 | ///\r | |
598 | /// Part 2 section 10.1: TPM_KEY_PARMS\r | |
599 | /// [size_is(parmSize)] BYTE* parms;\r | |
600 | ///\r | |
267669ba LG |
601 | typedef struct tdTPM_KEY_PARMS {\r |
602 | TPM_ALGORITHM_ID algorithmID;\r | |
603 | TPM_ENC_SCHEME encScheme;\r | |
604 | TPM_SIG_SCHEME sigScheme;\r | |
605 | UINT32 parmSize;\r | |
606 | UINT8 *parms;\r | |
607 | } TPM_KEY_PARMS;\r | |
608 | \r | |
427987f5 | 609 | ///\r |
610 | /// Part 2, section 10.4: TPM_STORE_PUBKEY\r | |
611 | ///\r | |
267669ba LG |
612 | typedef struct tdTPM_STORE_PUBKEY {\r |
613 | UINT32 keyLength;\r | |
614 | UINT8 key[1];\r | |
615 | } TPM_STORE_PUBKEY;\r | |
616 | \r | |
427987f5 | 617 | ///\r |
618 | /// Part 2, section 10.5: TPM_PUBKEY\r | |
619 | ///\r | |
267669ba LG |
620 | typedef struct tdTPM_PUBKEY{\r |
621 | TPM_KEY_PARMS algorithmParms;\r | |
622 | TPM_STORE_PUBKEY pubKey;\r | |
623 | } TPM_PUBKEY;\r | |
624 | \r | |
427987f5 | 625 | ///\r |
626 | /// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r | |
627 | ///\r | |
267669ba LG |
628 | typedef struct tdTPM_MIGRATIONKEYAUTH{\r |
629 | TPM_PUBKEY migrationKey;\r | |
630 | TPM_MIGRATE_SCHEME migrationScheme;\r | |
631 | TPM_DIGEST digest;\r | |
632 | } TPM_MIGRATIONKEYAUTH;\r | |
633 | \r | |
427987f5 | 634 | ///\r |
635 | /// Part 2, section 5.13: TPM_COUNTER_VALUE\r | |
636 | ///\r | |
267669ba LG |
637 | typedef struct tdTPM_COUNTER_VALUE{\r |
638 | TPM_STRUCTURE_TAG tag;\r | |
639 | UINT8 label[4];\r | |
640 | TPM_ACTUAL_COUNT counter;\r | |
641 | } TPM_COUNTER_VALUE;\r | |
642 | \r | |
427987f5 | 643 | ///\r |
644 | /// Part 2, section 5.14: TPM_SIGN_INFO\r | |
645 | /// Size of data indicated by dataLen\r | |
646 | ///\r | |
267669ba LG |
647 | typedef struct tdTPM_SIGN_INFO {\r |
648 | TPM_STRUCTURE_TAG tag;\r | |
649 | UINT8 fixed[4];\r | |
650 | TPM_NONCE replay;\r | |
651 | UINT32 dataLen;\r | |
652 | UINT8 *data;\r | |
653 | } TPM_SIGN_INFO;\r | |
654 | \r | |
427987f5 | 655 | ///\r |
656 | /// Part 2, section 5.15: TPM_MSA_COMPOSITE\r | |
657 | /// Number of migAuthDigest indicated by MSAlist\r | |
658 | ///\r | |
267669ba LG |
659 | typedef struct tdTPM_MSA_COMPOSITE {\r |
660 | UINT32 MSAlist;\r | |
661 | TPM_DIGEST migAuthDigest[1];\r | |
662 | } TPM_MSA_COMPOSITE;\r | |
663 | \r | |
427987f5 | 664 | ///\r |
665 | /// Part 2, section 5.16: TPM_CMK_AUTH\r | |
666 | ///\r | |
267669ba LG |
667 | typedef struct tdTPM_CMK_AUTH{\r |
668 | TPM_DIGEST migrationAuthorityDigest;\r | |
669 | TPM_DIGEST destinationKeyDigest;\r | |
670 | TPM_DIGEST sourceKeyDigest;\r | |
671 | } TPM_CMK_AUTH;\r | |
672 | \r | |
673 | //\r | |
674 | // Part 2, section 5.17: TPM_CMK_DELEGATE\r | |
675 | //\r | |
4135253b | 676 | #define TPM_CMK_DELEGATE_SIGNING ((TPM_CMK_DELEGATE) BIT31)\r |
677 | #define TPM_CMK_DELEGATE_STORAGE ((TPM_CMK_DELEGATE) BIT30)\r | |
678 | #define TPM_CMK_DELEGATE_BIND ((TPM_CMK_DELEGATE) BIT29)\r | |
679 | #define TPM_CMK_DELEGATE_LEGACY ((TPM_CMK_DELEGATE) BIT28)\r | |
680 | #define TPM_CMK_DELEGATE_MIGRATE ((TPM_CMK_DELEGATE) BIT27)\r | |
267669ba | 681 | \r |
427987f5 | 682 | ///\r |
683 | /// Part 2, section 5.18: TPM_SELECT_SIZE\r | |
684 | ///\r | |
267669ba LG |
685 | typedef struct tdTPM_SELECT_SIZE {\r |
686 | UINT8 major;\r | |
687 | UINT8 minor;\r | |
688 | UINT16 reqSize;\r | |
689 | } TPM_SELECT_SIZE;\r | |
690 | \r | |
427987f5 | 691 | ///\r |
692 | /// Part 2, section 5,19: TPM_CMK_MIGAUTH\r | |
693 | ///\r | |
267669ba LG |
694 | typedef struct tdTPM_CMK_MIGAUTH{\r |
695 | TPM_STRUCTURE_TAG tag;\r | |
696 | TPM_DIGEST msaDigest;\r | |
697 | TPM_DIGEST pubKeyDigest;\r | |
698 | } TPM_CMK_MIGAUTH;\r | |
699 | \r | |
427987f5 | 700 | ///\r |
701 | /// Part 2, section 5.20: TPM_CMK_SIGTICKET\r | |
702 | ///\r | |
267669ba LG |
703 | typedef struct tdTPM_CMK_SIGTICKET{\r |
704 | TPM_STRUCTURE_TAG tag;\r | |
705 | TPM_DIGEST verKeyDigest;\r | |
706 | TPM_DIGEST signedData;\r | |
707 | } TPM_CMK_SIGTICKET;\r | |
708 | \r | |
427987f5 | 709 | ///\r |
710 | /// Part 2, section 5.21: TPM_CMK_MA_APPROVAL\r | |
711 | ///\r | |
267669ba LG |
712 | typedef struct tdTPM_CMK_MA_APPROVAL{\r |
713 | TPM_STRUCTURE_TAG tag;\r | |
714 | TPM_DIGEST migrationAuthorityDigest;\r | |
715 | } TPM_CMK_MA_APPROVAL;\r | |
716 | \r | |
717 | //\r | |
718 | // Part 2, section 6: Command Tags\r | |
719 | //\r | |
720 | #define TPM_TAG_RQU_COMMAND ((TPM_STRUCTURE_TAG) 0x00C1)\r | |
721 | #define TPM_TAG_RQU_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C2)\r | |
722 | #define TPM_TAG_RQU_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C3)\r | |
723 | #define TPM_TAG_RSP_COMMAND ((TPM_STRUCTURE_TAG) 0x00C4)\r | |
724 | #define TPM_TAG_RSP_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C5)\r | |
725 | #define TPM_TAG_RSP_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C6)\r | |
726 | \r | |
427987f5 | 727 | ///\r |
728 | /// Part 2, section 7.1: TPM_PERMANENT_FLAGS\r | |
729 | ///\r | |
267669ba LG |
730 | typedef struct tdTPM_PERMANENT_FLAGS{\r |
731 | TPM_STRUCTURE_TAG tag;\r | |
732 | BOOLEAN disable;\r | |
733 | BOOLEAN ownership;\r | |
734 | BOOLEAN deactivated;\r | |
735 | BOOLEAN readPubek;\r | |
736 | BOOLEAN disableOwnerClear;\r | |
737 | BOOLEAN allowMaintenance;\r | |
738 | BOOLEAN physicalPresenceLifetimeLock;\r | |
739 | BOOLEAN physicalPresenceHWEnable;\r | |
740 | BOOLEAN physicalPresenceCMDEnable;\r | |
741 | BOOLEAN CEKPUsed;\r | |
742 | BOOLEAN TPMpost;\r | |
743 | BOOLEAN TPMpostLock;\r | |
744 | BOOLEAN FIPS;\r | |
745 | BOOLEAN operator;\r | |
746 | BOOLEAN enableRevokeEK;\r | |
747 | BOOLEAN nvLocked;\r | |
748 | BOOLEAN readSRKPub;\r | |
749 | BOOLEAN tpmEstablished;\r | |
750 | BOOLEAN maintenanceDone;\r | |
751 | } TPM_PERMANENT_FLAGS;\r | |
752 | \r | |
753 | //\r | |
4135253b | 754 | // Part 2, section 7.1.1: Flag Restrictions (of TPM_PERMANENT_FLAGS)\r |
267669ba LG |
755 | //\r |
756 | #define TPM_PF_DISABLE ((TPM_CAPABILITY_AREA) 1)\r | |
757 | #define TPM_PF_OWNERSHIP ((TPM_CAPABILITY_AREA) 2)\r | |
758 | #define TPM_PF_DEACTIVATED ((TPM_CAPABILITY_AREA) 3)\r | |
759 | #define TPM_PF_READPUBEK ((TPM_CAPABILITY_AREA) 4)\r | |
760 | #define TPM_PF_DISABLEOWNERCLEAR ((TPM_CAPABILITY_AREA) 5)\r | |
761 | #define TPM_PF_ALLOWMAINTENANCE ((TPM_CAPABILITY_AREA) 6)\r | |
762 | #define TPM_PF_PHYSICALPRESENCELIFETIMELOCK ((TPM_CAPABILITY_AREA) 7)\r | |
763 | #define TPM_PF_PHYSICALPRESENCEHWENABLE ((TPM_CAPABILITY_AREA) 8)\r | |
764 | #define TPM_PF_PHYSICALPRESENCECMDENABLE ((TPM_CAPABILITY_AREA) 9)\r | |
765 | #define TPM_PF_CEKPUSED ((TPM_CAPABILITY_AREA) 10)\r | |
766 | #define TPM_PF_TPMPOST ((TPM_CAPABILITY_AREA) 11)\r | |
767 | #define TPM_PF_TPMPOSTLOCK ((TPM_CAPABILITY_AREA) 12)\r | |
768 | #define TPM_PF_FIPS ((TPM_CAPABILITY_AREA) 13)\r | |
769 | #define TPM_PF_OPERATOR ((TPM_CAPABILITY_AREA) 14)\r | |
770 | #define TPM_PF_ENABLEREVOKEEK ((TPM_CAPABILITY_AREA) 15)\r | |
771 | #define TPM_PF_NV_LOCKED ((TPM_CAPABILITY_AREA) 16)\r | |
772 | #define TPM_PF_READSRKPUB ((TPM_CAPABILITY_AREA) 17)\r | |
773 | #define TPM_PF_TPMESTABLISHED ((TPM_CAPABILITY_AREA) 18)\r | |
774 | #define TPM_PF_MAINTENANCEDONE ((TPM_CAPABILITY_AREA) 19)\r | |
775 | \r | |
427987f5 | 776 | ///\r |
777 | /// Part 2, section 7.2: TPM_STCLEAR_FLAGS\r | |
778 | ///\r | |
267669ba LG |
779 | typedef struct tdTPM_STCLEAR_FLAGS{\r |
780 | TPM_STRUCTURE_TAG tag;\r | |
781 | BOOLEAN deactivated;\r | |
782 | BOOLEAN disableForceClear;\r | |
783 | BOOLEAN physicalPresence;\r | |
784 | BOOLEAN physicalPresenceLock;\r | |
785 | BOOLEAN bGlobalLock;\r | |
786 | } TPM_STCLEAR_FLAGS;\r | |
787 | \r | |
788 | //\r | |
4135253b | 789 | // Part 2, section 7.2.1: Flag Restrictions (of TPM_STCLEAR_FLAGS)\r |
267669ba LG |
790 | //\r |
791 | #define TPM_SF_DEACTIVATED ((TPM_CAPABILITY_AREA) 1)\r | |
792 | #define TPM_SF_DISABLEFORCECLEAR ((TPM_CAPABILITY_AREA) 2)\r | |
793 | #define TPM_SF_PHYSICALPRESENCE ((TPM_CAPABILITY_AREA) 3)\r | |
794 | #define TPM_SF_PHYSICALPRESENCELOCK ((TPM_CAPABILITY_AREA) 4)\r | |
795 | #define TPM_SF_BGLOBALLOCK ((TPM_CAPABILITY_AREA) 5)\r | |
796 | \r | |
427987f5 | 797 | ///\r |
798 | /// Part 2, section 7.3: TPM_STANY_FLAGS\r | |
799 | ///\r | |
267669ba LG |
800 | typedef struct tdTPM_STANY_FLAGS{\r |
801 | TPM_STRUCTURE_TAG tag;\r | |
802 | BOOLEAN postInitialise;\r | |
803 | TPM_MODIFIER_INDICATOR localityModifier;\r | |
804 | BOOLEAN transportExclusive;\r | |
805 | BOOLEAN TOSPresent;\r | |
806 | } TPM_STANY_FLAGS;\r | |
807 | \r | |
808 | //\r | |
4135253b | 809 | // Part 2, section 7.3.1: Flag Restrictions (of TPM_STANY_FLAGS)\r |
267669ba LG |
810 | //\r |
811 | #define TPM_AF_POSTINITIALISE ((TPM_CAPABILITY_AREA) 1)\r | |
812 | #define TPM_AF_LOCALITYMODIFIER ((TPM_CAPABILITY_AREA) 2)\r | |
813 | #define TPM_AF_TRANSPORTEXCLUSIVE ((TPM_CAPABILITY_AREA) 3)\r | |
814 | #define TPM_AF_TOSPRESENT ((TPM_CAPABILITY_AREA) 4)\r | |
815 | \r | |
816 | //\r | |
4135253b | 817 | // All those structures defined in section 7.4, 7.5, 7.6 are not normative and \r |
267669ba LG |
818 | // thus no definitions here\r |
819 | //\r | |
267669ba LG |
820 | \r |
821 | //\r | |
822 | // Part 2, section 8: PCR Structures\r | |
823 | // \r | |
824 | \r | |
427987f5 | 825 | ///\r |
826 | /// Part 2, section 8.1: TPM_PCR_SELECTION\r | |
827 | /// Size of pcrSelect[] indicated by sizeOfSelect\r | |
828 | ///\r | |
267669ba LG |
829 | typedef struct tdTPM_PCR_SELECTION {\r |
830 | UINT16 sizeOfSelect;\r | |
831 | UINT8 pcrSelect[1];\r | |
832 | } TPM_PCR_SELECTION;\r | |
833 | \r | |
427987f5 | 834 | ///\r |
835 | /// Part 2, section 8.2: TPM_PCR_COMPOSITE\r | |
836 | /// Size of pcrValue[] indicated by valueSize\r | |
837 | ///\r | |
267669ba LG |
838 | typedef struct tdTPM_PCR_COMPOSITE {\r |
839 | TPM_PCR_SELECTION select;\r | |
840 | UINT32 valueSize;\r | |
841 | TPM_PCRVALUE pcrValue[1];\r | |
842 | } TPM_PCR_COMPOSITE;\r | |
843 | \r | |
427987f5 | 844 | ///\r |
845 | /// Part 2, section 8.3: TPM_PCR_INFO\r | |
846 | ///\r | |
267669ba LG |
847 | typedef struct tdTPM_PCR_INFO {\r |
848 | TPM_PCR_SELECTION pcrSelection;\r | |
849 | TPM_COMPOSITE_HASH digestAtRelease;\r | |
850 | TPM_COMPOSITE_HASH digestAtCreation;\r | |
851 | } TPM_PCR_INFO;\r | |
852 | \r | |
427987f5 | 853 | ///\r |
854 | /// Part 2, section 8.6: TPM_LOCALITY_SELECTION\r | |
855 | ///\r | |
267669ba LG |
856 | typedef UINT8 TPM_LOCALITY_SELECTION;\r |
857 | \r | |
858 | #define TPM_LOC_FOUR ((UINT8) 0x10)\r | |
859 | #define TPM_LOC_THREE ((UINT8) 0x08)\r | |
860 | #define TPM_LOC_TWO ((UINT8) 0x04)\r | |
861 | #define TPM_LOC_ONE ((UINT8) 0x02)\r | |
862 | #define TPM_LOC_ZERO ((UINT8) 0x01)\r | |
863 | \r | |
427987f5 | 864 | ///\r |
865 | /// Part 2, section 8.4: TPM_PCR_INFO_LONG\r | |
866 | ///\r | |
267669ba LG |
867 | typedef struct tdTPM_PCR_INFO_LONG {\r |
868 | TPM_STRUCTURE_TAG tag;\r | |
869 | TPM_LOCALITY_SELECTION localityAtCreation;\r | |
870 | TPM_LOCALITY_SELECTION localityAtRelease;\r | |
871 | TPM_PCR_SELECTION creationPCRSelection;\r | |
872 | TPM_PCR_SELECTION releasePCRSelection;\r | |
873 | TPM_COMPOSITE_HASH digestAtCreation;\r | |
874 | TPM_COMPOSITE_HASH digestAtRelease;\r | |
875 | } TPM_PCR_INFO_LONG;\r | |
876 | \r | |
427987f5 | 877 | ///\r |
878 | /// Part 2, section 8.5: TPM_PCR_INFO_SHORT\r | |
879 | ///\r | |
267669ba LG |
880 | typedef struct tdTPM_PCR_INFO_SHORT{\r |
881 | TPM_PCR_SELECTION pcrSelection;\r | |
882 | TPM_LOCALITY_SELECTION localityAtRelease;\r | |
883 | TPM_COMPOSITE_HASH digestAtRelease;\r | |
884 | } TPM_PCR_INFO_SHORT;\r | |
885 | \r | |
427987f5 | 886 | ///\r |
887 | /// Part 2, section 8.8: TPM_PCR_ATTRIBUTES\r | |
888 | ///\r | |
267669ba LG |
889 | typedef struct tdTPM_PCR_ATTRIBUTES{\r |
890 | BOOLEAN pcrReset;\r | |
891 | TPM_LOCALITY_SELECTION pcrExtendLocal;\r | |
892 | TPM_LOCALITY_SELECTION pcrResetLocal;\r | |
893 | } TPM_PCR_ATTRIBUTES;\r | |
894 | \r | |
895 | //\r | |
896 | // Part 2, section 9: Storage Structures\r | |
897 | //\r | |
898 | \r | |
427987f5 | 899 | ///\r |
900 | /// Part 2, section 9.1: TPM_STORED_DATA\r | |
901 | /// [size_is(sealInfoSize)] BYTE* sealInfo;\r | |
902 | /// [size_is(encDataSize)] BYTE* encData;\r | |
903 | ///\r | |
267669ba LG |
904 | typedef struct tdTPM_STORED_DATA {\r |
905 | TPM_STRUCT_VER ver;\r | |
906 | UINT32 sealInfoSize;\r | |
907 | UINT8 *sealInfo;\r | |
908 | UINT32 encDataSize;\r | |
909 | UINT8 *encData;\r | |
910 | } TPM_STORED_DATA;\r | |
911 | \r | |
427987f5 | 912 | ///\r |
913 | /// Part 2, section 9.2: TPM_STORED_DATA12\r | |
914 | /// [size_is(sealInfoSize)] BYTE* sealInfo;\r | |
915 | /// [size_is(encDataSize)] BYTE* encData;\r | |
916 | ///\r | |
267669ba LG |
917 | typedef struct tdTPM_STORED_DATA12 {\r |
918 | TPM_STRUCTURE_TAG tag;\r | |
919 | TPM_ENTITY_TYPE et;\r | |
920 | UINT32 sealInfoSize;\r | |
921 | UINT8 *sealInfo;\r | |
922 | UINT32 encDataSize;\r | |
923 | UINT8 *encData;\r | |
924 | } TPM_STORED_DATA12;\r | |
925 | \r | |
427987f5 | 926 | ///\r |
927 | /// Part 2, section 9.3: TPM_SEALED_DATA\r | |
928 | /// [size_is(dataSize)] BYTE* data;\r | |
929 | ///\r | |
267669ba LG |
930 | typedef struct tdTPM_SEALED_DATA {\r |
931 | TPM_PAYLOAD_TYPE payload;\r | |
932 | TPM_SECRET authData;\r | |
933 | TPM_NONCE tpmProof;\r | |
934 | TPM_DIGEST storedDigest;\r | |
935 | UINT32 dataSize;\r | |
936 | UINT8 *data;\r | |
937 | } TPM_SEALED_DATA;\r | |
938 | \r | |
427987f5 | 939 | ///\r |
940 | /// Part 2, section 9.4: TPM_SYMMETRIC_KEY\r | |
941 | /// [size_is(size)] BYTE* data;\r | |
942 | ///\r | |
267669ba LG |
943 | typedef struct tdTPM_SYMMETRIC_KEY {\r |
944 | TPM_ALGORITHM_ID algId;\r | |
945 | TPM_ENC_SCHEME encScheme;\r | |
946 | UINT16 dataSize;\r | |
947 | UINT8 *data;\r | |
948 | } TPM_SYMMETRIC_KEY;\r | |
949 | \r | |
427987f5 | 950 | ///\r |
951 | /// Part 2, section 9.5: TPM_BOUND_DATA\r | |
952 | ///\r | |
267669ba LG |
953 | typedef struct tdTPM_BOUND_DATA {\r |
954 | TPM_STRUCT_VER ver;\r | |
955 | TPM_PAYLOAD_TYPE payload;\r | |
956 | UINT8 payloadData[1];\r | |
957 | } TPM_BOUND_DATA;\r | |
958 | \r | |
959 | //\r | |
960 | // Part 2 section 10: TPM_KEY complex\r | |
961 | // \r | |
962 | \r | |
4135253b | 963 | //\r |
964 | // Section 10.1, 10.4, and 10.5 have been defined previously\r | |
965 | //\r | |
966 | \r | |
427987f5 | 967 | ///\r |
968 | /// Part 2, section 10.2: TPM_KEY\r | |
969 | /// [size_is(encDataSize)] BYTE* encData;\r | |
970 | ///\r | |
267669ba LG |
971 | typedef struct tdTPM_KEY{\r |
972 | TPM_STRUCT_VER ver;\r | |
973 | TPM_KEY_USAGE keyUsage;\r | |
974 | TPM_KEY_FLAGS keyFlags;\r | |
975 | TPM_AUTH_DATA_USAGE authDataUsage;\r | |
976 | TPM_KEY_PARMS algorithmParms;\r | |
977 | UINT32 PCRInfoSize;\r | |
978 | UINT8 *PCRInfo;\r | |
979 | TPM_STORE_PUBKEY pubKey;\r | |
980 | UINT32 encDataSize;\r | |
981 | UINT8 *encData;\r | |
982 | } TPM_KEY;\r | |
983 | \r | |
427987f5 | 984 | ///\r |
985 | /// Part 2, section 10.3: TPM_KEY12\r | |
986 | /// [size_is(encDataSize)] BYTE* encData;\r | |
987 | ///\r | |
267669ba LG |
988 | typedef struct tdTPM_KEY12{\r |
989 | TPM_STRUCTURE_TAG tag;\r | |
990 | UINT16 fill;\r | |
991 | TPM_KEY_USAGE keyUsage;\r | |
992 | TPM_KEY_FLAGS keyFlags;\r | |
993 | TPM_AUTH_DATA_USAGE authDataUsage;\r | |
994 | TPM_KEY_PARMS algorithmParms;\r | |
995 | UINT32 PCRInfoSize;\r | |
996 | UINT8 *PCRInfo;\r | |
997 | TPM_STORE_PUBKEY pubKey;\r | |
998 | UINT32 encDataSize;\r | |
999 | UINT8 *encData;\r | |
1000 | } TPM_KEY12;\r | |
1001 | \r | |
427987f5 | 1002 | ///\r |
1003 | /// Part 2, section 10.7: TPM_STORE_PRIVKEY\r | |
1004 | /// [size_is(keyLength)] BYTE* key;\r | |
1005 | ///\r | |
267669ba LG |
1006 | typedef struct tdTPM_STORE_PRIVKEY {\r |
1007 | UINT32 keyLength;\r | |
1008 | UINT8 *key;\r | |
1009 | } TPM_STORE_PRIVKEY;\r | |
1010 | \r | |
427987f5 | 1011 | ///\r |
1012 | /// Part 2, section 10.6: TPM_STORE_ASYMKEY\r | |
1013 | ///\r | |
267669ba LG |
1014 | typedef struct tdTPM_STORE_ASYMKEY { // pos len total\r |
1015 | TPM_PAYLOAD_TYPE payload; // 0 1 1\r | |
1016 | TPM_SECRET usageAuth; // 1 20 21\r | |
1017 | TPM_SECRET migrationAuth; // 21 20 41\r | |
1018 | TPM_DIGEST pubDataDigest; // 41 20 61\r | |
1019 | TPM_STORE_PRIVKEY privKey; // 61 132-151 193-214\r | |
1020 | } TPM_STORE_ASYMKEY;\r | |
1021 | \r | |
427987f5 | 1022 | ///\r |
1023 | /// Part 2, section 10.8: TPM_MIGRATE_ASYMKEY\r | |
1024 | /// [size_is(partPrivKeyLen)] BYTE* partPrivKey;\r | |
1025 | ///\r | |
267669ba LG |
1026 | typedef struct tdTPM_MIGRATE_ASYMKEY { // pos len total\r |
1027 | TPM_PAYLOAD_TYPE payload; // 0 1 1\r | |
1028 | TPM_SECRET usageAuth; // 1 20 21\r | |
1029 | TPM_DIGEST pubDataDigest; // 21 20 41\r | |
1030 | UINT32 partPrivKeyLen; // 41 4 45\r | |
1031 | UINT8 *partPrivKey; // 45 112-127 157-172\r | |
1032 | } TPM_MIGRATE_ASYMKEY;\r | |
1033 | \r | |
427987f5 | 1034 | ///\r |
1035 | /// Part 2, section 10.9: TPM_KEY_CONTROL\r | |
1036 | ///\r | |
267669ba LG |
1037 | #define TPM_KEY_CONTROL_OWNER_EVICT ((UINT32) 0x00000001)\r |
1038 | \r | |
1039 | //\r | |
1040 | // Part 2, section 11: Signed Structures\r | |
1041 | //\r | |
1042 | \r | |
427987f5 | 1043 | ///\r |
1044 | /// Part 2, section 11.1: TPM_CERTIFY_INFO Structure\r | |
1045 | ///\r | |
4135253b | 1046 | typedef struct tdTPM_CERTIFY_INFO {\r |
1047 | TPM_STRUCT_VER version;\r | |
1048 | TPM_KEY_USAGE keyUsage;\r | |
1049 | TPM_KEY_FLAGS keyFlags;\r | |
1050 | TPM_AUTH_DATA_USAGE authDataUsage;\r | |
1051 | TPM_KEY_PARMS algorithmParms;\r | |
1052 | TPM_DIGEST pubkeyDigest;\r | |
1053 | TPM_NONCE data;\r | |
1054 | BOOLEAN parentPCRStatus;\r | |
1055 | UINT32 PCRInfoSize;\r | |
1056 | UINT8 *PCRInfo;\r | |
267669ba LG |
1057 | } TPM_CERTIFY_INFO;\r |
1058 | \r | |
427987f5 | 1059 | ///\r |
1060 | /// Part 2, section 11.2: TPM_CERTIFY_INFO2 Structure\r | |
1061 | ///\r | |
4135253b | 1062 | typedef struct tdTPM_CERTIFY_INFO2 {\r |
1063 | TPM_STRUCTURE_TAG tag;\r | |
1064 | UINT8 fill;\r | |
1065 | TPM_PAYLOAD_TYPE payloadType;\r | |
1066 | TPM_KEY_USAGE keyUsage;\r | |
1067 | TPM_KEY_FLAGS keyFlags;\r | |
1068 | TPM_AUTH_DATA_USAGE authDataUsage;\r | |
1069 | TPM_KEY_PARMS algorithmParms;\r | |
1070 | TPM_DIGEST pubkeyDigest;\r | |
1071 | TPM_NONCE data;\r | |
1072 | BOOLEAN parentPCRStatus;\r | |
1073 | UINT32 PCRInfoSize;\r | |
1074 | UINT8 *PCRInfo;\r | |
1075 | UINT32 migrationAuthoritySize;\r | |
1076 | UINT8 *migrationAuthority;\r | |
267669ba LG |
1077 | } TPM_CERTIFY_INFO2;\r |
1078 | \r | |
427987f5 | 1079 | ///\r |
1080 | /// Part 2, section 11.3 TPM_QUOTE_INFO Structure\r | |
1081 | ///\r | |
4135253b | 1082 | typedef struct tdTPM_QUOTE_INFO {\r |
1083 | TPM_STRUCT_VER version;\r | |
1084 | UINT8 fixed[4];\r | |
1085 | TPM_COMPOSITE_HASH digestValue;\r | |
1086 | TPM_NONCE externalData;\r | |
267669ba LG |
1087 | } TPM_QUOTE_INFO;\r |
1088 | \r | |
427987f5 | 1089 | ///\r |
1090 | /// Part 2, section 11.4 TPM_QUOTE_INFO2 Structure\r | |
1091 | ///\r | |
4135253b | 1092 | typedef struct tdTPM_QUOTE_INFO2 {\r |
1093 | TPM_STRUCTURE_TAG tag;\r | |
1094 | UINT8 fixed[4];\r | |
1095 | TPM_NONCE externalData;\r | |
1096 | TPM_PCR_INFO_SHORT infoShort;\r | |
267669ba LG |
1097 | } TPM_QUOTE_INFO2;\r |
1098 | \r | |
1099 | //\r | |
1100 | // Part 2, section 12: Identity Structures\r | |
1101 | //\r | |
1102 | \r | |
427987f5 | 1103 | ///\r |
1104 | /// Part 2, section 12.1 TPM_EK_BLOB\r | |
1105 | ///\r | |
4135253b | 1106 | typedef struct tdTPM_EK_BLOB {\r |
1107 | TPM_STRUCTURE_TAG tag;\r | |
1108 | TPM_EK_TYPE ekType;\r | |
1109 | UINT32 blobSize;\r | |
1110 | UINT8 *blob;\r | |
267669ba LG |
1111 | } TPM_EK_BLOB;\r |
1112 | \r | |
427987f5 | 1113 | ///\r |
1114 | /// Part 2, section 12.2 TPM_EK_BLOB_ACTIVATE\r | |
1115 | ///\r | |
4135253b | 1116 | typedef struct tdTPM_EK_BLOB_ACTIVATE {\r |
1117 | TPM_STRUCTURE_TAG tag;\r | |
1118 | TPM_SYMMETRIC_KEY sessionKey;\r | |
1119 | TPM_DIGEST idDigest;\r | |
1120 | TPM_PCR_INFO_SHORT pcrInfo;\r | |
267669ba LG |
1121 | } TPM_EK_BLOB_ACTIVATE;\r |
1122 | \r | |
427987f5 | 1123 | ///\r |
1124 | /// Part 2, section 12.3 TPM_EK_BLOB_AUTH\r | |
1125 | ///\r | |
4135253b | 1126 | typedef struct tdTPM_EK_BLOB_AUTH {\r |
1127 | TPM_STRUCTURE_TAG tag;\r | |
1128 | TPM_SECRET authValue;\r | |
267669ba LG |
1129 | } TPM_EK_BLOB_AUTH;\r |
1130 | \r | |
1131 | \r | |
427987f5 | 1132 | ///\r |
1133 | /// Part 2, section 12.5 TPM_IDENTITY_CONTENTS\r | |
1134 | ///\r | |
4135253b | 1135 | typedef struct tdTPM_IDENTITY_CONTENTS {\r |
1136 | TPM_STRUCT_VER ver;\r | |
1137 | UINT32 ordinal;\r | |
1138 | TPM_CHOSENID_HASH labelPrivCADigest;\r | |
1139 | TPM_PUBKEY identityPubKey;\r | |
267669ba LG |
1140 | } TPM_IDENTITY_CONTENTS;\r |
1141 | \r | |
427987f5 | 1142 | ///\r |
1143 | /// Part 2, section 12.6 TPM_IDENTITY_REQ\r | |
1144 | ///\r | |
4135253b | 1145 | typedef struct tdTPM_IDENTITY_REQ {\r |
1146 | UINT32 asymSize;\r | |
1147 | UINT32 symSize;\r | |
1148 | TPM_KEY_PARMS asymAlgorithm;\r | |
1149 | TPM_KEY_PARMS symAlgorithm;\r | |
1150 | UINT8 *asymBlob;\r | |
1151 | UINT8 *symBlob;\r | |
267669ba LG |
1152 | } TPM_IDENTITY_REQ;\r |
1153 | \r | |
427987f5 | 1154 | ///\r |
1155 | /// Part 2, section 12.7 TPM_IDENTITY_PROOF\r | |
1156 | ///\r | |
4135253b | 1157 | typedef struct tdTPM_IDENTITY_PROOF {\r |
1158 | TPM_STRUCT_VER ver;\r | |
1159 | UINT32 labelSize;\r | |
1160 | UINT32 identityBindingSize;\r | |
1161 | UINT32 endorsementSize;\r | |
1162 | UINT32 platformSize;\r | |
1163 | UINT32 conformanceSize;\r | |
1164 | TPM_PUBKEY identityKey;\r | |
1165 | UINT8 *labelArea;\r | |
1166 | UINT8 *identityBinding;\r | |
1167 | UINT8 *endorsementCredential;\r | |
1168 | UINT8 *platformCredential;\r | |
1169 | UINT8 *conformanceCredential;\r | |
267669ba LG |
1170 | } TPM_IDENTITY_PROOF;\r |
1171 | \r | |
427987f5 | 1172 | ///\r |
1173 | /// Part 2, section 12.8 TPM_ASYM_CA_CONTENTS\r | |
1174 | ///\r | |
4135253b | 1175 | typedef struct tdTPM_ASYM_CA_CONTENTS {\r |
1176 | TPM_SYMMETRIC_KEY sessionKey;\r | |
1177 | TPM_DIGEST idDigest;\r | |
267669ba LG |
1178 | } TPM_ASYM_CA_CONTENTS;\r |
1179 | \r | |
427987f5 | 1180 | ///\r |
1181 | /// Part 2, section 12.9 TPM_SYM_CA_ATTESTATION\r | |
1182 | ///\r | |
4135253b | 1183 | typedef struct tdTPM_SYM_CA_ATTESTATION {\r |
1184 | UINT32 credSize;\r | |
1185 | TPM_KEY_PARMS algorithm;\r | |
1186 | UINT8 *credential;\r | |
267669ba LG |
1187 | } TPM_SYM_CA_ATTESTATION;\r |
1188 | \r | |
427987f5 | 1189 | ///\r |
1190 | /// Part 2, section 15: Tick Structures\r | |
1191 | /// Placed here out of order because definitions are used in section 13.\r | |
1192 | ///\r | |
267669ba LG |
1193 | typedef struct tdTPM_CURRENT_TICKS {\r |
1194 | TPM_STRUCTURE_TAG tag;\r | |
1195 | UINT64 currentTicks;\r | |
1196 | UINT16 tickRate;\r | |
1197 | TPM_NONCE tickNonce;\r | |
1198 | } TPM_CURRENT_TICKS;\r | |
1199 | \r | |
427987f5 | 1200 | ///\r |
1201 | /// Part 2, section 13: Transport structures\r | |
1202 | ///\r | |
267669ba | 1203 | \r |
427987f5 | 1204 | ///\r |
1205 | /// Part 2, section 13.1: TPM _TRANSPORT_PUBLIC\r | |
1206 | ///\r | |
4135253b | 1207 | typedef struct tdTPM_TRANSPORT_PUBLIC {\r |
1208 | TPM_STRUCTURE_TAG tag;\r | |
1209 | TPM_TRANSPORT_ATTRIBUTES transAttributes;\r | |
1210 | TPM_ALGORITHM_ID algId;\r | |
1211 | TPM_ENC_SCHEME encScheme;\r | |
1212 | } TPM_TRANSPORT_PUBLIC;\r | |
1213 | \r | |
1214 | //\r | |
1215 | // Part 2, section 13.1.1 TPM_TRANSPORT_ATTRIBUTES Definitions\r | |
1216 | //\r | |
14996c96 LG |
1217 | #define TPM_TRANSPORT_ENCRYPT ((UINT32)BIT0)\r |
1218 | #define TPM_TRANSPORT_LOG ((UINT32)BIT1)\r | |
1219 | #define TPM_TRANSPORT_EXCLUSIVE ((UINT32)BIT2)\r | |
267669ba | 1220 | \r |
427987f5 | 1221 | ///\r |
1222 | /// Part 2, section 13.2 TPM_TRANSPORT_INTERNAL\r | |
1223 | ///\r | |
4135253b | 1224 | typedef struct tdTPM_TRANSPORT_INTERNAL {\r |
1225 | TPM_STRUCTURE_TAG tag;\r | |
1226 | TPM_AUTHDATA authData;\r | |
1227 | TPM_TRANSPORT_PUBLIC transPublic;\r | |
1228 | TPM_TRANSHANDLE transHandle;\r | |
1229 | TPM_NONCE transNonceEven;\r | |
1230 | TPM_DIGEST transDigest;\r | |
267669ba LG |
1231 | } TPM_TRANSPORT_INTERNAL;\r |
1232 | \r | |
427987f5 | 1233 | ///\r |
1234 | /// Part 2, section 13.3 TPM_TRANSPORT_LOG_IN structure\r | |
1235 | ///\r | |
4135253b | 1236 | typedef struct tdTPM_TRANSPORT_LOG_IN {\r |
1237 | TPM_STRUCTURE_TAG tag;\r | |
1238 | TPM_DIGEST parameters;\r | |
1239 | TPM_DIGEST pubKeyHash;\r | |
267669ba LG |
1240 | } TPM_TRANSPORT_LOG_IN;\r |
1241 | \r | |
427987f5 | 1242 | ///\r |
1243 | /// Part 2, section 13.4 TPM_TRANSPORT_LOG_OUT structure\r | |
1244 | ///\r | |
4135253b | 1245 | typedef struct tdTPM_TRANSPORT_LOG_OUT {\r |
1246 | TPM_STRUCTURE_TAG tag;\r | |
1247 | TPM_CURRENT_TICKS currentTicks;\r | |
1248 | TPM_DIGEST parameters;\r | |
1249 | TPM_MODIFIER_INDICATOR locality;\r | |
267669ba LG |
1250 | } TPM_TRANSPORT_LOG_OUT;\r |
1251 | \r | |
427987f5 | 1252 | ///\r |
1253 | /// Part 2, section 13.5 TPM_TRANSPORT_AUTH structure\r | |
1254 | ///\r | |
4135253b | 1255 | typedef struct tdTPM_TRANSPORT_AUTH {\r |
1256 | TPM_STRUCTURE_TAG tag;\r | |
1257 | TPM_AUTHDATA authData;\r | |
267669ba LG |
1258 | } TPM_TRANSPORT_AUTH;\r |
1259 | \r | |
1260 | //\r | |
1261 | // Part 2, section 14: Audit Structures\r | |
1262 | //\r | |
1263 | \r | |
427987f5 | 1264 | ///\r |
1265 | /// Part 2, section 14.1 TPM_AUDIT_EVENT_IN structure\r | |
1266 | ///\r | |
4135253b | 1267 | typedef struct tdTPM_AUDIT_EVENT_IN {\r |
1268 | TPM_STRUCTURE_TAG tag;\r | |
1269 | TPM_DIGEST inputParms;\r | |
1270 | TPM_COUNTER_VALUE auditCount;\r | |
267669ba LG |
1271 | } TPM_AUDIT_EVENT_IN;\r |
1272 | \r | |
427987f5 | 1273 | ///\r |
1274 | /// Part 2, section 14.2 TPM_AUDIT_EVENT_OUT structure\r | |
1275 | ///\r | |
4135253b | 1276 | typedef struct tdTPM_AUDIT_EVENT_OUT {\r |
1277 | TPM_STRUCTURE_TAG tag;\r | |
1278 | TPM_COMMAND_CODE ordinal;\r | |
1279 | TPM_DIGEST outputParms;\r | |
1280 | TPM_COUNTER_VALUE auditCount;\r | |
1281 | TPM_RESULT returnCode;\r | |
267669ba LG |
1282 | } TPM_AUDIT_EVENT_OUT;\r |
1283 | \r | |
1284 | //\r | |
1285 | // Part 2, section 16: Return Codes\r | |
1286 | //\r | |
267669ba LG |
1287 | \r |
1288 | #define TPM_VENDOR_ERROR TPM_Vendor_Specific32\r | |
1289 | #define TPM_NON_FATAL 0x00000800\r | |
1290 | \r | |
1291 | #define TPM_SUCCESS ((TPM_RESULT) TPM_BASE)\r | |
1292 | #define TPM_AUTHFAIL ((TPM_RESULT) (TPM_BASE + 1))\r | |
1293 | #define TPM_BADINDEX ((TPM_RESULT) (TPM_BASE + 2))\r | |
1294 | #define TPM_BAD_PARAMETER ((TPM_RESULT) (TPM_BASE + 3))\r | |
1295 | #define TPM_AUDITFAILURE ((TPM_RESULT) (TPM_BASE + 4))\r | |
1296 | #define TPM_CLEAR_DISABLED ((TPM_RESULT) (TPM_BASE + 5))\r | |
1297 | #define TPM_DEACTIVATED ((TPM_RESULT) (TPM_BASE + 6))\r | |
1298 | #define TPM_DISABLED ((TPM_RESULT) (TPM_BASE + 7))\r | |
1299 | #define TPM_DISABLED_CMD ((TPM_RESULT) (TPM_BASE + 8))\r | |
1300 | #define TPM_FAIL ((TPM_RESULT) (TPM_BASE + 9))\r | |
1301 | #define TPM_BAD_ORDINAL ((TPM_RESULT) (TPM_BASE + 10))\r | |
1302 | #define TPM_INSTALL_DISABLED ((TPM_RESULT) (TPM_BASE + 11))\r | |
1303 | #define TPM_INVALID_KEYHANDLE ((TPM_RESULT) (TPM_BASE + 12))\r | |
1304 | #define TPM_KEYNOTFOUND ((TPM_RESULT) (TPM_BASE + 13))\r | |
1305 | #define TPM_INAPPROPRIATE_ENC ((TPM_RESULT) (TPM_BASE + 14))\r | |
1306 | #define TPM_MIGRATEFAIL ((TPM_RESULT) (TPM_BASE + 15))\r | |
1307 | #define TPM_INVALID_PCR_INFO ((TPM_RESULT) (TPM_BASE + 16))\r | |
1308 | #define TPM_NOSPACE ((TPM_RESULT) (TPM_BASE + 17))\r | |
1309 | #define TPM_NOSRK ((TPM_RESULT) (TPM_BASE + 18))\r | |
1310 | #define TPM_NOTSEALED_BLOB ((TPM_RESULT) (TPM_BASE + 19))\r | |
1311 | #define TPM_OWNER_SET ((TPM_RESULT) (TPM_BASE + 20))\r | |
1312 | #define TPM_RESOURCES ((TPM_RESULT) (TPM_BASE + 21))\r | |
1313 | #define TPM_SHORTRANDOM ((TPM_RESULT) (TPM_BASE + 22))\r | |
1314 | #define TPM_SIZE ((TPM_RESULT) (TPM_BASE + 23))\r | |
1315 | #define TPM_WRONGPCRVAL ((TPM_RESULT) (TPM_BASE + 24))\r | |
1316 | #define TPM_BAD_PARAM_SIZE ((TPM_RESULT) (TPM_BASE + 25))\r | |
1317 | #define TPM_SHA_THREAD ((TPM_RESULT) (TPM_BASE + 26))\r | |
1318 | #define TPM_SHA_ERROR ((TPM_RESULT) (TPM_BASE + 27))\r | |
1319 | #define TPM_FAILEDSELFTEST ((TPM_RESULT) (TPM_BASE + 28))\r | |
1320 | #define TPM_AUTH2FAIL ((TPM_RESULT) (TPM_BASE + 29))\r | |
1321 | #define TPM_BADTAG ((TPM_RESULT) (TPM_BASE + 30))\r | |
1322 | #define TPM_IOERROR ((TPM_RESULT) (TPM_BASE + 31))\r | |
1323 | #define TPM_ENCRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 32))\r | |
1324 | #define TPM_DECRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 33))\r | |
1325 | #define TPM_INVALID_AUTHHANDLE ((TPM_RESULT) (TPM_BASE + 34))\r | |
1326 | #define TPM_NO_ENDORSEMENT ((TPM_RESULT) (TPM_BASE + 35))\r | |
1327 | #define TPM_INVALID_KEYUSAGE ((TPM_RESULT) (TPM_BASE + 36))\r | |
1328 | #define TPM_WRONG_ENTITYTYPE ((TPM_RESULT) (TPM_BASE + 37))\r | |
1329 | #define TPM_INVALID_POSTINIT ((TPM_RESULT) (TPM_BASE + 38))\r | |
1330 | #define TPM_INAPPROPRIATE_SIG ((TPM_RESULT) (TPM_BASE + 39))\r | |
1331 | #define TPM_BAD_KEY_PROPERTY ((TPM_RESULT) (TPM_BASE + 40))\r | |
1332 | #define TPM_BAD_MIGRATION ((TPM_RESULT) (TPM_BASE + 41))\r | |
1333 | #define TPM_BAD_SCHEME ((TPM_RESULT) (TPM_BASE + 42))\r | |
1334 | #define TPM_BAD_DATASIZE ((TPM_RESULT) (TPM_BASE + 43))\r | |
1335 | #define TPM_BAD_MODE ((TPM_RESULT) (TPM_BASE + 44))\r | |
1336 | #define TPM_BAD_PRESENCE ((TPM_RESULT) (TPM_BASE + 45))\r | |
1337 | #define TPM_BAD_VERSION ((TPM_RESULT) (TPM_BASE + 46))\r | |
1338 | #define TPM_NO_WRAP_TRANSPORT ((TPM_RESULT) (TPM_BASE + 47))\r | |
1339 | #define TPM_AUDITFAIL_UNSUCCESSFUL ((TPM_RESULT) (TPM_BASE + 48))\r | |
1340 | #define TPM_AUDITFAIL_SUCCESSFUL ((TPM_RESULT) (TPM_BASE + 49))\r | |
1341 | #define TPM_NOTRESETABLE ((TPM_RESULT) (TPM_BASE + 50))\r | |
1342 | #define TPM_NOTLOCAL ((TPM_RESULT) (TPM_BASE + 51))\r | |
1343 | #define TPM_BAD_TYPE ((TPM_RESULT) (TPM_BASE + 52))\r | |
1344 | #define TPM_INVALID_RESOURCE ((TPM_RESULT) (TPM_BASE + 53))\r | |
1345 | #define TPM_NOTFIPS ((TPM_RESULT) (TPM_BASE + 54))\r | |
1346 | #define TPM_INVALID_FAMILY ((TPM_RESULT) (TPM_BASE + 55))\r | |
1347 | #define TPM_NO_NV_PERMISSION ((TPM_RESULT) (TPM_BASE + 56))\r | |
1348 | #define TPM_REQUIRES_SIGN ((TPM_RESULT) (TPM_BASE + 57))\r | |
1349 | #define TPM_KEY_NOTSUPPORTED ((TPM_RESULT) (TPM_BASE + 58))\r | |
1350 | #define TPM_AUTH_CONFLICT ((TPM_RESULT) (TPM_BASE + 59))\r | |
1351 | #define TPM_AREA_LOCKED ((TPM_RESULT) (TPM_BASE + 60))\r | |
1352 | #define TPM_BAD_LOCALITY ((TPM_RESULT) (TPM_BASE + 61))\r | |
1353 | #define TPM_READ_ONLY ((TPM_RESULT) (TPM_BASE + 62))\r | |
1354 | #define TPM_PER_NOWRITE ((TPM_RESULT) (TPM_BASE + 63))\r | |
1355 | #define TPM_FAMILYCOUNT ((TPM_RESULT) (TPM_BASE + 64))\r | |
1356 | #define TPM_WRITE_LOCKED ((TPM_RESULT) (TPM_BASE + 65))\r | |
1357 | #define TPM_BAD_ATTRIBUTES ((TPM_RESULT) (TPM_BASE + 66))\r | |
1358 | #define TPM_INVALID_STRUCTURE ((TPM_RESULT) (TPM_BASE + 67))\r | |
1359 | #define TPM_KEY_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 68))\r | |
1360 | #define TPM_BAD_COUNTER ((TPM_RESULT) (TPM_BASE + 69))\r | |
1361 | #define TPM_NOT_FULLWRITE ((TPM_RESULT) (TPM_BASE + 70))\r | |
1362 | #define TPM_CONTEXT_GAP ((TPM_RESULT) (TPM_BASE + 71))\r | |
1363 | #define TPM_MAXNVWRITES ((TPM_RESULT) (TPM_BASE + 72))\r | |
1364 | #define TPM_NOOPERATOR ((TPM_RESULT) (TPM_BASE + 73))\r | |
1365 | #define TPM_RESOURCEMISSING ((TPM_RESULT) (TPM_BASE + 74))\r | |
1366 | #define TPM_DELEGATE_LOCK ((TPM_RESULT) (TPM_BASE + 75))\r | |
1367 | #define TPM_DELEGATE_FAMILY ((TPM_RESULT) (TPM_BASE + 76))\r | |
1368 | #define TPM_DELEGATE_ADMIN ((TPM_RESULT) (TPM_BASE + 77))\r | |
1369 | #define TPM_TRANSPORT_NOTEXCLUSIVE ((TPM_RESULT) (TPM_BASE + 78))\r | |
1370 | #define TPM_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 79))\r | |
1371 | #define TPM_DAA_RESOURCES ((TPM_RESULT) (TPM_BASE + 80))\r | |
1372 | #define TPM_DAA_INPUT_DATA0 ((TPM_RESULT) (TPM_BASE + 81))\r | |
1373 | #define TPM_DAA_INPUT_DATA1 ((TPM_RESULT) (TPM_BASE + 82))\r | |
1374 | #define TPM_DAA_ISSUER_SETTINGS ((TPM_RESULT) (TPM_BASE + 83))\r | |
1375 | #define TPM_DAA_TPM_SETTINGS ((TPM_RESULT) (TPM_BASE + 84))\r | |
1376 | #define TPM_DAA_STAGE ((TPM_RESULT) (TPM_BASE + 85))\r | |
1377 | #define TPM_DAA_ISSUER_VALIDITY ((TPM_RESULT) (TPM_BASE + 86))\r | |
1378 | #define TPM_DAA_WRONG_W ((TPM_RESULT) (TPM_BASE + 87))\r | |
1379 | #define TPM_BAD_HANDLE ((TPM_RESULT) (TPM_BASE + 88))\r | |
1380 | #define TPM_BAD_DELEGATE ((TPM_RESULT) (TPM_BASE + 89))\r | |
1381 | #define TPM_BADCONTEXT ((TPM_RESULT) (TPM_BASE + 90))\r | |
1382 | #define TPM_TOOMANYCONTEXTS ((TPM_RESULT) (TPM_BASE + 91))\r | |
1383 | #define TPM_MA_TICKET_SIGNATURE ((TPM_RESULT) (TPM_BASE + 92))\r | |
1384 | #define TPM_MA_DESTINATION ((TPM_RESULT) (TPM_BASE + 93))\r | |
1385 | #define TPM_MA_SOURCE ((TPM_RESULT) (TPM_BASE + 94))\r | |
1386 | #define TPM_MA_AUTHORITY ((TPM_RESULT) (TPM_BASE + 95))\r | |
1387 | #define TPM_PERMANENTEK ((TPM_RESULT) (TPM_BASE + 97))\r | |
1388 | #define TPM_BAD_SIGNATURE ((TPM_RESULT) (TPM_BASE + 98))\r | |
1389 | #define TPM_NOCONTEXTSPACE ((TPM_RESULT) (TPM_BASE + 99))\r | |
1390 | \r | |
1391 | #define TPM_RETRY ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL))\r | |
1392 | #define TPM_NEEDS_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 1))\r | |
1393 | #define TPM_DOING_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 2))\r | |
1394 | #define TPM_DEFEND_LOCK_RUNNING ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 3))\r | |
1395 | \r | |
1396 | //\r | |
1397 | // Part 2, section 17: Ordinals\r | |
1398 | //\r | |
1399 | // Ordinals are 32 bit values. The upper byte contains values that serve as\r | |
1400 | // flag indicators, the next byte contains values indicating what committee\r | |
1401 | // designated the ordinal, and the final two bytes contain the Command\r | |
1402 | // Ordinal Index.\r | |
1403 | // 3 2 1\r | |
1404 | // 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0\r | |
1405 | // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r | |
1406 | // |P|C|V| Reserved| Purview | Command Ordinal Index |\r | |
1407 | // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r | |
1408 | //\r | |
1409 | // Where:\r | |
1410 | //\r | |
1411 | // * P is Protected/Unprotected command. When 0 the command is a Protected\r | |
1412 | // command, when 1 the command is an Unprotected command.\r | |
1413 | //\r | |
1414 | // * C is Non-Connection/Connection related command. When 0 this command\r | |
1415 | // passes through to either the protected (TPM) or unprotected (TSS)\r | |
1416 | // components.\r | |
1417 | //\r | |
1418 | // * V is TPM/Vendor command. When 0 the command is TPM defined, when 1 the\r | |
1419 | // command is vendor defined.\r | |
1420 | //\r | |
1421 | // * All reserved area bits are set to 0.\r | |
1422 | //\r | |
1423 | \r | |
1424 | #define TPM_ORD_ActivateIdentity ((TPM_COMMAND_CODE) 0x0000007A)\r | |
1425 | #define TPM_ORD_AuthorizeMigrationKey ((TPM_COMMAND_CODE) 0x0000002B)\r | |
1426 | #define TPM_ORD_CertifyKey ((TPM_COMMAND_CODE) 0x00000032)\r | |
1427 | #define TPM_ORD_CertifyKey2 ((TPM_COMMAND_CODE) 0x00000033)\r | |
1428 | #define TPM_ORD_CertifySelfTest ((TPM_COMMAND_CODE) 0x00000052)\r | |
1429 | #define TPM_ORD_ChangeAuth ((TPM_COMMAND_CODE) 0x0000000C)\r | |
1430 | #define TPM_ORD_ChangeAuthAsymFinish ((TPM_COMMAND_CODE) 0x0000000F)\r | |
1431 | #define TPM_ORD_ChangeAuthAsymStart ((TPM_COMMAND_CODE) 0x0000000E)\r | |
1432 | #define TPM_ORD_ChangeAuthOwner ((TPM_COMMAND_CODE) 0x00000010)\r | |
1433 | #define TPM_ORD_CMK_ApproveMA ((TPM_COMMAND_CODE) 0x0000001D)\r | |
1434 | #define TPM_ORD_CMK_ConvertMigration ((TPM_COMMAND_CODE) 0x00000024)\r | |
1435 | #define TPM_ORD_CMK_CreateBlob ((TPM_COMMAND_CODE) 0x0000001B)\r | |
1436 | #define TPM_ORD_CMK_CreateKey ((TPM_COMMAND_CODE) 0x00000013)\r | |
1437 | #define TPM_ORD_CMK_CreateTicket ((TPM_COMMAND_CODE) 0x00000012)\r | |
1438 | #define TPM_ORD_CMK_SetRestrictions ((TPM_COMMAND_CODE) 0x0000001C)\r | |
1439 | #define TPM_ORD_ContinueSelfTest ((TPM_COMMAND_CODE) 0x00000053)\r | |
1440 | #define TPM_ORD_ConvertMigrationBlob ((TPM_COMMAND_CODE) 0x0000002A)\r | |
1441 | #define TPM_ORD_CreateCounter ((TPM_COMMAND_CODE) 0x000000DC)\r | |
1442 | #define TPM_ORD_CreateEndorsementKeyPair ((TPM_COMMAND_CODE) 0x00000078)\r | |
1443 | #define TPM_ORD_CreateMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002C)\r | |
1444 | #define TPM_ORD_CreateMigrationBlob ((TPM_COMMAND_CODE) 0x00000028)\r | |
1445 | #define TPM_ORD_CreateRevocableEK ((TPM_COMMAND_CODE) 0x0000007F)\r | |
1446 | #define TPM_ORD_CreateWrapKey ((TPM_COMMAND_CODE) 0x0000001F)\r | |
1447 | #define TPM_ORD_DAA_JOIN ((TPM_COMMAND_CODE) 0x00000029)\r | |
1448 | #define TPM_ORD_DAA_SIGN ((TPM_COMMAND_CODE) 0x00000031)\r | |
1449 | #define TPM_ORD_Delegate_CreateKeyDelegation ((TPM_COMMAND_CODE) 0x000000D4)\r | |
1450 | #define TPM_ORD_Delegate_CreateOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D5)\r | |
1451 | #define TPM_ORD_Delegate_LoadOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D8)\r | |
1452 | #define TPM_ORD_Delegate_Manage ((TPM_COMMAND_CODE) 0x000000D2)\r | |
1453 | #define TPM_ORD_Delegate_ReadTable ((TPM_COMMAND_CODE) 0x000000DB)\r | |
1454 | #define TPM_ORD_Delegate_UpdateVerification ((TPM_COMMAND_CODE) 0x000000D1)\r | |
1455 | #define TPM_ORD_Delegate_VerifyDelegation ((TPM_COMMAND_CODE) 0x000000D6)\r | |
1456 | #define TPM_ORD_DirRead ((TPM_COMMAND_CODE) 0x0000001A)\r | |
1457 | #define TPM_ORD_DirWriteAuth ((TPM_COMMAND_CODE) 0x00000019)\r | |
1458 | #define TPM_ORD_DisableForceClear ((TPM_COMMAND_CODE) 0x0000005E)\r | |
1459 | #define TPM_ORD_DisableOwnerClear ((TPM_COMMAND_CODE) 0x0000005C)\r | |
1460 | #define TPM_ORD_DisablePubekRead ((TPM_COMMAND_CODE) 0x0000007E)\r | |
1461 | #define TPM_ORD_DSAP ((TPM_COMMAND_CODE) 0x00000011)\r | |
1462 | #define TPM_ORD_EstablishTransport ((TPM_COMMAND_CODE) 0x000000E6)\r | |
1463 | #define TPM_ORD_EvictKey ((TPM_COMMAND_CODE) 0x00000022)\r | |
1464 | #define TPM_ORD_ExecuteTransport ((TPM_COMMAND_CODE) 0x000000E7)\r | |
1465 | #define TPM_ORD_Extend ((TPM_COMMAND_CODE) 0x00000014)\r | |
1466 | #define TPM_ORD_FieldUpgrade ((TPM_COMMAND_CODE) 0x000000AA)\r | |
1467 | #define TPM_ORD_FlushSpecific ((TPM_COMMAND_CODE) 0x000000BA)\r | |
1468 | #define TPM_ORD_ForceClear ((TPM_COMMAND_CODE) 0x0000005D)\r | |
1469 | #define TPM_ORD_GetAuditDigest ((TPM_COMMAND_CODE) 0x00000085)\r | |
1470 | #define TPM_ORD_GetAuditDigestSigned ((TPM_COMMAND_CODE) 0x00000086)\r | |
1471 | #define TPM_ORD_GetAuditEvent ((TPM_COMMAND_CODE) 0x00000082)\r | |
1472 | #define TPM_ORD_GetAuditEventSigned ((TPM_COMMAND_CODE) 0x00000083)\r | |
1473 | #define TPM_ORD_GetCapability ((TPM_COMMAND_CODE) 0x00000065)\r | |
1474 | #define TPM_ORD_GetCapabilityOwner ((TPM_COMMAND_CODE) 0x00000066)\r | |
1475 | #define TPM_ORD_GetCapabilitySigned ((TPM_COMMAND_CODE) 0x00000064)\r | |
1476 | #define TPM_ORD_GetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008C)\r | |
1477 | #define TPM_ORD_GetPubKey ((TPM_COMMAND_CODE) 0x00000021)\r | |
1478 | #define TPM_ORD_GetRandom ((TPM_COMMAND_CODE) 0x00000046)\r | |
1479 | #define TPM_ORD_GetTestResult ((TPM_COMMAND_CODE) 0x00000054)\r | |
1480 | #define TPM_ORD_GetTicks ((TPM_COMMAND_CODE) 0x000000F1)\r | |
1481 | #define TPM_ORD_IncrementCounter ((TPM_COMMAND_CODE) 0x000000DD)\r | |
1482 | #define TPM_ORD_Init ((TPM_COMMAND_CODE) 0x00000097)\r | |
1483 | #define TPM_ORD_KeyControlOwner ((TPM_COMMAND_CODE) 0x00000023)\r | |
1484 | #define TPM_ORD_KillMaintenanceFeature ((TPM_COMMAND_CODE) 0x0000002E)\r | |
1485 | #define TPM_ORD_LoadAuthContext ((TPM_COMMAND_CODE) 0x000000B7)\r | |
1486 | #define TPM_ORD_LoadContext ((TPM_COMMAND_CODE) 0x000000B9)\r | |
1487 | #define TPM_ORD_LoadKey ((TPM_COMMAND_CODE) 0x00000020)\r | |
1488 | #define TPM_ORD_LoadKey2 ((TPM_COMMAND_CODE) 0x00000041)\r | |
1489 | #define TPM_ORD_LoadKeyContext ((TPM_COMMAND_CODE) 0x000000B5)\r | |
1490 | #define TPM_ORD_LoadMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002D)\r | |
1491 | #define TPM_ORD_LoadManuMaintPub ((TPM_COMMAND_CODE) 0x0000002F)\r | |
1492 | #define TPM_ORD_MakeIdentity ((TPM_COMMAND_CODE) 0x00000079)\r | |
1493 | #define TPM_ORD_MigrateKey ((TPM_COMMAND_CODE) 0x00000025)\r | |
1494 | #define TPM_ORD_NV_DefineSpace ((TPM_COMMAND_CODE) 0x000000CC)\r | |
1495 | #define TPM_ORD_NV_ReadValue ((TPM_COMMAND_CODE) 0x000000CF)\r | |
1496 | #define TPM_ORD_NV_ReadValueAuth ((TPM_COMMAND_CODE) 0x000000D0)\r | |
1497 | #define TPM_ORD_NV_WriteValue ((TPM_COMMAND_CODE) 0x000000CD)\r | |
1498 | #define TPM_ORD_NV_WriteValueAuth ((TPM_COMMAND_CODE) 0x000000CE)\r | |
1499 | #define TPM_ORD_OIAP ((TPM_COMMAND_CODE) 0x0000000A)\r | |
1500 | #define TPM_ORD_OSAP ((TPM_COMMAND_CODE) 0x0000000B)\r | |
1501 | #define TPM_ORD_OwnerClear ((TPM_COMMAND_CODE) 0x0000005B)\r | |
1502 | #define TPM_ORD_OwnerReadInternalPub ((TPM_COMMAND_CODE) 0x00000081)\r | |
1503 | #define TPM_ORD_OwnerReadPubek ((TPM_COMMAND_CODE) 0x0000007D)\r | |
1504 | #define TPM_ORD_OwnerSetDisable ((TPM_COMMAND_CODE) 0x0000006E)\r | |
1505 | #define TPM_ORD_PCR_Reset ((TPM_COMMAND_CODE) 0x000000C8)\r | |
1506 | #define TPM_ORD_PcrRead ((TPM_COMMAND_CODE) 0x00000015)\r | |
1507 | #define TPM_ORD_PhysicalDisable ((TPM_COMMAND_CODE) 0x00000070)\r | |
1508 | #define TPM_ORD_PhysicalEnable ((TPM_COMMAND_CODE) 0x0000006F)\r | |
1509 | #define TPM_ORD_PhysicalSetDeactivated ((TPM_COMMAND_CODE) 0x00000072)\r | |
1510 | #define TPM_ORD_Quote ((TPM_COMMAND_CODE) 0x00000016)\r | |
1511 | #define TPM_ORD_Quote2 ((TPM_COMMAND_CODE) 0x0000003E)\r | |
1512 | #define TPM_ORD_ReadCounter ((TPM_COMMAND_CODE) 0x000000DE)\r | |
1513 | #define TPM_ORD_ReadManuMaintPub ((TPM_COMMAND_CODE) 0x00000030)\r | |
1514 | #define TPM_ORD_ReadPubek ((TPM_COMMAND_CODE) 0x0000007C)\r | |
1515 | #define TPM_ORD_ReleaseCounter ((TPM_COMMAND_CODE) 0x000000DF)\r | |
1516 | #define TPM_ORD_ReleaseCounterOwner ((TPM_COMMAND_CODE) 0x000000E0)\r | |
1517 | #define TPM_ORD_ReleaseTransportSigned ((TPM_COMMAND_CODE) 0x000000E8)\r | |
1518 | #define TPM_ORD_Reset ((TPM_COMMAND_CODE) 0x0000005A)\r | |
1519 | #define TPM_ORD_ResetLockValue ((TPM_COMMAND_CODE) 0x00000040)\r | |
1520 | #define TPM_ORD_RevokeTrust ((TPM_COMMAND_CODE) 0x00000080)\r | |
1521 | #define TPM_ORD_SaveAuthContext ((TPM_COMMAND_CODE) 0x000000B6)\r | |
1522 | #define TPM_ORD_SaveContext ((TPM_COMMAND_CODE) 0x000000B8)\r | |
1523 | #define TPM_ORD_SaveKeyContext ((TPM_COMMAND_CODE) 0x000000B4)\r | |
1524 | #define TPM_ORD_SaveState ((TPM_COMMAND_CODE) 0x00000098)\r | |
1525 | #define TPM_ORD_Seal ((TPM_COMMAND_CODE) 0x00000017)\r | |
1526 | #define TPM_ORD_Sealx ((TPM_COMMAND_CODE) 0x0000003D)\r | |
1527 | #define TPM_ORD_SelfTestFull ((TPM_COMMAND_CODE) 0x00000050)\r | |
1528 | #define TPM_ORD_SetCapability ((TPM_COMMAND_CODE) 0x0000003F)\r | |
1529 | #define TPM_ORD_SetOperatorAuth ((TPM_COMMAND_CODE) 0x00000074)\r | |
1530 | #define TPM_ORD_SetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008D)\r | |
1531 | #define TPM_ORD_SetOwnerInstall ((TPM_COMMAND_CODE) 0x00000071)\r | |
1532 | #define TPM_ORD_SetOwnerPointer ((TPM_COMMAND_CODE) 0x00000075)\r | |
1533 | #define TPM_ORD_SetRedirection ((TPM_COMMAND_CODE) 0x0000009A)\r | |
1534 | #define TPM_ORD_SetTempDeactivated ((TPM_COMMAND_CODE) 0x00000073)\r | |
1535 | #define TPM_ORD_SHA1Complete ((TPM_COMMAND_CODE) 0x000000A2)\r | |
1536 | #define TPM_ORD_SHA1CompleteExtend ((TPM_COMMAND_CODE) 0x000000A3)\r | |
1537 | #define TPM_ORD_SHA1Start ((TPM_COMMAND_CODE) 0x000000A0)\r | |
1538 | #define TPM_ORD_SHA1Update ((TPM_COMMAND_CODE) 0x000000A1)\r | |
1539 | #define TPM_ORD_Sign ((TPM_COMMAND_CODE) 0x0000003C)\r | |
1540 | #define TPM_ORD_Startup ((TPM_COMMAND_CODE) 0x00000099)\r | |
1541 | #define TPM_ORD_StirRandom ((TPM_COMMAND_CODE) 0x00000047)\r | |
1542 | #define TPM_ORD_TakeOwnership ((TPM_COMMAND_CODE) 0x0000000D)\r | |
1543 | #define TPM_ORD_Terminate_Handle ((TPM_COMMAND_CODE) 0x00000096)\r | |
1544 | #define TPM_ORD_TickStampBlob ((TPM_COMMAND_CODE) 0x000000F2)\r | |
1545 | #define TPM_ORD_UnBind ((TPM_COMMAND_CODE) 0x0000001E)\r | |
1546 | #define TPM_ORD_Unseal ((TPM_COMMAND_CODE) 0x00000018)\r | |
1547 | #define TSC_ORD_PhysicalPresence ((TPM_COMMAND_CODE) 0x4000000A)\r | |
1548 | #define TSC_ORD_ResetEstablishmentBit ((TPM_COMMAND_CODE) 0x4000000B)\r | |
1549 | \r | |
1550 | //\r | |
1551 | // Part 2, section 18: Context structures\r | |
1552 | //\r | |
1553 | \r | |
427987f5 | 1554 | ///\r |
1555 | /// Part 2, section 18.1: TPM_CONTEXT_BLOB\r | |
1556 | ///\r | |
4135253b | 1557 | typedef struct tdTPM_CONTEXT_BLOB {\r |
1558 | TPM_STRUCTURE_TAG tag;\r | |
1559 | TPM_RESOURCE_TYPE resourceType;\r | |
1560 | TPM_HANDLE handle;\r | |
1561 | UINT8 label[16];\r | |
1562 | UINT32 contextCount;\r | |
1563 | TPM_DIGEST integrityDigest;\r | |
1564 | UINT32 additionalSize;\r | |
1565 | UINT8 *additionalData;\r | |
1566 | UINT32 sensitiveSize;\r | |
1567 | UINT8 *sensitiveData;\r | |
267669ba LG |
1568 | } TPM_CONTEXT_BLOB;\r |
1569 | \r | |
427987f5 | 1570 | ///\r |
1571 | /// Part 2, section 18.2 TPM_CONTEXT_SENSITIVE\r | |
1572 | ///\r | |
4135253b | 1573 | typedef struct tdTPM_CONTEXT_SENSITIVE {\r |
1574 | TPM_STRUCTURE_TAG tag;\r | |
1575 | TPM_NONCE contextNonce;\r | |
1576 | UINT32 internalSize;\r | |
1577 | UINT8 *internalData;\r | |
267669ba LG |
1578 | } TPM_CONTEXT_SENSITIVE;\r |
1579 | \r | |
1580 | //\r | |
1581 | // Part 2, section 19: NV Structures\r | |
1582 | //\r | |
1583 | \r | |
4135253b | 1584 | //\r |
1585 | // Part 2, section 19.1.1: Required TPM_NV_INDEX values\r | |
1586 | //\r | |
267669ba LG |
1587 | #define TPM_NV_INDEX_LOCK ((UINT32)0xffffffff)\r |
1588 | #define TPM_NV_INDEX0 ((UINT32)0x00000000)\r | |
1589 | #define TPM_NV_INDEX_DIR ((UINT32)0x10000001)\r | |
1590 | #define TPM_NV_INDEX_EKCert ((UINT32)0x0000f000)\r | |
1591 | #define TPM_NV_INDEX_TPM_CC ((UINT32)0x0000f001)\r | |
1592 | #define TPM_NV_INDEX_PlatformCert ((UINT32)0x0000f002)\r | |
1593 | #define TPM_NV_INDEX_Platform_CC ((UINT32)0x0000f003)\r | |
4135253b | 1594 | //\r |
1595 | // Part 2, section 19.1.2: Reserved Index values\r | |
1596 | //\r | |
267669ba LG |
1597 | #define TPM_NV_INDEX_TSS_BASE ((UINT32)0x00011100)\r |
1598 | #define TPM_NV_INDEX_PC_BASE ((UINT32)0x00011200)\r | |
1599 | #define TPM_NV_INDEX_SERVER_BASE ((UINT32)0x00011300)\r | |
1600 | #define TPM_NV_INDEX_MOBILE_BASE ((UINT32)0x00011400)\r | |
1601 | #define TPM_NV_INDEX_PERIPHERAL_BASE ((UINT32)0x00011500)\r | |
1602 | #define TPM_NV_INDEX_GROUP_RESV_BASE ((UINT32)0x00010000)\r | |
1603 | \r | |
427987f5 | 1604 | ///\r |
1605 | /// The typedefs TPM_NV_PER_ATTRIBUTES (not present in TPM 1.2 Spec. have been added \r | |
1606 | /// and structure fields that were to hold the following values\r | |
1607 | ///\r | |
4135253b | 1608 | typedef UINT32 TPM_NV_PER_ATTRIBUTES;\r |
267669ba | 1609 | \r |
427987f5 | 1610 | ///\r |
1611 | /// Part 2, section 19.2: TPM_NV_ATTRIBUTES\r | |
1612 | ///\r | |
1613 | typedef struct tdTPM_NV_ATTRIBUTES {\r | |
1614 | TPM_STRUCTURE_TAG tag;\r | |
1615 | TPM_NV_PER_ATTRIBUTES attributes;\r | |
1616 | } TPM_NV_ATTRIBUTES;\r | |
1617 | \r | |
4135253b | 1618 | #define TPM_NV_PER_READ_STCLEAR (BIT31)\r |
1619 | #define TPM_NV_PER_AUTHREAD (BIT18)\r | |
1620 | #define TPM_NV_PER_OWNERREAD (BIT17)\r | |
1621 | #define TPM_NV_PER_PPREAD (BIT16)\r | |
1622 | #define TPM_NV_PER_GLOBALLOCK (BIT15)\r | |
1623 | #define TPM_NV_PER_WRITE_STCLEAR (BIT14)\r | |
1624 | #define TPM_NV_PER_WRITEDEFINE (BIT13)\r | |
1625 | #define TPM_NV_PER_WRITEALL (BIT12)\r | |
1626 | #define TPM_NV_PER_AUTHWRITE (BIT2)\r | |
1627 | #define TPM_NV_PER_OWNERWRITE (BIT1)\r | |
1628 | #define TPM_NV_PER_PPWRITE (BIT0)\r | |
267669ba | 1629 | \r |
427987f5 | 1630 | ///\r |
1631 | /// Part 2, section 19.3: TPM_NV_DATA_PUBLIC\r | |
1632 | ///\r | |
4135253b | 1633 | typedef struct tdTPM_NV_DATA_PUBLIC {\r |
1634 | TPM_STRUCTURE_TAG tag;\r | |
1635 | TPM_NV_INDEX nvIndex;\r | |
1636 | TPM_PCR_INFO_SHORT pcrInfoRead;\r | |
1637 | TPM_PCR_INFO_SHORT pcrInfoWrite;\r | |
1638 | TPM_NV_ATTRIBUTES permission;\r | |
1639 | BOOLEAN bReadSTClear;\r | |
1640 | BOOLEAN bWriteSTClear;\r | |
1641 | BOOLEAN bWriteDefine;\r | |
1642 | UINT32 dataSize;\r | |
1643 | } TPM_NV_DATA_PUBLIC;\r | |
267669ba | 1644 | \r |
4135253b | 1645 | //\r |
1646 | // Part 2, section 20: Delegate Structures\r | |
1647 | //\r | |
267669ba | 1648 | \r |
4135253b | 1649 | #define TPM_DEL_OWNER_BITS ((UINT32)0x00000001)\r |
1650 | #define TPM_DEL_KEY_BITS ((UINT32)0x00000002)\r | |
cc078d72 | 1651 | ///\r |
1652 | /// Part 2, section 20.2: Delegate Definitions\r | |
1653 | ///\r | |
4135253b | 1654 | typedef struct tdTPM_DELEGATIONS {\r |
1655 | TPM_STRUCTURE_TAG tag;\r | |
1656 | UINT32 delegateType;\r | |
1657 | UINT32 per1;\r | |
1658 | UINT32 per2;\r | |
1659 | } TPM_DELEGATIONS;\r | |
267669ba | 1660 | \r |
4135253b | 1661 | //\r |
1662 | // Part 2, section 20.2.1: Owner Permission Settings\r | |
1663 | //\r | |
1664 | #define TPM_DELEGATE_SetOrdinalAuditStatus (BIT30)\r | |
1665 | #define TPM_DELEGATE_DirWriteAuth (BIT29)\r | |
1666 | #define TPM_DELEGATE_CMK_ApproveMA (BIT28)\r | |
1667 | #define TPM_DELEGATE_CMK_CreateTicket (BIT26)\r | |
1668 | #define TPM_DELEGATE_Delegate_LoadOwnerDelegation (BIT24)\r | |
1669 | #define TPM_DELEGATE_DAA_Join (BIT23)\r | |
1670 | #define TPM_DELEGATE_AuthorizeMigrationKey (BIT22)\r | |
1671 | #define TPM_DELEGATE_CreateMaintenanceArchive (BIT21)\r | |
1672 | #define TPM_DELEGATE_LoadMaintenanceArchive (BIT20)\r | |
1673 | #define TPM_DELEGATE_KillMaintenanceFeature (BIT19)\r | |
1674 | #define TPM_DELEGATE_OwnerReadInteralPub (BIT18)\r | |
1675 | #define TPM_DELEGATE_ResetLockValue (BIT17)\r | |
1676 | #define TPM_DELEGATE_OwnerClear (BIT16)\r | |
1677 | #define TPM_DELEGATE_DisableOwnerClear (BIT15)\r | |
1678 | #define TPM_DELEGATE_OwnerSetDisable (BIT13)\r | |
1679 | #define TPM_DELEGATE_SetCapability (BIT12)\r | |
1680 | #define TPM_DELEGATE_MakeIdentity (BIT11)\r | |
1681 | #define TPM_DELEGATE_ActivateIdentity (BIT10)\r | |
1682 | #define TPM_DELEGATE_OwnerReadPubek (BIT9)\r | |
1683 | #define TPM_DELEGATE_DisablePubekRead (BIT8)\r | |
1684 | #define TPM_DELEGATE_SetRedirection (BIT7)\r | |
1685 | #define TPM_DELEGATE_FieldUpgrade (BIT6)\r | |
1686 | #define TPM_DELEGATE_Delegate_UpdateVerification (BIT5)\r | |
1687 | #define TPM_DELEGATE_CreateCounter (BIT4)\r | |
1688 | #define TPM_DELEGATE_ReleaseCounterOwner (BIT3)\r | |
1689 | #define TPM_DELEGATE_DelegateManage (BIT2)\r | |
1690 | #define TPM_DELEGATE_Delegate_CreateOwnerDelegation (BIT1)\r | |
1691 | #define TPM_DELEGATE_DAA_Sign (BIT0)\r | |
1692 | \r | |
1693 | //\r | |
1694 | // Part 2, section 20.2.3: Key Permission settings\r | |
1695 | //\r | |
1696 | #define TPM_KEY_DELEGATE_CMK_ConvertMigration (BIT28)\r | |
1697 | #define TPM_KEY_DELEGATE_TickStampBlob (BIT27)\r | |
1698 | #define TPM_KEY_DELEGATE_ChangeAuthAsymStart (BIT26)\r | |
1699 | #define TPM_KEY_DELEGATE_ChangeAuthAsymFinish (BIT25)\r | |
1700 | #define TPM_KEY_DELEGATE_CMK_CreateKey (BIT24)\r | |
1701 | #define TPM_KEY_DELEGATE_MigrateKey (BIT23)\r | |
1702 | #define TPM_KEY_DELEGATE_LoadKey2 (BIT22)\r | |
1703 | #define TPM_KEY_DELEGATE_EstablishTransport (BIT21)\r | |
1704 | #define TPM_KEY_DELEGATE_ReleaseTransportSigned (BIT20)\r | |
1705 | #define TPM_KEY_DELEGATE_Quote2 (BIT19)\r | |
1706 | #define TPM_KEY_DELEGATE_Sealx (BIT18)\r | |
1707 | #define TPM_KEY_DELEGATE_MakeIdentity (BIT17)\r | |
1708 | #define TPM_KEY_DELEGATE_ActivateIdentity (BIT16)\r | |
1709 | #define TPM_KEY_DELEGATE_GetAuditDigestSigned (BIT15)\r | |
1710 | #define TPM_KEY_DELEGATE_Sign (BIT14)\r | |
1711 | #define TPM_KEY_DELEGATE_CertifyKey2 (BIT13)\r | |
1712 | #define TPM_KEY_DELEGATE_CertifyKey (BIT12)\r | |
1713 | #define TPM_KEY_DELEGATE_CreateWrapKey (BIT11)\r | |
1714 | #define TPM_KEY_DELEGATE_CMK_CreateBlob (BIT10)\r | |
1715 | #define TPM_KEY_DELEGATE_CreateMigrationBlob (BIT9)\r | |
1716 | #define TPM_KEY_DELEGATE_ConvertMigrationBlob (BIT8)\r | |
1717 | #define TPM_KEY_DELEGATE_CreateKeyDelegation (BIT7)\r | |
1718 | #define TPM_KEY_DELEGATE_ChangeAuth (BIT6)\r | |
1719 | #define TPM_KEY_DELEGATE_GetPubKey (BIT5)\r | |
1720 | #define TPM_KEY_DELEGATE_UnBind (BIT4)\r | |
1721 | #define TPM_KEY_DELEGATE_Quote (BIT3)\r | |
1722 | #define TPM_KEY_DELEGATE_Unseal (BIT2)\r | |
1723 | #define TPM_KEY_DELEGATE_Seal (BIT1)\r | |
1724 | #define TPM_KEY_DELEGATE_LoadKey (BIT0)\r | |
1725 | \r | |
1726 | //\r | |
1727 | // Part 2, section 20.3: TPM_FAMILY_FLAGS\r | |
1728 | //\r | |
1729 | #define TPM_DELEGATE_ADMIN_LOCK (BIT1)\r | |
1730 | #define TPM_FAMFLAG_ENABLE (BIT0)\r | |
1731 | \r | |
427987f5 | 1732 | ///\r |
1733 | /// Part 2, section 20.4: TPM_FAMILY_LABEL\r | |
1734 | ///\r | |
4135253b | 1735 | typedef struct tdTPM_FAMILY_LABEL {\r |
1736 | UINT8 label;\r | |
267669ba LG |
1737 | } TPM_FAMILY_LABEL;\r |
1738 | \r | |
427987f5 | 1739 | ///\r |
1740 | /// Part 2, section 20.5: TPM_FAMILY_TABLE_ENTRY\r | |
1741 | ///\r | |
4135253b | 1742 | typedef struct tdTPM_FAMILY_TABLE_ENTRY {\r |
1743 | TPM_STRUCTURE_TAG tag;\r | |
1744 | TPM_FAMILY_LABEL label;\r | |
1745 | TPM_FAMILY_ID familyID;\r | |
1746 | TPM_FAMILY_VERIFICATION verificationCount;\r | |
1747 | TPM_FAMILY_FLAGS flags;\r | |
267669ba LG |
1748 | } TPM_FAMILY_TABLE_ENTRY;\r |
1749 | \r | |
4135253b | 1750 | //\r |
1751 | // Part 2, section 20.6: TPM_FAMILY_TABLE\r | |
1752 | //\r | |
1753 | #define TPM_NUM_FAMILY_TABLE_ENTRY_MIN 8\r | |
267669ba | 1754 | \r |
4135253b | 1755 | typedef struct tdTPM_FAMILY_TABLE{\r |
1756 | TPM_FAMILY_TABLE_ENTRY famTableRow[TPM_NUM_FAMILY_TABLE_ENTRY_MIN];\r | |
1757 | } TPM_FAMILY_TABLE;\r | |
267669ba | 1758 | \r |
427987f5 | 1759 | ///\r |
1760 | /// Part 2, section 20.7: TPM_DELEGATE_LABEL\r | |
1761 | ///\r | |
4135253b | 1762 | typedef struct tdTPM_DELEGATE_LABEL {\r |
1763 | UINT8 label;\r | |
267669ba LG |
1764 | } TPM_DELEGATE_LABEL;\r |
1765 | \r | |
427987f5 | 1766 | ///\r |
1767 | /// Part 2, section 20.8: TPM_DELEGATE_PUBLIC\r | |
1768 | ///\r | |
4135253b | 1769 | typedef struct tdTPM_DELEGATE_PUBLIC {\r |
1770 | TPM_STRUCTURE_TAG tag;\r | |
1771 | TPM_DELEGATE_LABEL label;\r | |
1772 | TPM_PCR_INFO_SHORT pcrInfo;\r | |
1773 | TPM_DELEGATIONS permissions;\r | |
1774 | TPM_FAMILY_ID familyID;\r | |
1775 | TPM_FAMILY_VERIFICATION verificationCount;\r | |
267669ba LG |
1776 | } TPM_DELEGATE_PUBLIC;\r |
1777 | \r | |
427987f5 | 1778 | ///\r |
1779 | /// Part 2, section 20.9: TPM_DELEGATE_TABLE_ROW\r | |
1780 | ///\r | |
4135253b | 1781 | typedef struct tdTPM_DELEGATE_TABLE_ROW {\r |
1782 | TPM_STRUCTURE_TAG tag;\r | |
1783 | TPM_DELEGATE_PUBLIC pub;\r | |
1784 | TPM_SECRET authValue;\r | |
267669ba LG |
1785 | } TPM_DELEGATE_TABLE_ROW;\r |
1786 | \r | |
4135253b | 1787 | //\r |
1788 | // Part 2, section 20.10: TPM_DELEGATE_TABLE\r | |
1789 | //\r | |
267669ba | 1790 | #define TPM_NUM_DELEGATE_TABLE_ENTRY_MIN 2\r |
4135253b | 1791 | \r |
1792 | typedef struct tdTPM_DELEGATE_TABLE{\r | |
1793 | TPM_DELEGATE_TABLE_ROW delRow[TPM_NUM_DELEGATE_TABLE_ENTRY_MIN];\r | |
1794 | } TPM_DELEGATE_TABLE;\r | |
1795 | \r | |
427987f5 | 1796 | ///\r |
1797 | /// Part 2, section 20.11: TPM_DELEGATE_SENSITIVE\r | |
1798 | ///\r | |
4135253b | 1799 | typedef struct tdTPM_DELEGATE_SENSITIVE {\r |
1800 | TPM_STRUCTURE_TAG tag;\r | |
1801 | TPM_SECRET authValue;\r | |
267669ba LG |
1802 | } TPM_DELEGATE_SENSITIVE;\r |
1803 | \r | |
427987f5 | 1804 | ///\r |
1805 | /// Part 2, section 20.12: TPM_DELEGATE_OWNER_BLOB\r | |
1806 | ///\r | |
4135253b | 1807 | typedef struct tdTPM_DELEGATE_OWNER_BLOB {\r |
1808 | TPM_STRUCTURE_TAG tag;\r | |
1809 | TPM_DELEGATE_PUBLIC pub;\r | |
1810 | TPM_DIGEST integrityDigest;\r | |
1811 | UINT32 additionalSize;\r | |
1812 | UINT8 *additionalArea;\r | |
1813 | UINT32 sensitiveSize;\r | |
1814 | UINT8 *sensitiveArea;\r | |
267669ba LG |
1815 | } TPM_DELEGATE_OWNER_BLOB;\r |
1816 | \r | |
427987f5 | 1817 | ///\r |
1818 | /// Part 2, section 20.13: TTPM_DELEGATE_KEY_BLOB\r | |
1819 | ///\r | |
4135253b | 1820 | typedef struct tdTPM_DELEGATE_KEY_BLOB {\r |
1821 | TPM_STRUCTURE_TAG tag;\r | |
1822 | TPM_DELEGATE_PUBLIC pub;\r | |
1823 | TPM_DIGEST integrityDigest;\r | |
1824 | TPM_DIGEST pubKeyDigest;\r | |
1825 | UINT32 additionalSize;\r | |
1826 | UINT8 *additionalArea;\r | |
1827 | UINT32 sensitiveSize;\r | |
1828 | UINT8 *sensitiveArea;\r | |
267669ba LG |
1829 | } TPM_DELEGATE_KEY_BLOB;\r |
1830 | \r | |
4135253b | 1831 | //\r |
1832 | // Part 2, section 20.14: TPM_FAMILY_OPERATION Values\r | |
1833 | //\r | |
1834 | #define TPM_FAMILY_CREATE ((UINT32)0x00000001)\r | |
1835 | #define TPM_FAMILY_ENABLE ((UINT32)0x00000002)\r | |
1836 | #define TPM_FAMILY_ADMIN ((UINT32)0x00000003)\r | |
1837 | #define TPM_FAMILY_INVALIDATE ((UINT32)0x00000004)\r | |
1838 | \r | |
267669ba LG |
1839 | //\r |
1840 | // Part 2, section 21.1: TPM_CAPABILITY_AREA for GetCapability\r | |
1841 | //\r | |
1842 | #define TPM_CAP_ORD ((TPM_CAPABILITY_AREA) 0x00000001)\r | |
1843 | #define TPM_CAP_ALG ((TPM_CAPABILITY_AREA) 0x00000002)\r | |
1844 | #define TPM_CAP_PID ((TPM_CAPABILITY_AREA) 0x00000003)\r | |
1845 | #define TPM_CAP_FLAG ((TPM_CAPABILITY_AREA) 0x00000004)\r | |
1846 | #define TPM_CAP_PROPERTY ((TPM_CAPABILITY_AREA) 0x00000005)\r | |
1847 | #define TPM_CAP_VERSION ((TPM_CAPABILITY_AREA) 0x00000006)\r | |
1848 | #define TPM_CAP_KEY_HANDLE ((TPM_CAPABILITY_AREA) 0x00000007)\r | |
1849 | #define TPM_CAP_CHECK_LOADED ((TPM_CAPABILITY_AREA) 0x00000008)\r | |
1850 | #define TPM_CAP_SYM_MODE ((TPM_CAPABILITY_AREA) 0x00000009)\r | |
1851 | #define TPM_CAP_KEY_STATUS ((TPM_CAPABILITY_AREA) 0x0000000C)\r | |
1852 | #define TPM_CAP_NV_LIST ((TPM_CAPABILITY_AREA) 0x0000000D)\r | |
1853 | #define TPM_CAP_MFR ((TPM_CAPABILITY_AREA) 0x00000010)\r | |
1854 | #define TPM_CAP_NV_INDEX ((TPM_CAPABILITY_AREA) 0x00000011)\r | |
1855 | #define TPM_CAP_TRANS_ALG ((TPM_CAPABILITY_AREA) 0x00000012)\r | |
1856 | #define TPM_CAP_HANDLE ((TPM_CAPABILITY_AREA) 0x00000014)\r | |
1857 | #define TPM_CAP_TRANS_ES ((TPM_CAPABILITY_AREA) 0x00000015)\r | |
1858 | #define TPM_CAP_AUTH_ENCRYPT ((TPM_CAPABILITY_AREA) 0x00000017)\r | |
1859 | #define TPM_CAP_SELECT_SIZE ((TPM_CAPABILITY_AREA) 0x00000018)\r | |
1860 | #define TPM_CAP_VERSION_VAL ((TPM_CAPABILITY_AREA) 0x0000001A)\r | |
1861 | \r | |
1862 | #define TPM_CAP_FLAG_PERMANENT ((TPM_CAPABILITY_AREA) 0x00000108)\r | |
1863 | #define TPM_CAP_FLAG_VOLATILE ((TPM_CAPABILITY_AREA) 0x00000109)\r | |
1864 | \r | |
1865 | //\r | |
1866 | // Part 2, section 21.2: CAP_PROPERTY Subcap values for GetCapability\r | |
1867 | //\r | |
1868 | #define TPM_CAP_PROP_PCR ((TPM_CAPABILITY_AREA) 0x00000101)\r | |
1869 | #define TPM_CAP_PROP_DIR ((TPM_CAPABILITY_AREA) 0x00000102)\r | |
1870 | #define TPM_CAP_PROP_MANUFACTURER ((TPM_CAPABILITY_AREA) 0x00000103)\r | |
1871 | #define TPM_CAP_PROP_KEYS ((TPM_CAPABILITY_AREA) 0x00000104)\r | |
1872 | #define TPM_CAP_PROP_MIN_COUNTER ((TPM_CAPABILITY_AREA) 0x00000107)\r | |
1873 | #define TPM_CAP_PROP_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010A)\r | |
1874 | #define TPM_CAP_PROP_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010B)\r | |
1875 | #define TPM_CAP_PROP_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010C)\r | |
1876 | #define TPM_CAP_PROP_MAX_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010D)\r | |
1877 | #define TPM_CAP_PROP_MAX_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010E)\r | |
1878 | #define TPM_CAP_PROP_MAX_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010F)\r | |
1879 | #define TPM_CAP_PROP_MAX_KEYS ((TPM_CAPABILITY_AREA) 0x00000110)\r | |
1880 | #define TPM_CAP_PROP_OWNER ((TPM_CAPABILITY_AREA) 0x00000111)\r | |
1881 | #define TPM_CAP_PROP_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000112)\r | |
1882 | #define TPM_CAP_PROP_MAX_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000113)\r | |
1883 | #define TPM_CAP_PROP_FAMILYROWS ((TPM_CAPABILITY_AREA) 0x00000114)\r | |
1884 | #define TPM_CAP_PROP_TIS_TIMEOUT ((TPM_CAPABILITY_AREA) 0x00000115)\r | |
1885 | #define TPM_CAP_PROP_STARTUP_EFFECT ((TPM_CAPABILITY_AREA) 0x00000116)\r | |
1886 | #define TPM_CAP_PROP_DELEGATE_ROW ((TPM_CAPABILITY_AREA) 0x00000117)\r | |
1887 | #define TPM_CAP_PROP_DAA_MAX ((TPM_CAPABILITY_AREA) 0x00000119)\r | |
1888 | #define CAP_PROP_SESSION_DAA ((TPM_CAPABILITY_AREA) 0x0000011A)\r | |
1889 | #define TPM_CAP_PROP_CONTEXT_DIST ((TPM_CAPABILITY_AREA) 0x0000011B)\r | |
1890 | #define TPM_CAP_PROP_DAA_INTERRUPT ((TPM_CAPABILITY_AREA) 0x0000011C)\r | |
1891 | #define TPM_CAP_PROP_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011D)\r | |
1892 | #define TPM_CAP_PROP_MAX_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011E)\r | |
1893 | #define TPM_CAP_PROP_CMK_RESTRICTION ((TPM_CAPABILITY_AREA) 0x0000011F)\r | |
1894 | #define TPM_CAP_PROP_DURATION ((TPM_CAPABILITY_AREA) 0x00000120)\r | |
1895 | #define TPM_CAP_PROP_ACTIVE_COUNTER ((TPM_CAPABILITY_AREA) 0x00000122)\r | |
1896 | #define TPM_CAP_PROP_MAX_NV_AVAILABLE ((TPM_CAPABILITY_AREA) 0x00000123)\r | |
1897 | #define TPM_CAP_PROP_INPUT_BUFFER ((TPM_CAPABILITY_AREA) 0x00000124)\r | |
1898 | \r | |
427987f5 | 1899 | ///\r |
1900 | /// Part 2, section 21.6: TPM_CAP_VERSION_INFO\r | |
1901 | /// [size_is(vendorSpecificSize)] BYTE* vendorSpecific;\r | |
1902 | ///\r | |
267669ba LG |
1903 | typedef struct tdTPM_CAP_VERSION_INFO {\r |
1904 | TPM_STRUCTURE_TAG tag;\r | |
1905 | TPM_VERSION version;\r | |
1906 | UINT16 specLevel;\r | |
1907 | UINT8 errataRev;\r | |
1908 | UINT8 tpmVendorID[4];\r | |
1909 | UINT16 vendorSpecificSize;\r | |
1910 | UINT8 *vendorSpecific;\r | |
1911 | } TPM_CAP_VERSION_INFO;\r | |
1912 | \r | |
1913 | //\r | |
1914 | // Part 2, section 22: DAA Structures\r | |
1915 | //\r | |
1916 | \r | |
4135253b | 1917 | //\r |
1918 | // Part 2, section 22.1: Size definitions\r | |
1919 | //\r | |
267669ba LG |
1920 | #define TPM_DAA_SIZE_r0 (43)\r |
1921 | #define TPM_DAA_SIZE_r1 (43)\r | |
1922 | #define TPM_DAA_SIZE_r2 (128)\r | |
1923 | #define TPM_DAA_SIZE_r3 (168)\r | |
1924 | #define TPM_DAA_SIZE_r4 (219)\r | |
1925 | #define TPM_DAA_SIZE_NT (20)\r | |
1926 | #define TPM_DAA_SIZE_v0 (128)\r | |
1927 | #define TPM_DAA_SIZE_v1 (192)\r | |
1928 | #define TPM_DAA_SIZE_NE (256)\r | |
1929 | #define TPM_DAA_SIZE_w (256)\r | |
1930 | #define TPM_DAA_SIZE_issuerModulus (256)\r | |
4135253b | 1931 | //\r |
1932 | // Part 2, section 22.2: Constant definitions\r | |
1933 | //\r | |
267669ba LG |
1934 | #define TPM_DAA_power0 (104)\r |
1935 | #define TPM_DAA_power1 (1024)\r | |
1936 | \r | |
427987f5 | 1937 | ///\r |
1938 | /// Part 2, section 22.3: TPM_DAA_ISSUER\r | |
1939 | ///\r | |
4135253b | 1940 | typedef struct tdTPM_DAA_ISSUER {\r |
1941 | TPM_STRUCTURE_TAG tag;\r | |
1942 | TPM_DIGEST DAA_digest_R0;\r | |
1943 | TPM_DIGEST DAA_digest_R1;\r | |
1944 | TPM_DIGEST DAA_digest_S0;\r | |
1945 | TPM_DIGEST DAA_digest_S1;\r | |
1946 | TPM_DIGEST DAA_digest_n;\r | |
1947 | TPM_DIGEST DAA_digest_gamma;\r | |
1948 | UINT8 DAA_generic_q[26];\r | |
267669ba LG |
1949 | } TPM_DAA_ISSUER;\r |
1950 | \r | |
427987f5 | 1951 | ///\r |
1952 | /// Part 2, section 22.4: TPM_DAA_TPM\r | |
1953 | ///\r | |
4135253b | 1954 | typedef struct tdTPM_DAA_TPM {\r |
1955 | TPM_STRUCTURE_TAG tag;\r | |
1956 | TPM_DIGEST DAA_digestIssuer;\r | |
1957 | TPM_DIGEST DAA_digest_v0;\r | |
1958 | TPM_DIGEST DAA_digest_v1;\r | |
1959 | TPM_DIGEST DAA_rekey;\r | |
1960 | UINT32 DAA_count;\r | |
267669ba LG |
1961 | } TPM_DAA_TPM;\r |
1962 | \r | |
427987f5 | 1963 | ///\r |
1964 | /// Part 2, section 22.5: TPM_DAA_CONTEXT\r | |
1965 | ///\r | |
4135253b | 1966 | typedef struct tdTPM_DAA_CONTEXT {\r |
1967 | TPM_STRUCTURE_TAG tag;\r | |
1968 | TPM_DIGEST DAA_digestContext;\r | |
1969 | TPM_DIGEST DAA_digest;\r | |
1970 | TPM_DAA_CONTEXT_SEED DAA_contextSeed;\r | |
1971 | UINT8 DAA_scratch[256];\r | |
1972 | UINT8 DAA_stage;\r | |
267669ba LG |
1973 | } TPM_DAA_CONTEXT;\r |
1974 | \r | |
427987f5 | 1975 | ///\r |
1976 | /// Part 2, section 22.6: TPM_DAA_JOINDATA\r | |
1977 | ///\r | |
4135253b | 1978 | typedef struct tdTPM_DAA_JOINDATA {\r |
1979 | UINT8 DAA_join_u0[128];\r | |
1980 | UINT8 DAA_join_u1[138];\r | |
1981 | TPM_DIGEST DAA_digest_n0;\r | |
267669ba LG |
1982 | } TPM_DAA_JOINDATA;\r |
1983 | \r | |
427987f5 | 1984 | ///\r |
1985 | /// Part 2, section 22.8: TPM_DAA_BLOB\r | |
1986 | ///\r | |
4135253b | 1987 | typedef struct tdTPM_DAA_BLOB {\r |
1988 | TPM_STRUCTURE_TAG tag;\r | |
1989 | TPM_RESOURCE_TYPE resourceType;\r | |
1990 | UINT8 label[16];\r | |
1991 | TPM_DIGEST blobIntegrity;\r | |
1992 | UINT32 additionalSize;\r | |
1993 | UINT8 *additionalData;\r | |
1994 | UINT32 sensitiveSize;\r | |
1995 | UINT8 *sensitiveData;\r | |
267669ba LG |
1996 | } TPM_DAA_BLOB;\r |
1997 | \r | |
427987f5 | 1998 | ///\r |
1999 | /// Part 2, section 22.9: TPM_DAA_SENSITIVE\r | |
2000 | ///\r | |
4135253b | 2001 | typedef struct tdTPM_DAA_SENSITIVE {\r |
2002 | TPM_STRUCTURE_TAG tag;\r | |
2003 | UINT32 internalSize;\r | |
2004 | UINT8 *internalData;\r | |
267669ba LG |
2005 | } TPM_DAA_SENSITIVE;\r |
2006 | \r | |
2007 | \r | |
2008 | //\r | |
2009 | // Part 2, section 23: Redirection\r | |
2010 | //\r | |
2011 | \r | |
427987f5 | 2012 | ///\r |
2013 | /// Part 2 section 23.1: TPM_REDIR_COMMAND\r | |
2014 | /// This section defines exactly one value but does not\r | |
2015 | /// give it a name. The definition of TPM_SetRedirection in Part3\r | |
2016 | /// refers to exactly one name but does not give its value. We join\r | |
2017 | /// them here.\r | |
2018 | ///\r | |
267669ba LG |
2019 | #define TPM_REDIR_GPIO (0x00000001)\r |
2020 | \r | |
427987f5 | 2021 | ///\r |
cc078d72 | 2022 | /// TPM Command Headers defined in Part 3\r |
427987f5 | 2023 | ///\r |
267669ba LG |
2024 | typedef struct tdTPM_RQU_COMMAND_HDR {\r |
2025 | TPM_STRUCTURE_TAG tag;\r | |
2026 | UINT32 paramSize;\r | |
2027 | TPM_COMMAND_CODE ordinal;\r | |
2028 | } TPM_RQU_COMMAND_HDR;\r | |
2029 | \r | |
cc078d72 | 2030 | ///\r |
2031 | /// TPM Response Headers defined in Part 3\r | |
2032 | ///\r | |
267669ba LG |
2033 | typedef struct tdTPM_RSP_COMMAND_HDR {\r |
2034 | TPM_STRUCTURE_TAG tag;\r | |
2035 | UINT32 paramSize;\r | |
2036 | TPM_RESULT returnCode;\r | |
2037 | } TPM_RSP_COMMAND_HDR;\r | |
2038 | \r | |
a04ad3f0 | 2039 | #pragma pack ()\r |
267669ba | 2040 | \r |
4135253b | 2041 | #endif\r |