]> git.proxmox.com Git - mirror_edk2.git/blame - MdePkg/Include/IndustryStandard/Tpm12.h
1, Add <Library/DevicePathLib.h> for all source that use device path utility macros
[mirror_edk2.git] / MdePkg / Include / IndustryStandard / Tpm12.h
CommitLineData
42eedea9 1/** @file \r
267669ba 2 TPM Specification data structures (TCG TPM Specification Version 1.2 Revision 94)\r
267669ba
LG
3 See http://trustedcomputinggroup.org for latest specification updates\r
4\r
4135253b 5 Copyright (c) 2006 - 2008, Intel Corporation\r
8069d49e
LG
6 All rights reserved. This program and the accompanying materials \r
7 are licensed and made available under the terms and conditions of the BSD License \r
8 which accompanies this distribution. The full text of the license may be found at \r
9 http://opensource.org/licenses/bsd-license.php \r
10\r
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
13**/\r
14\r
267669ba
LG
15\r
16#ifndef _TPM12_H_\r
17#define _TPM12_H_\r
18\r
ec8432e5 19///\r
20/// The start of TPM return codes\r
21///\r
267669ba
LG
22#define TPM_BASE (EFI_MAX_BIT + (EFI_MAX_BIT >> 1))\r
23\r
24//\r
25// Structures are all packed on 1-byte alignment\r
26//\r
a04ad3f0 27#pragma pack (1)\r
267669ba
LG
28\r
29//\r
4135253b 30// Part 2, section 2.2.3: Helper redefinitions\r
267669ba
LG
31//\r
32typedef UINT8 TPM_AUTH_DATA_USAGE;\r
33typedef UINT8 TPM_PAYLOAD_TYPE;\r
34typedef UINT8 TPM_VERSION_BYTE;\r
35typedef UINT16 TPM_TAG;\r
36typedef UINT16 TPM_PROTOCOL_ID;\r
37typedef UINT16 TPM_STARTUP_TYPE;\r
38typedef UINT16 TPM_ENC_SCHEME;\r
39typedef UINT16 TPM_SIG_SCHEME;\r
40typedef UINT16 TPM_MIGRATE_SCHEME;\r
41typedef UINT16 TPM_PHYSICAL_PRESENCE;\r
42typedef UINT16 TPM_ENTITY_TYPE;\r
43typedef UINT16 TPM_KEY_USAGE;\r
44typedef UINT16 TPM_EK_TYPE;\r
45typedef UINT16 TPM_STRUCTURE_TAG;\r
46typedef UINT16 TPM_PLATFORM_SPECIFIC;\r
47typedef UINT32 TPM_COMMAND_CODE;\r
48typedef UINT32 TPM_CAPABILITY_AREA;\r
49typedef UINT32 TPM_KEY_FLAGS;\r
50typedef UINT32 TPM_ALGORITHM_ID;\r
51typedef UINT32 TPM_MODIFIER_INDICATOR;\r
52typedef UINT32 TPM_ACTUAL_COUNT;\r
53typedef UINT32 TPM_TRANSPORT_ATTRIBUTES;\r
54typedef UINT32 TPM_AUTHHANDLE;\r
55typedef UINT32 TPM_DIRINDEX;\r
56typedef UINT32 TPM_KEY_HANDLE;\r
57typedef UINT32 TPM_PCRINDEX;\r
58typedef UINT32 TPM_RESULT;\r
59typedef UINT32 TPM_RESOURCE_TYPE;\r
60typedef UINT32 TPM_KEY_CONTROL;\r
61typedef UINT32 TPM_NV_INDEX;\r
62typedef UINT32 TPM_FAMILY_ID;\r
63typedef UINT32 TPM_FAMILY_VERIFICATION;\r
64typedef UINT32 TPM_STARTUP_EFFECTS;\r
65typedef UINT32 TPM_SYM_MODE;\r
66typedef UINT32 TPM_FAMILY_FLAGS;\r
67typedef UINT32 TPM_DELEGATE_INDEX;\r
68typedef UINT32 TPM_CMK_DELEGATE;\r
69typedef UINT32 TPM_COUNT_ID;\r
70typedef UINT32 TPM_REDIT_COMMAND;\r
71typedef UINT32 TPM_TRANSHANDLE;\r
72typedef UINT32 TPM_HANDLE;\r
73typedef UINT32 TPM_FAMILY_OPERATION;\r
74\r
75//\r
76// Part 2, section 2.2.4: Vendor specific\r
77// The following defines allow for the quick specification of a\r
78// vendor specific item.\r
79//\r
80#define TPM_Vendor_Specific32 ((UINT32) 0x00000400)\r
81#define TPM_Vendor_Specific8 ((UINT8) 0x80)\r
82\r
83//\r
4135253b 84// Part 2, section 3.1: TPM_STRUCTURE_TAG\r
267669ba
LG
85//\r
86#define TPM_TAG_CONTEXTBLOB ((TPM_STRUCTURE_TAG) 0x0001)\r
87#define TPM_TAG_CONTEXT_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0002)\r
88#define TPM_TAG_CONTEXTPOINTER ((TPM_STRUCTURE_TAG) 0x0003)\r
89#define TPM_TAG_CONTEXTLIST ((TPM_STRUCTURE_TAG) 0x0004)\r
90#define TPM_TAG_SIGNINFO ((TPM_STRUCTURE_TAG) 0x0005)\r
91#define TPM_TAG_PCR_INFO_LONG ((TPM_STRUCTURE_TAG) 0x0006)\r
92#define TPM_TAG_PERSISTENT_FLAGS ((TPM_STRUCTURE_TAG) 0x0007)\r
93#define TPM_TAG_VOLATILE_FLAGS ((TPM_STRUCTURE_TAG) 0x0008)\r
94#define TPM_TAG_PERSISTENT_DATA ((TPM_STRUCTURE_TAG) 0x0009)\r
95#define TPM_TAG_VOLATILE_DATA ((TPM_STRUCTURE_TAG) 0x000A)\r
96#define TPM_TAG_SV_DATA ((TPM_STRUCTURE_TAG) 0x000B)\r
97#define TPM_TAG_EK_BLOB ((TPM_STRUCTURE_TAG) 0x000C)\r
98#define TPM_TAG_EK_BLOB_AUTH ((TPM_STRUCTURE_TAG) 0x000D)\r
99#define TPM_TAG_COUNTER_VALUE ((TPM_STRUCTURE_TAG) 0x000E)\r
100#define TPM_TAG_TRANSPORT_INTERNAL ((TPM_STRUCTURE_TAG) 0x000F)\r
101#define TPM_TAG_TRANSPORT_LOG_IN ((TPM_STRUCTURE_TAG) 0x0010)\r
102#define TPM_TAG_TRANSPORT_LOG_OUT ((TPM_STRUCTURE_TAG) 0x0011)\r
103#define TPM_TAG_AUDIT_EVENT_IN ((TPM_STRUCTURE_TAG) 0x0012)\r
104#define TPM_TAG_AUDIT_EVENT_OUT ((TPM_STRUCTURE_TAG) 0x0013)\r
105#define TPM_TAG_CURRENT_TICKS ((TPM_STRUCTURE_TAG) 0x0014)\r
106#define TPM_TAG_KEY ((TPM_STRUCTURE_TAG) 0x0015)\r
107#define TPM_TAG_STORED_DATA12 ((TPM_STRUCTURE_TAG) 0x0016)\r
108#define TPM_TAG_NV_ATTRIBUTES ((TPM_STRUCTURE_TAG) 0x0017)\r
109#define TPM_TAG_NV_DATA_PUBLIC ((TPM_STRUCTURE_TAG) 0x0018)\r
110#define TPM_TAG_NV_DATA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0019)\r
111#define TPM_TAG_DELEGATIONS ((TPM_STRUCTURE_TAG) 0x001A)\r
112#define TPM_TAG_DELEGATE_PUBLIC ((TPM_STRUCTURE_TAG) 0x001B)\r
113#define TPM_TAG_DELEGATE_TABLE_ROW ((TPM_STRUCTURE_TAG) 0x001C)\r
114#define TPM_TAG_TRANSPORT_AUTH ((TPM_STRUCTURE_TAG) 0x001D)\r
115#define TPM_TAG_TRANSPORT_PUBLIC ((TPM_STRUCTURE_TAG) 0x001E)\r
116#define TPM_TAG_PERMANENT_FLAGS ((TPM_STRUCTURE_TAG) 0x001F)\r
117#define TPM_TAG_STCLEAR_FLAGS ((TPM_STRUCTURE_TAG) 0x0020)\r
118#define TPM_TAG_STANY_FLAGS ((TPM_STRUCTURE_TAG) 0x0021)\r
119#define TPM_TAG_PERMANENT_DATA ((TPM_STRUCTURE_TAG) 0x0022)\r
120#define TPM_TAG_STCLEAR_DATA ((TPM_STRUCTURE_TAG) 0x0023)\r
121#define TPM_TAG_STANY_DATA ((TPM_STRUCTURE_TAG) 0x0024)\r
122#define TPM_TAG_FAMILY_TABLE_ENTRY ((TPM_STRUCTURE_TAG) 0x0025)\r
123#define TPM_TAG_DELEGATE_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0026)\r
124#define TPM_TAG_DELG_KEY_BLOB ((TPM_STRUCTURE_TAG) 0x0027)\r
125#define TPM_TAG_KEY12 ((TPM_STRUCTURE_TAG) 0x0028)\r
126#define TPM_TAG_CERTIFY_INFO2 ((TPM_STRUCTURE_TAG) 0x0029)\r
127#define TPM_TAG_DELEGATE_OWNER_BLOB ((TPM_STRUCTURE_TAG) 0x002A)\r
128#define TPM_TAG_EK_BLOB_ACTIVATE ((TPM_STRUCTURE_TAG) 0x002B)\r
129#define TPM_TAG_DAA_BLOB ((TPM_STRUCTURE_TAG) 0x002C)\r
130#define TPM_TAG_DAA_CONTEXT ((TPM_STRUCTURE_TAG) 0x002D)\r
131#define TPM_TAG_DAA_ENFORCE ((TPM_STRUCTURE_TAG) 0x002E)\r
132#define TPM_TAG_DAA_ISSUER ((TPM_STRUCTURE_TAG) 0x002F)\r
133#define TPM_TAG_CAP_VERSION_INFO ((TPM_STRUCTURE_TAG) 0x0030)\r
134#define TPM_TAG_DAA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0031)\r
135#define TPM_TAG_DAA_TPM ((TPM_STRUCTURE_TAG) 0x0032)\r
136#define TPM_TAG_CMK_MIGAUTH ((TPM_STRUCTURE_TAG) 0x0033)\r
137#define TPM_TAG_CMK_SIGTICKET ((TPM_STRUCTURE_TAG) 0x0034)\r
138#define TPM_TAG_CMK_MA_APPROVAL ((TPM_STRUCTURE_TAG) 0x0035)\r
139#define TPM_TAG_QUOTE_INFO2 ((TPM_STRUCTURE_TAG) 0x0036)\r
140\r
141//\r
142// Part 2, section 4: TPM Types\r
143//\r
144\r
145//\r
146// Part 2, section 4.1: TPM_RESOURCE_TYPE\r
147//\r
4135253b 148#define TPM_RT_KEY ((TPM_RESOURCE_TYPE) 0x00000001) ///< The handle is a key handle and is the result of a LoadKey type operation\r
149#define TPM_RT_AUTH ((TPM_RESOURCE_TYPE) 0x00000002) ///< The handle is an authorization handle. Auth handles come from TPM_OIAP, TPM_OSAP and TPM_DSAP\r
150#define TPM_RT_HASH ((TPM_RESOURCE_TYPE) 0x00000003) ///< Reserved for hashes\r
151#define TPM_RT_TRANS ((TPM_RESOURCE_TYPE) 0x00000004) ///< The handle is for a transport session. Transport handles come from TPM_EstablishTransport\r
152#define TPM_RT_CONTEXT ((TPM_RESOURCE_TYPE) 0x00000005) ///< Resource wrapped and held outside the TPM using the context save/restore commands\r
153#define TPM_RT_COUNTER ((TPM_RESOURCE_TYPE) 0x00000006) ///< Reserved for counters\r
154#define TPM_RT_DELEGATE ((TPM_RESOURCE_TYPE) 0x00000007) ///< The handle is for a delegate row. These are the internal rows held in NV storage by the TPM\r
155#define TPM_RT_DAA_TPM ((TPM_RESOURCE_TYPE) 0x00000008) ///< The value is a DAA TPM specific blob\r
156#define TPM_RT_DAA_V0 ((TPM_RESOURCE_TYPE) 0x00000009) ///< The value is a DAA V0 parameter\r
157#define TPM_RT_DAA_V1 ((TPM_RESOURCE_TYPE) 0x0000000A) ///< The value is a DAA V1 parameter\r
267669ba
LG
158\r
159//\r
160// Part 2, section 4.2: TPM_PAYLOAD_TYPE\r
161//\r
4135253b 162#define TPM_PT_ASYM ((TPM_PAYLOAD_TYPE) 0x01) ///< The entity is an asymmetric key\r
163#define TPM_PT_BIND ((TPM_PAYLOAD_TYPE) 0x02) ///< The entity is bound data\r
164#define TPM_PT_MIGRATE ((TPM_PAYLOAD_TYPE) 0x03) ///< The entity is a migration blob\r
165#define TPM_PT_MAINT ((TPM_PAYLOAD_TYPE) 0x04) ///< The entity is a maintenance blob\r
166#define TPM_PT_SEAL ((TPM_PAYLOAD_TYPE) 0x05) ///< The entity is sealed data\r
167#define TPM_PT_MIGRATE_RESTRICTED ((TPM_PAYLOAD_TYPE) 0x06) ///< The entity is a restricted-migration asymmetric key\r
168#define TPM_PT_MIGRATE_EXTERNAL ((TPM_PAYLOAD_TYPE) 0x07) ///< The entity is a external migratable key\r
169#define TPM_PT_CMK_MIGRATE ((TPM_PAYLOAD_TYPE) 0x08) ///< The entity is a CMK migratable blob\r
170#define TPM_PT_VENDOR_SPECIFIC ((TPM_PAYLOAD_TYPE) 0x80) ///< 0x80 - 0xFF Vendor specific payloads\r
171\r
172//\r
173// Part 2, section 4.3: TPM_ENTITY_TYPE\r
174//\r
175#define TPM_ET_KEYHANDLE ((UINT16) 0x0001) ///< The entity is a keyHandle or key\r
176#define TPM_ET_OWNER ((UINT16) 0x0002) ///< The entity is the TPM Owner\r
177#define TPM_ET_DATA ((UINT16) 0x0003) ///< The entity is some data\r
178#define TPM_ET_SRK ((UINT16) 0x0004) ///< The entity is the SRK\r
179#define TPM_ET_KEY ((UINT16) 0x0005) ///< The entity is a key or keyHandle\r
180#define TPM_ET_REVOKE ((UINT16) 0x0006) ///< The entity is the RevokeTrust value\r
181#define TPM_ET_DEL_OWNER_BLOB ((UINT16) 0x0007) ///< The entity is a delegate owner blob\r
182#define TPM_ET_DEL_ROW ((UINT16) 0x0008) ///< The entity is a delegate row\r
183#define TPM_ET_DEL_KEY_BLOB ((UINT16) 0x0009) ///< The entity is a delegate key blob\r
184#define TPM_ET_COUNTER ((UINT16) 0x000A) ///< The entity is a counter\r
185#define TPM_ET_NV ((UINT16) 0x000B) ///< The entity is a NV index\r
186#define TPM_ET_RESERVED_HANDLE ((UINT16) 0x0040) ///< Reserved. This value avoids collisions with the handle MSB setting.\r
267669ba
LG
187//\r
188// TPM_ENTITY_TYPE MSB Values: The MSB is used to indicate the ADIP encryption sheme when applicable\r
189//\r
4135253b 190#define TPM_ET_XOR ((UINT16) 0x0000) ///< ADIP encryption scheme: XOR\r
191#define TPM_ET_AES128 ((UINT16) 0x0006) ///< ADIP encryption scheme: AES 128 bits\r
267669ba
LG
192\r
193//\r
194// Part 2, section 4.4.1: Reserved Key Handles\r
195//\r
4135253b 196#define TPM_KH_SRK ((TPM_KEY_HANDLE) 0x40000000) ///< The handle points to the SRK\r
197#define TPM_KH_OWNER ((TPM_KEY_HANDLE) 0x40000001) ///< The handle points to the TPM Owner\r
198#define TPM_KH_REVOKE ((TPM_KEY_HANDLE) 0x40000002) ///< The handle points to the RevokeTrust value\r
199#define TPM_KH_TRANSPORT ((TPM_KEY_HANDLE) 0x40000003) ///< The handle points to the EstablishTransport static authorization\r
200#define TPM_KH_OPERATOR ((TPM_KEY_HANDLE) 0x40000004) ///< The handle points to the Operator auth\r
201#define TPM_KH_ADMIN ((TPM_KEY_HANDLE) 0x40000005) ///< The handle points to the delegation administration auth\r
202#define TPM_KH_EK ((TPM_KEY_HANDLE) 0x40000006) ///< The handle points to the PUBEK, only usable with TPM_OwnerReadInternalPub\r
267669ba
LG
203\r
204//\r
205// Part 2, section 4.5: TPM_STARTUP_TYPE\r
206//\r
4135253b 207#define TPM_ST_CLEAR ((TPM_STARTUP_TYPE) 0x0001) ///< The TPM is starting up from a clean state\r
208#define TPM_ST_STATE ((TPM_STARTUP_TYPE) 0x0002) ///< The TPM is starting up from a saved state\r
209#define TPM_ST_DEACTIVATED ((TPM_STARTUP_TYPE) 0x0003) ///< The TPM is to startup and set the deactivated flag to TRUE\r
267669ba
LG
210\r
211//\r
212// Part 2, section 4.6: TPM_STATUP_EFFECTS\r
213// The table makeup is still an open issue.\r
214//\r
215\r
216//\r
217// Part 2, section 4.7: TPM_PROTOCOL_ID\r
218//\r
4135253b 219#define TPM_PID_OIAP ((TPM_PROTOCOL_ID) 0x0001) ///< The OIAP protocol.\r
220#define TPM_PID_OSAP ((TPM_PROTOCOL_ID) 0x0002) ///< The OSAP protocol.\r
221#define TPM_PID_ADIP ((TPM_PROTOCOL_ID) 0x0003) ///< The ADIP protocol.\r
222#define TPM_PID_ADCP ((TPM_PROTOCOL_ID) 0x0004) ///< The ADCP protocol.\r
223#define TPM_PID_OWNER ((TPM_PROTOCOL_ID) 0x0005) ///< The protocol for taking ownership of a TPM.\r
224#define TPM_PID_DSAP ((TPM_PROTOCOL_ID) 0x0006) ///< The DSAP protocol\r
225#define TPM_PID_TRANSPORT ((TPM_PROTOCOL_ID) 0x0007) ///< The transport protocol\r
267669ba
LG
226\r
227//\r
228// Part 2, section 4.8: TPM_ALGORITHM_ID\r
229// The TPM MUST support the algorithms TPM_ALG_RSA, TPM_ALG_SHA, TPM_ALG_HMAC,\r
230// TPM_ALG_MGF1\r
231//\r
4135253b 232#define TPM_ALG_RSA ((TPM_ALGORITHM_ID) 0x00000001) ///< The RSA algorithm.\r
233#define TPM_ALG_DES ((TPM_ALGORITHM_ID) 0x00000002) ///< The DES algorithm\r
234#define TPM_ALG_3DES ((TPM_ALGORITHM_ID) 0x00000003) ///< The 3DES algorithm in EDE mode\r
235#define TPM_ALG_SHA ((TPM_ALGORITHM_ID) 0x00000004) ///< The SHA1 algorithm\r
236#define TPM_ALG_HMAC ((TPM_ALGORITHM_ID) 0x00000005) ///< The RFC 2104 HMAC algorithm\r
237#define TPM_ALG_AES128 ((TPM_ALGORITHM_ID) 0x00000006) ///< The AES algorithm, key size 128\r
238#define TPM_ALG_MGF1 ((TPM_ALGORITHM_ID) 0x00000007) ///< The XOR algorithm using MGF1 to create a string the size of the encrypted block\r
239#define TPM_ALG_AES192 ((TPM_ALGORITHM_ID) 0x00000008) ///< AES, key size 192\r
240#define TPM_ALG_AES256 ((TPM_ALGORITHM_ID) 0x00000009) ///< AES, key size 256\r
241#define TPM_ALG_XOR ((TPM_ALGORITHM_ID) 0x0000000A) ///< XOR using the rolling nonces\r
267669ba
LG
242\r
243//\r
244// Part 2, section 4.9: TPM_PHYSICAL_PRESENCE\r
245//\r
4135253b 246#define TPM_PHYSICAL_PRESENCE_HW_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0200) ///< Sets the physicalPresenceHWEnable to FALSE\r
247#define TPM_PHYSICAL_PRESENCE_CMD_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0100) ///< Sets the physicalPresenceCMDEnable to FALSE\r
248#define TPM_PHYSICAL_PRESENCE_LIFETIME_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0080) ///< Sets the physicalPresenceLifetimeLock to TRUE\r
249#define TPM_PHYSICAL_PRESENCE_HW_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0040) ///< Sets the physicalPresenceHWEnable to TRUE\r
250#define TPM_PHYSICAL_PRESENCE_CMD_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0020) ///< Sets the physicalPresenceCMDEnable to TRUE\r
251#define TPM_PHYSICAL_PRESENCE_NOTPRESENT ((TPM_PHYSICAL_PRESENCE) 0x0010) ///< Sets PhysicalPresence = FALSE\r
252#define TPM_PHYSICAL_PRESENCE_PRESENT ((TPM_PHYSICAL_PRESENCE) 0x0008) ///< Sets PhysicalPresence = TRUE\r
253#define TPM_PHYSICAL_PRESENCE_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0004) ///< Sets PhysicalPresenceLock = TRUE\r
267669ba
LG
254\r
255//\r
256// Part 2, section 4.10: TPM_MIGRATE_SCHEME\r
257//\r
4135253b 258#define TPM_MS_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0001) ///< A public key that can be used with all TPM migration commands other than 'ReWrap' mode.\r
259#define TPM_MS_REWRAP ((TPM_MIGRATE_SCHEME) 0x0002) ///< A public key that can be used for the ReWrap mode of TPM_CreateMigrationBlob.\r
260#define TPM_MS_MAINT ((TPM_MIGRATE_SCHEME) 0x0003) ///< A public key that can be used for the Maintenance commands\r
261#define TPM_MS_RESTRICT_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0004) ///< The key is to be migrated to a Migration Authority.\r
262#define TPM_MS_RESTRICT_APPROVE_DOUBLE ((TPM_MIGRATE_SCHEME) 0x0005) ///< The key is to be migrated to an entity approved by a Migration Authority using double wrapping\r
267669ba
LG
263\r
264//\r
265// Part 2, section 4.11: TPM_EK_TYPE\r
266//\r
4135253b 267#define TPM_EK_TYPE_ACTIVATE ((TPM_EK_TYPE) 0x0001) ///< The blob MUST be TPM_EK_BLOB_ACTIVATE\r
268#define TPM_EK_TYPE_AUTH ((TPM_EK_TYPE) 0x0002) ///< The blob MUST be TPM_EK_BLOB_AUTH\r
267669ba
LG
269\r
270//\r
271// Part 2, section 4.12: TPM_PLATFORM_SPECIFIC\r
272//\r
4135253b 273#define TPM_PS_PC_11 ((TPM_PLATFORM_SPECIFIC) 0x0001) ///< PC Specific version 1.1\r
274#define TPM_PS_PC_12 ((TPM_PLATFORM_SPECIFIC) 0x0002) ///< PC Specific version 1.2\r
275#define TPM_PS_PDA_12 ((TPM_PLATFORM_SPECIFIC) 0x0003) ///< PDA Specific version 1.2\r
276#define TPM_PS_Server_12 ((TPM_PLATFORM_SPECIFIC) 0x0004) ///< Server Specific version 1.2\r
277#define TPM_PS_Mobile_12 ((TPM_PLATFORM_SPECIFIC) 0x0005) ///< Mobil Specific version 1.2\r
267669ba
LG
278\r
279//\r
280// Part 2, section 5: Basic Structures\r
281//\r
282\r
283//\r
284// Part 2, section 5.1: TPM_STRUCT_VER\r
285//\r
286typedef struct tdTPM_STRUCT_VER {\r
287 UINT8 major;\r
288 UINT8 minor;\r
289 UINT8 revMajor;\r
290 UINT8 revMinor;\r
291} TPM_STRUCT_VER;\r
292\r
293//\r
294// Part 2, section 5.3: TPM_VERSION\r
295//\r
296typedef struct tdTPM_VERSION {\r
297 TPM_VERSION_BYTE major;\r
298 TPM_VERSION_BYTE minor;\r
299 UINT8 revMajor;\r
300 UINT8 revMinor;\r
301} TPM_VERSION;\r
302\r
303//\r
304// Part 2, section 5.4: TPM_DIGEST\r
305//\r
306#define TPM_SHA1_160_HASH_LEN 0x14\r
307#define TPM_SHA1BASED_NONCE_LEN TPM_SHA1_160_HASH_LEN\r
308\r
309typedef struct tdTPM_DIGEST{\r
310 UINT8 digest[TPM_SHA1_160_HASH_LEN];\r
311} TPM_DIGEST;\r
312\r
4135253b 313typedef TPM_DIGEST TPM_CHOSENID_HASH;\r
314typedef TPM_DIGEST TPM_COMPOSITE_HASH;\r
315typedef TPM_DIGEST TPM_DIRVALUE;\r
267669ba 316typedef TPM_DIGEST TPM_HMAC;\r
4135253b 317typedef TPM_DIGEST TPM_PCRVALUE;\r
318typedef TPM_DIGEST TPM_AUDITDIGEST;\r
319typedef TPM_DIGEST TPM_DAA_TPM_SEED;\r
320typedef TPM_DIGEST TPM_DAA_CONTEXT_SEED;\r
267669ba
LG
321\r
322//\r
323// Part 2, section 5.5: TPM_NONCE\r
324//\r
325typedef struct tdTPM_NONCE{\r
326 UINT8 nonce[20];\r
327} TPM_NONCE;\r
328\r
329//\r
330// Part 2, section 5.6: TPM_AUTHDATA\r
331//\r
332typedef UINT8 tdTPM_AUTHDATA[20];\r
333typedef tdTPM_AUTHDATA TPM_AUTHDATA;\r
334typedef TPM_AUTHDATA TPM_SECRET;\r
335typedef TPM_AUTHDATA TPM_ENCAUTH;\r
336\r
337//\r
338// Part 2, section 5.7: TPM_KEY_HANDLE_LIST\r
339// Size of handle is loaded * sizeof(TPM_KEY_HANDLE)\r
340//\r
341typedef struct tdTPM_KEY_HANDLE_LIST {\r
342 UINT16 loaded;\r
343 TPM_KEY_HANDLE handle[1];\r
344} TPM_KEY_HANDLE_LIST;\r
345\r
346//\r
347// Part 2, section 5.8: TPM_KEY_USAGE values\r
348//\r
4135253b 349///\r
350/// TPM_KEY_SIGNING SHALL indicate a signing key. The [private] key SHALL be\r
351/// used for signing operations, only. This means that it MUST be a leaf of the\r
352/// Protected Storage key hierarchy.\r
353///\r
267669ba 354#define TPM_KEY_SIGNING ((UINT16) 0x0010)\r
4135253b 355///\r
356/// TPM_KEY_STORAGE SHALL indicate a storage key. The key SHALL be used to wrap\r
357/// and unwrap other keys in the Protected Storage hierarchy\r
358///\r
267669ba 359#define TPM_KEY_STORAGE ((UINT16) 0x0011)\r
4135253b 360///\r
361/// TPM_KEY_IDENTITY SHALL indicate an identity key. The key SHALL be used for\r
362/// operations that require a TPM identity, only.\r
363///\r
267669ba 364#define TPM_KEY_IDENTITY ((UINT16) 0x0012)\r
4135253b 365///\r
366/// TPM_KEY_AUTHCHANGE SHALL indicate an ephemeral key that is in use during\r
367/// the ChangeAuthAsym process, only.\r
368///\r
267669ba 369#define TPM_KEY_AUTHCHANGE ((UINT16) 0x0013)\r
4135253b 370///\r
371/// TPM_KEY_BIND SHALL indicate a key that can be used for TPM_Bind and\r
372/// TPM_Unbind operations only.\r
373///\r
267669ba 374#define TPM_KEY_BIND ((UINT16) 0x0014)\r
4135253b 375///\r
376/// TPM_KEY_LEGACY SHALL indicate a key that can perform signing and binding\r
377/// operations. The key MAY be used for both signing and binding operations.\r
378/// The TPM_KEY_LEGACY key type is to allow for use by applications where both\r
379/// signing and encryption operations occur with the same key. The use of this\r
380/// key type is not recommended TPM_KEY_MIGRATE 0x0016 This SHALL indicate a\r
381/// key in use for TPM_MigrateKey\r
382///\r
267669ba 383#define TPM_KEY_LEGACY ((UINT16) 0x0015)\r
4135253b 384///\r
385/// TPM_KEY_MIGRAGE SHALL indicate a key in use for TPM_MigrateKey\r
386///\r
267669ba 387#define TPM_KEY_MIGRATE ((UINT16) 0x0016)\r
267669ba
LG
388\r
389//\r
4135253b 390// Part 2, section 5.8.1: Mandatory Key Usage Schemes\r
267669ba
LG
391//\r
392\r
393#define TPM_ES_NONE ((TPM_ENC_SCHEME) 0x0001)\r
394#define TPM_ES_RSAESPKCSv15 ((TPM_ENC_SCHEME) 0x0002)\r
395#define TPM_ES_RSAESOAEP_SHA1_MGF1 ((TPM_ENC_SCHEME) 0x0003)\r
396#define TPM_ES_SYM_CNT ((TPM_ENC_SCHEME) 0x0004)\r
397#define TPM_ES_SYM_OFB ((TPM_ENC_SCHEME) 0x0005)\r
398\r
399#define TPM_SS_NONE ((TPM_SIG_SCHEME) 0x0001)\r
400#define TPM_SS_RSASSAPKCS1v15_SHA1 ((TPM_SIG_SCHEME) 0x0002)\r
401#define TPM_SS_RSASSAPKCS1v15_DER ((TPM_SIG_SCHEME) 0x0003)\r
402#define TPM_SS_RSASSAPKCS1v15_INFO ((TPM_SIG_SCHEME) 0x0004)\r
403\r
404//\r
405// Part 2, section 5.9: TPM_AUTH_DATA_USAGE values\r
406//\r
407#define TPM_AUTH_NEVER ((TPM_AUTH_DATA_USAGE) 0x00)\r
408#define TPM_AUTH_ALWAYS ((TPM_AUTH_DATA_USAGE) 0x01)\r
409#define TPM_AUTH_PRIV_USE_ONLY ((TPM_AUTH_DATA_USAGE) 0x03)\r
410\r
411//\r
412// Part 2, section 5.10: TPM_KEY_FLAGS\r
413//\r
373b5cf9 414typedef enum tdTPM_KEY_FLAGS {\r
267669ba
LG
415 redirection = 0x00000001,\r
416 migratable = 0x00000002,\r
417 isVolatile = 0x00000004,\r
418 pcrIgnoredOnRead = 0x00000008,\r
419 migrateAuthority = 0x00000010\r
3e7b340f 420} TPM_KEY_FLAGS_BITS;\r
267669ba
LG
421\r
422//\r
423// Part 2, section 5.11: TPM_CHANGEAUTH_VALIDATE\r
424//\r
425typedef struct tdTPM_CHANGEAUTH_VALIDATE {\r
426 TPM_SECRET newAuthSecret;\r
427 TPM_NONCE n1;\r
428} TPM_CHANGEAUTH_VALIDATE;\r
429\r
430//\r
431// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r
432// decalared after section 10 to catch declaration of TPM_PUBKEY\r
433//\r
434// Part 2 section 10.1: TPM_KEY_PARMS\r
435// [size_is(parmSize)] BYTE* parms;\r
436//\r
437typedef struct tdTPM_KEY_PARMS {\r
438 TPM_ALGORITHM_ID algorithmID;\r
439 TPM_ENC_SCHEME encScheme;\r
440 TPM_SIG_SCHEME sigScheme;\r
441 UINT32 parmSize;\r
442 UINT8 *parms;\r
443} TPM_KEY_PARMS;\r
444\r
445//\r
446// Part 2, section 10.4: TPM_STORE_PUBKEY\r
447//\r
448typedef struct tdTPM_STORE_PUBKEY {\r
449 UINT32 keyLength;\r
450 UINT8 key[1];\r
451} TPM_STORE_PUBKEY;\r
452\r
453//\r
454// Part 2, section 10.5: TPM_PUBKEY\r
455//\r
456typedef struct tdTPM_PUBKEY{\r
457 TPM_KEY_PARMS algorithmParms;\r
458 TPM_STORE_PUBKEY pubKey;\r
459} TPM_PUBKEY;\r
460\r
461//\r
462// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r
463//\r
464typedef struct tdTPM_MIGRATIONKEYAUTH{\r
465 TPM_PUBKEY migrationKey;\r
466 TPM_MIGRATE_SCHEME migrationScheme;\r
467 TPM_DIGEST digest;\r
468} TPM_MIGRATIONKEYAUTH;\r
469\r
470//\r
471// Part 2, section 5.13: TPM_COUNTER_VALUE\r
472//\r
473typedef struct tdTPM_COUNTER_VALUE{\r
474 TPM_STRUCTURE_TAG tag;\r
475 UINT8 label[4];\r
476 TPM_ACTUAL_COUNT counter;\r
477} TPM_COUNTER_VALUE;\r
478\r
479//\r
480// Part 2, section 5.14: TPM_SIGN_INFO\r
481// Size of data indicated by dataLen\r
482//\r
483typedef struct tdTPM_SIGN_INFO {\r
484 TPM_STRUCTURE_TAG tag;\r
485 UINT8 fixed[4];\r
486 TPM_NONCE replay;\r
487 UINT32 dataLen;\r
488 UINT8 *data;\r
489} TPM_SIGN_INFO;\r
490\r
491//\r
492// Part 2, section 5.15: TPM_MSA_COMPOSITE\r
493// Number of migAuthDigest indicated by MSAlist\r
494//\r
495typedef struct tdTPM_MSA_COMPOSITE {\r
496 UINT32 MSAlist;\r
497 TPM_DIGEST migAuthDigest[1];\r
498} TPM_MSA_COMPOSITE;\r
499\r
500//\r
501// Part 2, section 5.16: TPM_CMK_AUTH\r
502//\r
503typedef struct tdTPM_CMK_AUTH{\r
504 TPM_DIGEST migrationAuthorityDigest;\r
505 TPM_DIGEST destinationKeyDigest;\r
506 TPM_DIGEST sourceKeyDigest;\r
507} TPM_CMK_AUTH;\r
508\r
509//\r
510// Part 2, section 5.17: TPM_CMK_DELEGATE\r
511//\r
4135253b 512#define TPM_CMK_DELEGATE_SIGNING ((TPM_CMK_DELEGATE) BIT31)\r
513#define TPM_CMK_DELEGATE_STORAGE ((TPM_CMK_DELEGATE) BIT30)\r
514#define TPM_CMK_DELEGATE_BIND ((TPM_CMK_DELEGATE) BIT29)\r
515#define TPM_CMK_DELEGATE_LEGACY ((TPM_CMK_DELEGATE) BIT28)\r
516#define TPM_CMK_DELEGATE_MIGRATE ((TPM_CMK_DELEGATE) BIT27)\r
267669ba
LG
517\r
518//\r
519// Part 2, section 5.18: TPM_SELECT_SIZE\r
520//\r
521typedef struct tdTPM_SELECT_SIZE {\r
522 UINT8 major;\r
523 UINT8 minor;\r
524 UINT16 reqSize;\r
525} TPM_SELECT_SIZE;\r
526\r
527//\r
528// Part 2, section 5,19: TPM_CMK_MIGAUTH\r
529//\r
530typedef struct tdTPM_CMK_MIGAUTH{\r
531 TPM_STRUCTURE_TAG tag;\r
532 TPM_DIGEST msaDigest;\r
533 TPM_DIGEST pubKeyDigest;\r
534} TPM_CMK_MIGAUTH;\r
535\r
536//\r
537// Part 2, section 5.20: TPM_CMK_SIGTICKET\r
538//\r
539typedef struct tdTPM_CMK_SIGTICKET{\r
540 TPM_STRUCTURE_TAG tag;\r
541 TPM_DIGEST verKeyDigest;\r
542 TPM_DIGEST signedData;\r
543} TPM_CMK_SIGTICKET;\r
544\r
545//\r
546// Part 2, section 5.21: TPM_CMK_MA_APPROVAL\r
547//\r
548typedef struct tdTPM_CMK_MA_APPROVAL{\r
549 TPM_STRUCTURE_TAG tag;\r
550 TPM_DIGEST migrationAuthorityDigest;\r
551} TPM_CMK_MA_APPROVAL;\r
552\r
553//\r
554// Part 2, section 6: Command Tags\r
555//\r
556#define TPM_TAG_RQU_COMMAND ((TPM_STRUCTURE_TAG) 0x00C1)\r
557#define TPM_TAG_RQU_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C2)\r
558#define TPM_TAG_RQU_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C3)\r
559#define TPM_TAG_RSP_COMMAND ((TPM_STRUCTURE_TAG) 0x00C4)\r
560#define TPM_TAG_RSP_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C5)\r
561#define TPM_TAG_RSP_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C6)\r
562\r
563//\r
564// Part 2, section 7.1: TPM_PERMANENT_FLAGS\r
565//\r
566typedef struct tdTPM_PERMANENT_FLAGS{\r
567 TPM_STRUCTURE_TAG tag;\r
568 BOOLEAN disable;\r
569 BOOLEAN ownership;\r
570 BOOLEAN deactivated;\r
571 BOOLEAN readPubek;\r
572 BOOLEAN disableOwnerClear;\r
573 BOOLEAN allowMaintenance;\r
574 BOOLEAN physicalPresenceLifetimeLock;\r
575 BOOLEAN physicalPresenceHWEnable;\r
576 BOOLEAN physicalPresenceCMDEnable;\r
577 BOOLEAN CEKPUsed;\r
578 BOOLEAN TPMpost;\r
579 BOOLEAN TPMpostLock;\r
580 BOOLEAN FIPS;\r
581 BOOLEAN operator;\r
582 BOOLEAN enableRevokeEK;\r
583 BOOLEAN nvLocked;\r
584 BOOLEAN readSRKPub;\r
585 BOOLEAN tpmEstablished;\r
586 BOOLEAN maintenanceDone;\r
587} TPM_PERMANENT_FLAGS;\r
588\r
589//\r
4135253b 590// Part 2, section 7.1.1: Flag Restrictions (of TPM_PERMANENT_FLAGS)\r
267669ba
LG
591//\r
592#define TPM_PF_DISABLE ((TPM_CAPABILITY_AREA) 1)\r
593#define TPM_PF_OWNERSHIP ((TPM_CAPABILITY_AREA) 2)\r
594#define TPM_PF_DEACTIVATED ((TPM_CAPABILITY_AREA) 3)\r
595#define TPM_PF_READPUBEK ((TPM_CAPABILITY_AREA) 4)\r
596#define TPM_PF_DISABLEOWNERCLEAR ((TPM_CAPABILITY_AREA) 5)\r
597#define TPM_PF_ALLOWMAINTENANCE ((TPM_CAPABILITY_AREA) 6)\r
598#define TPM_PF_PHYSICALPRESENCELIFETIMELOCK ((TPM_CAPABILITY_AREA) 7)\r
599#define TPM_PF_PHYSICALPRESENCEHWENABLE ((TPM_CAPABILITY_AREA) 8)\r
600#define TPM_PF_PHYSICALPRESENCECMDENABLE ((TPM_CAPABILITY_AREA) 9)\r
601#define TPM_PF_CEKPUSED ((TPM_CAPABILITY_AREA) 10)\r
602#define TPM_PF_TPMPOST ((TPM_CAPABILITY_AREA) 11)\r
603#define TPM_PF_TPMPOSTLOCK ((TPM_CAPABILITY_AREA) 12)\r
604#define TPM_PF_FIPS ((TPM_CAPABILITY_AREA) 13)\r
605#define TPM_PF_OPERATOR ((TPM_CAPABILITY_AREA) 14)\r
606#define TPM_PF_ENABLEREVOKEEK ((TPM_CAPABILITY_AREA) 15)\r
607#define TPM_PF_NV_LOCKED ((TPM_CAPABILITY_AREA) 16)\r
608#define TPM_PF_READSRKPUB ((TPM_CAPABILITY_AREA) 17)\r
609#define TPM_PF_TPMESTABLISHED ((TPM_CAPABILITY_AREA) 18)\r
610#define TPM_PF_MAINTENANCEDONE ((TPM_CAPABILITY_AREA) 19)\r
611\r
612//\r
613// Part 2, section 7.2: TPM_STCLEAR_FLAGS\r
614//\r
615typedef struct tdTPM_STCLEAR_FLAGS{\r
616 TPM_STRUCTURE_TAG tag;\r
617 BOOLEAN deactivated;\r
618 BOOLEAN disableForceClear;\r
619 BOOLEAN physicalPresence;\r
620 BOOLEAN physicalPresenceLock;\r
621 BOOLEAN bGlobalLock;\r
622} TPM_STCLEAR_FLAGS;\r
623\r
624//\r
4135253b 625// Part 2, section 7.2.1: Flag Restrictions (of TPM_STCLEAR_FLAGS)\r
267669ba
LG
626//\r
627#define TPM_SF_DEACTIVATED ((TPM_CAPABILITY_AREA) 1)\r
628#define TPM_SF_DISABLEFORCECLEAR ((TPM_CAPABILITY_AREA) 2)\r
629#define TPM_SF_PHYSICALPRESENCE ((TPM_CAPABILITY_AREA) 3)\r
630#define TPM_SF_PHYSICALPRESENCELOCK ((TPM_CAPABILITY_AREA) 4)\r
631#define TPM_SF_BGLOBALLOCK ((TPM_CAPABILITY_AREA) 5)\r
632\r
633//\r
634// Part 2, section 7.3: TPM_STANY_FLAGS\r
635//\r
636typedef struct tdTPM_STANY_FLAGS{\r
637 TPM_STRUCTURE_TAG tag;\r
638 BOOLEAN postInitialise;\r
639 TPM_MODIFIER_INDICATOR localityModifier;\r
640 BOOLEAN transportExclusive;\r
641 BOOLEAN TOSPresent;\r
642} TPM_STANY_FLAGS;\r
643\r
644//\r
4135253b 645// Part 2, section 7.3.1: Flag Restrictions (of TPM_STANY_FLAGS)\r
267669ba
LG
646//\r
647#define TPM_AF_POSTINITIALISE ((TPM_CAPABILITY_AREA) 1)\r
648#define TPM_AF_LOCALITYMODIFIER ((TPM_CAPABILITY_AREA) 2)\r
649#define TPM_AF_TRANSPORTEXCLUSIVE ((TPM_CAPABILITY_AREA) 3)\r
650#define TPM_AF_TOSPRESENT ((TPM_CAPABILITY_AREA) 4)\r
651\r
652//\r
4135253b 653// All those structures defined in section 7.4, 7.5, 7.6 are not normative and \r
267669ba
LG
654// thus no definitions here\r
655//\r
267669ba
LG
656\r
657//\r
658// Part 2, section 8: PCR Structures\r
659// \r
660\r
661//\r
662// Part 2, section 8.1: TPM_PCR_SELECTION\r
663// Size of pcrSelect[] indicated by sizeOfSelect\r
664//\r
665typedef struct tdTPM_PCR_SELECTION {\r
666 UINT16 sizeOfSelect;\r
667 UINT8 pcrSelect[1];\r
668} TPM_PCR_SELECTION;\r
669\r
670//\r
671// Part 2, section 8.2: TPM_PCR_COMPOSITE\r
672// Size of pcrValue[] indicated by valueSize\r
673//\r
674typedef struct tdTPM_PCR_COMPOSITE {\r
675 TPM_PCR_SELECTION select;\r
676 UINT32 valueSize;\r
677 TPM_PCRVALUE pcrValue[1];\r
678} TPM_PCR_COMPOSITE;\r
679\r
680//\r
681// Part 2, section 8.3: TPM_PCR_INFO\r
682//\r
683typedef struct tdTPM_PCR_INFO {\r
684 TPM_PCR_SELECTION pcrSelection;\r
685 TPM_COMPOSITE_HASH digestAtRelease;\r
686 TPM_COMPOSITE_HASH digestAtCreation;\r
687} TPM_PCR_INFO;\r
688\r
689//\r
690// Part 2, section 8.6: TPM_LOCALITY_SELECTION\r
691//\r
692typedef UINT8 TPM_LOCALITY_SELECTION;\r
693\r
694#define TPM_LOC_FOUR ((UINT8) 0x10)\r
695#define TPM_LOC_THREE ((UINT8) 0x08)\r
696#define TPM_LOC_TWO ((UINT8) 0x04)\r
697#define TPM_LOC_ONE ((UINT8) 0x02)\r
698#define TPM_LOC_ZERO ((UINT8) 0x01)\r
699\r
700//\r
701// Part 2, section 8.4: TPM_PCR_INFO_LONG\r
702//\r
703typedef struct tdTPM_PCR_INFO_LONG {\r
704 TPM_STRUCTURE_TAG tag;\r
705 TPM_LOCALITY_SELECTION localityAtCreation;\r
706 TPM_LOCALITY_SELECTION localityAtRelease;\r
707 TPM_PCR_SELECTION creationPCRSelection;\r
708 TPM_PCR_SELECTION releasePCRSelection;\r
709 TPM_COMPOSITE_HASH digestAtCreation;\r
710 TPM_COMPOSITE_HASH digestAtRelease;\r
711} TPM_PCR_INFO_LONG;\r
712\r
713//\r
714// Part 2, section 8.5: TPM_PCR_INFO_SHORT\r
715//\r
716typedef struct tdTPM_PCR_INFO_SHORT{\r
717 TPM_PCR_SELECTION pcrSelection;\r
718 TPM_LOCALITY_SELECTION localityAtRelease;\r
719 TPM_COMPOSITE_HASH digestAtRelease;\r
720} TPM_PCR_INFO_SHORT;\r
721\r
722//\r
723// Part 2, section 8.8: TPM_PCR_ATTRIBUTES\r
724//\r
725typedef struct tdTPM_PCR_ATTRIBUTES{\r
726 BOOLEAN pcrReset;\r
727 TPM_LOCALITY_SELECTION pcrExtendLocal;\r
728 TPM_LOCALITY_SELECTION pcrResetLocal;\r
729} TPM_PCR_ATTRIBUTES;\r
730\r
731//\r
732// Part 2, section 9: Storage Structures\r
733//\r
734\r
735//\r
736// Part 2, section 9.1: TPM_STORED_DATA\r
737// [size_is(sealInfoSize)] BYTE* sealInfo;\r
738// [size_is(encDataSize)] BYTE* encData;\r
739//\r
740typedef struct tdTPM_STORED_DATA {\r
741 TPM_STRUCT_VER ver;\r
742 UINT32 sealInfoSize;\r
743 UINT8 *sealInfo;\r
744 UINT32 encDataSize;\r
745 UINT8 *encData;\r
746} TPM_STORED_DATA;\r
747\r
748//\r
749// Part 2, section 9.2: TPM_STORED_DATA12\r
750// [size_is(sealInfoSize)] BYTE* sealInfo;\r
751// [size_is(encDataSize)] BYTE* encData;\r
752//\r
753typedef struct tdTPM_STORED_DATA12 {\r
754 TPM_STRUCTURE_TAG tag;\r
755 TPM_ENTITY_TYPE et;\r
756 UINT32 sealInfoSize;\r
757 UINT8 *sealInfo;\r
758 UINT32 encDataSize;\r
759 UINT8 *encData;\r
760} TPM_STORED_DATA12;\r
761\r
762//\r
763// Part 2, section 9.3: TPM_SEALED_DATA\r
764// [size_is(dataSize)] BYTE* data;\r
765//\r
766typedef struct tdTPM_SEALED_DATA {\r
767 TPM_PAYLOAD_TYPE payload;\r
768 TPM_SECRET authData;\r
769 TPM_NONCE tpmProof;\r
770 TPM_DIGEST storedDigest;\r
771 UINT32 dataSize;\r
772 UINT8 *data;\r
773} TPM_SEALED_DATA;\r
774\r
775//\r
776// Part 2, section 9.4: TPM_SYMMETRIC_KEY\r
777// [size_is(size)] BYTE* data;\r
778//\r
779typedef struct tdTPM_SYMMETRIC_KEY {\r
780 TPM_ALGORITHM_ID algId;\r
781 TPM_ENC_SCHEME encScheme;\r
782 UINT16 dataSize;\r
783 UINT8 *data;\r
784} TPM_SYMMETRIC_KEY;\r
785\r
786//\r
787// Part 2, section 9.5: TPM_BOUND_DATA\r
788//\r
789typedef struct tdTPM_BOUND_DATA {\r
790 TPM_STRUCT_VER ver;\r
791 TPM_PAYLOAD_TYPE payload;\r
792 UINT8 payloadData[1];\r
793} TPM_BOUND_DATA;\r
794\r
795//\r
796// Part 2 section 10: TPM_KEY complex\r
797// \r
798\r
4135253b 799//\r
800// Section 10.1, 10.4, and 10.5 have been defined previously\r
801//\r
802\r
267669ba
LG
803//\r
804// Part 2, section 10.2: TPM_KEY\r
805// [size_is(encDataSize)] BYTE* encData;\r
806//\r
807typedef struct tdTPM_KEY{\r
808 TPM_STRUCT_VER ver;\r
809 TPM_KEY_USAGE keyUsage;\r
810 TPM_KEY_FLAGS keyFlags;\r
811 TPM_AUTH_DATA_USAGE authDataUsage;\r
812 TPM_KEY_PARMS algorithmParms;\r
813 UINT32 PCRInfoSize;\r
814 UINT8 *PCRInfo;\r
815 TPM_STORE_PUBKEY pubKey;\r
816 UINT32 encDataSize;\r
817 UINT8 *encData;\r
818} TPM_KEY;\r
819\r
820//\r
821// Part 2, section 10.3: TPM_KEY12\r
822// [size_is(encDataSize)] BYTE* encData;\r
823//\r
824typedef struct tdTPM_KEY12{\r
825 TPM_STRUCTURE_TAG tag;\r
826 UINT16 fill;\r
827 TPM_KEY_USAGE keyUsage;\r
828 TPM_KEY_FLAGS keyFlags;\r
829 TPM_AUTH_DATA_USAGE authDataUsage;\r
830 TPM_KEY_PARMS algorithmParms;\r
831 UINT32 PCRInfoSize;\r
832 UINT8 *PCRInfo;\r
833 TPM_STORE_PUBKEY pubKey;\r
834 UINT32 encDataSize;\r
835 UINT8 *encData;\r
836} TPM_KEY12;\r
837\r
838//\r
839// Part 2, section 10.7: TPM_STORE_PRIVKEY\r
840// [size_is(keyLength)] BYTE* key;\r
841//\r
842typedef struct tdTPM_STORE_PRIVKEY {\r
843 UINT32 keyLength;\r
844 UINT8 *key;\r
845} TPM_STORE_PRIVKEY;\r
846\r
847//\r
848// Part 2, section 10.6: TPM_STORE_ASYMKEY\r
849//\r
850typedef struct tdTPM_STORE_ASYMKEY { // pos len total\r
851 TPM_PAYLOAD_TYPE payload; // 0 1 1\r
852 TPM_SECRET usageAuth; // 1 20 21\r
853 TPM_SECRET migrationAuth; // 21 20 41\r
854 TPM_DIGEST pubDataDigest; // 41 20 61\r
855 TPM_STORE_PRIVKEY privKey; // 61 132-151 193-214\r
856} TPM_STORE_ASYMKEY;\r
857\r
858//\r
859// Part 2, section 10.8: TPM_MIGRATE_ASYMKEY\r
860// [size_is(partPrivKeyLen)] BYTE* partPrivKey;\r
861//\r
862typedef struct tdTPM_MIGRATE_ASYMKEY { // pos len total\r
863 TPM_PAYLOAD_TYPE payload; // 0 1 1\r
864 TPM_SECRET usageAuth; // 1 20 21\r
865 TPM_DIGEST pubDataDigest; // 21 20 41\r
866 UINT32 partPrivKeyLen; // 41 4 45\r
867 UINT8 *partPrivKey; // 45 112-127 157-172\r
868} TPM_MIGRATE_ASYMKEY;\r
869\r
870//\r
871// Part 2, section 10.9: TPM_KEY_CONTROL\r
872//\r
873#define TPM_KEY_CONTROL_OWNER_EVICT ((UINT32) 0x00000001)\r
874\r
875//\r
876// Part 2, section 11: Signed Structures\r
877//\r
878\r
4135253b 879//\r
880// Part 2, section 11.1: TPM_CERTIFY_INFO Structure\r
881//\r
882typedef struct tdTPM_CERTIFY_INFO {\r
883 TPM_STRUCT_VER version;\r
884 TPM_KEY_USAGE keyUsage;\r
885 TPM_KEY_FLAGS keyFlags;\r
886 TPM_AUTH_DATA_USAGE authDataUsage;\r
887 TPM_KEY_PARMS algorithmParms;\r
888 TPM_DIGEST pubkeyDigest;\r
889 TPM_NONCE data;\r
890 BOOLEAN parentPCRStatus;\r
891 UINT32 PCRInfoSize;\r
892 UINT8 *PCRInfo;\r
267669ba
LG
893} TPM_CERTIFY_INFO;\r
894\r
4135253b 895//\r
896// Part 2, section 11.2: TPM_CERTIFY_INFO2 Structure\r
897//\r
898typedef struct tdTPM_CERTIFY_INFO2 {\r
899 TPM_STRUCTURE_TAG tag;\r
900 UINT8 fill;\r
901 TPM_PAYLOAD_TYPE payloadType;\r
902 TPM_KEY_USAGE keyUsage;\r
903 TPM_KEY_FLAGS keyFlags;\r
904 TPM_AUTH_DATA_USAGE authDataUsage;\r
905 TPM_KEY_PARMS algorithmParms;\r
906 TPM_DIGEST pubkeyDigest;\r
907 TPM_NONCE data;\r
908 BOOLEAN parentPCRStatus;\r
909 UINT32 PCRInfoSize;\r
910 UINT8 *PCRInfo;\r
911 UINT32 migrationAuthoritySize;\r
912 UINT8 *migrationAuthority;\r
267669ba
LG
913} TPM_CERTIFY_INFO2;\r
914\r
4135253b 915//\r
916// Part 2, section 11.3 TPM_QUOTE_INFO Structure\r
917//\r
918typedef struct tdTPM_QUOTE_INFO {\r
919 TPM_STRUCT_VER version;\r
920 UINT8 fixed[4];\r
921 TPM_COMPOSITE_HASH digestValue;\r
922 TPM_NONCE externalData;\r
267669ba
LG
923} TPM_QUOTE_INFO;\r
924\r
4135253b 925//\r
926// Part 2, section 11.4 TPM_QUOTE_INFO2 Structure\r
927//\r
928typedef struct tdTPM_QUOTE_INFO2 {\r
929 TPM_STRUCTURE_TAG tag;\r
930 UINT8 fixed[4];\r
931 TPM_NONCE externalData;\r
932 TPM_PCR_INFO_SHORT infoShort;\r
267669ba
LG
933} TPM_QUOTE_INFO2;\r
934\r
935//\r
936// Part 2, section 12: Identity Structures\r
937//\r
938\r
4135253b 939//\r
940// Part 2, section 12.1 TPM_EK_BLOB\r
941//\r
942typedef struct tdTPM_EK_BLOB {\r
943 TPM_STRUCTURE_TAG tag;\r
944 TPM_EK_TYPE ekType;\r
945 UINT32 blobSize;\r
946 UINT8 *blob;\r
267669ba
LG
947} TPM_EK_BLOB;\r
948\r
4135253b 949//\r
950// Part 2, section 12.2 TPM_EK_BLOB_ACTIVATE\r
951//\r
952typedef struct tdTPM_EK_BLOB_ACTIVATE {\r
953 TPM_STRUCTURE_TAG tag;\r
954 TPM_SYMMETRIC_KEY sessionKey;\r
955 TPM_DIGEST idDigest;\r
956 TPM_PCR_INFO_SHORT pcrInfo;\r
267669ba
LG
957} TPM_EK_BLOB_ACTIVATE;\r
958\r
4135253b 959//\r
960// Part 2, section 12.3 TPM_EK_BLOB_AUTH\r
961//\r
962typedef struct tdTPM_EK_BLOB_AUTH {\r
963 TPM_STRUCTURE_TAG tag;\r
964 TPM_SECRET authValue;\r
267669ba
LG
965} TPM_EK_BLOB_AUTH;\r
966\r
967\r
4135253b 968//\r
969// Part 2, section 12.5 TPM_IDENTITY_CONTENTS\r
970//\r
971typedef struct tdTPM_IDENTITY_CONTENTS {\r
972 TPM_STRUCT_VER ver;\r
973 UINT32 ordinal;\r
974 TPM_CHOSENID_HASH labelPrivCADigest;\r
975 TPM_PUBKEY identityPubKey;\r
267669ba
LG
976} TPM_IDENTITY_CONTENTS;\r
977\r
4135253b 978//\r
979// Part 2, section 12.6 TPM_IDENTITY_REQ\r
980//\r
981typedef struct tdTPM_IDENTITY_REQ {\r
982 UINT32 asymSize;\r
983 UINT32 symSize;\r
984 TPM_KEY_PARMS asymAlgorithm;\r
985 TPM_KEY_PARMS symAlgorithm;\r
986 UINT8 *asymBlob;\r
987 UINT8 *symBlob;\r
267669ba
LG
988} TPM_IDENTITY_REQ;\r
989\r
4135253b 990//\r
991// Part 2, section 12.7 TPM_IDENTITY_PROOF\r
992//\r
993typedef struct tdTPM_IDENTITY_PROOF {\r
994 TPM_STRUCT_VER ver;\r
995 UINT32 labelSize;\r
996 UINT32 identityBindingSize;\r
997 UINT32 endorsementSize;\r
998 UINT32 platformSize;\r
999 UINT32 conformanceSize;\r
1000 TPM_PUBKEY identityKey;\r
1001 UINT8 *labelArea;\r
1002 UINT8 *identityBinding;\r
1003 UINT8 *endorsementCredential;\r
1004 UINT8 *platformCredential;\r
1005 UINT8 *conformanceCredential;\r
267669ba
LG
1006} TPM_IDENTITY_PROOF;\r
1007\r
4135253b 1008//\r
1009// Part 2, section 12.8 TPM_ASYM_CA_CONTENTS\r
1010//\r
1011typedef struct tdTPM_ASYM_CA_CONTENTS {\r
1012 TPM_SYMMETRIC_KEY sessionKey;\r
1013 TPM_DIGEST idDigest;\r
267669ba
LG
1014} TPM_ASYM_CA_CONTENTS;\r
1015\r
4135253b 1016//\r
1017// Part 2, section 12.9 TPM_SYM_CA_ATTESTATION\r
1018//\r
1019typedef struct tdTPM_SYM_CA_ATTESTATION {\r
1020 UINT32 credSize;\r
1021 TPM_KEY_PARMS algorithm;\r
1022 UINT8 *credential;\r
267669ba
LG
1023} TPM_SYM_CA_ATTESTATION;\r
1024\r
1025//\r
4135253b 1026// Part 2, section 15: Tick Structures\r
267669ba
LG
1027// Placed here out of order because definitions are used in section 13.\r
1028//\r
1029typedef struct tdTPM_CURRENT_TICKS {\r
1030 TPM_STRUCTURE_TAG tag;\r
1031 UINT64 currentTicks;\r
1032 UINT16 tickRate;\r
1033 TPM_NONCE tickNonce;\r
1034} TPM_CURRENT_TICKS;\r
1035\r
1036//\r
1037// Part 2, section 13: Transport structures\r
1038//\r
1039\r
4135253b 1040//\r
1041// Part 2, section 13.1: TPM _TRANSPORT_PUBLIC\r
1042//\r
1043typedef struct tdTPM_TRANSPORT_PUBLIC {\r
1044 TPM_STRUCTURE_TAG tag;\r
1045 TPM_TRANSPORT_ATTRIBUTES transAttributes;\r
1046 TPM_ALGORITHM_ID algId;\r
1047 TPM_ENC_SCHEME encScheme;\r
1048} TPM_TRANSPORT_PUBLIC;\r
1049\r
1050//\r
1051// Part 2, section 13.1.1 TPM_TRANSPORT_ATTRIBUTES Definitions\r
1052//\r
267669ba
LG
1053#define TPM_TRANSPORT_ENCRYPT ((UINT32)0x00000001)\r
1054#define TPM_TRANSPORT_LOG ((UINT32)0x00000002)\r
1055#define TPM_TRANSPORT_EXCLUSIVE ((UINT32)0x00000004)\r
1056\r
4135253b 1057//\r
1058// Part 2, section 13.2 TPM_TRANSPORT_INTERNAL\r
1059//\r
1060typedef struct tdTPM_TRANSPORT_INTERNAL {\r
1061 TPM_STRUCTURE_TAG tag;\r
1062 TPM_AUTHDATA authData;\r
1063 TPM_TRANSPORT_PUBLIC transPublic;\r
1064 TPM_TRANSHANDLE transHandle;\r
1065 TPM_NONCE transNonceEven;\r
1066 TPM_DIGEST transDigest;\r
267669ba
LG
1067} TPM_TRANSPORT_INTERNAL;\r
1068\r
4135253b 1069//\r
1070// Part 2, section 13.3 TPM_TRANSPORT_LOG_IN structure\r
1071//\r
1072typedef struct tdTPM_TRANSPORT_LOG_IN {\r
1073 TPM_STRUCTURE_TAG tag;\r
1074 TPM_DIGEST parameters;\r
1075 TPM_DIGEST pubKeyHash;\r
267669ba
LG
1076} TPM_TRANSPORT_LOG_IN;\r
1077\r
4135253b 1078//\r
1079// Part 2, section 13.4 TPM_TRANSPORT_LOG_OUT structure\r
1080//\r
1081typedef struct tdTPM_TRANSPORT_LOG_OUT {\r
1082 TPM_STRUCTURE_TAG tag;\r
1083 TPM_CURRENT_TICKS currentTicks;\r
1084 TPM_DIGEST parameters;\r
1085 TPM_MODIFIER_INDICATOR locality;\r
267669ba
LG
1086} TPM_TRANSPORT_LOG_OUT;\r
1087\r
4135253b 1088//\r
1089// Part 2, section 13.5 TPM_TRANSPORT_AUTH structure\r
1090//\r
1091typedef struct tdTPM_TRANSPORT_AUTH {\r
1092 TPM_STRUCTURE_TAG tag;\r
1093 TPM_AUTHDATA authData;\r
267669ba
LG
1094} TPM_TRANSPORT_AUTH;\r
1095\r
1096//\r
1097// Part 2, section 14: Audit Structures\r
1098//\r
1099\r
4135253b 1100//\r
1101// Part 2, section 14.1 TPM_AUDIT_EVENT_IN structure\r
1102//\r
1103typedef struct tdTPM_AUDIT_EVENT_IN {\r
1104 TPM_STRUCTURE_TAG tag;\r
1105 TPM_DIGEST inputParms;\r
1106 TPM_COUNTER_VALUE auditCount;\r
267669ba
LG
1107} TPM_AUDIT_EVENT_IN;\r
1108\r
4135253b 1109//\r
1110// Part 2, section 14.2 TPM_AUDIT_EVENT_OUT structure\r
1111//\r
1112typedef struct tdTPM_AUDIT_EVENT_OUT {\r
1113 TPM_STRUCTURE_TAG tag;\r
1114 TPM_COMMAND_CODE ordinal;\r
1115 TPM_DIGEST outputParms;\r
1116 TPM_COUNTER_VALUE auditCount;\r
1117 TPM_RESULT returnCode;\r
267669ba
LG
1118} TPM_AUDIT_EVENT_OUT;\r
1119\r
1120//\r
1121// Part 2, section 16: Return Codes\r
1122//\r
267669ba
LG
1123\r
1124#define TPM_VENDOR_ERROR TPM_Vendor_Specific32\r
1125#define TPM_NON_FATAL 0x00000800\r
1126\r
1127#define TPM_SUCCESS ((TPM_RESULT) TPM_BASE)\r
1128#define TPM_AUTHFAIL ((TPM_RESULT) (TPM_BASE + 1))\r
1129#define TPM_BADINDEX ((TPM_RESULT) (TPM_BASE + 2))\r
1130#define TPM_BAD_PARAMETER ((TPM_RESULT) (TPM_BASE + 3))\r
1131#define TPM_AUDITFAILURE ((TPM_RESULT) (TPM_BASE + 4))\r
1132#define TPM_CLEAR_DISABLED ((TPM_RESULT) (TPM_BASE + 5))\r
1133#define TPM_DEACTIVATED ((TPM_RESULT) (TPM_BASE + 6))\r
1134#define TPM_DISABLED ((TPM_RESULT) (TPM_BASE + 7))\r
1135#define TPM_DISABLED_CMD ((TPM_RESULT) (TPM_BASE + 8))\r
1136#define TPM_FAIL ((TPM_RESULT) (TPM_BASE + 9))\r
1137#define TPM_BAD_ORDINAL ((TPM_RESULT) (TPM_BASE + 10))\r
1138#define TPM_INSTALL_DISABLED ((TPM_RESULT) (TPM_BASE + 11))\r
1139#define TPM_INVALID_KEYHANDLE ((TPM_RESULT) (TPM_BASE + 12))\r
1140#define TPM_KEYNOTFOUND ((TPM_RESULT) (TPM_BASE + 13))\r
1141#define TPM_INAPPROPRIATE_ENC ((TPM_RESULT) (TPM_BASE + 14))\r
1142#define TPM_MIGRATEFAIL ((TPM_RESULT) (TPM_BASE + 15))\r
1143#define TPM_INVALID_PCR_INFO ((TPM_RESULT) (TPM_BASE + 16))\r
1144#define TPM_NOSPACE ((TPM_RESULT) (TPM_BASE + 17))\r
1145#define TPM_NOSRK ((TPM_RESULT) (TPM_BASE + 18))\r
1146#define TPM_NOTSEALED_BLOB ((TPM_RESULT) (TPM_BASE + 19))\r
1147#define TPM_OWNER_SET ((TPM_RESULT) (TPM_BASE + 20))\r
1148#define TPM_RESOURCES ((TPM_RESULT) (TPM_BASE + 21))\r
1149#define TPM_SHORTRANDOM ((TPM_RESULT) (TPM_BASE + 22))\r
1150#define TPM_SIZE ((TPM_RESULT) (TPM_BASE + 23))\r
1151#define TPM_WRONGPCRVAL ((TPM_RESULT) (TPM_BASE + 24))\r
1152#define TPM_BAD_PARAM_SIZE ((TPM_RESULT) (TPM_BASE + 25))\r
1153#define TPM_SHA_THREAD ((TPM_RESULT) (TPM_BASE + 26))\r
1154#define TPM_SHA_ERROR ((TPM_RESULT) (TPM_BASE + 27))\r
1155#define TPM_FAILEDSELFTEST ((TPM_RESULT) (TPM_BASE + 28))\r
1156#define TPM_AUTH2FAIL ((TPM_RESULT) (TPM_BASE + 29))\r
1157#define TPM_BADTAG ((TPM_RESULT) (TPM_BASE + 30))\r
1158#define TPM_IOERROR ((TPM_RESULT) (TPM_BASE + 31))\r
1159#define TPM_ENCRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 32))\r
1160#define TPM_DECRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 33))\r
1161#define TPM_INVALID_AUTHHANDLE ((TPM_RESULT) (TPM_BASE + 34))\r
1162#define TPM_NO_ENDORSEMENT ((TPM_RESULT) (TPM_BASE + 35))\r
1163#define TPM_INVALID_KEYUSAGE ((TPM_RESULT) (TPM_BASE + 36))\r
1164#define TPM_WRONG_ENTITYTYPE ((TPM_RESULT) (TPM_BASE + 37))\r
1165#define TPM_INVALID_POSTINIT ((TPM_RESULT) (TPM_BASE + 38))\r
1166#define TPM_INAPPROPRIATE_SIG ((TPM_RESULT) (TPM_BASE + 39))\r
1167#define TPM_BAD_KEY_PROPERTY ((TPM_RESULT) (TPM_BASE + 40))\r
1168#define TPM_BAD_MIGRATION ((TPM_RESULT) (TPM_BASE + 41))\r
1169#define TPM_BAD_SCHEME ((TPM_RESULT) (TPM_BASE + 42))\r
1170#define TPM_BAD_DATASIZE ((TPM_RESULT) (TPM_BASE + 43))\r
1171#define TPM_BAD_MODE ((TPM_RESULT) (TPM_BASE + 44))\r
1172#define TPM_BAD_PRESENCE ((TPM_RESULT) (TPM_BASE + 45))\r
1173#define TPM_BAD_VERSION ((TPM_RESULT) (TPM_BASE + 46))\r
1174#define TPM_NO_WRAP_TRANSPORT ((TPM_RESULT) (TPM_BASE + 47))\r
1175#define TPM_AUDITFAIL_UNSUCCESSFUL ((TPM_RESULT) (TPM_BASE + 48))\r
1176#define TPM_AUDITFAIL_SUCCESSFUL ((TPM_RESULT) (TPM_BASE + 49))\r
1177#define TPM_NOTRESETABLE ((TPM_RESULT) (TPM_BASE + 50))\r
1178#define TPM_NOTLOCAL ((TPM_RESULT) (TPM_BASE + 51))\r
1179#define TPM_BAD_TYPE ((TPM_RESULT) (TPM_BASE + 52))\r
1180#define TPM_INVALID_RESOURCE ((TPM_RESULT) (TPM_BASE + 53))\r
1181#define TPM_NOTFIPS ((TPM_RESULT) (TPM_BASE + 54))\r
1182#define TPM_INVALID_FAMILY ((TPM_RESULT) (TPM_BASE + 55))\r
1183#define TPM_NO_NV_PERMISSION ((TPM_RESULT) (TPM_BASE + 56))\r
1184#define TPM_REQUIRES_SIGN ((TPM_RESULT) (TPM_BASE + 57))\r
1185#define TPM_KEY_NOTSUPPORTED ((TPM_RESULT) (TPM_BASE + 58))\r
1186#define TPM_AUTH_CONFLICT ((TPM_RESULT) (TPM_BASE + 59))\r
1187#define TPM_AREA_LOCKED ((TPM_RESULT) (TPM_BASE + 60))\r
1188#define TPM_BAD_LOCALITY ((TPM_RESULT) (TPM_BASE + 61))\r
1189#define TPM_READ_ONLY ((TPM_RESULT) (TPM_BASE + 62))\r
1190#define TPM_PER_NOWRITE ((TPM_RESULT) (TPM_BASE + 63))\r
1191#define TPM_FAMILYCOUNT ((TPM_RESULT) (TPM_BASE + 64))\r
1192#define TPM_WRITE_LOCKED ((TPM_RESULT) (TPM_BASE + 65))\r
1193#define TPM_BAD_ATTRIBUTES ((TPM_RESULT) (TPM_BASE + 66))\r
1194#define TPM_INVALID_STRUCTURE ((TPM_RESULT) (TPM_BASE + 67))\r
1195#define TPM_KEY_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 68))\r
1196#define TPM_BAD_COUNTER ((TPM_RESULT) (TPM_BASE + 69))\r
1197#define TPM_NOT_FULLWRITE ((TPM_RESULT) (TPM_BASE + 70))\r
1198#define TPM_CONTEXT_GAP ((TPM_RESULT) (TPM_BASE + 71))\r
1199#define TPM_MAXNVWRITES ((TPM_RESULT) (TPM_BASE + 72))\r
1200#define TPM_NOOPERATOR ((TPM_RESULT) (TPM_BASE + 73))\r
1201#define TPM_RESOURCEMISSING ((TPM_RESULT) (TPM_BASE + 74))\r
1202#define TPM_DELEGATE_LOCK ((TPM_RESULT) (TPM_BASE + 75))\r
1203#define TPM_DELEGATE_FAMILY ((TPM_RESULT) (TPM_BASE + 76))\r
1204#define TPM_DELEGATE_ADMIN ((TPM_RESULT) (TPM_BASE + 77))\r
1205#define TPM_TRANSPORT_NOTEXCLUSIVE ((TPM_RESULT) (TPM_BASE + 78))\r
1206#define TPM_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 79))\r
1207#define TPM_DAA_RESOURCES ((TPM_RESULT) (TPM_BASE + 80))\r
1208#define TPM_DAA_INPUT_DATA0 ((TPM_RESULT) (TPM_BASE + 81))\r
1209#define TPM_DAA_INPUT_DATA1 ((TPM_RESULT) (TPM_BASE + 82))\r
1210#define TPM_DAA_ISSUER_SETTINGS ((TPM_RESULT) (TPM_BASE + 83))\r
1211#define TPM_DAA_TPM_SETTINGS ((TPM_RESULT) (TPM_BASE + 84))\r
1212#define TPM_DAA_STAGE ((TPM_RESULT) (TPM_BASE + 85))\r
1213#define TPM_DAA_ISSUER_VALIDITY ((TPM_RESULT) (TPM_BASE + 86))\r
1214#define TPM_DAA_WRONG_W ((TPM_RESULT) (TPM_BASE + 87))\r
1215#define TPM_BAD_HANDLE ((TPM_RESULT) (TPM_BASE + 88))\r
1216#define TPM_BAD_DELEGATE ((TPM_RESULT) (TPM_BASE + 89))\r
1217#define TPM_BADCONTEXT ((TPM_RESULT) (TPM_BASE + 90))\r
1218#define TPM_TOOMANYCONTEXTS ((TPM_RESULT) (TPM_BASE + 91))\r
1219#define TPM_MA_TICKET_SIGNATURE ((TPM_RESULT) (TPM_BASE + 92))\r
1220#define TPM_MA_DESTINATION ((TPM_RESULT) (TPM_BASE + 93))\r
1221#define TPM_MA_SOURCE ((TPM_RESULT) (TPM_BASE + 94))\r
1222#define TPM_MA_AUTHORITY ((TPM_RESULT) (TPM_BASE + 95))\r
1223#define TPM_PERMANENTEK ((TPM_RESULT) (TPM_BASE + 97))\r
1224#define TPM_BAD_SIGNATURE ((TPM_RESULT) (TPM_BASE + 98))\r
1225#define TPM_NOCONTEXTSPACE ((TPM_RESULT) (TPM_BASE + 99))\r
1226\r
1227#define TPM_RETRY ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL))\r
1228#define TPM_NEEDS_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 1))\r
1229#define TPM_DOING_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 2))\r
1230#define TPM_DEFEND_LOCK_RUNNING ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 3))\r
1231\r
1232//\r
1233// Part 2, section 17: Ordinals\r
1234//\r
1235// Ordinals are 32 bit values. The upper byte contains values that serve as\r
1236// flag indicators, the next byte contains values indicating what committee\r
1237// designated the ordinal, and the final two bytes contain the Command\r
1238// Ordinal Index.\r
1239// 3 2 1\r
1240// 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0\r
1241// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r
1242// |P|C|V| Reserved| Purview | Command Ordinal Index |\r
1243// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r
1244//\r
1245// Where:\r
1246//\r
1247// * P is Protected/Unprotected command. When 0 the command is a Protected\r
1248// command, when 1 the command is an Unprotected command.\r
1249//\r
1250// * C is Non-Connection/Connection related command. When 0 this command\r
1251// passes through to either the protected (TPM) or unprotected (TSS)\r
1252// components.\r
1253//\r
1254// * V is TPM/Vendor command. When 0 the command is TPM defined, when 1 the\r
1255// command is vendor defined.\r
1256//\r
1257// * All reserved area bits are set to 0.\r
1258//\r
1259\r
1260#define TPM_ORD_ActivateIdentity ((TPM_COMMAND_CODE) 0x0000007A)\r
1261#define TPM_ORD_AuthorizeMigrationKey ((TPM_COMMAND_CODE) 0x0000002B)\r
1262#define TPM_ORD_CertifyKey ((TPM_COMMAND_CODE) 0x00000032)\r
1263#define TPM_ORD_CertifyKey2 ((TPM_COMMAND_CODE) 0x00000033)\r
1264#define TPM_ORD_CertifySelfTest ((TPM_COMMAND_CODE) 0x00000052)\r
1265#define TPM_ORD_ChangeAuth ((TPM_COMMAND_CODE) 0x0000000C)\r
1266#define TPM_ORD_ChangeAuthAsymFinish ((TPM_COMMAND_CODE) 0x0000000F)\r
1267#define TPM_ORD_ChangeAuthAsymStart ((TPM_COMMAND_CODE) 0x0000000E)\r
1268#define TPM_ORD_ChangeAuthOwner ((TPM_COMMAND_CODE) 0x00000010)\r
1269#define TPM_ORD_CMK_ApproveMA ((TPM_COMMAND_CODE) 0x0000001D)\r
1270#define TPM_ORD_CMK_ConvertMigration ((TPM_COMMAND_CODE) 0x00000024)\r
1271#define TPM_ORD_CMK_CreateBlob ((TPM_COMMAND_CODE) 0x0000001B)\r
1272#define TPM_ORD_CMK_CreateKey ((TPM_COMMAND_CODE) 0x00000013)\r
1273#define TPM_ORD_CMK_CreateTicket ((TPM_COMMAND_CODE) 0x00000012)\r
1274#define TPM_ORD_CMK_SetRestrictions ((TPM_COMMAND_CODE) 0x0000001C)\r
1275#define TPM_ORD_ContinueSelfTest ((TPM_COMMAND_CODE) 0x00000053)\r
1276#define TPM_ORD_ConvertMigrationBlob ((TPM_COMMAND_CODE) 0x0000002A)\r
1277#define TPM_ORD_CreateCounter ((TPM_COMMAND_CODE) 0x000000DC)\r
1278#define TPM_ORD_CreateEndorsementKeyPair ((TPM_COMMAND_CODE) 0x00000078)\r
1279#define TPM_ORD_CreateMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002C)\r
1280#define TPM_ORD_CreateMigrationBlob ((TPM_COMMAND_CODE) 0x00000028)\r
1281#define TPM_ORD_CreateRevocableEK ((TPM_COMMAND_CODE) 0x0000007F)\r
1282#define TPM_ORD_CreateWrapKey ((TPM_COMMAND_CODE) 0x0000001F)\r
1283#define TPM_ORD_DAA_JOIN ((TPM_COMMAND_CODE) 0x00000029)\r
1284#define TPM_ORD_DAA_SIGN ((TPM_COMMAND_CODE) 0x00000031)\r
1285#define TPM_ORD_Delegate_CreateKeyDelegation ((TPM_COMMAND_CODE) 0x000000D4)\r
1286#define TPM_ORD_Delegate_CreateOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D5)\r
1287#define TPM_ORD_Delegate_LoadOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D8)\r
1288#define TPM_ORD_Delegate_Manage ((TPM_COMMAND_CODE) 0x000000D2)\r
1289#define TPM_ORD_Delegate_ReadTable ((TPM_COMMAND_CODE) 0x000000DB)\r
1290#define TPM_ORD_Delegate_UpdateVerification ((TPM_COMMAND_CODE) 0x000000D1)\r
1291#define TPM_ORD_Delegate_VerifyDelegation ((TPM_COMMAND_CODE) 0x000000D6)\r
1292#define TPM_ORD_DirRead ((TPM_COMMAND_CODE) 0x0000001A)\r
1293#define TPM_ORD_DirWriteAuth ((TPM_COMMAND_CODE) 0x00000019)\r
1294#define TPM_ORD_DisableForceClear ((TPM_COMMAND_CODE) 0x0000005E)\r
1295#define TPM_ORD_DisableOwnerClear ((TPM_COMMAND_CODE) 0x0000005C)\r
1296#define TPM_ORD_DisablePubekRead ((TPM_COMMAND_CODE) 0x0000007E)\r
1297#define TPM_ORD_DSAP ((TPM_COMMAND_CODE) 0x00000011)\r
1298#define TPM_ORD_EstablishTransport ((TPM_COMMAND_CODE) 0x000000E6)\r
1299#define TPM_ORD_EvictKey ((TPM_COMMAND_CODE) 0x00000022)\r
1300#define TPM_ORD_ExecuteTransport ((TPM_COMMAND_CODE) 0x000000E7)\r
1301#define TPM_ORD_Extend ((TPM_COMMAND_CODE) 0x00000014)\r
1302#define TPM_ORD_FieldUpgrade ((TPM_COMMAND_CODE) 0x000000AA)\r
1303#define TPM_ORD_FlushSpecific ((TPM_COMMAND_CODE) 0x000000BA)\r
1304#define TPM_ORD_ForceClear ((TPM_COMMAND_CODE) 0x0000005D)\r
1305#define TPM_ORD_GetAuditDigest ((TPM_COMMAND_CODE) 0x00000085)\r
1306#define TPM_ORD_GetAuditDigestSigned ((TPM_COMMAND_CODE) 0x00000086)\r
1307#define TPM_ORD_GetAuditEvent ((TPM_COMMAND_CODE) 0x00000082)\r
1308#define TPM_ORD_GetAuditEventSigned ((TPM_COMMAND_CODE) 0x00000083)\r
1309#define TPM_ORD_GetCapability ((TPM_COMMAND_CODE) 0x00000065)\r
1310#define TPM_ORD_GetCapabilityOwner ((TPM_COMMAND_CODE) 0x00000066)\r
1311#define TPM_ORD_GetCapabilitySigned ((TPM_COMMAND_CODE) 0x00000064)\r
1312#define TPM_ORD_GetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008C)\r
1313#define TPM_ORD_GetPubKey ((TPM_COMMAND_CODE) 0x00000021)\r
1314#define TPM_ORD_GetRandom ((TPM_COMMAND_CODE) 0x00000046)\r
1315#define TPM_ORD_GetTestResult ((TPM_COMMAND_CODE) 0x00000054)\r
1316#define TPM_ORD_GetTicks ((TPM_COMMAND_CODE) 0x000000F1)\r
1317#define TPM_ORD_IncrementCounter ((TPM_COMMAND_CODE) 0x000000DD)\r
1318#define TPM_ORD_Init ((TPM_COMMAND_CODE) 0x00000097)\r
1319#define TPM_ORD_KeyControlOwner ((TPM_COMMAND_CODE) 0x00000023)\r
1320#define TPM_ORD_KillMaintenanceFeature ((TPM_COMMAND_CODE) 0x0000002E)\r
1321#define TPM_ORD_LoadAuthContext ((TPM_COMMAND_CODE) 0x000000B7)\r
1322#define TPM_ORD_LoadContext ((TPM_COMMAND_CODE) 0x000000B9)\r
1323#define TPM_ORD_LoadKey ((TPM_COMMAND_CODE) 0x00000020)\r
1324#define TPM_ORD_LoadKey2 ((TPM_COMMAND_CODE) 0x00000041)\r
1325#define TPM_ORD_LoadKeyContext ((TPM_COMMAND_CODE) 0x000000B5)\r
1326#define TPM_ORD_LoadMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002D)\r
1327#define TPM_ORD_LoadManuMaintPub ((TPM_COMMAND_CODE) 0x0000002F)\r
1328#define TPM_ORD_MakeIdentity ((TPM_COMMAND_CODE) 0x00000079)\r
1329#define TPM_ORD_MigrateKey ((TPM_COMMAND_CODE) 0x00000025)\r
1330#define TPM_ORD_NV_DefineSpace ((TPM_COMMAND_CODE) 0x000000CC)\r
1331#define TPM_ORD_NV_ReadValue ((TPM_COMMAND_CODE) 0x000000CF)\r
1332#define TPM_ORD_NV_ReadValueAuth ((TPM_COMMAND_CODE) 0x000000D0)\r
1333#define TPM_ORD_NV_WriteValue ((TPM_COMMAND_CODE) 0x000000CD)\r
1334#define TPM_ORD_NV_WriteValueAuth ((TPM_COMMAND_CODE) 0x000000CE)\r
1335#define TPM_ORD_OIAP ((TPM_COMMAND_CODE) 0x0000000A)\r
1336#define TPM_ORD_OSAP ((TPM_COMMAND_CODE) 0x0000000B)\r
1337#define TPM_ORD_OwnerClear ((TPM_COMMAND_CODE) 0x0000005B)\r
1338#define TPM_ORD_OwnerReadInternalPub ((TPM_COMMAND_CODE) 0x00000081)\r
1339#define TPM_ORD_OwnerReadPubek ((TPM_COMMAND_CODE) 0x0000007D)\r
1340#define TPM_ORD_OwnerSetDisable ((TPM_COMMAND_CODE) 0x0000006E)\r
1341#define TPM_ORD_PCR_Reset ((TPM_COMMAND_CODE) 0x000000C8)\r
1342#define TPM_ORD_PcrRead ((TPM_COMMAND_CODE) 0x00000015)\r
1343#define TPM_ORD_PhysicalDisable ((TPM_COMMAND_CODE) 0x00000070)\r
1344#define TPM_ORD_PhysicalEnable ((TPM_COMMAND_CODE) 0x0000006F)\r
1345#define TPM_ORD_PhysicalSetDeactivated ((TPM_COMMAND_CODE) 0x00000072)\r
1346#define TPM_ORD_Quote ((TPM_COMMAND_CODE) 0x00000016)\r
1347#define TPM_ORD_Quote2 ((TPM_COMMAND_CODE) 0x0000003E)\r
1348#define TPM_ORD_ReadCounter ((TPM_COMMAND_CODE) 0x000000DE)\r
1349#define TPM_ORD_ReadManuMaintPub ((TPM_COMMAND_CODE) 0x00000030)\r
1350#define TPM_ORD_ReadPubek ((TPM_COMMAND_CODE) 0x0000007C)\r
1351#define TPM_ORD_ReleaseCounter ((TPM_COMMAND_CODE) 0x000000DF)\r
1352#define TPM_ORD_ReleaseCounterOwner ((TPM_COMMAND_CODE) 0x000000E0)\r
1353#define TPM_ORD_ReleaseTransportSigned ((TPM_COMMAND_CODE) 0x000000E8)\r
1354#define TPM_ORD_Reset ((TPM_COMMAND_CODE) 0x0000005A)\r
1355#define TPM_ORD_ResetLockValue ((TPM_COMMAND_CODE) 0x00000040)\r
1356#define TPM_ORD_RevokeTrust ((TPM_COMMAND_CODE) 0x00000080)\r
1357#define TPM_ORD_SaveAuthContext ((TPM_COMMAND_CODE) 0x000000B6)\r
1358#define TPM_ORD_SaveContext ((TPM_COMMAND_CODE) 0x000000B8)\r
1359#define TPM_ORD_SaveKeyContext ((TPM_COMMAND_CODE) 0x000000B4)\r
1360#define TPM_ORD_SaveState ((TPM_COMMAND_CODE) 0x00000098)\r
1361#define TPM_ORD_Seal ((TPM_COMMAND_CODE) 0x00000017)\r
1362#define TPM_ORD_Sealx ((TPM_COMMAND_CODE) 0x0000003D)\r
1363#define TPM_ORD_SelfTestFull ((TPM_COMMAND_CODE) 0x00000050)\r
1364#define TPM_ORD_SetCapability ((TPM_COMMAND_CODE) 0x0000003F)\r
1365#define TPM_ORD_SetOperatorAuth ((TPM_COMMAND_CODE) 0x00000074)\r
1366#define TPM_ORD_SetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008D)\r
1367#define TPM_ORD_SetOwnerInstall ((TPM_COMMAND_CODE) 0x00000071)\r
1368#define TPM_ORD_SetOwnerPointer ((TPM_COMMAND_CODE) 0x00000075)\r
1369#define TPM_ORD_SetRedirection ((TPM_COMMAND_CODE) 0x0000009A)\r
1370#define TPM_ORD_SetTempDeactivated ((TPM_COMMAND_CODE) 0x00000073)\r
1371#define TPM_ORD_SHA1Complete ((TPM_COMMAND_CODE) 0x000000A2)\r
1372#define TPM_ORD_SHA1CompleteExtend ((TPM_COMMAND_CODE) 0x000000A3)\r
1373#define TPM_ORD_SHA1Start ((TPM_COMMAND_CODE) 0x000000A0)\r
1374#define TPM_ORD_SHA1Update ((TPM_COMMAND_CODE) 0x000000A1)\r
1375#define TPM_ORD_Sign ((TPM_COMMAND_CODE) 0x0000003C)\r
1376#define TPM_ORD_Startup ((TPM_COMMAND_CODE) 0x00000099)\r
1377#define TPM_ORD_StirRandom ((TPM_COMMAND_CODE) 0x00000047)\r
1378#define TPM_ORD_TakeOwnership ((TPM_COMMAND_CODE) 0x0000000D)\r
1379#define TPM_ORD_Terminate_Handle ((TPM_COMMAND_CODE) 0x00000096)\r
1380#define TPM_ORD_TickStampBlob ((TPM_COMMAND_CODE) 0x000000F2)\r
1381#define TPM_ORD_UnBind ((TPM_COMMAND_CODE) 0x0000001E)\r
1382#define TPM_ORD_Unseal ((TPM_COMMAND_CODE) 0x00000018)\r
1383#define TSC_ORD_PhysicalPresence ((TPM_COMMAND_CODE) 0x4000000A)\r
1384#define TSC_ORD_ResetEstablishmentBit ((TPM_COMMAND_CODE) 0x4000000B)\r
1385\r
1386//\r
1387// Part 2, section 18: Context structures\r
1388//\r
1389\r
4135253b 1390//\r
1391// Part 2, section 18.1: TPM_CONTEXT_BLOB\r
1392//\r
1393typedef struct tdTPM_CONTEXT_BLOB {\r
1394 TPM_STRUCTURE_TAG tag;\r
1395 TPM_RESOURCE_TYPE resourceType;\r
1396 TPM_HANDLE handle;\r
1397 UINT8 label[16];\r
1398 UINT32 contextCount;\r
1399 TPM_DIGEST integrityDigest;\r
1400 UINT32 additionalSize;\r
1401 UINT8 *additionalData;\r
1402 UINT32 sensitiveSize;\r
1403 UINT8 *sensitiveData;\r
267669ba
LG
1404} TPM_CONTEXT_BLOB;\r
1405\r
4135253b 1406//\r
1407// Part 2, section 18.2 TPM_CONTEXT_SENSITIVE\r
1408//\r
1409typedef struct tdTPM_CONTEXT_SENSITIVE {\r
1410 TPM_STRUCTURE_TAG tag;\r
1411 TPM_NONCE contextNonce;\r
1412 UINT32 internalSize;\r
1413 UINT8 *internalData;\r
267669ba
LG
1414} TPM_CONTEXT_SENSITIVE;\r
1415\r
1416//\r
1417// Part 2, section 19: NV Structures\r
1418//\r
1419\r
4135253b 1420//\r
1421// Part 2, section 19.1.1: Required TPM_NV_INDEX values\r
1422//\r
267669ba
LG
1423#define TPM_NV_INDEX_LOCK ((UINT32)0xffffffff)\r
1424#define TPM_NV_INDEX0 ((UINT32)0x00000000)\r
1425#define TPM_NV_INDEX_DIR ((UINT32)0x10000001)\r
1426#define TPM_NV_INDEX_EKCert ((UINT32)0x0000f000)\r
1427#define TPM_NV_INDEX_TPM_CC ((UINT32)0x0000f001)\r
1428#define TPM_NV_INDEX_PlatformCert ((UINT32)0x0000f002)\r
1429#define TPM_NV_INDEX_Platform_CC ((UINT32)0x0000f003)\r
4135253b 1430//\r
1431// Part 2, section 19.1.2: Reserved Index values\r
1432//\r
267669ba
LG
1433#define TPM_NV_INDEX_TSS_BASE ((UINT32)0x00011100)\r
1434#define TPM_NV_INDEX_PC_BASE ((UINT32)0x00011200)\r
1435#define TPM_NV_INDEX_SERVER_BASE ((UINT32)0x00011300)\r
1436#define TPM_NV_INDEX_MOBILE_BASE ((UINT32)0x00011400)\r
1437#define TPM_NV_INDEX_PERIPHERAL_BASE ((UINT32)0x00011500)\r
1438#define TPM_NV_INDEX_GROUP_RESV_BASE ((UINT32)0x00010000)\r
1439\r
4135253b 1440//\r
267669ba
LG
1441// The typedefs TPM_NV_PER_ATTRIBUTES (not present in TPM 1.2 Spec. have been added \r
1442// and structure fields that were to hold the following values\r
4135253b 1443//\r
1444typedef UINT32 TPM_NV_PER_ATTRIBUTES;\r
267669ba 1445\r
4135253b 1446//\r
1447// Part 2, section 19.2: TPM_NV_ATTRIBUTES\r
1448//\r
1449#define TPM_NV_PER_READ_STCLEAR (BIT31)\r
1450#define TPM_NV_PER_AUTHREAD (BIT18)\r
1451#define TPM_NV_PER_OWNERREAD (BIT17)\r
1452#define TPM_NV_PER_PPREAD (BIT16)\r
1453#define TPM_NV_PER_GLOBALLOCK (BIT15)\r
1454#define TPM_NV_PER_WRITE_STCLEAR (BIT14)\r
1455#define TPM_NV_PER_WRITEDEFINE (BIT13)\r
1456#define TPM_NV_PER_WRITEALL (BIT12)\r
1457#define TPM_NV_PER_AUTHWRITE (BIT2)\r
1458#define TPM_NV_PER_OWNERWRITE (BIT1)\r
1459#define TPM_NV_PER_PPWRITE (BIT0)\r
267669ba 1460\r
4135253b 1461typedef struct tdTPM_NV_ATTRIBUTES {\r
1462 TPM_STRUCTURE_TAG tag;\r
1463 TPM_NV_PER_ATTRIBUTES attributes;\r
1464} TPM_NV_ATTRIBUTES;\r
267669ba 1465\r
4135253b 1466//\r
1467// Part 2, section 19.3: TPM_NV_DATA_PUBLIC\r
1468//\r
1469typedef struct tdTPM_NV_DATA_PUBLIC {\r
1470 TPM_STRUCTURE_TAG tag;\r
1471 TPM_NV_INDEX nvIndex;\r
1472 TPM_PCR_INFO_SHORT pcrInfoRead;\r
1473 TPM_PCR_INFO_SHORT pcrInfoWrite;\r
1474 TPM_NV_ATTRIBUTES permission;\r
1475 BOOLEAN bReadSTClear;\r
1476 BOOLEAN bWriteSTClear;\r
1477 BOOLEAN bWriteDefine;\r
1478 UINT32 dataSize;\r
1479} TPM_NV_DATA_PUBLIC;\r
267669ba 1480\r
4135253b 1481//\r
1482// Part 2, section 20: Delegate Structures\r
1483//\r
267669ba 1484\r
4135253b 1485//\r
1486// Part 2, section 20.2: Delegate Definitions\r
1487//\r
1488#define TPM_DEL_OWNER_BITS ((UINT32)0x00000001)\r
1489#define TPM_DEL_KEY_BITS ((UINT32)0x00000002)\r
267669ba 1490\r
4135253b 1491typedef struct tdTPM_DELEGATIONS {\r
1492 TPM_STRUCTURE_TAG tag;\r
1493 UINT32 delegateType;\r
1494 UINT32 per1;\r
1495 UINT32 per2;\r
1496} TPM_DELEGATIONS;\r
267669ba 1497\r
4135253b 1498//\r
1499// Part 2, section 20.2.1: Owner Permission Settings\r
1500//\r
1501#define TPM_DELEGATE_SetOrdinalAuditStatus (BIT30)\r
1502#define TPM_DELEGATE_DirWriteAuth (BIT29)\r
1503#define TPM_DELEGATE_CMK_ApproveMA (BIT28)\r
1504#define TPM_DELEGATE_CMK_CreateTicket (BIT26)\r
1505#define TPM_DELEGATE_Delegate_LoadOwnerDelegation (BIT24)\r
1506#define TPM_DELEGATE_DAA_Join (BIT23)\r
1507#define TPM_DELEGATE_AuthorizeMigrationKey (BIT22)\r
1508#define TPM_DELEGATE_CreateMaintenanceArchive (BIT21)\r
1509#define TPM_DELEGATE_LoadMaintenanceArchive (BIT20)\r
1510#define TPM_DELEGATE_KillMaintenanceFeature (BIT19)\r
1511#define TPM_DELEGATE_OwnerReadInteralPub (BIT18)\r
1512#define TPM_DELEGATE_ResetLockValue (BIT17)\r
1513#define TPM_DELEGATE_OwnerClear (BIT16)\r
1514#define TPM_DELEGATE_DisableOwnerClear (BIT15)\r
1515#define TPM_DELEGATE_OwnerSetDisable (BIT13)\r
1516#define TPM_DELEGATE_SetCapability (BIT12)\r
1517#define TPM_DELEGATE_MakeIdentity (BIT11)\r
1518#define TPM_DELEGATE_ActivateIdentity (BIT10)\r
1519#define TPM_DELEGATE_OwnerReadPubek (BIT9)\r
1520#define TPM_DELEGATE_DisablePubekRead (BIT8)\r
1521#define TPM_DELEGATE_SetRedirection (BIT7)\r
1522#define TPM_DELEGATE_FieldUpgrade (BIT6)\r
1523#define TPM_DELEGATE_Delegate_UpdateVerification (BIT5)\r
1524#define TPM_DELEGATE_CreateCounter (BIT4)\r
1525#define TPM_DELEGATE_ReleaseCounterOwner (BIT3)\r
1526#define TPM_DELEGATE_DelegateManage (BIT2)\r
1527#define TPM_DELEGATE_Delegate_CreateOwnerDelegation (BIT1)\r
1528#define TPM_DELEGATE_DAA_Sign (BIT0)\r
1529\r
1530//\r
1531// Part 2, section 20.2.3: Key Permission settings\r
1532//\r
1533#define TPM_KEY_DELEGATE_CMK_ConvertMigration (BIT28)\r
1534#define TPM_KEY_DELEGATE_TickStampBlob (BIT27)\r
1535#define TPM_KEY_DELEGATE_ChangeAuthAsymStart (BIT26)\r
1536#define TPM_KEY_DELEGATE_ChangeAuthAsymFinish (BIT25)\r
1537#define TPM_KEY_DELEGATE_CMK_CreateKey (BIT24)\r
1538#define TPM_KEY_DELEGATE_MigrateKey (BIT23)\r
1539#define TPM_KEY_DELEGATE_LoadKey2 (BIT22)\r
1540#define TPM_KEY_DELEGATE_EstablishTransport (BIT21)\r
1541#define TPM_KEY_DELEGATE_ReleaseTransportSigned (BIT20)\r
1542#define TPM_KEY_DELEGATE_Quote2 (BIT19)\r
1543#define TPM_KEY_DELEGATE_Sealx (BIT18)\r
1544#define TPM_KEY_DELEGATE_MakeIdentity (BIT17)\r
1545#define TPM_KEY_DELEGATE_ActivateIdentity (BIT16)\r
1546#define TPM_KEY_DELEGATE_GetAuditDigestSigned (BIT15)\r
1547#define TPM_KEY_DELEGATE_Sign (BIT14)\r
1548#define TPM_KEY_DELEGATE_CertifyKey2 (BIT13)\r
1549#define TPM_KEY_DELEGATE_CertifyKey (BIT12)\r
1550#define TPM_KEY_DELEGATE_CreateWrapKey (BIT11)\r
1551#define TPM_KEY_DELEGATE_CMK_CreateBlob (BIT10)\r
1552#define TPM_KEY_DELEGATE_CreateMigrationBlob (BIT9)\r
1553#define TPM_KEY_DELEGATE_ConvertMigrationBlob (BIT8)\r
1554#define TPM_KEY_DELEGATE_CreateKeyDelegation (BIT7)\r
1555#define TPM_KEY_DELEGATE_ChangeAuth (BIT6)\r
1556#define TPM_KEY_DELEGATE_GetPubKey (BIT5)\r
1557#define TPM_KEY_DELEGATE_UnBind (BIT4)\r
1558#define TPM_KEY_DELEGATE_Quote (BIT3)\r
1559#define TPM_KEY_DELEGATE_Unseal (BIT2)\r
1560#define TPM_KEY_DELEGATE_Seal (BIT1)\r
1561#define TPM_KEY_DELEGATE_LoadKey (BIT0)\r
1562\r
1563//\r
1564// Part 2, section 20.3: TPM_FAMILY_FLAGS\r
1565//\r
1566#define TPM_DELEGATE_ADMIN_LOCK (BIT1)\r
1567#define TPM_FAMFLAG_ENABLE (BIT0)\r
1568\r
1569//\r
1570// Part 2, section 20.4: TPM_FAMILY_LABEL\r
1571//\r
1572typedef struct tdTPM_FAMILY_LABEL {\r
1573 UINT8 label;\r
267669ba
LG
1574} TPM_FAMILY_LABEL;\r
1575\r
4135253b 1576//\r
1577// Part 2, section 20.5: TPM_FAMILY_TABLE_ENTRY\r
1578//\r
1579typedef struct tdTPM_FAMILY_TABLE_ENTRY {\r
1580 TPM_STRUCTURE_TAG tag;\r
1581 TPM_FAMILY_LABEL label;\r
1582 TPM_FAMILY_ID familyID;\r
1583 TPM_FAMILY_VERIFICATION verificationCount;\r
1584 TPM_FAMILY_FLAGS flags;\r
267669ba
LG
1585} TPM_FAMILY_TABLE_ENTRY;\r
1586\r
4135253b 1587//\r
1588// Part 2, section 20.6: TPM_FAMILY_TABLE\r
1589//\r
1590#define TPM_NUM_FAMILY_TABLE_ENTRY_MIN 8\r
267669ba 1591\r
4135253b 1592typedef struct tdTPM_FAMILY_TABLE{\r
1593 TPM_FAMILY_TABLE_ENTRY famTableRow[TPM_NUM_FAMILY_TABLE_ENTRY_MIN];\r
1594} TPM_FAMILY_TABLE;\r
267669ba 1595\r
4135253b 1596//\r
1597// Part 2, section 20.7: TPM_DELEGATE_LABEL\r
1598//\r
1599typedef struct tdTPM_DELEGATE_LABEL {\r
1600 UINT8 label;\r
267669ba
LG
1601} TPM_DELEGATE_LABEL;\r
1602\r
4135253b 1603//\r
1604// Part 2, section 20.8: TPM_DELEGATE_PUBLIC\r
1605//\r
1606typedef struct tdTPM_DELEGATE_PUBLIC {\r
1607 TPM_STRUCTURE_TAG tag;\r
1608 TPM_DELEGATE_LABEL label;\r
1609 TPM_PCR_INFO_SHORT pcrInfo;\r
1610 TPM_DELEGATIONS permissions;\r
1611 TPM_FAMILY_ID familyID;\r
1612 TPM_FAMILY_VERIFICATION verificationCount;\r
267669ba
LG
1613} TPM_DELEGATE_PUBLIC;\r
1614\r
4135253b 1615//\r
1616// Part 2, section 20.9: TPM_DELEGATE_TABLE_ROW\r
1617//\r
1618typedef struct tdTPM_DELEGATE_TABLE_ROW {\r
1619 TPM_STRUCTURE_TAG tag;\r
1620 TPM_DELEGATE_PUBLIC pub;\r
1621 TPM_SECRET authValue;\r
267669ba
LG
1622} TPM_DELEGATE_TABLE_ROW;\r
1623\r
4135253b 1624//\r
1625// Part 2, section 20.10: TPM_DELEGATE_TABLE\r
1626//\r
267669ba 1627#define TPM_NUM_DELEGATE_TABLE_ENTRY_MIN 2\r
4135253b 1628\r
1629typedef struct tdTPM_DELEGATE_TABLE{\r
1630 TPM_DELEGATE_TABLE_ROW delRow[TPM_NUM_DELEGATE_TABLE_ENTRY_MIN];\r
1631} TPM_DELEGATE_TABLE;\r
1632\r
1633//\r
1634// Part 2, section 20.11: TPM_DELEGATE_SENSITIVE\r
1635//\r
1636typedef struct tdTPM_DELEGATE_SENSITIVE {\r
1637 TPM_STRUCTURE_TAG tag;\r
1638 TPM_SECRET authValue;\r
267669ba
LG
1639} TPM_DELEGATE_SENSITIVE;\r
1640\r
4135253b 1641//\r
1642// Part 2, section 20.12: TPM_DELEGATE_OWNER_BLOB\r
1643//\r
1644typedef struct tdTPM_DELEGATE_OWNER_BLOB {\r
1645 TPM_STRUCTURE_TAG tag;\r
1646 TPM_DELEGATE_PUBLIC pub;\r
1647 TPM_DIGEST integrityDigest;\r
1648 UINT32 additionalSize;\r
1649 UINT8 *additionalArea;\r
1650 UINT32 sensitiveSize;\r
1651 UINT8 *sensitiveArea;\r
267669ba
LG
1652} TPM_DELEGATE_OWNER_BLOB;\r
1653\r
4135253b 1654//\r
1655// Part 2, section 20.13: TTPM_DELEGATE_KEY_BLOB\r
1656//\r
1657typedef struct tdTPM_DELEGATE_KEY_BLOB {\r
1658 TPM_STRUCTURE_TAG tag;\r
1659 TPM_DELEGATE_PUBLIC pub;\r
1660 TPM_DIGEST integrityDigest;\r
1661 TPM_DIGEST pubKeyDigest;\r
1662 UINT32 additionalSize;\r
1663 UINT8 *additionalArea;\r
1664 UINT32 sensitiveSize;\r
1665 UINT8 *sensitiveArea;\r
267669ba
LG
1666} TPM_DELEGATE_KEY_BLOB;\r
1667\r
4135253b 1668//\r
1669// Part 2, section 20.14: TPM_FAMILY_OPERATION Values\r
1670//\r
1671#define TPM_FAMILY_CREATE ((UINT32)0x00000001)\r
1672#define TPM_FAMILY_ENABLE ((UINT32)0x00000002)\r
1673#define TPM_FAMILY_ADMIN ((UINT32)0x00000003)\r
1674#define TPM_FAMILY_INVALIDATE ((UINT32)0x00000004)\r
1675\r
267669ba
LG
1676//\r
1677// Part 2, section 21.1: TPM_CAPABILITY_AREA for GetCapability\r
1678//\r
1679#define TPM_CAP_ORD ((TPM_CAPABILITY_AREA) 0x00000001)\r
1680#define TPM_CAP_ALG ((TPM_CAPABILITY_AREA) 0x00000002)\r
1681#define TPM_CAP_PID ((TPM_CAPABILITY_AREA) 0x00000003)\r
1682#define TPM_CAP_FLAG ((TPM_CAPABILITY_AREA) 0x00000004)\r
1683#define TPM_CAP_PROPERTY ((TPM_CAPABILITY_AREA) 0x00000005)\r
1684#define TPM_CAP_VERSION ((TPM_CAPABILITY_AREA) 0x00000006)\r
1685#define TPM_CAP_KEY_HANDLE ((TPM_CAPABILITY_AREA) 0x00000007)\r
1686#define TPM_CAP_CHECK_LOADED ((TPM_CAPABILITY_AREA) 0x00000008)\r
1687#define TPM_CAP_SYM_MODE ((TPM_CAPABILITY_AREA) 0x00000009)\r
1688#define TPM_CAP_KEY_STATUS ((TPM_CAPABILITY_AREA) 0x0000000C)\r
1689#define TPM_CAP_NV_LIST ((TPM_CAPABILITY_AREA) 0x0000000D)\r
1690#define TPM_CAP_MFR ((TPM_CAPABILITY_AREA) 0x00000010)\r
1691#define TPM_CAP_NV_INDEX ((TPM_CAPABILITY_AREA) 0x00000011)\r
1692#define TPM_CAP_TRANS_ALG ((TPM_CAPABILITY_AREA) 0x00000012)\r
1693#define TPM_CAP_HANDLE ((TPM_CAPABILITY_AREA) 0x00000014)\r
1694#define TPM_CAP_TRANS_ES ((TPM_CAPABILITY_AREA) 0x00000015)\r
1695#define TPM_CAP_AUTH_ENCRYPT ((TPM_CAPABILITY_AREA) 0x00000017)\r
1696#define TPM_CAP_SELECT_SIZE ((TPM_CAPABILITY_AREA) 0x00000018)\r
1697#define TPM_CAP_VERSION_VAL ((TPM_CAPABILITY_AREA) 0x0000001A)\r
1698\r
1699#define TPM_CAP_FLAG_PERMANENT ((TPM_CAPABILITY_AREA) 0x00000108)\r
1700#define TPM_CAP_FLAG_VOLATILE ((TPM_CAPABILITY_AREA) 0x00000109)\r
1701\r
1702//\r
1703// Part 2, section 21.2: CAP_PROPERTY Subcap values for GetCapability\r
1704//\r
1705#define TPM_CAP_PROP_PCR ((TPM_CAPABILITY_AREA) 0x00000101)\r
1706#define TPM_CAP_PROP_DIR ((TPM_CAPABILITY_AREA) 0x00000102)\r
1707#define TPM_CAP_PROP_MANUFACTURER ((TPM_CAPABILITY_AREA) 0x00000103)\r
1708#define TPM_CAP_PROP_KEYS ((TPM_CAPABILITY_AREA) 0x00000104)\r
1709#define TPM_CAP_PROP_MIN_COUNTER ((TPM_CAPABILITY_AREA) 0x00000107)\r
1710#define TPM_CAP_PROP_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010A)\r
1711#define TPM_CAP_PROP_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010B)\r
1712#define TPM_CAP_PROP_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010C)\r
1713#define TPM_CAP_PROP_MAX_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010D)\r
1714#define TPM_CAP_PROP_MAX_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010E)\r
1715#define TPM_CAP_PROP_MAX_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010F)\r
1716#define TPM_CAP_PROP_MAX_KEYS ((TPM_CAPABILITY_AREA) 0x00000110)\r
1717#define TPM_CAP_PROP_OWNER ((TPM_CAPABILITY_AREA) 0x00000111)\r
1718#define TPM_CAP_PROP_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000112)\r
1719#define TPM_CAP_PROP_MAX_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000113)\r
1720#define TPM_CAP_PROP_FAMILYROWS ((TPM_CAPABILITY_AREA) 0x00000114)\r
1721#define TPM_CAP_PROP_TIS_TIMEOUT ((TPM_CAPABILITY_AREA) 0x00000115)\r
1722#define TPM_CAP_PROP_STARTUP_EFFECT ((TPM_CAPABILITY_AREA) 0x00000116)\r
1723#define TPM_CAP_PROP_DELEGATE_ROW ((TPM_CAPABILITY_AREA) 0x00000117)\r
1724#define TPM_CAP_PROP_DAA_MAX ((TPM_CAPABILITY_AREA) 0x00000119)\r
1725#define CAP_PROP_SESSION_DAA ((TPM_CAPABILITY_AREA) 0x0000011A)\r
1726#define TPM_CAP_PROP_CONTEXT_DIST ((TPM_CAPABILITY_AREA) 0x0000011B)\r
1727#define TPM_CAP_PROP_DAA_INTERRUPT ((TPM_CAPABILITY_AREA) 0x0000011C)\r
1728#define TPM_CAP_PROP_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011D)\r
1729#define TPM_CAP_PROP_MAX_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011E)\r
1730#define TPM_CAP_PROP_CMK_RESTRICTION ((TPM_CAPABILITY_AREA) 0x0000011F)\r
1731#define TPM_CAP_PROP_DURATION ((TPM_CAPABILITY_AREA) 0x00000120)\r
1732#define TPM_CAP_PROP_ACTIVE_COUNTER ((TPM_CAPABILITY_AREA) 0x00000122)\r
1733#define TPM_CAP_PROP_MAX_NV_AVAILABLE ((TPM_CAPABILITY_AREA) 0x00000123)\r
1734#define TPM_CAP_PROP_INPUT_BUFFER ((TPM_CAPABILITY_AREA) 0x00000124)\r
1735\r
1736//\r
1737// Part 2, section 21.6: TPM_CAP_VERSION_INFO\r
1738// [size_is(vendorSpecificSize)] BYTE* vendorSpecific;\r
1739//\r
1740typedef struct tdTPM_CAP_VERSION_INFO {\r
1741 TPM_STRUCTURE_TAG tag;\r
1742 TPM_VERSION version;\r
1743 UINT16 specLevel;\r
1744 UINT8 errataRev;\r
1745 UINT8 tpmVendorID[4];\r
1746 UINT16 vendorSpecificSize;\r
1747 UINT8 *vendorSpecific;\r
1748} TPM_CAP_VERSION_INFO;\r
1749\r
1750//\r
1751// Part 2, section 22: DAA Structures\r
1752//\r
1753\r
4135253b 1754//\r
1755// Part 2, section 22.1: Size definitions\r
1756//\r
267669ba
LG
1757#define TPM_DAA_SIZE_r0 (43)\r
1758#define TPM_DAA_SIZE_r1 (43)\r
1759#define TPM_DAA_SIZE_r2 (128)\r
1760#define TPM_DAA_SIZE_r3 (168)\r
1761#define TPM_DAA_SIZE_r4 (219)\r
1762#define TPM_DAA_SIZE_NT (20)\r
1763#define TPM_DAA_SIZE_v0 (128)\r
1764#define TPM_DAA_SIZE_v1 (192)\r
1765#define TPM_DAA_SIZE_NE (256)\r
1766#define TPM_DAA_SIZE_w (256)\r
1767#define TPM_DAA_SIZE_issuerModulus (256)\r
4135253b 1768//\r
1769// Part 2, section 22.2: Constant definitions\r
1770//\r
267669ba
LG
1771#define TPM_DAA_power0 (104)\r
1772#define TPM_DAA_power1 (1024)\r
1773\r
4135253b 1774//\r
1775// Part 2, section 22.3: TPM_DAA_ISSUER\r
1776//\r
1777typedef struct tdTPM_DAA_ISSUER {\r
1778 TPM_STRUCTURE_TAG tag;\r
1779 TPM_DIGEST DAA_digest_R0;\r
1780 TPM_DIGEST DAA_digest_R1;\r
1781 TPM_DIGEST DAA_digest_S0;\r
1782 TPM_DIGEST DAA_digest_S1;\r
1783 TPM_DIGEST DAA_digest_n;\r
1784 TPM_DIGEST DAA_digest_gamma;\r
1785 UINT8 DAA_generic_q[26];\r
267669ba
LG
1786} TPM_DAA_ISSUER;\r
1787\r
4135253b 1788//\r
1789// Part 2, section 22.4: TPM_DAA_TPM\r
1790//\r
1791typedef struct tdTPM_DAA_TPM {\r
1792 TPM_STRUCTURE_TAG tag;\r
1793 TPM_DIGEST DAA_digestIssuer;\r
1794 TPM_DIGEST DAA_digest_v0;\r
1795 TPM_DIGEST DAA_digest_v1;\r
1796 TPM_DIGEST DAA_rekey;\r
1797 UINT32 DAA_count;\r
267669ba
LG
1798} TPM_DAA_TPM;\r
1799\r
4135253b 1800//\r
1801// Part 2, section 22.5: TPM_DAA_CONTEXT\r
1802//\r
1803typedef struct tdTPM_DAA_CONTEXT {\r
1804 TPM_STRUCTURE_TAG tag;\r
1805 TPM_DIGEST DAA_digestContext;\r
1806 TPM_DIGEST DAA_digest;\r
1807 TPM_DAA_CONTEXT_SEED DAA_contextSeed;\r
1808 UINT8 DAA_scratch[256];\r
1809 UINT8 DAA_stage;\r
267669ba
LG
1810} TPM_DAA_CONTEXT;\r
1811\r
4135253b 1812//\r
1813// Part 2, section 22.6: TPM_DAA_JOINDATA\r
1814//\r
1815typedef struct tdTPM_DAA_JOINDATA {\r
1816 UINT8 DAA_join_u0[128];\r
1817 UINT8 DAA_join_u1[138];\r
1818 TPM_DIGEST DAA_digest_n0;\r
267669ba
LG
1819} TPM_DAA_JOINDATA;\r
1820\r
4135253b 1821//\r
1822// Part 2, section 22.8: TPM_DAA_BLOB\r
1823//\r
1824typedef struct tdTPM_DAA_BLOB {\r
1825 TPM_STRUCTURE_TAG tag;\r
1826 TPM_RESOURCE_TYPE resourceType;\r
1827 UINT8 label[16];\r
1828 TPM_DIGEST blobIntegrity;\r
1829 UINT32 additionalSize;\r
1830 UINT8 *additionalData;\r
1831 UINT32 sensitiveSize;\r
1832 UINT8 *sensitiveData;\r
267669ba
LG
1833} TPM_DAA_BLOB;\r
1834\r
4135253b 1835//\r
1836// Part 2, section 22.9: TPM_DAA_SENSITIVE\r
1837//\r
1838typedef struct tdTPM_DAA_SENSITIVE {\r
1839 TPM_STRUCTURE_TAG tag;\r
1840 UINT32 internalSize;\r
1841 UINT8 *internalData;\r
267669ba
LG
1842} TPM_DAA_SENSITIVE;\r
1843\r
1844\r
1845//\r
1846// Part 2, section 23: Redirection\r
1847//\r
1848\r
4135253b 1849//\r
1850// Part 2 section 23.1: TPM_REDIR_COMMAND\r
1851// This section defines exactly one value but does not\r
267669ba
LG
1852// give it a name. The definition of TPM_SetRedirection in Part3\r
1853// refers to exactly one name but does not give its value. We join\r
1854// them here.\r
4135253b 1855//\r
267669ba
LG
1856#define TPM_REDIR_GPIO (0x00000001)\r
1857\r
1858//\r
4135253b 1859// TPM Command & Response Headers defined in Part 3\r
267669ba
LG
1860//\r
1861typedef struct tdTPM_RQU_COMMAND_HDR {\r
1862 TPM_STRUCTURE_TAG tag;\r
1863 UINT32 paramSize;\r
1864 TPM_COMMAND_CODE ordinal;\r
1865} TPM_RQU_COMMAND_HDR;\r
1866\r
1867typedef struct tdTPM_RSP_COMMAND_HDR {\r
1868 TPM_STRUCTURE_TAG tag;\r
1869 UINT32 paramSize;\r
1870 TPM_RESULT returnCode;\r
1871} TPM_RSP_COMMAND_HDR;\r
1872\r
a04ad3f0 1873#pragma pack ()\r
267669ba 1874\r
4135253b 1875#endif\r