]> git.proxmox.com Git - mirror_edk2.git/blame - MdePkg/Include/IndustryStandard/Tpm12.h
MdePkg: Clean up source files
[mirror_edk2.git] / MdePkg / Include / IndustryStandard / Tpm12.h
CommitLineData
9095d37b 1/** @file\r
1919913f 2 TPM Specification data structures (TCG TPM Specification Version 1.2 Revision 103)\r
267669ba
LG
3 See http://trustedcomputinggroup.org for latest specification updates\r
4\r
9095d37b
LG
5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>\r
6 This program and the accompanying materials\r
7 are licensed and made available under the terms and conditions of the BSD License\r
8 which accompanies this distribution. The full text of the license may be found at\r
9 http://opensource.org/licenses/bsd-license.php\r
8069d49e 10\r
9095d37b
LG
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
8069d49e
LG
13**/\r
14\r
267669ba
LG
15\r
16#ifndef _TPM12_H_\r
17#define _TPM12_H_\r
18\r
ec8432e5 19///\r
20/// The start of TPM return codes\r
21///\r
6a8fb8ba 22#define TPM_BASE 0\r
267669ba
LG
23\r
24//\r
427987f5 25// All structures MUST be packed on a byte boundary.\r
267669ba 26//\r
766f4bc1 27\r
a04ad3f0 28#pragma pack (1)\r
267669ba
LG
29\r
30//\r
4135253b 31// Part 2, section 2.2.3: Helper redefinitions\r
267669ba 32//\r
cc078d72 33///\r
34/// Indicates the conditions where it is required that authorization be presented\r
35///\r
267669ba 36typedef UINT8 TPM_AUTH_DATA_USAGE;\r
cc078d72 37///\r
38/// The information as to what the payload is in an encrypted structure\r
39///\r
267669ba 40typedef UINT8 TPM_PAYLOAD_TYPE;\r
cc078d72 41///\r
42/// The version info breakdown\r
43///\r
267669ba 44typedef UINT8 TPM_VERSION_BYTE;\r
cc078d72 45///\r
1919913f 46/// The state of the dictionary attack mitigation logic\r
47///\r
48typedef UINT8 TPM_DA_STATE;\r
49///\r
cc078d72 50/// The request or response authorization type\r
51///\r
267669ba 52typedef UINT16 TPM_TAG;\r
cc078d72 53///\r
54/// The protocol in use\r
55///\r
267669ba 56typedef UINT16 TPM_PROTOCOL_ID;\r
cc078d72 57///\r
58/// Indicates the start state\r
59///\r
267669ba 60typedef UINT16 TPM_STARTUP_TYPE;\r
cc078d72 61///\r
62/// The definition of the encryption scheme\r
63///\r
267669ba 64typedef UINT16 TPM_ENC_SCHEME;\r
cc078d72 65///\r
66/// The definition of the signature scheme\r
67///\r
267669ba 68typedef UINT16 TPM_SIG_SCHEME;\r
cc078d72 69///\r
70/// The definition of the migration scheme\r
71///\r
267669ba 72typedef UINT16 TPM_MIGRATE_SCHEME;\r
cc078d72 73///\r
74/// Sets the state of the physical presence mechanism\r
75///\r
267669ba 76typedef UINT16 TPM_PHYSICAL_PRESENCE;\r
cc078d72 77///\r
78/// Indicates the types of entity that are supported by the TPM\r
79///\r
267669ba 80typedef UINT16 TPM_ENTITY_TYPE;\r
cc078d72 81///\r
82/// Indicates the permitted usage of the key\r
83///\r
267669ba 84typedef UINT16 TPM_KEY_USAGE;\r
cc078d72 85///\r
86/// The type of asymmetric encrypted structure in use by the endorsement key\r
87///\r
267669ba 88typedef UINT16 TPM_EK_TYPE;\r
cc078d72 89///\r
90/// The tag for the structure\r
91///\r
267669ba 92typedef UINT16 TPM_STRUCTURE_TAG;\r
cc078d72 93///\r
94/// The platform specific spec to which the information relates to\r
95///\r
267669ba 96typedef UINT16 TPM_PLATFORM_SPECIFIC;\r
cc078d72 97///\r
98/// The command ordinal\r
99///\r
267669ba 100typedef UINT32 TPM_COMMAND_CODE;\r
cc078d72 101///\r
102/// Identifies a TPM capability area\r
103///\r
267669ba 104typedef UINT32 TPM_CAPABILITY_AREA;\r
cc078d72 105///\r
106/// Indicates information regarding a key\r
107///\r
267669ba 108typedef UINT32 TPM_KEY_FLAGS;\r
cc078d72 109///\r
110/// Indicates the type of algorithm\r
111///\r
267669ba 112typedef UINT32 TPM_ALGORITHM_ID;\r
cc078d72 113///\r
114/// The locality modifier\r
115///\r
267669ba 116typedef UINT32 TPM_MODIFIER_INDICATOR;\r
cc078d72 117///\r
118/// The actual number of a counter\r
119///\r
267669ba 120typedef UINT32 TPM_ACTUAL_COUNT;\r
cc078d72 121///\r
122/// Attributes that define what options are in use for a transport session\r
123///\r
267669ba 124typedef UINT32 TPM_TRANSPORT_ATTRIBUTES;\r
cc078d72 125///\r
126/// Handle to an authorization session\r
127///\r
267669ba 128typedef UINT32 TPM_AUTHHANDLE;\r
cc078d72 129///\r
130/// Index to a DIR register\r
131///\r
267669ba 132typedef UINT32 TPM_DIRINDEX;\r
cc078d72 133///\r
134/// The area where a key is held assigned by the TPM\r
135///\r
267669ba 136typedef UINT32 TPM_KEY_HANDLE;\r
cc078d72 137///\r
138/// Index to a PCR register\r
139///\r
267669ba 140typedef UINT32 TPM_PCRINDEX;\r
cc078d72 141///\r
142/// The return code from a function\r
143///\r
267669ba 144typedef UINT32 TPM_RESULT;\r
cc078d72 145///\r
146/// The types of resources that a TPM may have using internal resources\r
147///\r
267669ba 148typedef UINT32 TPM_RESOURCE_TYPE;\r
cc078d72 149///\r
150/// Allows for controlling of the key when loaded and how to handle TPM_Startup issues\r
151///\r
267669ba 152typedef UINT32 TPM_KEY_CONTROL;\r
cc078d72 153///\r
154/// The index into the NV storage area\r
155///\r
267669ba 156typedef UINT32 TPM_NV_INDEX;\r
cc078d72 157///\r
9095d37b
LG
158/// The family ID. Family IDs are automatically assigned a sequence number by the TPM.\r
159/// A trusted process can set the FamilyID value in an individual row to NULL, which\r
cc078d72 160/// invalidates that row. The family ID resets to NULL on each change of TPM Owner.\r
161///\r
267669ba 162typedef UINT32 TPM_FAMILY_ID;\r
cc078d72 163///\r
164/// IA value used as a label for the most recent verification of this family. Set to zero when not in use.\r
165///\r
267669ba 166typedef UINT32 TPM_FAMILY_VERIFICATION;\r
cc078d72 167///\r
168/// How the TPM handles var\r
169///\r
267669ba 170typedef UINT32 TPM_STARTUP_EFFECTS;\r
cc078d72 171///\r
172/// The mode of a symmetric encryption\r
173///\r
267669ba 174typedef UINT32 TPM_SYM_MODE;\r
cc078d72 175///\r
176/// The family flags\r
177///\r
267669ba 178typedef UINT32 TPM_FAMILY_FLAGS;\r
cc078d72 179///\r
180/// The index value for the delegate NV table\r
181///\r
267669ba 182typedef UINT32 TPM_DELEGATE_INDEX;\r
cc078d72 183///\r
184/// The restrictions placed on delegation of CMK commands\r
185///\r
267669ba 186typedef UINT32 TPM_CMK_DELEGATE;\r
cc078d72 187///\r
188/// The ID value of a monotonic counter\r
189///\r
267669ba 190typedef UINT32 TPM_COUNT_ID;\r
cc078d72 191///\r
192/// A command to execute\r
193///\r
267669ba 194typedef UINT32 TPM_REDIT_COMMAND;\r
cc078d72 195///\r
196/// A transport session handle\r
197///\r
267669ba 198typedef UINT32 TPM_TRANSHANDLE;\r
cc078d72 199///\r
200/// A generic handle could be key, transport etc\r
201///\r
267669ba 202typedef UINT32 TPM_HANDLE;\r
cc078d72 203///\r
204/// What operation is happening\r
205///\r
267669ba
LG
206typedef UINT32 TPM_FAMILY_OPERATION;\r
207\r
208//\r
209// Part 2, section 2.2.4: Vendor specific\r
210// The following defines allow for the quick specification of a\r
211// vendor specific item.\r
212//\r
213#define TPM_Vendor_Specific32 ((UINT32) 0x00000400)\r
214#define TPM_Vendor_Specific8 ((UINT8) 0x80)\r
215\r
216//\r
4135253b 217// Part 2, section 3.1: TPM_STRUCTURE_TAG\r
267669ba
LG
218//\r
219#define TPM_TAG_CONTEXTBLOB ((TPM_STRUCTURE_TAG) 0x0001)\r
220#define TPM_TAG_CONTEXT_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0002)\r
221#define TPM_TAG_CONTEXTPOINTER ((TPM_STRUCTURE_TAG) 0x0003)\r
222#define TPM_TAG_CONTEXTLIST ((TPM_STRUCTURE_TAG) 0x0004)\r
223#define TPM_TAG_SIGNINFO ((TPM_STRUCTURE_TAG) 0x0005)\r
224#define TPM_TAG_PCR_INFO_LONG ((TPM_STRUCTURE_TAG) 0x0006)\r
225#define TPM_TAG_PERSISTENT_FLAGS ((TPM_STRUCTURE_TAG) 0x0007)\r
226#define TPM_TAG_VOLATILE_FLAGS ((TPM_STRUCTURE_TAG) 0x0008)\r
227#define TPM_TAG_PERSISTENT_DATA ((TPM_STRUCTURE_TAG) 0x0009)\r
228#define TPM_TAG_VOLATILE_DATA ((TPM_STRUCTURE_TAG) 0x000A)\r
229#define TPM_TAG_SV_DATA ((TPM_STRUCTURE_TAG) 0x000B)\r
230#define TPM_TAG_EK_BLOB ((TPM_STRUCTURE_TAG) 0x000C)\r
231#define TPM_TAG_EK_BLOB_AUTH ((TPM_STRUCTURE_TAG) 0x000D)\r
232#define TPM_TAG_COUNTER_VALUE ((TPM_STRUCTURE_TAG) 0x000E)\r
233#define TPM_TAG_TRANSPORT_INTERNAL ((TPM_STRUCTURE_TAG) 0x000F)\r
234#define TPM_TAG_TRANSPORT_LOG_IN ((TPM_STRUCTURE_TAG) 0x0010)\r
235#define TPM_TAG_TRANSPORT_LOG_OUT ((TPM_STRUCTURE_TAG) 0x0011)\r
236#define TPM_TAG_AUDIT_EVENT_IN ((TPM_STRUCTURE_TAG) 0x0012)\r
237#define TPM_TAG_AUDIT_EVENT_OUT ((TPM_STRUCTURE_TAG) 0x0013)\r
238#define TPM_TAG_CURRENT_TICKS ((TPM_STRUCTURE_TAG) 0x0014)\r
239#define TPM_TAG_KEY ((TPM_STRUCTURE_TAG) 0x0015)\r
240#define TPM_TAG_STORED_DATA12 ((TPM_STRUCTURE_TAG) 0x0016)\r
241#define TPM_TAG_NV_ATTRIBUTES ((TPM_STRUCTURE_TAG) 0x0017)\r
242#define TPM_TAG_NV_DATA_PUBLIC ((TPM_STRUCTURE_TAG) 0x0018)\r
243#define TPM_TAG_NV_DATA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0019)\r
244#define TPM_TAG_DELEGATIONS ((TPM_STRUCTURE_TAG) 0x001A)\r
245#define TPM_TAG_DELEGATE_PUBLIC ((TPM_STRUCTURE_TAG) 0x001B)\r
246#define TPM_TAG_DELEGATE_TABLE_ROW ((TPM_STRUCTURE_TAG) 0x001C)\r
247#define TPM_TAG_TRANSPORT_AUTH ((TPM_STRUCTURE_TAG) 0x001D)\r
248#define TPM_TAG_TRANSPORT_PUBLIC ((TPM_STRUCTURE_TAG) 0x001E)\r
249#define TPM_TAG_PERMANENT_FLAGS ((TPM_STRUCTURE_TAG) 0x001F)\r
250#define TPM_TAG_STCLEAR_FLAGS ((TPM_STRUCTURE_TAG) 0x0020)\r
251#define TPM_TAG_STANY_FLAGS ((TPM_STRUCTURE_TAG) 0x0021)\r
252#define TPM_TAG_PERMANENT_DATA ((TPM_STRUCTURE_TAG) 0x0022)\r
253#define TPM_TAG_STCLEAR_DATA ((TPM_STRUCTURE_TAG) 0x0023)\r
254#define TPM_TAG_STANY_DATA ((TPM_STRUCTURE_TAG) 0x0024)\r
255#define TPM_TAG_FAMILY_TABLE_ENTRY ((TPM_STRUCTURE_TAG) 0x0025)\r
256#define TPM_TAG_DELEGATE_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0026)\r
257#define TPM_TAG_DELG_KEY_BLOB ((TPM_STRUCTURE_TAG) 0x0027)\r
258#define TPM_TAG_KEY12 ((TPM_STRUCTURE_TAG) 0x0028)\r
259#define TPM_TAG_CERTIFY_INFO2 ((TPM_STRUCTURE_TAG) 0x0029)\r
260#define TPM_TAG_DELEGATE_OWNER_BLOB ((TPM_STRUCTURE_TAG) 0x002A)\r
261#define TPM_TAG_EK_BLOB_ACTIVATE ((TPM_STRUCTURE_TAG) 0x002B)\r
262#define TPM_TAG_DAA_BLOB ((TPM_STRUCTURE_TAG) 0x002C)\r
263#define TPM_TAG_DAA_CONTEXT ((TPM_STRUCTURE_TAG) 0x002D)\r
264#define TPM_TAG_DAA_ENFORCE ((TPM_STRUCTURE_TAG) 0x002E)\r
265#define TPM_TAG_DAA_ISSUER ((TPM_STRUCTURE_TAG) 0x002F)\r
266#define TPM_TAG_CAP_VERSION_INFO ((TPM_STRUCTURE_TAG) 0x0030)\r
267#define TPM_TAG_DAA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0031)\r
268#define TPM_TAG_DAA_TPM ((TPM_STRUCTURE_TAG) 0x0032)\r
269#define TPM_TAG_CMK_MIGAUTH ((TPM_STRUCTURE_TAG) 0x0033)\r
270#define TPM_TAG_CMK_SIGTICKET ((TPM_STRUCTURE_TAG) 0x0034)\r
271#define TPM_TAG_CMK_MA_APPROVAL ((TPM_STRUCTURE_TAG) 0x0035)\r
272#define TPM_TAG_QUOTE_INFO2 ((TPM_STRUCTURE_TAG) 0x0036)\r
1919913f 273#define TPM_TAG_DA_INFO ((TPM_STRUCTURE_TAG) 0x0037)\r
274#define TPM_TAG_DA_LIMITED ((TPM_STRUCTURE_TAG) 0x0038)\r
275#define TPM_TAG_DA_ACTION_TYPE ((TPM_STRUCTURE_TAG) 0x0039)\r
267669ba
LG
276\r
277//\r
278// Part 2, section 4: TPM Types\r
279//\r
280\r
281//\r
282// Part 2, section 4.1: TPM_RESOURCE_TYPE\r
283//\r
4135253b 284#define TPM_RT_KEY ((TPM_RESOURCE_TYPE) 0x00000001) ///< The handle is a key handle and is the result of a LoadKey type operation\r
285#define TPM_RT_AUTH ((TPM_RESOURCE_TYPE) 0x00000002) ///< The handle is an authorization handle. Auth handles come from TPM_OIAP, TPM_OSAP and TPM_DSAP\r
286#define TPM_RT_HASH ((TPM_RESOURCE_TYPE) 0x00000003) ///< Reserved for hashes\r
287#define TPM_RT_TRANS ((TPM_RESOURCE_TYPE) 0x00000004) ///< The handle is for a transport session. Transport handles come from TPM_EstablishTransport\r
288#define TPM_RT_CONTEXT ((TPM_RESOURCE_TYPE) 0x00000005) ///< Resource wrapped and held outside the TPM using the context save/restore commands\r
289#define TPM_RT_COUNTER ((TPM_RESOURCE_TYPE) 0x00000006) ///< Reserved for counters\r
290#define TPM_RT_DELEGATE ((TPM_RESOURCE_TYPE) 0x00000007) ///< The handle is for a delegate row. These are the internal rows held in NV storage by the TPM\r
291#define TPM_RT_DAA_TPM ((TPM_RESOURCE_TYPE) 0x00000008) ///< The value is a DAA TPM specific blob\r
292#define TPM_RT_DAA_V0 ((TPM_RESOURCE_TYPE) 0x00000009) ///< The value is a DAA V0 parameter\r
293#define TPM_RT_DAA_V1 ((TPM_RESOURCE_TYPE) 0x0000000A) ///< The value is a DAA V1 parameter\r
267669ba
LG
294\r
295//\r
296// Part 2, section 4.2: TPM_PAYLOAD_TYPE\r
297//\r
4135253b 298#define TPM_PT_ASYM ((TPM_PAYLOAD_TYPE) 0x01) ///< The entity is an asymmetric key\r
299#define TPM_PT_BIND ((TPM_PAYLOAD_TYPE) 0x02) ///< The entity is bound data\r
300#define TPM_PT_MIGRATE ((TPM_PAYLOAD_TYPE) 0x03) ///< The entity is a migration blob\r
301#define TPM_PT_MAINT ((TPM_PAYLOAD_TYPE) 0x04) ///< The entity is a maintenance blob\r
302#define TPM_PT_SEAL ((TPM_PAYLOAD_TYPE) 0x05) ///< The entity is sealed data\r
303#define TPM_PT_MIGRATE_RESTRICTED ((TPM_PAYLOAD_TYPE) 0x06) ///< The entity is a restricted-migration asymmetric key\r
304#define TPM_PT_MIGRATE_EXTERNAL ((TPM_PAYLOAD_TYPE) 0x07) ///< The entity is a external migratable key\r
305#define TPM_PT_CMK_MIGRATE ((TPM_PAYLOAD_TYPE) 0x08) ///< The entity is a CMK migratable blob\r
306#define TPM_PT_VENDOR_SPECIFIC ((TPM_PAYLOAD_TYPE) 0x80) ///< 0x80 - 0xFF Vendor specific payloads\r
307\r
308//\r
309// Part 2, section 4.3: TPM_ENTITY_TYPE\r
310//\r
311#define TPM_ET_KEYHANDLE ((UINT16) 0x0001) ///< The entity is a keyHandle or key\r
312#define TPM_ET_OWNER ((UINT16) 0x0002) ///< The entity is the TPM Owner\r
313#define TPM_ET_DATA ((UINT16) 0x0003) ///< The entity is some data\r
314#define TPM_ET_SRK ((UINT16) 0x0004) ///< The entity is the SRK\r
315#define TPM_ET_KEY ((UINT16) 0x0005) ///< The entity is a key or keyHandle\r
316#define TPM_ET_REVOKE ((UINT16) 0x0006) ///< The entity is the RevokeTrust value\r
317#define TPM_ET_DEL_OWNER_BLOB ((UINT16) 0x0007) ///< The entity is a delegate owner blob\r
318#define TPM_ET_DEL_ROW ((UINT16) 0x0008) ///< The entity is a delegate row\r
319#define TPM_ET_DEL_KEY_BLOB ((UINT16) 0x0009) ///< The entity is a delegate key blob\r
320#define TPM_ET_COUNTER ((UINT16) 0x000A) ///< The entity is a counter\r
321#define TPM_ET_NV ((UINT16) 0x000B) ///< The entity is a NV index\r
1919913f 322#define TPM_ET_OPERATOR ((UINT16) 0x000C) ///< The entity is the operator\r
4135253b 323#define TPM_ET_RESERVED_HANDLE ((UINT16) 0x0040) ///< Reserved. This value avoids collisions with the handle MSB setting.\r
267669ba
LG
324//\r
325// TPM_ENTITY_TYPE MSB Values: The MSB is used to indicate the ADIP encryption sheme when applicable\r
326//\r
4135253b 327#define TPM_ET_XOR ((UINT16) 0x0000) ///< ADIP encryption scheme: XOR\r
328#define TPM_ET_AES128 ((UINT16) 0x0006) ///< ADIP encryption scheme: AES 128 bits\r
267669ba
LG
329\r
330//\r
331// Part 2, section 4.4.1: Reserved Key Handles\r
332//\r
4135253b 333#define TPM_KH_SRK ((TPM_KEY_HANDLE) 0x40000000) ///< The handle points to the SRK\r
334#define TPM_KH_OWNER ((TPM_KEY_HANDLE) 0x40000001) ///< The handle points to the TPM Owner\r
335#define TPM_KH_REVOKE ((TPM_KEY_HANDLE) 0x40000002) ///< The handle points to the RevokeTrust value\r
336#define TPM_KH_TRANSPORT ((TPM_KEY_HANDLE) 0x40000003) ///< The handle points to the EstablishTransport static authorization\r
337#define TPM_KH_OPERATOR ((TPM_KEY_HANDLE) 0x40000004) ///< The handle points to the Operator auth\r
338#define TPM_KH_ADMIN ((TPM_KEY_HANDLE) 0x40000005) ///< The handle points to the delegation administration auth\r
339#define TPM_KH_EK ((TPM_KEY_HANDLE) 0x40000006) ///< The handle points to the PUBEK, only usable with TPM_OwnerReadInternalPub\r
267669ba
LG
340\r
341//\r
342// Part 2, section 4.5: TPM_STARTUP_TYPE\r
343//\r
4135253b 344#define TPM_ST_CLEAR ((TPM_STARTUP_TYPE) 0x0001) ///< The TPM is starting up from a clean state\r
345#define TPM_ST_STATE ((TPM_STARTUP_TYPE) 0x0002) ///< The TPM is starting up from a saved state\r
346#define TPM_ST_DEACTIVATED ((TPM_STARTUP_TYPE) 0x0003) ///< The TPM is to startup and set the deactivated flag to TRUE\r
267669ba
LG
347\r
348//\r
349// Part 2, section 4.6: TPM_STATUP_EFFECTS\r
350// The table makeup is still an open issue.\r
351//\r
352\r
353//\r
354// Part 2, section 4.7: TPM_PROTOCOL_ID\r
355//\r
4135253b 356#define TPM_PID_OIAP ((TPM_PROTOCOL_ID) 0x0001) ///< The OIAP protocol.\r
357#define TPM_PID_OSAP ((TPM_PROTOCOL_ID) 0x0002) ///< The OSAP protocol.\r
358#define TPM_PID_ADIP ((TPM_PROTOCOL_ID) 0x0003) ///< The ADIP protocol.\r
359#define TPM_PID_ADCP ((TPM_PROTOCOL_ID) 0x0004) ///< The ADCP protocol.\r
360#define TPM_PID_OWNER ((TPM_PROTOCOL_ID) 0x0005) ///< The protocol for taking ownership of a TPM.\r
361#define TPM_PID_DSAP ((TPM_PROTOCOL_ID) 0x0006) ///< The DSAP protocol\r
362#define TPM_PID_TRANSPORT ((TPM_PROTOCOL_ID) 0x0007) ///< The transport protocol\r
267669ba
LG
363\r
364//\r
365// Part 2, section 4.8: TPM_ALGORITHM_ID\r
366// The TPM MUST support the algorithms TPM_ALG_RSA, TPM_ALG_SHA, TPM_ALG_HMAC,\r
367// TPM_ALG_MGF1\r
368//\r
4135253b 369#define TPM_ALG_RSA ((TPM_ALGORITHM_ID) 0x00000001) ///< The RSA algorithm.\r
370#define TPM_ALG_DES ((TPM_ALGORITHM_ID) 0x00000002) ///< The DES algorithm\r
371#define TPM_ALG_3DES ((TPM_ALGORITHM_ID) 0x00000003) ///< The 3DES algorithm in EDE mode\r
372#define TPM_ALG_SHA ((TPM_ALGORITHM_ID) 0x00000004) ///< The SHA1 algorithm\r
373#define TPM_ALG_HMAC ((TPM_ALGORITHM_ID) 0x00000005) ///< The RFC 2104 HMAC algorithm\r
374#define TPM_ALG_AES128 ((TPM_ALGORITHM_ID) 0x00000006) ///< The AES algorithm, key size 128\r
375#define TPM_ALG_MGF1 ((TPM_ALGORITHM_ID) 0x00000007) ///< The XOR algorithm using MGF1 to create a string the size of the encrypted block\r
376#define TPM_ALG_AES192 ((TPM_ALGORITHM_ID) 0x00000008) ///< AES, key size 192\r
377#define TPM_ALG_AES256 ((TPM_ALGORITHM_ID) 0x00000009) ///< AES, key size 256\r
378#define TPM_ALG_XOR ((TPM_ALGORITHM_ID) 0x0000000A) ///< XOR using the rolling nonces\r
267669ba
LG
379\r
380//\r
381// Part 2, section 4.9: TPM_PHYSICAL_PRESENCE\r
382//\r
4135253b 383#define TPM_PHYSICAL_PRESENCE_HW_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0200) ///< Sets the physicalPresenceHWEnable to FALSE\r
384#define TPM_PHYSICAL_PRESENCE_CMD_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0100) ///< Sets the physicalPresenceCMDEnable to FALSE\r
385#define TPM_PHYSICAL_PRESENCE_LIFETIME_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0080) ///< Sets the physicalPresenceLifetimeLock to TRUE\r
386#define TPM_PHYSICAL_PRESENCE_HW_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0040) ///< Sets the physicalPresenceHWEnable to TRUE\r
387#define TPM_PHYSICAL_PRESENCE_CMD_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0020) ///< Sets the physicalPresenceCMDEnable to TRUE\r
388#define TPM_PHYSICAL_PRESENCE_NOTPRESENT ((TPM_PHYSICAL_PRESENCE) 0x0010) ///< Sets PhysicalPresence = FALSE\r
389#define TPM_PHYSICAL_PRESENCE_PRESENT ((TPM_PHYSICAL_PRESENCE) 0x0008) ///< Sets PhysicalPresence = TRUE\r
390#define TPM_PHYSICAL_PRESENCE_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0004) ///< Sets PhysicalPresenceLock = TRUE\r
267669ba
LG
391\r
392//\r
393// Part 2, section 4.10: TPM_MIGRATE_SCHEME\r
394//\r
4135253b 395#define TPM_MS_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0001) ///< A public key that can be used with all TPM migration commands other than 'ReWrap' mode.\r
396#define TPM_MS_REWRAP ((TPM_MIGRATE_SCHEME) 0x0002) ///< A public key that can be used for the ReWrap mode of TPM_CreateMigrationBlob.\r
397#define TPM_MS_MAINT ((TPM_MIGRATE_SCHEME) 0x0003) ///< A public key that can be used for the Maintenance commands\r
398#define TPM_MS_RESTRICT_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0004) ///< The key is to be migrated to a Migration Authority.\r
399#define TPM_MS_RESTRICT_APPROVE_DOUBLE ((TPM_MIGRATE_SCHEME) 0x0005) ///< The key is to be migrated to an entity approved by a Migration Authority using double wrapping\r
267669ba
LG
400\r
401//\r
402// Part 2, section 4.11: TPM_EK_TYPE\r
403//\r
4135253b 404#define TPM_EK_TYPE_ACTIVATE ((TPM_EK_TYPE) 0x0001) ///< The blob MUST be TPM_EK_BLOB_ACTIVATE\r
405#define TPM_EK_TYPE_AUTH ((TPM_EK_TYPE) 0x0002) ///< The blob MUST be TPM_EK_BLOB_AUTH\r
267669ba
LG
406\r
407//\r
408// Part 2, section 4.12: TPM_PLATFORM_SPECIFIC\r
409//\r
4135253b 410#define TPM_PS_PC_11 ((TPM_PLATFORM_SPECIFIC) 0x0001) ///< PC Specific version 1.1\r
411#define TPM_PS_PC_12 ((TPM_PLATFORM_SPECIFIC) 0x0002) ///< PC Specific version 1.2\r
412#define TPM_PS_PDA_12 ((TPM_PLATFORM_SPECIFIC) 0x0003) ///< PDA Specific version 1.2\r
413#define TPM_PS_Server_12 ((TPM_PLATFORM_SPECIFIC) 0x0004) ///< Server Specific version 1.2\r
414#define TPM_PS_Mobile_12 ((TPM_PLATFORM_SPECIFIC) 0x0005) ///< Mobil Specific version 1.2\r
267669ba
LG
415\r
416//\r
417// Part 2, section 5: Basic Structures\r
418//\r
419\r
427987f5 420///\r
421/// Part 2, section 5.1: TPM_STRUCT_VER\r
422///\r
267669ba
LG
423typedef struct tdTPM_STRUCT_VER {\r
424 UINT8 major;\r
425 UINT8 minor;\r
426 UINT8 revMajor;\r
427 UINT8 revMinor;\r
428} TPM_STRUCT_VER;\r
429\r
427987f5 430///\r
431/// Part 2, section 5.3: TPM_VERSION\r
432///\r
267669ba
LG
433typedef struct tdTPM_VERSION {\r
434 TPM_VERSION_BYTE major;\r
435 TPM_VERSION_BYTE minor;\r
436 UINT8 revMajor;\r
437 UINT8 revMinor;\r
438} TPM_VERSION;\r
439\r
267669ba 440\r
9cf53f00 441#define TPM_SHA1_160_HASH_LEN 0x14\r
442#define TPM_SHA1BASED_NONCE_LEN TPM_SHA1_160_HASH_LEN\r
443\r
cc078d72 444///\r
445/// Part 2, section 5.4: TPM_DIGEST\r
446///\r
267669ba
LG
447typedef struct tdTPM_DIGEST{\r
448 UINT8 digest[TPM_SHA1_160_HASH_LEN];\r
449} TPM_DIGEST;\r
450\r
cc078d72 451///\r
452/// This SHALL be the digest of the chosen identityLabel and privacyCA for a new TPM identity\r
453///\r
4135253b 454typedef TPM_DIGEST TPM_CHOSENID_HASH;\r
cc078d72 455///\r
456/// This SHALL be the hash of a list of PCR indexes and PCR values that a key or data is bound to\r
457///\r
4135253b 458typedef TPM_DIGEST TPM_COMPOSITE_HASH;\r
cc078d72 459///\r
460/// This SHALL be the value of a DIR register\r
461///\r
4135253b 462typedef TPM_DIGEST TPM_DIRVALUE;\r
cc078d72 463\r
267669ba 464typedef TPM_DIGEST TPM_HMAC;\r
cc078d72 465///\r
466/// The value inside of the PCR\r
467///\r
4135253b 468typedef TPM_DIGEST TPM_PCRVALUE;\r
cc078d72 469///\r
470/// This SHALL be the value of the current internal audit state\r
471///\r
4135253b 472typedef TPM_DIGEST TPM_AUDITDIGEST;\r
267669ba 473\r
427987f5 474///\r
475/// Part 2, section 5.5: TPM_NONCE\r
476///\r
267669ba
LG
477typedef struct tdTPM_NONCE{\r
478 UINT8 nonce[20];\r
479} TPM_NONCE;\r
480\r
1919913f 481///\r
482/// This SHALL be a random value generated by a TPM immediately after the EK is installed\r
483/// in that TPM, whenever an EK is installed in that TPM\r
484///\r
485typedef TPM_NONCE TPM_DAA_TPM_SEED;\r
486///\r
487/// This SHALL be a random value\r
488///\r
489typedef TPM_NONCE TPM_DAA_CONTEXT_SEED;\r
490\r
267669ba
LG
491//\r
492// Part 2, section 5.6: TPM_AUTHDATA\r
493//\r
cc078d72 494///\r
495/// The AuthData data is the information that is saved or passed to provide proof of ownership\r
496/// 296 of an entity\r
497///\r
267669ba 498typedef UINT8 tdTPM_AUTHDATA[20];\r
cc078d72 499\r
267669ba 500typedef tdTPM_AUTHDATA TPM_AUTHDATA;\r
cc078d72 501///\r
502/// A secret plaintext value used in the authorization process\r
503///\r
267669ba 504typedef TPM_AUTHDATA TPM_SECRET;\r
cc078d72 505///\r
506/// A ciphertext (encrypted) version of AuthData data. The encryption mechanism depends on the context\r
507///\r
267669ba
LG
508typedef TPM_AUTHDATA TPM_ENCAUTH;\r
509\r
427987f5 510///\r
511/// Part 2, section 5.7: TPM_KEY_HANDLE_LIST\r
512/// Size of handle is loaded * sizeof(TPM_KEY_HANDLE)\r
513///\r
267669ba
LG
514typedef struct tdTPM_KEY_HANDLE_LIST {\r
515 UINT16 loaded;\r
516 TPM_KEY_HANDLE handle[1];\r
517} TPM_KEY_HANDLE_LIST;\r
518\r
519//\r
520// Part 2, section 5.8: TPM_KEY_USAGE values\r
521//\r
4135253b 522///\r
523/// TPM_KEY_SIGNING SHALL indicate a signing key. The [private] key SHALL be\r
524/// used for signing operations, only. This means that it MUST be a leaf of the\r
525/// Protected Storage key hierarchy.\r
526///\r
267669ba 527#define TPM_KEY_SIGNING ((UINT16) 0x0010)\r
4135253b 528///\r
529/// TPM_KEY_STORAGE SHALL indicate a storage key. The key SHALL be used to wrap\r
530/// and unwrap other keys in the Protected Storage hierarchy\r
531///\r
267669ba 532#define TPM_KEY_STORAGE ((UINT16) 0x0011)\r
4135253b 533///\r
534/// TPM_KEY_IDENTITY SHALL indicate an identity key. The key SHALL be used for\r
535/// operations that require a TPM identity, only.\r
536///\r
267669ba 537#define TPM_KEY_IDENTITY ((UINT16) 0x0012)\r
4135253b 538///\r
539/// TPM_KEY_AUTHCHANGE SHALL indicate an ephemeral key that is in use during\r
540/// the ChangeAuthAsym process, only.\r
541///\r
267669ba 542#define TPM_KEY_AUTHCHANGE ((UINT16) 0x0013)\r
4135253b 543///\r
544/// TPM_KEY_BIND SHALL indicate a key that can be used for TPM_Bind and\r
545/// TPM_Unbind operations only.\r
546///\r
267669ba 547#define TPM_KEY_BIND ((UINT16) 0x0014)\r
4135253b 548///\r
549/// TPM_KEY_LEGACY SHALL indicate a key that can perform signing and binding\r
550/// operations. The key MAY be used for both signing and binding operations.\r
551/// The TPM_KEY_LEGACY key type is to allow for use by applications where both\r
552/// signing and encryption operations occur with the same key. The use of this\r
553/// key type is not recommended TPM_KEY_MIGRATE 0x0016 This SHALL indicate a\r
554/// key in use for TPM_MigrateKey\r
555///\r
267669ba 556#define TPM_KEY_LEGACY ((UINT16) 0x0015)\r
4135253b 557///\r
558/// TPM_KEY_MIGRAGE SHALL indicate a key in use for TPM_MigrateKey\r
559///\r
267669ba 560#define TPM_KEY_MIGRATE ((UINT16) 0x0016)\r
267669ba
LG
561\r
562//\r
4135253b 563// Part 2, section 5.8.1: Mandatory Key Usage Schemes\r
267669ba
LG
564//\r
565\r
566#define TPM_ES_NONE ((TPM_ENC_SCHEME) 0x0001)\r
567#define TPM_ES_RSAESPKCSv15 ((TPM_ENC_SCHEME) 0x0002)\r
568#define TPM_ES_RSAESOAEP_SHA1_MGF1 ((TPM_ENC_SCHEME) 0x0003)\r
1919913f 569#define TPM_ES_SYM_CNT ((TPM_ENC_SCHEME) 0x0004) ///< rev94 defined\r
570#define TPM_ES_SYM_CTR ((TPM_ENC_SCHEME) 0x0004)\r
267669ba
LG
571#define TPM_ES_SYM_OFB ((TPM_ENC_SCHEME) 0x0005)\r
572\r
573#define TPM_SS_NONE ((TPM_SIG_SCHEME) 0x0001)\r
574#define TPM_SS_RSASSAPKCS1v15_SHA1 ((TPM_SIG_SCHEME) 0x0002)\r
575#define TPM_SS_RSASSAPKCS1v15_DER ((TPM_SIG_SCHEME) 0x0003)\r
576#define TPM_SS_RSASSAPKCS1v15_INFO ((TPM_SIG_SCHEME) 0x0004)\r
577\r
578//\r
579// Part 2, section 5.9: TPM_AUTH_DATA_USAGE values\r
580//\r
581#define TPM_AUTH_NEVER ((TPM_AUTH_DATA_USAGE) 0x00)\r
582#define TPM_AUTH_ALWAYS ((TPM_AUTH_DATA_USAGE) 0x01)\r
583#define TPM_AUTH_PRIV_USE_ONLY ((TPM_AUTH_DATA_USAGE) 0x03)\r
584\r
427987f5 585///\r
586/// Part 2, section 5.10: TPM_KEY_FLAGS\r
587///\r
373b5cf9 588typedef enum tdTPM_KEY_FLAGS {\r
267669ba
LG
589 redirection = 0x00000001,\r
590 migratable = 0x00000002,\r
591 isVolatile = 0x00000004,\r
592 pcrIgnoredOnRead = 0x00000008,\r
593 migrateAuthority = 0x00000010\r
3e7b340f 594} TPM_KEY_FLAGS_BITS;\r
267669ba 595\r
427987f5 596///\r
597/// Part 2, section 5.11: TPM_CHANGEAUTH_VALIDATE\r
598///\r
267669ba
LG
599typedef struct tdTPM_CHANGEAUTH_VALIDATE {\r
600 TPM_SECRET newAuthSecret;\r
601 TPM_NONCE n1;\r
602} TPM_CHANGEAUTH_VALIDATE;\r
603\r
427987f5 604///\r
605/// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r
606/// decalared after section 10 to catch declaration of TPM_PUBKEY\r
607///\r
608/// Part 2 section 10.1: TPM_KEY_PARMS\r
609/// [size_is(parmSize)] BYTE* parms;\r
610///\r
267669ba
LG
611typedef struct tdTPM_KEY_PARMS {\r
612 TPM_ALGORITHM_ID algorithmID;\r
613 TPM_ENC_SCHEME encScheme;\r
614 TPM_SIG_SCHEME sigScheme;\r
615 UINT32 parmSize;\r
616 UINT8 *parms;\r
617} TPM_KEY_PARMS;\r
618\r
427987f5 619///\r
620/// Part 2, section 10.4: TPM_STORE_PUBKEY\r
621///\r
267669ba
LG
622typedef struct tdTPM_STORE_PUBKEY {\r
623 UINT32 keyLength;\r
624 UINT8 key[1];\r
625} TPM_STORE_PUBKEY;\r
626\r
427987f5 627///\r
628/// Part 2, section 10.5: TPM_PUBKEY\r
629///\r
267669ba
LG
630typedef struct tdTPM_PUBKEY{\r
631 TPM_KEY_PARMS algorithmParms;\r
632 TPM_STORE_PUBKEY pubKey;\r
633} TPM_PUBKEY;\r
634\r
427987f5 635///\r
636/// Part 2, section 5.12: TPM_MIGRATIONKEYAUTH\r
637///\r
267669ba
LG
638typedef struct tdTPM_MIGRATIONKEYAUTH{\r
639 TPM_PUBKEY migrationKey;\r
640 TPM_MIGRATE_SCHEME migrationScheme;\r
641 TPM_DIGEST digest;\r
642} TPM_MIGRATIONKEYAUTH;\r
643\r
427987f5 644///\r
645/// Part 2, section 5.13: TPM_COUNTER_VALUE\r
646///\r
267669ba
LG
647typedef struct tdTPM_COUNTER_VALUE{\r
648 TPM_STRUCTURE_TAG tag;\r
649 UINT8 label[4];\r
650 TPM_ACTUAL_COUNT counter;\r
651} TPM_COUNTER_VALUE;\r
652\r
427987f5 653///\r
654/// Part 2, section 5.14: TPM_SIGN_INFO\r
655/// Size of data indicated by dataLen\r
656///\r
267669ba
LG
657typedef struct tdTPM_SIGN_INFO {\r
658 TPM_STRUCTURE_TAG tag;\r
659 UINT8 fixed[4];\r
660 TPM_NONCE replay;\r
661 UINT32 dataLen;\r
662 UINT8 *data;\r
663} TPM_SIGN_INFO;\r
664\r
427987f5 665///\r
666/// Part 2, section 5.15: TPM_MSA_COMPOSITE\r
667/// Number of migAuthDigest indicated by MSAlist\r
668///\r
267669ba
LG
669typedef struct tdTPM_MSA_COMPOSITE {\r
670 UINT32 MSAlist;\r
671 TPM_DIGEST migAuthDigest[1];\r
672} TPM_MSA_COMPOSITE;\r
673\r
427987f5 674///\r
675/// Part 2, section 5.16: TPM_CMK_AUTH\r
676///\r
267669ba
LG
677typedef struct tdTPM_CMK_AUTH{\r
678 TPM_DIGEST migrationAuthorityDigest;\r
679 TPM_DIGEST destinationKeyDigest;\r
680 TPM_DIGEST sourceKeyDigest;\r
681} TPM_CMK_AUTH;\r
682\r
683//\r
684// Part 2, section 5.17: TPM_CMK_DELEGATE\r
685//\r
4135253b 686#define TPM_CMK_DELEGATE_SIGNING ((TPM_CMK_DELEGATE) BIT31)\r
687#define TPM_CMK_DELEGATE_STORAGE ((TPM_CMK_DELEGATE) BIT30)\r
688#define TPM_CMK_DELEGATE_BIND ((TPM_CMK_DELEGATE) BIT29)\r
689#define TPM_CMK_DELEGATE_LEGACY ((TPM_CMK_DELEGATE) BIT28)\r
690#define TPM_CMK_DELEGATE_MIGRATE ((TPM_CMK_DELEGATE) BIT27)\r
267669ba 691\r
427987f5 692///\r
693/// Part 2, section 5.18: TPM_SELECT_SIZE\r
694///\r
267669ba
LG
695typedef struct tdTPM_SELECT_SIZE {\r
696 UINT8 major;\r
697 UINT8 minor;\r
698 UINT16 reqSize;\r
699} TPM_SELECT_SIZE;\r
700\r
427987f5 701///\r
702/// Part 2, section 5,19: TPM_CMK_MIGAUTH\r
703///\r
267669ba
LG
704typedef struct tdTPM_CMK_MIGAUTH{\r
705 TPM_STRUCTURE_TAG tag;\r
706 TPM_DIGEST msaDigest;\r
707 TPM_DIGEST pubKeyDigest;\r
708} TPM_CMK_MIGAUTH;\r
709\r
427987f5 710///\r
711/// Part 2, section 5.20: TPM_CMK_SIGTICKET\r
712///\r
267669ba
LG
713typedef struct tdTPM_CMK_SIGTICKET{\r
714 TPM_STRUCTURE_TAG tag;\r
715 TPM_DIGEST verKeyDigest;\r
716 TPM_DIGEST signedData;\r
717} TPM_CMK_SIGTICKET;\r
718\r
427987f5 719///\r
720/// Part 2, section 5.21: TPM_CMK_MA_APPROVAL\r
721///\r
267669ba
LG
722typedef struct tdTPM_CMK_MA_APPROVAL{\r
723 TPM_STRUCTURE_TAG tag;\r
724 TPM_DIGEST migrationAuthorityDigest;\r
725} TPM_CMK_MA_APPROVAL;\r
726\r
727//\r
728// Part 2, section 6: Command Tags\r
729//\r
730#define TPM_TAG_RQU_COMMAND ((TPM_STRUCTURE_TAG) 0x00C1)\r
731#define TPM_TAG_RQU_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C2)\r
732#define TPM_TAG_RQU_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C3)\r
733#define TPM_TAG_RSP_COMMAND ((TPM_STRUCTURE_TAG) 0x00C4)\r
734#define TPM_TAG_RSP_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C5)\r
735#define TPM_TAG_RSP_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C6)\r
736\r
427987f5 737///\r
738/// Part 2, section 7.1: TPM_PERMANENT_FLAGS\r
739///\r
267669ba
LG
740typedef struct tdTPM_PERMANENT_FLAGS{\r
741 TPM_STRUCTURE_TAG tag;\r
742 BOOLEAN disable;\r
743 BOOLEAN ownership;\r
744 BOOLEAN deactivated;\r
745 BOOLEAN readPubek;\r
746 BOOLEAN disableOwnerClear;\r
747 BOOLEAN allowMaintenance;\r
748 BOOLEAN physicalPresenceLifetimeLock;\r
749 BOOLEAN physicalPresenceHWEnable;\r
750 BOOLEAN physicalPresenceCMDEnable;\r
751 BOOLEAN CEKPUsed;\r
752 BOOLEAN TPMpost;\r
753 BOOLEAN TPMpostLock;\r
754 BOOLEAN FIPS;\r
755 BOOLEAN operator;\r
756 BOOLEAN enableRevokeEK;\r
757 BOOLEAN nvLocked;\r
758 BOOLEAN readSRKPub;\r
759 BOOLEAN tpmEstablished;\r
760 BOOLEAN maintenanceDone;\r
1919913f 761 BOOLEAN disableFullDALogicInfo;\r
267669ba
LG
762} TPM_PERMANENT_FLAGS;\r
763\r
764//\r
4135253b 765// Part 2, section 7.1.1: Flag Restrictions (of TPM_PERMANENT_FLAGS)\r
267669ba
LG
766//\r
767#define TPM_PF_DISABLE ((TPM_CAPABILITY_AREA) 1)\r
768#define TPM_PF_OWNERSHIP ((TPM_CAPABILITY_AREA) 2)\r
769#define TPM_PF_DEACTIVATED ((TPM_CAPABILITY_AREA) 3)\r
770#define TPM_PF_READPUBEK ((TPM_CAPABILITY_AREA) 4)\r
771#define TPM_PF_DISABLEOWNERCLEAR ((TPM_CAPABILITY_AREA) 5)\r
772#define TPM_PF_ALLOWMAINTENANCE ((TPM_CAPABILITY_AREA) 6)\r
773#define TPM_PF_PHYSICALPRESENCELIFETIMELOCK ((TPM_CAPABILITY_AREA) 7)\r
774#define TPM_PF_PHYSICALPRESENCEHWENABLE ((TPM_CAPABILITY_AREA) 8)\r
775#define TPM_PF_PHYSICALPRESENCECMDENABLE ((TPM_CAPABILITY_AREA) 9)\r
776#define TPM_PF_CEKPUSED ((TPM_CAPABILITY_AREA) 10)\r
777#define TPM_PF_TPMPOST ((TPM_CAPABILITY_AREA) 11)\r
778#define TPM_PF_TPMPOSTLOCK ((TPM_CAPABILITY_AREA) 12)\r
779#define TPM_PF_FIPS ((TPM_CAPABILITY_AREA) 13)\r
780#define TPM_PF_OPERATOR ((TPM_CAPABILITY_AREA) 14)\r
781#define TPM_PF_ENABLEREVOKEEK ((TPM_CAPABILITY_AREA) 15)\r
782#define TPM_PF_NV_LOCKED ((TPM_CAPABILITY_AREA) 16)\r
783#define TPM_PF_READSRKPUB ((TPM_CAPABILITY_AREA) 17)\r
784#define TPM_PF_TPMESTABLISHED ((TPM_CAPABILITY_AREA) 18)\r
785#define TPM_PF_MAINTENANCEDONE ((TPM_CAPABILITY_AREA) 19)\r
1919913f 786#define TPM_PF_DISABLEFULLDALOGICINFO ((TPM_CAPABILITY_AREA) 20)\r
267669ba 787\r
427987f5 788///\r
789/// Part 2, section 7.2: TPM_STCLEAR_FLAGS\r
790///\r
267669ba
LG
791typedef struct tdTPM_STCLEAR_FLAGS{\r
792 TPM_STRUCTURE_TAG tag;\r
793 BOOLEAN deactivated;\r
794 BOOLEAN disableForceClear;\r
795 BOOLEAN physicalPresence;\r
796 BOOLEAN physicalPresenceLock;\r
797 BOOLEAN bGlobalLock;\r
798} TPM_STCLEAR_FLAGS;\r
799\r
800//\r
4135253b 801// Part 2, section 7.2.1: Flag Restrictions (of TPM_STCLEAR_FLAGS)\r
267669ba
LG
802//\r
803#define TPM_SF_DEACTIVATED ((TPM_CAPABILITY_AREA) 1)\r
804#define TPM_SF_DISABLEFORCECLEAR ((TPM_CAPABILITY_AREA) 2)\r
805#define TPM_SF_PHYSICALPRESENCE ((TPM_CAPABILITY_AREA) 3)\r
806#define TPM_SF_PHYSICALPRESENCELOCK ((TPM_CAPABILITY_AREA) 4)\r
807#define TPM_SF_BGLOBALLOCK ((TPM_CAPABILITY_AREA) 5)\r
808\r
427987f5 809///\r
810/// Part 2, section 7.3: TPM_STANY_FLAGS\r
811///\r
267669ba
LG
812typedef struct tdTPM_STANY_FLAGS{\r
813 TPM_STRUCTURE_TAG tag;\r
814 BOOLEAN postInitialise;\r
815 TPM_MODIFIER_INDICATOR localityModifier;\r
816 BOOLEAN transportExclusive;\r
817 BOOLEAN TOSPresent;\r
818} TPM_STANY_FLAGS;\r
819\r
820//\r
4135253b 821// Part 2, section 7.3.1: Flag Restrictions (of TPM_STANY_FLAGS)\r
267669ba
LG
822//\r
823#define TPM_AF_POSTINITIALISE ((TPM_CAPABILITY_AREA) 1)\r
824#define TPM_AF_LOCALITYMODIFIER ((TPM_CAPABILITY_AREA) 2)\r
825#define TPM_AF_TRANSPORTEXCLUSIVE ((TPM_CAPABILITY_AREA) 3)\r
826#define TPM_AF_TOSPRESENT ((TPM_CAPABILITY_AREA) 4)\r
827\r
828//\r
9095d37b 829// All those structures defined in section 7.4, 7.5, 7.6 are not normative and\r
267669ba
LG
830// thus no definitions here\r
831//\r
1919913f 832// Part 2, section 7.4: TPM_PERMANENT_DATA\r
833//\r
834#define TPM_MIN_COUNTERS 4 ///< the minimum number of counters is 4\r
835#define TPM_DELEGATE_KEY TPM_KEY\r
836#define TPM_NUM_PCR 16\r
837#define TPM_MAX_NV_WRITE_NOOWNER 64\r
838\r
839//\r
840// Part 2, section 7.4.1: PERMANENT_DATA Subcap for SetCapability\r
841//\r
842#define TPM_PD_REVMAJOR ((TPM_CAPABILITY_AREA) 1)\r
843#define TPM_PD_REVMINOR ((TPM_CAPABILITY_AREA) 2)\r
844#define TPM_PD_TPMPROOF ((TPM_CAPABILITY_AREA) 3)\r
845#define TPM_PD_OWNERAUTH ((TPM_CAPABILITY_AREA) 4)\r
846#define TPM_PD_OPERATORAUTH ((TPM_CAPABILITY_AREA) 5)\r
847#define TPM_PD_MANUMAINTPUB ((TPM_CAPABILITY_AREA) 6)\r
848#define TPM_PD_ENDORSEMENTKEY ((TPM_CAPABILITY_AREA) 7)\r
849#define TPM_PD_SRK ((TPM_CAPABILITY_AREA) 8)\r
850#define TPM_PD_DELEGATEKEY ((TPM_CAPABILITY_AREA) 9)\r
851#define TPM_PD_CONTEXTKEY ((TPM_CAPABILITY_AREA) 10)\r
852#define TPM_PD_AUDITMONOTONICCOUNTER ((TPM_CAPABILITY_AREA) 11)\r
853#define TPM_PD_MONOTONICCOUNTER ((TPM_CAPABILITY_AREA) 12)\r
854#define TPM_PD_PCRATTRIB ((TPM_CAPABILITY_AREA) 13)\r
855#define TPM_PD_ORDINALAUDITSTATUS ((TPM_CAPABILITY_AREA) 14)\r
856#define TPM_PD_AUTHDIR ((TPM_CAPABILITY_AREA) 15)\r
857#define TPM_PD_RNGSTATE ((TPM_CAPABILITY_AREA) 16)\r
858#define TPM_PD_FAMILYTABLE ((TPM_CAPABILITY_AREA) 17)\r
859#define TPM_DELEGATETABLE ((TPM_CAPABILITY_AREA) 18)\r
860#define TPM_PD_EKRESET ((TPM_CAPABILITY_AREA) 19)\r
861#define TPM_PD_MAXNVBUFSIZE ((TPM_CAPABILITY_AREA) 20)\r
862#define TPM_PD_LASTFAMILYID ((TPM_CAPABILITY_AREA) 21)\r
863#define TPM_PD_NOOWNERNVWRITE ((TPM_CAPABILITY_AREA) 22)\r
864#define TPM_PD_RESTRICTDELEGATE ((TPM_CAPABILITY_AREA) 23)\r
865#define TPM_PD_TPMDAASEED ((TPM_CAPABILITY_AREA) 24)\r
866#define TPM_PD_DAAPROOF ((TPM_CAPABILITY_AREA) 25)\r
867\r
868///\r
869/// Part 2, section 7.5: TPM_STCLEAR_DATA\r
870/// available inside TPM only\r
871///\r
872 typedef struct tdTPM_STCLEAR_DATA{\r
873 TPM_STRUCTURE_TAG tag;\r
874 TPM_NONCE contextNonceKey;\r
875 TPM_COUNT_ID countID;\r
876 UINT32 ownerReference;\r
877 BOOLEAN disableResetLock;\r
878 TPM_PCRVALUE PCR[TPM_NUM_PCR];\r
879 UINT32 deferredPhysicalPresence;\r
880 }TPM_STCLEAR_DATA;\r
881\r
882//\r
883// Part 2, section 7.5.1: STCLEAR_DATA Subcap for SetCapability\r
884//\r
885#define TPM_SD_CONTEXTNONCEKEY ((TPM_CAPABILITY_AREA)0x00000001)\r
886#define TPM_SD_COUNTID ((TPM_CAPABILITY_AREA)0x00000002)\r
887#define TPM_SD_OWNERREFERENCE ((TPM_CAPABILITY_AREA)0x00000003)\r
888#define TPM_SD_DISABLERESETLOCK ((TPM_CAPABILITY_AREA)0x00000004)\r
889#define TPM_SD_PCR ((TPM_CAPABILITY_AREA)0x00000005)\r
890#define TPM_SD_DEFERREDPHYSICALPRESENCE ((TPM_CAPABILITY_AREA)0x00000006)\r
891\r
892//\r
893// Part 2, section 7.6.1: STANY_DATA Subcap for SetCapability\r
894//\r
895#define TPM_AD_CONTEXTNONCESESSION ((TPM_CAPABILITY_AREA) 1)\r
896#define TPM_AD_AUDITDIGEST ((TPM_CAPABILITY_AREA) 2)\r
897#define TPM_AD_CURRENTTICKS ((TPM_CAPABILITY_AREA) 3)\r
898#define TPM_AD_CONTEXTCOUNT ((TPM_CAPABILITY_AREA) 4)\r
899#define TPM_AD_CONTEXTLIST ((TPM_CAPABILITY_AREA) 5)\r
900#define TPM_AD_SESSIONS ((TPM_CAPABILITY_AREA) 6)\r
267669ba
LG
901\r
902//\r
903// Part 2, section 8: PCR Structures\r
9095d37b 904//\r
267669ba 905\r
427987f5 906///\r
907/// Part 2, section 8.1: TPM_PCR_SELECTION\r
908/// Size of pcrSelect[] indicated by sizeOfSelect\r
909///\r
267669ba
LG
910typedef struct tdTPM_PCR_SELECTION {\r
911 UINT16 sizeOfSelect;\r
912 UINT8 pcrSelect[1];\r
913} TPM_PCR_SELECTION;\r
914\r
427987f5 915///\r
916/// Part 2, section 8.2: TPM_PCR_COMPOSITE\r
917/// Size of pcrValue[] indicated by valueSize\r
918///\r
267669ba
LG
919typedef struct tdTPM_PCR_COMPOSITE {\r
920 TPM_PCR_SELECTION select;\r
921 UINT32 valueSize;\r
922 TPM_PCRVALUE pcrValue[1];\r
923} TPM_PCR_COMPOSITE;\r
924\r
427987f5 925///\r
926/// Part 2, section 8.3: TPM_PCR_INFO\r
927///\r
267669ba
LG
928typedef struct tdTPM_PCR_INFO {\r
929 TPM_PCR_SELECTION pcrSelection;\r
930 TPM_COMPOSITE_HASH digestAtRelease;\r
931 TPM_COMPOSITE_HASH digestAtCreation;\r
932} TPM_PCR_INFO;\r
933\r
427987f5 934///\r
935/// Part 2, section 8.6: TPM_LOCALITY_SELECTION\r
936///\r
267669ba
LG
937typedef UINT8 TPM_LOCALITY_SELECTION;\r
938\r
939#define TPM_LOC_FOUR ((UINT8) 0x10)\r
940#define TPM_LOC_THREE ((UINT8) 0x08)\r
941#define TPM_LOC_TWO ((UINT8) 0x04)\r
942#define TPM_LOC_ONE ((UINT8) 0x02)\r
943#define TPM_LOC_ZERO ((UINT8) 0x01)\r
944\r
427987f5 945///\r
946/// Part 2, section 8.4: TPM_PCR_INFO_LONG\r
947///\r
267669ba
LG
948typedef struct tdTPM_PCR_INFO_LONG {\r
949 TPM_STRUCTURE_TAG tag;\r
950 TPM_LOCALITY_SELECTION localityAtCreation;\r
951 TPM_LOCALITY_SELECTION localityAtRelease;\r
952 TPM_PCR_SELECTION creationPCRSelection;\r
953 TPM_PCR_SELECTION releasePCRSelection;\r
954 TPM_COMPOSITE_HASH digestAtCreation;\r
955 TPM_COMPOSITE_HASH digestAtRelease;\r
956} TPM_PCR_INFO_LONG;\r
957\r
427987f5 958///\r
959/// Part 2, section 8.5: TPM_PCR_INFO_SHORT\r
960///\r
267669ba
LG
961typedef struct tdTPM_PCR_INFO_SHORT{\r
962 TPM_PCR_SELECTION pcrSelection;\r
963 TPM_LOCALITY_SELECTION localityAtRelease;\r
964 TPM_COMPOSITE_HASH digestAtRelease;\r
965} TPM_PCR_INFO_SHORT;\r
966\r
427987f5 967///\r
968/// Part 2, section 8.8: TPM_PCR_ATTRIBUTES\r
969///\r
267669ba
LG
970typedef struct tdTPM_PCR_ATTRIBUTES{\r
971 BOOLEAN pcrReset;\r
972 TPM_LOCALITY_SELECTION pcrExtendLocal;\r
973 TPM_LOCALITY_SELECTION pcrResetLocal;\r
974} TPM_PCR_ATTRIBUTES;\r
975\r
976//\r
977// Part 2, section 9: Storage Structures\r
978//\r
979\r
427987f5 980///\r
981/// Part 2, section 9.1: TPM_STORED_DATA\r
982/// [size_is(sealInfoSize)] BYTE* sealInfo;\r
983/// [size_is(encDataSize)] BYTE* encData;\r
984///\r
267669ba
LG
985typedef struct tdTPM_STORED_DATA {\r
986 TPM_STRUCT_VER ver;\r
987 UINT32 sealInfoSize;\r
988 UINT8 *sealInfo;\r
989 UINT32 encDataSize;\r
990 UINT8 *encData;\r
991} TPM_STORED_DATA;\r
992\r
427987f5 993///\r
994/// Part 2, section 9.2: TPM_STORED_DATA12\r
995/// [size_is(sealInfoSize)] BYTE* sealInfo;\r
996/// [size_is(encDataSize)] BYTE* encData;\r
997///\r
267669ba
LG
998typedef struct tdTPM_STORED_DATA12 {\r
999 TPM_STRUCTURE_TAG tag;\r
1000 TPM_ENTITY_TYPE et;\r
1001 UINT32 sealInfoSize;\r
1002 UINT8 *sealInfo;\r
1003 UINT32 encDataSize;\r
1004 UINT8 *encData;\r
1005} TPM_STORED_DATA12;\r
1006\r
427987f5 1007///\r
1008/// Part 2, section 9.3: TPM_SEALED_DATA\r
1009/// [size_is(dataSize)] BYTE* data;\r
1010///\r
267669ba
LG
1011typedef struct tdTPM_SEALED_DATA {\r
1012 TPM_PAYLOAD_TYPE payload;\r
1013 TPM_SECRET authData;\r
1014 TPM_NONCE tpmProof;\r
1015 TPM_DIGEST storedDigest;\r
1016 UINT32 dataSize;\r
1017 UINT8 *data;\r
1018} TPM_SEALED_DATA;\r
1019\r
427987f5 1020///\r
1021/// Part 2, section 9.4: TPM_SYMMETRIC_KEY\r
1022/// [size_is(size)] BYTE* data;\r
1023///\r
267669ba
LG
1024typedef struct tdTPM_SYMMETRIC_KEY {\r
1025 TPM_ALGORITHM_ID algId;\r
1026 TPM_ENC_SCHEME encScheme;\r
1027 UINT16 dataSize;\r
1028 UINT8 *data;\r
1029} TPM_SYMMETRIC_KEY;\r
1030\r
427987f5 1031///\r
1032/// Part 2, section 9.5: TPM_BOUND_DATA\r
1033///\r
267669ba
LG
1034typedef struct tdTPM_BOUND_DATA {\r
1035 TPM_STRUCT_VER ver;\r
1036 TPM_PAYLOAD_TYPE payload;\r
1037 UINT8 payloadData[1];\r
1038} TPM_BOUND_DATA;\r
1039\r
1040//\r
1041// Part 2 section 10: TPM_KEY complex\r
9095d37b 1042//\r
267669ba 1043\r
4135253b 1044//\r
1045// Section 10.1, 10.4, and 10.5 have been defined previously\r
1046//\r
1047\r
427987f5 1048///\r
1049/// Part 2, section 10.2: TPM_KEY\r
1050/// [size_is(encDataSize)] BYTE* encData;\r
1051///\r
267669ba
LG
1052typedef struct tdTPM_KEY{\r
1053 TPM_STRUCT_VER ver;\r
1054 TPM_KEY_USAGE keyUsage;\r
1055 TPM_KEY_FLAGS keyFlags;\r
1056 TPM_AUTH_DATA_USAGE authDataUsage;\r
1057 TPM_KEY_PARMS algorithmParms;\r
1058 UINT32 PCRInfoSize;\r
1059 UINT8 *PCRInfo;\r
1060 TPM_STORE_PUBKEY pubKey;\r
1061 UINT32 encDataSize;\r
1062 UINT8 *encData;\r
1063} TPM_KEY;\r
1064\r
427987f5 1065///\r
1066/// Part 2, section 10.3: TPM_KEY12\r
1067/// [size_is(encDataSize)] BYTE* encData;\r
1068///\r
267669ba
LG
1069typedef struct tdTPM_KEY12{\r
1070 TPM_STRUCTURE_TAG tag;\r
1071 UINT16 fill;\r
1072 TPM_KEY_USAGE keyUsage;\r
1073 TPM_KEY_FLAGS keyFlags;\r
1074 TPM_AUTH_DATA_USAGE authDataUsage;\r
1075 TPM_KEY_PARMS algorithmParms;\r
1076 UINT32 PCRInfoSize;\r
1077 UINT8 *PCRInfo;\r
1078 TPM_STORE_PUBKEY pubKey;\r
1079 UINT32 encDataSize;\r
1080 UINT8 *encData;\r
1081} TPM_KEY12;\r
1082\r
427987f5 1083///\r
1084/// Part 2, section 10.7: TPM_STORE_PRIVKEY\r
1085/// [size_is(keyLength)] BYTE* key;\r
1086///\r
267669ba
LG
1087typedef struct tdTPM_STORE_PRIVKEY {\r
1088 UINT32 keyLength;\r
1089 UINT8 *key;\r
1090} TPM_STORE_PRIVKEY;\r
1091\r
427987f5 1092///\r
1093/// Part 2, section 10.6: TPM_STORE_ASYMKEY\r
1094///\r
267669ba
LG
1095typedef struct tdTPM_STORE_ASYMKEY { // pos len total\r
1096 TPM_PAYLOAD_TYPE payload; // 0 1 1\r
1097 TPM_SECRET usageAuth; // 1 20 21\r
1098 TPM_SECRET migrationAuth; // 21 20 41\r
1099 TPM_DIGEST pubDataDigest; // 41 20 61\r
1100 TPM_STORE_PRIVKEY privKey; // 61 132-151 193-214\r
1101} TPM_STORE_ASYMKEY;\r
1102\r
427987f5 1103///\r
1104/// Part 2, section 10.8: TPM_MIGRATE_ASYMKEY\r
1105/// [size_is(partPrivKeyLen)] BYTE* partPrivKey;\r
1106///\r
267669ba
LG
1107typedef struct tdTPM_MIGRATE_ASYMKEY { // pos len total\r
1108 TPM_PAYLOAD_TYPE payload; // 0 1 1\r
1109 TPM_SECRET usageAuth; // 1 20 21\r
1110 TPM_DIGEST pubDataDigest; // 21 20 41\r
1111 UINT32 partPrivKeyLen; // 41 4 45\r
1112 UINT8 *partPrivKey; // 45 112-127 157-172\r
1113} TPM_MIGRATE_ASYMKEY;\r
1114\r
427987f5 1115///\r
1116/// Part 2, section 10.9: TPM_KEY_CONTROL\r
1117///\r
267669ba
LG
1118#define TPM_KEY_CONTROL_OWNER_EVICT ((UINT32) 0x00000001)\r
1119\r
1120//\r
1121// Part 2, section 11: Signed Structures\r
1122//\r
1123\r
427987f5 1124///\r
1125/// Part 2, section 11.1: TPM_CERTIFY_INFO Structure\r
1126///\r
4135253b 1127typedef struct tdTPM_CERTIFY_INFO {\r
1128 TPM_STRUCT_VER version;\r
1129 TPM_KEY_USAGE keyUsage;\r
1130 TPM_KEY_FLAGS keyFlags;\r
1131 TPM_AUTH_DATA_USAGE authDataUsage;\r
1132 TPM_KEY_PARMS algorithmParms;\r
1133 TPM_DIGEST pubkeyDigest;\r
1134 TPM_NONCE data;\r
1135 BOOLEAN parentPCRStatus;\r
1136 UINT32 PCRInfoSize;\r
1137 UINT8 *PCRInfo;\r
267669ba
LG
1138} TPM_CERTIFY_INFO;\r
1139\r
427987f5 1140///\r
1141/// Part 2, section 11.2: TPM_CERTIFY_INFO2 Structure\r
1142///\r
4135253b 1143typedef struct tdTPM_CERTIFY_INFO2 {\r
1144 TPM_STRUCTURE_TAG tag;\r
1145 UINT8 fill;\r
1146 TPM_PAYLOAD_TYPE payloadType;\r
1147 TPM_KEY_USAGE keyUsage;\r
1148 TPM_KEY_FLAGS keyFlags;\r
1149 TPM_AUTH_DATA_USAGE authDataUsage;\r
1150 TPM_KEY_PARMS algorithmParms;\r
1151 TPM_DIGEST pubkeyDigest;\r
1152 TPM_NONCE data;\r
1153 BOOLEAN parentPCRStatus;\r
1154 UINT32 PCRInfoSize;\r
1155 UINT8 *PCRInfo;\r
1156 UINT32 migrationAuthoritySize;\r
1157 UINT8 *migrationAuthority;\r
267669ba
LG
1158} TPM_CERTIFY_INFO2;\r
1159\r
427987f5 1160///\r
1161/// Part 2, section 11.3 TPM_QUOTE_INFO Structure\r
1162///\r
4135253b 1163typedef struct tdTPM_QUOTE_INFO {\r
1164 TPM_STRUCT_VER version;\r
1165 UINT8 fixed[4];\r
1166 TPM_COMPOSITE_HASH digestValue;\r
1167 TPM_NONCE externalData;\r
267669ba
LG
1168} TPM_QUOTE_INFO;\r
1169\r
427987f5 1170///\r
1171/// Part 2, section 11.4 TPM_QUOTE_INFO2 Structure\r
1172///\r
4135253b 1173typedef struct tdTPM_QUOTE_INFO2 {\r
1174 TPM_STRUCTURE_TAG tag;\r
1175 UINT8 fixed[4];\r
1176 TPM_NONCE externalData;\r
1177 TPM_PCR_INFO_SHORT infoShort;\r
267669ba
LG
1178} TPM_QUOTE_INFO2;\r
1179\r
1180//\r
1181// Part 2, section 12: Identity Structures\r
1182//\r
1183\r
427987f5 1184///\r
1185/// Part 2, section 12.1 TPM_EK_BLOB\r
1186///\r
4135253b 1187typedef struct tdTPM_EK_BLOB {\r
1188 TPM_STRUCTURE_TAG tag;\r
1189 TPM_EK_TYPE ekType;\r
1190 UINT32 blobSize;\r
1191 UINT8 *blob;\r
267669ba
LG
1192} TPM_EK_BLOB;\r
1193\r
427987f5 1194///\r
1195/// Part 2, section 12.2 TPM_EK_BLOB_ACTIVATE\r
1196///\r
4135253b 1197typedef struct tdTPM_EK_BLOB_ACTIVATE {\r
1198 TPM_STRUCTURE_TAG tag;\r
1199 TPM_SYMMETRIC_KEY sessionKey;\r
1200 TPM_DIGEST idDigest;\r
1201 TPM_PCR_INFO_SHORT pcrInfo;\r
267669ba
LG
1202} TPM_EK_BLOB_ACTIVATE;\r
1203\r
427987f5 1204///\r
1205/// Part 2, section 12.3 TPM_EK_BLOB_AUTH\r
1206///\r
4135253b 1207typedef struct tdTPM_EK_BLOB_AUTH {\r
1208 TPM_STRUCTURE_TAG tag;\r
1209 TPM_SECRET authValue;\r
267669ba
LG
1210} TPM_EK_BLOB_AUTH;\r
1211\r
1212\r
427987f5 1213///\r
1214/// Part 2, section 12.5 TPM_IDENTITY_CONTENTS\r
1215///\r
4135253b 1216typedef struct tdTPM_IDENTITY_CONTENTS {\r
1217 TPM_STRUCT_VER ver;\r
1218 UINT32 ordinal;\r
1219 TPM_CHOSENID_HASH labelPrivCADigest;\r
1220 TPM_PUBKEY identityPubKey;\r
267669ba
LG
1221} TPM_IDENTITY_CONTENTS;\r
1222\r
427987f5 1223///\r
1224/// Part 2, section 12.6 TPM_IDENTITY_REQ\r
1225///\r
4135253b 1226typedef struct tdTPM_IDENTITY_REQ {\r
1227 UINT32 asymSize;\r
1228 UINT32 symSize;\r
1229 TPM_KEY_PARMS asymAlgorithm;\r
1230 TPM_KEY_PARMS symAlgorithm;\r
1231 UINT8 *asymBlob;\r
1232 UINT8 *symBlob;\r
267669ba
LG
1233} TPM_IDENTITY_REQ;\r
1234\r
427987f5 1235///\r
1236/// Part 2, section 12.7 TPM_IDENTITY_PROOF\r
1237///\r
4135253b 1238typedef struct tdTPM_IDENTITY_PROOF {\r
1239 TPM_STRUCT_VER ver;\r
1240 UINT32 labelSize;\r
1241 UINT32 identityBindingSize;\r
1242 UINT32 endorsementSize;\r
1243 UINT32 platformSize;\r
1244 UINT32 conformanceSize;\r
1245 TPM_PUBKEY identityKey;\r
1246 UINT8 *labelArea;\r
1247 UINT8 *identityBinding;\r
1248 UINT8 *endorsementCredential;\r
1249 UINT8 *platformCredential;\r
1250 UINT8 *conformanceCredential;\r
267669ba
LG
1251} TPM_IDENTITY_PROOF;\r
1252\r
427987f5 1253///\r
1254/// Part 2, section 12.8 TPM_ASYM_CA_CONTENTS\r
1255///\r
4135253b 1256typedef struct tdTPM_ASYM_CA_CONTENTS {\r
1257 TPM_SYMMETRIC_KEY sessionKey;\r
1258 TPM_DIGEST idDigest;\r
267669ba
LG
1259} TPM_ASYM_CA_CONTENTS;\r
1260\r
427987f5 1261///\r
1262/// Part 2, section 12.9 TPM_SYM_CA_ATTESTATION\r
1263///\r
4135253b 1264typedef struct tdTPM_SYM_CA_ATTESTATION {\r
1265 UINT32 credSize;\r
1266 TPM_KEY_PARMS algorithm;\r
1267 UINT8 *credential;\r
267669ba
LG
1268} TPM_SYM_CA_ATTESTATION;\r
1269\r
427987f5 1270///\r
1271/// Part 2, section 15: Tick Structures\r
1272/// Placed here out of order because definitions are used in section 13.\r
1273///\r
267669ba
LG
1274typedef struct tdTPM_CURRENT_TICKS {\r
1275 TPM_STRUCTURE_TAG tag;\r
1276 UINT64 currentTicks;\r
1277 UINT16 tickRate;\r
1278 TPM_NONCE tickNonce;\r
1279} TPM_CURRENT_TICKS;\r
1280\r
427987f5 1281///\r
1282/// Part 2, section 13: Transport structures\r
1283///\r
267669ba 1284\r
427987f5 1285///\r
1286/// Part 2, section 13.1: TPM _TRANSPORT_PUBLIC\r
1287///\r
4135253b 1288typedef struct tdTPM_TRANSPORT_PUBLIC {\r
1289 TPM_STRUCTURE_TAG tag;\r
1290 TPM_TRANSPORT_ATTRIBUTES transAttributes;\r
1291 TPM_ALGORITHM_ID algId;\r
1292 TPM_ENC_SCHEME encScheme;\r
1293} TPM_TRANSPORT_PUBLIC;\r
1294\r
1295//\r
1296// Part 2, section 13.1.1 TPM_TRANSPORT_ATTRIBUTES Definitions\r
1297//\r
14996c96
LG
1298#define TPM_TRANSPORT_ENCRYPT ((UINT32)BIT0)\r
1299#define TPM_TRANSPORT_LOG ((UINT32)BIT1)\r
1300#define TPM_TRANSPORT_EXCLUSIVE ((UINT32)BIT2)\r
267669ba 1301\r
427987f5 1302///\r
1303/// Part 2, section 13.2 TPM_TRANSPORT_INTERNAL\r
1304///\r
4135253b 1305typedef struct tdTPM_TRANSPORT_INTERNAL {\r
1306 TPM_STRUCTURE_TAG tag;\r
1307 TPM_AUTHDATA authData;\r
1308 TPM_TRANSPORT_PUBLIC transPublic;\r
1309 TPM_TRANSHANDLE transHandle;\r
1310 TPM_NONCE transNonceEven;\r
1311 TPM_DIGEST transDigest;\r
267669ba
LG
1312} TPM_TRANSPORT_INTERNAL;\r
1313\r
427987f5 1314///\r
1315/// Part 2, section 13.3 TPM_TRANSPORT_LOG_IN structure\r
1316///\r
4135253b 1317typedef struct tdTPM_TRANSPORT_LOG_IN {\r
1318 TPM_STRUCTURE_TAG tag;\r
1319 TPM_DIGEST parameters;\r
1320 TPM_DIGEST pubKeyHash;\r
267669ba
LG
1321} TPM_TRANSPORT_LOG_IN;\r
1322\r
427987f5 1323///\r
1324/// Part 2, section 13.4 TPM_TRANSPORT_LOG_OUT structure\r
1325///\r
4135253b 1326typedef struct tdTPM_TRANSPORT_LOG_OUT {\r
1327 TPM_STRUCTURE_TAG tag;\r
1328 TPM_CURRENT_TICKS currentTicks;\r
1329 TPM_DIGEST parameters;\r
1330 TPM_MODIFIER_INDICATOR locality;\r
267669ba
LG
1331} TPM_TRANSPORT_LOG_OUT;\r
1332\r
427987f5 1333///\r
1334/// Part 2, section 13.5 TPM_TRANSPORT_AUTH structure\r
1335///\r
4135253b 1336typedef struct tdTPM_TRANSPORT_AUTH {\r
1337 TPM_STRUCTURE_TAG tag;\r
1338 TPM_AUTHDATA authData;\r
267669ba
LG
1339} TPM_TRANSPORT_AUTH;\r
1340\r
1341//\r
1342// Part 2, section 14: Audit Structures\r
1343//\r
1344\r
427987f5 1345///\r
1346/// Part 2, section 14.1 TPM_AUDIT_EVENT_IN structure\r
1347///\r
4135253b 1348typedef struct tdTPM_AUDIT_EVENT_IN {\r
1349 TPM_STRUCTURE_TAG tag;\r
1350 TPM_DIGEST inputParms;\r
1351 TPM_COUNTER_VALUE auditCount;\r
267669ba
LG
1352} TPM_AUDIT_EVENT_IN;\r
1353\r
427987f5 1354///\r
1355/// Part 2, section 14.2 TPM_AUDIT_EVENT_OUT structure\r
1356///\r
4135253b 1357typedef struct tdTPM_AUDIT_EVENT_OUT {\r
1358 TPM_STRUCTURE_TAG tag;\r
1359 TPM_COMMAND_CODE ordinal;\r
1360 TPM_DIGEST outputParms;\r
1361 TPM_COUNTER_VALUE auditCount;\r
1362 TPM_RESULT returnCode;\r
267669ba
LG
1363} TPM_AUDIT_EVENT_OUT;\r
1364\r
1365//\r
1366// Part 2, section 16: Return Codes\r
1367//\r
267669ba
LG
1368\r
1369#define TPM_VENDOR_ERROR TPM_Vendor_Specific32\r
1370#define TPM_NON_FATAL 0x00000800\r
1371\r
1372#define TPM_SUCCESS ((TPM_RESULT) TPM_BASE)\r
1373#define TPM_AUTHFAIL ((TPM_RESULT) (TPM_BASE + 1))\r
1374#define TPM_BADINDEX ((TPM_RESULT) (TPM_BASE + 2))\r
1375#define TPM_BAD_PARAMETER ((TPM_RESULT) (TPM_BASE + 3))\r
1376#define TPM_AUDITFAILURE ((TPM_RESULT) (TPM_BASE + 4))\r
1377#define TPM_CLEAR_DISABLED ((TPM_RESULT) (TPM_BASE + 5))\r
1378#define TPM_DEACTIVATED ((TPM_RESULT) (TPM_BASE + 6))\r
1379#define TPM_DISABLED ((TPM_RESULT) (TPM_BASE + 7))\r
1380#define TPM_DISABLED_CMD ((TPM_RESULT) (TPM_BASE + 8))\r
1381#define TPM_FAIL ((TPM_RESULT) (TPM_BASE + 9))\r
1382#define TPM_BAD_ORDINAL ((TPM_RESULT) (TPM_BASE + 10))\r
1383#define TPM_INSTALL_DISABLED ((TPM_RESULT) (TPM_BASE + 11))\r
1384#define TPM_INVALID_KEYHANDLE ((TPM_RESULT) (TPM_BASE + 12))\r
1385#define TPM_KEYNOTFOUND ((TPM_RESULT) (TPM_BASE + 13))\r
1386#define TPM_INAPPROPRIATE_ENC ((TPM_RESULT) (TPM_BASE + 14))\r
1387#define TPM_MIGRATEFAIL ((TPM_RESULT) (TPM_BASE + 15))\r
1388#define TPM_INVALID_PCR_INFO ((TPM_RESULT) (TPM_BASE + 16))\r
1389#define TPM_NOSPACE ((TPM_RESULT) (TPM_BASE + 17))\r
1390#define TPM_NOSRK ((TPM_RESULT) (TPM_BASE + 18))\r
1391#define TPM_NOTSEALED_BLOB ((TPM_RESULT) (TPM_BASE + 19))\r
1392#define TPM_OWNER_SET ((TPM_RESULT) (TPM_BASE + 20))\r
1393#define TPM_RESOURCES ((TPM_RESULT) (TPM_BASE + 21))\r
1394#define TPM_SHORTRANDOM ((TPM_RESULT) (TPM_BASE + 22))\r
1395#define TPM_SIZE ((TPM_RESULT) (TPM_BASE + 23))\r
1396#define TPM_WRONGPCRVAL ((TPM_RESULT) (TPM_BASE + 24))\r
1397#define TPM_BAD_PARAM_SIZE ((TPM_RESULT) (TPM_BASE + 25))\r
1398#define TPM_SHA_THREAD ((TPM_RESULT) (TPM_BASE + 26))\r
1399#define TPM_SHA_ERROR ((TPM_RESULT) (TPM_BASE + 27))\r
1400#define TPM_FAILEDSELFTEST ((TPM_RESULT) (TPM_BASE + 28))\r
1401#define TPM_AUTH2FAIL ((TPM_RESULT) (TPM_BASE + 29))\r
1402#define TPM_BADTAG ((TPM_RESULT) (TPM_BASE + 30))\r
1403#define TPM_IOERROR ((TPM_RESULT) (TPM_BASE + 31))\r
1404#define TPM_ENCRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 32))\r
1405#define TPM_DECRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 33))\r
1406#define TPM_INVALID_AUTHHANDLE ((TPM_RESULT) (TPM_BASE + 34))\r
1407#define TPM_NO_ENDORSEMENT ((TPM_RESULT) (TPM_BASE + 35))\r
1408#define TPM_INVALID_KEYUSAGE ((TPM_RESULT) (TPM_BASE + 36))\r
1409#define TPM_WRONG_ENTITYTYPE ((TPM_RESULT) (TPM_BASE + 37))\r
1410#define TPM_INVALID_POSTINIT ((TPM_RESULT) (TPM_BASE + 38))\r
1411#define TPM_INAPPROPRIATE_SIG ((TPM_RESULT) (TPM_BASE + 39))\r
1412#define TPM_BAD_KEY_PROPERTY ((TPM_RESULT) (TPM_BASE + 40))\r
1413#define TPM_BAD_MIGRATION ((TPM_RESULT) (TPM_BASE + 41))\r
1414#define TPM_BAD_SCHEME ((TPM_RESULT) (TPM_BASE + 42))\r
1415#define TPM_BAD_DATASIZE ((TPM_RESULT) (TPM_BASE + 43))\r
1416#define TPM_BAD_MODE ((TPM_RESULT) (TPM_BASE + 44))\r
1417#define TPM_BAD_PRESENCE ((TPM_RESULT) (TPM_BASE + 45))\r
1418#define TPM_BAD_VERSION ((TPM_RESULT) (TPM_BASE + 46))\r
1419#define TPM_NO_WRAP_TRANSPORT ((TPM_RESULT) (TPM_BASE + 47))\r
1420#define TPM_AUDITFAIL_UNSUCCESSFUL ((TPM_RESULT) (TPM_BASE + 48))\r
1421#define TPM_AUDITFAIL_SUCCESSFUL ((TPM_RESULT) (TPM_BASE + 49))\r
1422#define TPM_NOTRESETABLE ((TPM_RESULT) (TPM_BASE + 50))\r
1423#define TPM_NOTLOCAL ((TPM_RESULT) (TPM_BASE + 51))\r
1424#define TPM_BAD_TYPE ((TPM_RESULT) (TPM_BASE + 52))\r
1425#define TPM_INVALID_RESOURCE ((TPM_RESULT) (TPM_BASE + 53))\r
1426#define TPM_NOTFIPS ((TPM_RESULT) (TPM_BASE + 54))\r
1427#define TPM_INVALID_FAMILY ((TPM_RESULT) (TPM_BASE + 55))\r
1428#define TPM_NO_NV_PERMISSION ((TPM_RESULT) (TPM_BASE + 56))\r
1429#define TPM_REQUIRES_SIGN ((TPM_RESULT) (TPM_BASE + 57))\r
1430#define TPM_KEY_NOTSUPPORTED ((TPM_RESULT) (TPM_BASE + 58))\r
1431#define TPM_AUTH_CONFLICT ((TPM_RESULT) (TPM_BASE + 59))\r
1432#define TPM_AREA_LOCKED ((TPM_RESULT) (TPM_BASE + 60))\r
1433#define TPM_BAD_LOCALITY ((TPM_RESULT) (TPM_BASE + 61))\r
1434#define TPM_READ_ONLY ((TPM_RESULT) (TPM_BASE + 62))\r
1435#define TPM_PER_NOWRITE ((TPM_RESULT) (TPM_BASE + 63))\r
1436#define TPM_FAMILYCOUNT ((TPM_RESULT) (TPM_BASE + 64))\r
1437#define TPM_WRITE_LOCKED ((TPM_RESULT) (TPM_BASE + 65))\r
1438#define TPM_BAD_ATTRIBUTES ((TPM_RESULT) (TPM_BASE + 66))\r
1439#define TPM_INVALID_STRUCTURE ((TPM_RESULT) (TPM_BASE + 67))\r
1440#define TPM_KEY_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 68))\r
1441#define TPM_BAD_COUNTER ((TPM_RESULT) (TPM_BASE + 69))\r
1442#define TPM_NOT_FULLWRITE ((TPM_RESULT) (TPM_BASE + 70))\r
1443#define TPM_CONTEXT_GAP ((TPM_RESULT) (TPM_BASE + 71))\r
1444#define TPM_MAXNVWRITES ((TPM_RESULT) (TPM_BASE + 72))\r
1445#define TPM_NOOPERATOR ((TPM_RESULT) (TPM_BASE + 73))\r
1446#define TPM_RESOURCEMISSING ((TPM_RESULT) (TPM_BASE + 74))\r
1447#define TPM_DELEGATE_LOCK ((TPM_RESULT) (TPM_BASE + 75))\r
1448#define TPM_DELEGATE_FAMILY ((TPM_RESULT) (TPM_BASE + 76))\r
1449#define TPM_DELEGATE_ADMIN ((TPM_RESULT) (TPM_BASE + 77))\r
1450#define TPM_TRANSPORT_NOTEXCLUSIVE ((TPM_RESULT) (TPM_BASE + 78))\r
1451#define TPM_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 79))\r
1452#define TPM_DAA_RESOURCES ((TPM_RESULT) (TPM_BASE + 80))\r
1453#define TPM_DAA_INPUT_DATA0 ((TPM_RESULT) (TPM_BASE + 81))\r
1454#define TPM_DAA_INPUT_DATA1 ((TPM_RESULT) (TPM_BASE + 82))\r
1455#define TPM_DAA_ISSUER_SETTINGS ((TPM_RESULT) (TPM_BASE + 83))\r
1456#define TPM_DAA_TPM_SETTINGS ((TPM_RESULT) (TPM_BASE + 84))\r
1457#define TPM_DAA_STAGE ((TPM_RESULT) (TPM_BASE + 85))\r
1458#define TPM_DAA_ISSUER_VALIDITY ((TPM_RESULT) (TPM_BASE + 86))\r
1459#define TPM_DAA_WRONG_W ((TPM_RESULT) (TPM_BASE + 87))\r
1460#define TPM_BAD_HANDLE ((TPM_RESULT) (TPM_BASE + 88))\r
1461#define TPM_BAD_DELEGATE ((TPM_RESULT) (TPM_BASE + 89))\r
1462#define TPM_BADCONTEXT ((TPM_RESULT) (TPM_BASE + 90))\r
1463#define TPM_TOOMANYCONTEXTS ((TPM_RESULT) (TPM_BASE + 91))\r
1464#define TPM_MA_TICKET_SIGNATURE ((TPM_RESULT) (TPM_BASE + 92))\r
1465#define TPM_MA_DESTINATION ((TPM_RESULT) (TPM_BASE + 93))\r
1466#define TPM_MA_SOURCE ((TPM_RESULT) (TPM_BASE + 94))\r
1467#define TPM_MA_AUTHORITY ((TPM_RESULT) (TPM_BASE + 95))\r
1468#define TPM_PERMANENTEK ((TPM_RESULT) (TPM_BASE + 97))\r
1469#define TPM_BAD_SIGNATURE ((TPM_RESULT) (TPM_BASE + 98))\r
1470#define TPM_NOCONTEXTSPACE ((TPM_RESULT) (TPM_BASE + 99))\r
1471\r
1472#define TPM_RETRY ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL))\r
1473#define TPM_NEEDS_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 1))\r
1474#define TPM_DOING_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 2))\r
1475#define TPM_DEFEND_LOCK_RUNNING ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 3))\r
1476\r
1477//\r
1478// Part 2, section 17: Ordinals\r
1479//\r
1480// Ordinals are 32 bit values. The upper byte contains values that serve as\r
1481// flag indicators, the next byte contains values indicating what committee\r
1482// designated the ordinal, and the final two bytes contain the Command\r
1483// Ordinal Index.\r
1484// 3 2 1\r
1485// 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0\r
1486// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r
1487// |P|C|V| Reserved| Purview | Command Ordinal Index |\r
1488// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r
1489//\r
1490// Where:\r
1491//\r
1492// * P is Protected/Unprotected command. When 0 the command is a Protected\r
1493// command, when 1 the command is an Unprotected command.\r
1494//\r
1495// * C is Non-Connection/Connection related command. When 0 this command\r
1496// passes through to either the protected (TPM) or unprotected (TSS)\r
1497// components.\r
1498//\r
1499// * V is TPM/Vendor command. When 0 the command is TPM defined, when 1 the\r
1500// command is vendor defined.\r
1501//\r
1502// * All reserved area bits are set to 0.\r
1503//\r
1504\r
1505#define TPM_ORD_ActivateIdentity ((TPM_COMMAND_CODE) 0x0000007A)\r
1506#define TPM_ORD_AuthorizeMigrationKey ((TPM_COMMAND_CODE) 0x0000002B)\r
1507#define TPM_ORD_CertifyKey ((TPM_COMMAND_CODE) 0x00000032)\r
1508#define TPM_ORD_CertifyKey2 ((TPM_COMMAND_CODE) 0x00000033)\r
1509#define TPM_ORD_CertifySelfTest ((TPM_COMMAND_CODE) 0x00000052)\r
1510#define TPM_ORD_ChangeAuth ((TPM_COMMAND_CODE) 0x0000000C)\r
1511#define TPM_ORD_ChangeAuthAsymFinish ((TPM_COMMAND_CODE) 0x0000000F)\r
1512#define TPM_ORD_ChangeAuthAsymStart ((TPM_COMMAND_CODE) 0x0000000E)\r
1513#define TPM_ORD_ChangeAuthOwner ((TPM_COMMAND_CODE) 0x00000010)\r
1514#define TPM_ORD_CMK_ApproveMA ((TPM_COMMAND_CODE) 0x0000001D)\r
1515#define TPM_ORD_CMK_ConvertMigration ((TPM_COMMAND_CODE) 0x00000024)\r
1516#define TPM_ORD_CMK_CreateBlob ((TPM_COMMAND_CODE) 0x0000001B)\r
1517#define TPM_ORD_CMK_CreateKey ((TPM_COMMAND_CODE) 0x00000013)\r
1518#define TPM_ORD_CMK_CreateTicket ((TPM_COMMAND_CODE) 0x00000012)\r
1519#define TPM_ORD_CMK_SetRestrictions ((TPM_COMMAND_CODE) 0x0000001C)\r
1520#define TPM_ORD_ContinueSelfTest ((TPM_COMMAND_CODE) 0x00000053)\r
1521#define TPM_ORD_ConvertMigrationBlob ((TPM_COMMAND_CODE) 0x0000002A)\r
1522#define TPM_ORD_CreateCounter ((TPM_COMMAND_CODE) 0x000000DC)\r
1523#define TPM_ORD_CreateEndorsementKeyPair ((TPM_COMMAND_CODE) 0x00000078)\r
1524#define TPM_ORD_CreateMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002C)\r
1525#define TPM_ORD_CreateMigrationBlob ((TPM_COMMAND_CODE) 0x00000028)\r
1526#define TPM_ORD_CreateRevocableEK ((TPM_COMMAND_CODE) 0x0000007F)\r
1527#define TPM_ORD_CreateWrapKey ((TPM_COMMAND_CODE) 0x0000001F)\r
1528#define TPM_ORD_DAA_JOIN ((TPM_COMMAND_CODE) 0x00000029)\r
1529#define TPM_ORD_DAA_SIGN ((TPM_COMMAND_CODE) 0x00000031)\r
1530#define TPM_ORD_Delegate_CreateKeyDelegation ((TPM_COMMAND_CODE) 0x000000D4)\r
1531#define TPM_ORD_Delegate_CreateOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D5)\r
1532#define TPM_ORD_Delegate_LoadOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D8)\r
1533#define TPM_ORD_Delegate_Manage ((TPM_COMMAND_CODE) 0x000000D2)\r
1534#define TPM_ORD_Delegate_ReadTable ((TPM_COMMAND_CODE) 0x000000DB)\r
1535#define TPM_ORD_Delegate_UpdateVerification ((TPM_COMMAND_CODE) 0x000000D1)\r
1536#define TPM_ORD_Delegate_VerifyDelegation ((TPM_COMMAND_CODE) 0x000000D6)\r
1537#define TPM_ORD_DirRead ((TPM_COMMAND_CODE) 0x0000001A)\r
1538#define TPM_ORD_DirWriteAuth ((TPM_COMMAND_CODE) 0x00000019)\r
1539#define TPM_ORD_DisableForceClear ((TPM_COMMAND_CODE) 0x0000005E)\r
1540#define TPM_ORD_DisableOwnerClear ((TPM_COMMAND_CODE) 0x0000005C)\r
1541#define TPM_ORD_DisablePubekRead ((TPM_COMMAND_CODE) 0x0000007E)\r
1542#define TPM_ORD_DSAP ((TPM_COMMAND_CODE) 0x00000011)\r
1543#define TPM_ORD_EstablishTransport ((TPM_COMMAND_CODE) 0x000000E6)\r
1544#define TPM_ORD_EvictKey ((TPM_COMMAND_CODE) 0x00000022)\r
1545#define TPM_ORD_ExecuteTransport ((TPM_COMMAND_CODE) 0x000000E7)\r
1546#define TPM_ORD_Extend ((TPM_COMMAND_CODE) 0x00000014)\r
1547#define TPM_ORD_FieldUpgrade ((TPM_COMMAND_CODE) 0x000000AA)\r
1548#define TPM_ORD_FlushSpecific ((TPM_COMMAND_CODE) 0x000000BA)\r
1549#define TPM_ORD_ForceClear ((TPM_COMMAND_CODE) 0x0000005D)\r
1550#define TPM_ORD_GetAuditDigest ((TPM_COMMAND_CODE) 0x00000085)\r
1551#define TPM_ORD_GetAuditDigestSigned ((TPM_COMMAND_CODE) 0x00000086)\r
1552#define TPM_ORD_GetAuditEvent ((TPM_COMMAND_CODE) 0x00000082)\r
1553#define TPM_ORD_GetAuditEventSigned ((TPM_COMMAND_CODE) 0x00000083)\r
1554#define TPM_ORD_GetCapability ((TPM_COMMAND_CODE) 0x00000065)\r
1555#define TPM_ORD_GetCapabilityOwner ((TPM_COMMAND_CODE) 0x00000066)\r
1556#define TPM_ORD_GetCapabilitySigned ((TPM_COMMAND_CODE) 0x00000064)\r
1557#define TPM_ORD_GetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008C)\r
1558#define TPM_ORD_GetPubKey ((TPM_COMMAND_CODE) 0x00000021)\r
1559#define TPM_ORD_GetRandom ((TPM_COMMAND_CODE) 0x00000046)\r
1560#define TPM_ORD_GetTestResult ((TPM_COMMAND_CODE) 0x00000054)\r
1561#define TPM_ORD_GetTicks ((TPM_COMMAND_CODE) 0x000000F1)\r
1562#define TPM_ORD_IncrementCounter ((TPM_COMMAND_CODE) 0x000000DD)\r
1563#define TPM_ORD_Init ((TPM_COMMAND_CODE) 0x00000097)\r
1564#define TPM_ORD_KeyControlOwner ((TPM_COMMAND_CODE) 0x00000023)\r
1565#define TPM_ORD_KillMaintenanceFeature ((TPM_COMMAND_CODE) 0x0000002E)\r
1566#define TPM_ORD_LoadAuthContext ((TPM_COMMAND_CODE) 0x000000B7)\r
1567#define TPM_ORD_LoadContext ((TPM_COMMAND_CODE) 0x000000B9)\r
1568#define TPM_ORD_LoadKey ((TPM_COMMAND_CODE) 0x00000020)\r
1569#define TPM_ORD_LoadKey2 ((TPM_COMMAND_CODE) 0x00000041)\r
1570#define TPM_ORD_LoadKeyContext ((TPM_COMMAND_CODE) 0x000000B5)\r
1571#define TPM_ORD_LoadMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002D)\r
1572#define TPM_ORD_LoadManuMaintPub ((TPM_COMMAND_CODE) 0x0000002F)\r
1573#define TPM_ORD_MakeIdentity ((TPM_COMMAND_CODE) 0x00000079)\r
1574#define TPM_ORD_MigrateKey ((TPM_COMMAND_CODE) 0x00000025)\r
1575#define TPM_ORD_NV_DefineSpace ((TPM_COMMAND_CODE) 0x000000CC)\r
1576#define TPM_ORD_NV_ReadValue ((TPM_COMMAND_CODE) 0x000000CF)\r
1577#define TPM_ORD_NV_ReadValueAuth ((TPM_COMMAND_CODE) 0x000000D0)\r
1578#define TPM_ORD_NV_WriteValue ((TPM_COMMAND_CODE) 0x000000CD)\r
1579#define TPM_ORD_NV_WriteValueAuth ((TPM_COMMAND_CODE) 0x000000CE)\r
1580#define TPM_ORD_OIAP ((TPM_COMMAND_CODE) 0x0000000A)\r
1581#define TPM_ORD_OSAP ((TPM_COMMAND_CODE) 0x0000000B)\r
1582#define TPM_ORD_OwnerClear ((TPM_COMMAND_CODE) 0x0000005B)\r
1583#define TPM_ORD_OwnerReadInternalPub ((TPM_COMMAND_CODE) 0x00000081)\r
1584#define TPM_ORD_OwnerReadPubek ((TPM_COMMAND_CODE) 0x0000007D)\r
1585#define TPM_ORD_OwnerSetDisable ((TPM_COMMAND_CODE) 0x0000006E)\r
1586#define TPM_ORD_PCR_Reset ((TPM_COMMAND_CODE) 0x000000C8)\r
1587#define TPM_ORD_PcrRead ((TPM_COMMAND_CODE) 0x00000015)\r
1588#define TPM_ORD_PhysicalDisable ((TPM_COMMAND_CODE) 0x00000070)\r
1589#define TPM_ORD_PhysicalEnable ((TPM_COMMAND_CODE) 0x0000006F)\r
1590#define TPM_ORD_PhysicalSetDeactivated ((TPM_COMMAND_CODE) 0x00000072)\r
1591#define TPM_ORD_Quote ((TPM_COMMAND_CODE) 0x00000016)\r
1592#define TPM_ORD_Quote2 ((TPM_COMMAND_CODE) 0x0000003E)\r
1593#define TPM_ORD_ReadCounter ((TPM_COMMAND_CODE) 0x000000DE)\r
1594#define TPM_ORD_ReadManuMaintPub ((TPM_COMMAND_CODE) 0x00000030)\r
1595#define TPM_ORD_ReadPubek ((TPM_COMMAND_CODE) 0x0000007C)\r
1596#define TPM_ORD_ReleaseCounter ((TPM_COMMAND_CODE) 0x000000DF)\r
1597#define TPM_ORD_ReleaseCounterOwner ((TPM_COMMAND_CODE) 0x000000E0)\r
1598#define TPM_ORD_ReleaseTransportSigned ((TPM_COMMAND_CODE) 0x000000E8)\r
1599#define TPM_ORD_Reset ((TPM_COMMAND_CODE) 0x0000005A)\r
1600#define TPM_ORD_ResetLockValue ((TPM_COMMAND_CODE) 0x00000040)\r
1601#define TPM_ORD_RevokeTrust ((TPM_COMMAND_CODE) 0x00000080)\r
1602#define TPM_ORD_SaveAuthContext ((TPM_COMMAND_CODE) 0x000000B6)\r
1603#define TPM_ORD_SaveContext ((TPM_COMMAND_CODE) 0x000000B8)\r
1604#define TPM_ORD_SaveKeyContext ((TPM_COMMAND_CODE) 0x000000B4)\r
1605#define TPM_ORD_SaveState ((TPM_COMMAND_CODE) 0x00000098)\r
1606#define TPM_ORD_Seal ((TPM_COMMAND_CODE) 0x00000017)\r
1607#define TPM_ORD_Sealx ((TPM_COMMAND_CODE) 0x0000003D)\r
1608#define TPM_ORD_SelfTestFull ((TPM_COMMAND_CODE) 0x00000050)\r
1609#define TPM_ORD_SetCapability ((TPM_COMMAND_CODE) 0x0000003F)\r
1610#define TPM_ORD_SetOperatorAuth ((TPM_COMMAND_CODE) 0x00000074)\r
1611#define TPM_ORD_SetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008D)\r
1612#define TPM_ORD_SetOwnerInstall ((TPM_COMMAND_CODE) 0x00000071)\r
1613#define TPM_ORD_SetOwnerPointer ((TPM_COMMAND_CODE) 0x00000075)\r
1614#define TPM_ORD_SetRedirection ((TPM_COMMAND_CODE) 0x0000009A)\r
1615#define TPM_ORD_SetTempDeactivated ((TPM_COMMAND_CODE) 0x00000073)\r
1616#define TPM_ORD_SHA1Complete ((TPM_COMMAND_CODE) 0x000000A2)\r
1617#define TPM_ORD_SHA1CompleteExtend ((TPM_COMMAND_CODE) 0x000000A3)\r
1618#define TPM_ORD_SHA1Start ((TPM_COMMAND_CODE) 0x000000A0)\r
1619#define TPM_ORD_SHA1Update ((TPM_COMMAND_CODE) 0x000000A1)\r
1620#define TPM_ORD_Sign ((TPM_COMMAND_CODE) 0x0000003C)\r
1621#define TPM_ORD_Startup ((TPM_COMMAND_CODE) 0x00000099)\r
1622#define TPM_ORD_StirRandom ((TPM_COMMAND_CODE) 0x00000047)\r
1623#define TPM_ORD_TakeOwnership ((TPM_COMMAND_CODE) 0x0000000D)\r
1624#define TPM_ORD_Terminate_Handle ((TPM_COMMAND_CODE) 0x00000096)\r
1625#define TPM_ORD_TickStampBlob ((TPM_COMMAND_CODE) 0x000000F2)\r
1626#define TPM_ORD_UnBind ((TPM_COMMAND_CODE) 0x0000001E)\r
1627#define TPM_ORD_Unseal ((TPM_COMMAND_CODE) 0x00000018)\r
1628#define TSC_ORD_PhysicalPresence ((TPM_COMMAND_CODE) 0x4000000A)\r
1629#define TSC_ORD_ResetEstablishmentBit ((TPM_COMMAND_CODE) 0x4000000B)\r
1630\r
1631//\r
1632// Part 2, section 18: Context structures\r
1633//\r
1634\r
427987f5 1635///\r
1636/// Part 2, section 18.1: TPM_CONTEXT_BLOB\r
1637///\r
4135253b 1638typedef struct tdTPM_CONTEXT_BLOB {\r
1639 TPM_STRUCTURE_TAG tag;\r
1640 TPM_RESOURCE_TYPE resourceType;\r
1641 TPM_HANDLE handle;\r
1642 UINT8 label[16];\r
1643 UINT32 contextCount;\r
1644 TPM_DIGEST integrityDigest;\r
1645 UINT32 additionalSize;\r
1646 UINT8 *additionalData;\r
1647 UINT32 sensitiveSize;\r
1648 UINT8 *sensitiveData;\r
267669ba
LG
1649} TPM_CONTEXT_BLOB;\r
1650\r
427987f5 1651///\r
1652/// Part 2, section 18.2 TPM_CONTEXT_SENSITIVE\r
1653///\r
4135253b 1654typedef struct tdTPM_CONTEXT_SENSITIVE {\r
1655 TPM_STRUCTURE_TAG tag;\r
1656 TPM_NONCE contextNonce;\r
1657 UINT32 internalSize;\r
1658 UINT8 *internalData;\r
267669ba
LG
1659} TPM_CONTEXT_SENSITIVE;\r
1660\r
1661//\r
1662// Part 2, section 19: NV Structures\r
1663//\r
1664\r
4135253b 1665//\r
1666// Part 2, section 19.1.1: Required TPM_NV_INDEX values\r
1667//\r
267669ba
LG
1668#define TPM_NV_INDEX_LOCK ((UINT32)0xffffffff)\r
1669#define TPM_NV_INDEX0 ((UINT32)0x00000000)\r
1670#define TPM_NV_INDEX_DIR ((UINT32)0x10000001)\r
1671#define TPM_NV_INDEX_EKCert ((UINT32)0x0000f000)\r
1672#define TPM_NV_INDEX_TPM_CC ((UINT32)0x0000f001)\r
1673#define TPM_NV_INDEX_PlatformCert ((UINT32)0x0000f002)\r
1674#define TPM_NV_INDEX_Platform_CC ((UINT32)0x0000f003)\r
4135253b 1675//\r
1676// Part 2, section 19.1.2: Reserved Index values\r
1677//\r
267669ba
LG
1678#define TPM_NV_INDEX_TSS_BASE ((UINT32)0x00011100)\r
1679#define TPM_NV_INDEX_PC_BASE ((UINT32)0x00011200)\r
1680#define TPM_NV_INDEX_SERVER_BASE ((UINT32)0x00011300)\r
1681#define TPM_NV_INDEX_MOBILE_BASE ((UINT32)0x00011400)\r
1682#define TPM_NV_INDEX_PERIPHERAL_BASE ((UINT32)0x00011500)\r
1683#define TPM_NV_INDEX_GROUP_RESV_BASE ((UINT32)0x00010000)\r
1684\r
427987f5 1685///\r
1686/// Part 2, section 19.2: TPM_NV_ATTRIBUTES\r
1687///\r
1688typedef struct tdTPM_NV_ATTRIBUTES {\r
1689 TPM_STRUCTURE_TAG tag;\r
f754f721 1690 UINT32 attributes;\r
427987f5 1691} TPM_NV_ATTRIBUTES;\r
1692\r
4135253b 1693#define TPM_NV_PER_READ_STCLEAR (BIT31)\r
1694#define TPM_NV_PER_AUTHREAD (BIT18)\r
1695#define TPM_NV_PER_OWNERREAD (BIT17)\r
1696#define TPM_NV_PER_PPREAD (BIT16)\r
1697#define TPM_NV_PER_GLOBALLOCK (BIT15)\r
1698#define TPM_NV_PER_WRITE_STCLEAR (BIT14)\r
1699#define TPM_NV_PER_WRITEDEFINE (BIT13)\r
1700#define TPM_NV_PER_WRITEALL (BIT12)\r
1701#define TPM_NV_PER_AUTHWRITE (BIT2)\r
1702#define TPM_NV_PER_OWNERWRITE (BIT1)\r
1703#define TPM_NV_PER_PPWRITE (BIT0)\r
267669ba 1704\r
427987f5 1705///\r
1706/// Part 2, section 19.3: TPM_NV_DATA_PUBLIC\r
1707///\r
4135253b 1708typedef struct tdTPM_NV_DATA_PUBLIC {\r
1709 TPM_STRUCTURE_TAG tag;\r
1710 TPM_NV_INDEX nvIndex;\r
1711 TPM_PCR_INFO_SHORT pcrInfoRead;\r
1712 TPM_PCR_INFO_SHORT pcrInfoWrite;\r
1713 TPM_NV_ATTRIBUTES permission;\r
1714 BOOLEAN bReadSTClear;\r
1715 BOOLEAN bWriteSTClear;\r
1716 BOOLEAN bWriteDefine;\r
1717 UINT32 dataSize;\r
1718} TPM_NV_DATA_PUBLIC;\r
267669ba 1719\r
4135253b 1720//\r
1721// Part 2, section 20: Delegate Structures\r
1722//\r
267669ba 1723\r
4135253b 1724#define TPM_DEL_OWNER_BITS ((UINT32)0x00000001)\r
1725#define TPM_DEL_KEY_BITS ((UINT32)0x00000002)\r
cc078d72 1726///\r
1727/// Part 2, section 20.2: Delegate Definitions\r
1728///\r
4135253b 1729typedef struct tdTPM_DELEGATIONS {\r
1730 TPM_STRUCTURE_TAG tag;\r
1731 UINT32 delegateType;\r
1732 UINT32 per1;\r
1733 UINT32 per2;\r
1734} TPM_DELEGATIONS;\r
267669ba 1735\r
4135253b 1736//\r
1737// Part 2, section 20.2.1: Owner Permission Settings\r
1738//\r
1739#define TPM_DELEGATE_SetOrdinalAuditStatus (BIT30)\r
1740#define TPM_DELEGATE_DirWriteAuth (BIT29)\r
1741#define TPM_DELEGATE_CMK_ApproveMA (BIT28)\r
1919913f 1742#define TPM_DELEGATE_NV_WriteValue (BIT27)\r
4135253b 1743#define TPM_DELEGATE_CMK_CreateTicket (BIT26)\r
1919913f 1744#define TPM_DELEGATE_NV_ReadValue (BIT25)\r
4135253b 1745#define TPM_DELEGATE_Delegate_LoadOwnerDelegation (BIT24)\r
1746#define TPM_DELEGATE_DAA_Join (BIT23)\r
1747#define TPM_DELEGATE_AuthorizeMigrationKey (BIT22)\r
1748#define TPM_DELEGATE_CreateMaintenanceArchive (BIT21)\r
1749#define TPM_DELEGATE_LoadMaintenanceArchive (BIT20)\r
1750#define TPM_DELEGATE_KillMaintenanceFeature (BIT19)\r
1751#define TPM_DELEGATE_OwnerReadInteralPub (BIT18)\r
1752#define TPM_DELEGATE_ResetLockValue (BIT17)\r
1753#define TPM_DELEGATE_OwnerClear (BIT16)\r
1754#define TPM_DELEGATE_DisableOwnerClear (BIT15)\r
1919913f 1755#define TPM_DELEGATE_NV_DefineSpace (BIT14)\r
4135253b 1756#define TPM_DELEGATE_OwnerSetDisable (BIT13)\r
1757#define TPM_DELEGATE_SetCapability (BIT12)\r
1758#define TPM_DELEGATE_MakeIdentity (BIT11)\r
1759#define TPM_DELEGATE_ActivateIdentity (BIT10)\r
1760#define TPM_DELEGATE_OwnerReadPubek (BIT9)\r
1761#define TPM_DELEGATE_DisablePubekRead (BIT8)\r
1762#define TPM_DELEGATE_SetRedirection (BIT7)\r
1763#define TPM_DELEGATE_FieldUpgrade (BIT6)\r
1764#define TPM_DELEGATE_Delegate_UpdateVerification (BIT5)\r
1765#define TPM_DELEGATE_CreateCounter (BIT4)\r
1766#define TPM_DELEGATE_ReleaseCounterOwner (BIT3)\r
1767#define TPM_DELEGATE_DelegateManage (BIT2)\r
1768#define TPM_DELEGATE_Delegate_CreateOwnerDelegation (BIT1)\r
1769#define TPM_DELEGATE_DAA_Sign (BIT0)\r
1770\r
1771//\r
1772// Part 2, section 20.2.3: Key Permission settings\r
1773//\r
1774#define TPM_KEY_DELEGATE_CMK_ConvertMigration (BIT28)\r
1775#define TPM_KEY_DELEGATE_TickStampBlob (BIT27)\r
1776#define TPM_KEY_DELEGATE_ChangeAuthAsymStart (BIT26)\r
1777#define TPM_KEY_DELEGATE_ChangeAuthAsymFinish (BIT25)\r
1778#define TPM_KEY_DELEGATE_CMK_CreateKey (BIT24)\r
1779#define TPM_KEY_DELEGATE_MigrateKey (BIT23)\r
1780#define TPM_KEY_DELEGATE_LoadKey2 (BIT22)\r
1781#define TPM_KEY_DELEGATE_EstablishTransport (BIT21)\r
1782#define TPM_KEY_DELEGATE_ReleaseTransportSigned (BIT20)\r
1783#define TPM_KEY_DELEGATE_Quote2 (BIT19)\r
1784#define TPM_KEY_DELEGATE_Sealx (BIT18)\r
1785#define TPM_KEY_DELEGATE_MakeIdentity (BIT17)\r
1786#define TPM_KEY_DELEGATE_ActivateIdentity (BIT16)\r
1787#define TPM_KEY_DELEGATE_GetAuditDigestSigned (BIT15)\r
1788#define TPM_KEY_DELEGATE_Sign (BIT14)\r
1789#define TPM_KEY_DELEGATE_CertifyKey2 (BIT13)\r
1790#define TPM_KEY_DELEGATE_CertifyKey (BIT12)\r
1791#define TPM_KEY_DELEGATE_CreateWrapKey (BIT11)\r
1792#define TPM_KEY_DELEGATE_CMK_CreateBlob (BIT10)\r
1793#define TPM_KEY_DELEGATE_CreateMigrationBlob (BIT9)\r
1794#define TPM_KEY_DELEGATE_ConvertMigrationBlob (BIT8)\r
1795#define TPM_KEY_DELEGATE_CreateKeyDelegation (BIT7)\r
1796#define TPM_KEY_DELEGATE_ChangeAuth (BIT6)\r
1797#define TPM_KEY_DELEGATE_GetPubKey (BIT5)\r
1798#define TPM_KEY_DELEGATE_UnBind (BIT4)\r
1799#define TPM_KEY_DELEGATE_Quote (BIT3)\r
1800#define TPM_KEY_DELEGATE_Unseal (BIT2)\r
1801#define TPM_KEY_DELEGATE_Seal (BIT1)\r
1802#define TPM_KEY_DELEGATE_LoadKey (BIT0)\r
1803\r
1804//\r
1805// Part 2, section 20.3: TPM_FAMILY_FLAGS\r
1806//\r
1807#define TPM_DELEGATE_ADMIN_LOCK (BIT1)\r
1808#define TPM_FAMFLAG_ENABLE (BIT0)\r
1809\r
427987f5 1810///\r
1811/// Part 2, section 20.4: TPM_FAMILY_LABEL\r
1812///\r
4135253b 1813typedef struct tdTPM_FAMILY_LABEL {\r
1814 UINT8 label;\r
267669ba
LG
1815} TPM_FAMILY_LABEL;\r
1816\r
427987f5 1817///\r
1818/// Part 2, section 20.5: TPM_FAMILY_TABLE_ENTRY\r
1819///\r
4135253b 1820typedef struct tdTPM_FAMILY_TABLE_ENTRY {\r
1821 TPM_STRUCTURE_TAG tag;\r
1822 TPM_FAMILY_LABEL label;\r
1823 TPM_FAMILY_ID familyID;\r
1824 TPM_FAMILY_VERIFICATION verificationCount;\r
1825 TPM_FAMILY_FLAGS flags;\r
267669ba
LG
1826} TPM_FAMILY_TABLE_ENTRY;\r
1827\r
4135253b 1828//\r
1829// Part 2, section 20.6: TPM_FAMILY_TABLE\r
1830//\r
1831#define TPM_NUM_FAMILY_TABLE_ENTRY_MIN 8\r
267669ba 1832\r
4135253b 1833typedef struct tdTPM_FAMILY_TABLE{\r
1834 TPM_FAMILY_TABLE_ENTRY famTableRow[TPM_NUM_FAMILY_TABLE_ENTRY_MIN];\r
1835} TPM_FAMILY_TABLE;\r
267669ba 1836\r
427987f5 1837///\r
1838/// Part 2, section 20.7: TPM_DELEGATE_LABEL\r
1839///\r
4135253b 1840typedef struct tdTPM_DELEGATE_LABEL {\r
1841 UINT8 label;\r
267669ba
LG
1842} TPM_DELEGATE_LABEL;\r
1843\r
427987f5 1844///\r
1845/// Part 2, section 20.8: TPM_DELEGATE_PUBLIC\r
1846///\r
4135253b 1847typedef struct tdTPM_DELEGATE_PUBLIC {\r
1848 TPM_STRUCTURE_TAG tag;\r
1849 TPM_DELEGATE_LABEL label;\r
1850 TPM_PCR_INFO_SHORT pcrInfo;\r
1851 TPM_DELEGATIONS permissions;\r
1852 TPM_FAMILY_ID familyID;\r
1853 TPM_FAMILY_VERIFICATION verificationCount;\r
267669ba
LG
1854} TPM_DELEGATE_PUBLIC;\r
1855\r
427987f5 1856///\r
1857/// Part 2, section 20.9: TPM_DELEGATE_TABLE_ROW\r
1858///\r
4135253b 1859typedef struct tdTPM_DELEGATE_TABLE_ROW {\r
1860 TPM_STRUCTURE_TAG tag;\r
1861 TPM_DELEGATE_PUBLIC pub;\r
1862 TPM_SECRET authValue;\r
267669ba
LG
1863} TPM_DELEGATE_TABLE_ROW;\r
1864\r
4135253b 1865//\r
1866// Part 2, section 20.10: TPM_DELEGATE_TABLE\r
1867//\r
267669ba 1868#define TPM_NUM_DELEGATE_TABLE_ENTRY_MIN 2\r
4135253b 1869\r
1870typedef struct tdTPM_DELEGATE_TABLE{\r
1871 TPM_DELEGATE_TABLE_ROW delRow[TPM_NUM_DELEGATE_TABLE_ENTRY_MIN];\r
1872} TPM_DELEGATE_TABLE;\r
1873\r
427987f5 1874///\r
1875/// Part 2, section 20.11: TPM_DELEGATE_SENSITIVE\r
1876///\r
4135253b 1877typedef struct tdTPM_DELEGATE_SENSITIVE {\r
1878 TPM_STRUCTURE_TAG tag;\r
1879 TPM_SECRET authValue;\r
267669ba
LG
1880} TPM_DELEGATE_SENSITIVE;\r
1881\r
427987f5 1882///\r
1883/// Part 2, section 20.12: TPM_DELEGATE_OWNER_BLOB\r
1884///\r
4135253b 1885typedef struct tdTPM_DELEGATE_OWNER_BLOB {\r
1886 TPM_STRUCTURE_TAG tag;\r
1887 TPM_DELEGATE_PUBLIC pub;\r
1888 TPM_DIGEST integrityDigest;\r
1889 UINT32 additionalSize;\r
1890 UINT8 *additionalArea;\r
1891 UINT32 sensitiveSize;\r
1892 UINT8 *sensitiveArea;\r
267669ba
LG
1893} TPM_DELEGATE_OWNER_BLOB;\r
1894\r
427987f5 1895///\r
1896/// Part 2, section 20.13: TTPM_DELEGATE_KEY_BLOB\r
1897///\r
4135253b 1898typedef struct tdTPM_DELEGATE_KEY_BLOB {\r
1899 TPM_STRUCTURE_TAG tag;\r
1900 TPM_DELEGATE_PUBLIC pub;\r
1901 TPM_DIGEST integrityDigest;\r
1902 TPM_DIGEST pubKeyDigest;\r
1903 UINT32 additionalSize;\r
1904 UINT8 *additionalArea;\r
1905 UINT32 sensitiveSize;\r
1906 UINT8 *sensitiveArea;\r
267669ba
LG
1907} TPM_DELEGATE_KEY_BLOB;\r
1908\r
4135253b 1909//\r
1910// Part 2, section 20.14: TPM_FAMILY_OPERATION Values\r
1911//\r
1912#define TPM_FAMILY_CREATE ((UINT32)0x00000001)\r
1913#define TPM_FAMILY_ENABLE ((UINT32)0x00000002)\r
1914#define TPM_FAMILY_ADMIN ((UINT32)0x00000003)\r
1915#define TPM_FAMILY_INVALIDATE ((UINT32)0x00000004)\r
1916\r
267669ba
LG
1917//\r
1918// Part 2, section 21.1: TPM_CAPABILITY_AREA for GetCapability\r
1919//\r
1920#define TPM_CAP_ORD ((TPM_CAPABILITY_AREA) 0x00000001)\r
1921#define TPM_CAP_ALG ((TPM_CAPABILITY_AREA) 0x00000002)\r
1922#define TPM_CAP_PID ((TPM_CAPABILITY_AREA) 0x00000003)\r
1923#define TPM_CAP_FLAG ((TPM_CAPABILITY_AREA) 0x00000004)\r
1924#define TPM_CAP_PROPERTY ((TPM_CAPABILITY_AREA) 0x00000005)\r
1925#define TPM_CAP_VERSION ((TPM_CAPABILITY_AREA) 0x00000006)\r
1926#define TPM_CAP_KEY_HANDLE ((TPM_CAPABILITY_AREA) 0x00000007)\r
1927#define TPM_CAP_CHECK_LOADED ((TPM_CAPABILITY_AREA) 0x00000008)\r
1928#define TPM_CAP_SYM_MODE ((TPM_CAPABILITY_AREA) 0x00000009)\r
1929#define TPM_CAP_KEY_STATUS ((TPM_CAPABILITY_AREA) 0x0000000C)\r
1930#define TPM_CAP_NV_LIST ((TPM_CAPABILITY_AREA) 0x0000000D)\r
1931#define TPM_CAP_MFR ((TPM_CAPABILITY_AREA) 0x00000010)\r
1932#define TPM_CAP_NV_INDEX ((TPM_CAPABILITY_AREA) 0x00000011)\r
1933#define TPM_CAP_TRANS_ALG ((TPM_CAPABILITY_AREA) 0x00000012)\r
1934#define TPM_CAP_HANDLE ((TPM_CAPABILITY_AREA) 0x00000014)\r
1935#define TPM_CAP_TRANS_ES ((TPM_CAPABILITY_AREA) 0x00000015)\r
1936#define TPM_CAP_AUTH_ENCRYPT ((TPM_CAPABILITY_AREA) 0x00000017)\r
1937#define TPM_CAP_SELECT_SIZE ((TPM_CAPABILITY_AREA) 0x00000018)\r
1938#define TPM_CAP_VERSION_VAL ((TPM_CAPABILITY_AREA) 0x0000001A)\r
1939\r
1940#define TPM_CAP_FLAG_PERMANENT ((TPM_CAPABILITY_AREA) 0x00000108)\r
1941#define TPM_CAP_FLAG_VOLATILE ((TPM_CAPABILITY_AREA) 0x00000109)\r
1942\r
1943//\r
1944// Part 2, section 21.2: CAP_PROPERTY Subcap values for GetCapability\r
1945//\r
1946#define TPM_CAP_PROP_PCR ((TPM_CAPABILITY_AREA) 0x00000101)\r
1947#define TPM_CAP_PROP_DIR ((TPM_CAPABILITY_AREA) 0x00000102)\r
1948#define TPM_CAP_PROP_MANUFACTURER ((TPM_CAPABILITY_AREA) 0x00000103)\r
1949#define TPM_CAP_PROP_KEYS ((TPM_CAPABILITY_AREA) 0x00000104)\r
1950#define TPM_CAP_PROP_MIN_COUNTER ((TPM_CAPABILITY_AREA) 0x00000107)\r
1951#define TPM_CAP_PROP_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010A)\r
1952#define TPM_CAP_PROP_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010B)\r
1953#define TPM_CAP_PROP_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010C)\r
1954#define TPM_CAP_PROP_MAX_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010D)\r
1955#define TPM_CAP_PROP_MAX_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010E)\r
1956#define TPM_CAP_PROP_MAX_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010F)\r
1957#define TPM_CAP_PROP_MAX_KEYS ((TPM_CAPABILITY_AREA) 0x00000110)\r
1958#define TPM_CAP_PROP_OWNER ((TPM_CAPABILITY_AREA) 0x00000111)\r
1959#define TPM_CAP_PROP_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000112)\r
1960#define TPM_CAP_PROP_MAX_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000113)\r
1961#define TPM_CAP_PROP_FAMILYROWS ((TPM_CAPABILITY_AREA) 0x00000114)\r
1962#define TPM_CAP_PROP_TIS_TIMEOUT ((TPM_CAPABILITY_AREA) 0x00000115)\r
1963#define TPM_CAP_PROP_STARTUP_EFFECT ((TPM_CAPABILITY_AREA) 0x00000116)\r
1964#define TPM_CAP_PROP_DELEGATE_ROW ((TPM_CAPABILITY_AREA) 0x00000117)\r
1965#define TPM_CAP_PROP_DAA_MAX ((TPM_CAPABILITY_AREA) 0x00000119)\r
1966#define CAP_PROP_SESSION_DAA ((TPM_CAPABILITY_AREA) 0x0000011A)\r
1967#define TPM_CAP_PROP_CONTEXT_DIST ((TPM_CAPABILITY_AREA) 0x0000011B)\r
1968#define TPM_CAP_PROP_DAA_INTERRUPT ((TPM_CAPABILITY_AREA) 0x0000011C)\r
1969#define TPM_CAP_PROP_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011D)\r
1970#define TPM_CAP_PROP_MAX_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011E)\r
1971#define TPM_CAP_PROP_CMK_RESTRICTION ((TPM_CAPABILITY_AREA) 0x0000011F)\r
1972#define TPM_CAP_PROP_DURATION ((TPM_CAPABILITY_AREA) 0x00000120)\r
1973#define TPM_CAP_PROP_ACTIVE_COUNTER ((TPM_CAPABILITY_AREA) 0x00000122)\r
1974#define TPM_CAP_PROP_MAX_NV_AVAILABLE ((TPM_CAPABILITY_AREA) 0x00000123)\r
1975#define TPM_CAP_PROP_INPUT_BUFFER ((TPM_CAPABILITY_AREA) 0x00000124)\r
1976\r
1919913f 1977//\r
1978// Part 2, section 21.4: TPM_CAPABILITY_AREA for SetCapability\r
1979//\r
1980#define TPM_SET_PERM_FLAGS ((TPM_CAPABILITY_AREA) 0x00000001)\r
1981#define TPM_SET_PERM_DATA ((TPM_CAPABILITY_AREA) 0x00000002)\r
1982#define TPM_SET_STCLEAR_FLAGS ((TPM_CAPABILITY_AREA) 0x00000003)\r
1983#define TPM_SET_STCLEAR_DATA ((TPM_CAPABILITY_AREA) 0x00000004)\r
1984#define TPM_SET_STANY_FLAGS ((TPM_CAPABILITY_AREA) 0x00000005)\r
1985#define TPM_SET_STANY_DATA ((TPM_CAPABILITY_AREA) 0x00000006)\r
1986\r
427987f5 1987///\r
1988/// Part 2, section 21.6: TPM_CAP_VERSION_INFO\r
1989/// [size_is(vendorSpecificSize)] BYTE* vendorSpecific;\r
1990///\r
267669ba
LG
1991typedef struct tdTPM_CAP_VERSION_INFO {\r
1992 TPM_STRUCTURE_TAG tag;\r
1993 TPM_VERSION version;\r
1994 UINT16 specLevel;\r
1995 UINT8 errataRev;\r
1996 UINT8 tpmVendorID[4];\r
1997 UINT16 vendorSpecificSize;\r
1998 UINT8 *vendorSpecific;\r
1999} TPM_CAP_VERSION_INFO;\r
2000\r
1919913f 2001///\r
2002/// Part 2, section 21.10: TPM_DA_ACTION_TYPE\r
2003///\r
2004typedef struct tdTPM_DA_ACTION_TYPE {\r
2005 TPM_STRUCTURE_TAG tag;\r
2006 UINT32 actions;\r
2007} TPM_DA_ACTION_TYPE;\r
2008\r
2009#define TPM_DA_ACTION_FAILURE_MODE (((UINT32)1)<<3)\r
2010#define TPM_DA_ACTION_DEACTIVATE (((UINT32)1)<<2)\r
2011#define TPM_DA_ACTION_DISABLE (((UINT32)1)<<1)\r
2012#define TPM_DA_ACTION_TIMEOUT (((UINT32)1)<<0)\r
2013\r
2014///\r
2015/// Part 2, section 21.7: TPM_DA_INFO\r
2016///\r
2017typedef struct tdTPM_DA_INFO {\r
2018 TPM_STRUCTURE_TAG tag;\r
2019 TPM_DA_STATE state;\r
2020 UINT16 currentCount;\r
2021 UINT16 thresholdCount;\r
2022 TPM_DA_ACTION_TYPE actionAtThreshold;\r
2023 UINT32 actionDependValue;\r
2024 UINT32 vendorDataSize;\r
2025 UINT8 *vendorData;\r
2026} TPM_DA_INFO;\r
2027\r
2028///\r
2029/// Part 2, section 21.8: TPM_DA_INFO_LIMITED\r
2030///\r
2031typedef struct tdTPM_DA_INFO_LIMITED {\r
2032 TPM_STRUCTURE_TAG tag;\r
2033 TPM_DA_STATE state;\r
2034 TPM_DA_ACTION_TYPE actionAtThreshold;\r
2035 UINT32 vendorDataSize;\r
2036 UINT8 *vendorData;\r
2037} TPM_DA_INFO_LIMITED;\r
2038\r
2039//\r
2040// Part 2, section 21.9: CAP_PROPERTY Subcap values for GetCapability\r
2041//\r
2042#define TPM_DA_STATE_INACTIVE ((UINT8)0x00)\r
2043#define TPM_DA_STATE_ACTIVE ((UINT8)0x01)\r
2044\r
267669ba
LG
2045//\r
2046// Part 2, section 22: DAA Structures\r
2047//\r
2048\r
4135253b 2049//\r
2050// Part 2, section 22.1: Size definitions\r
2051//\r
267669ba
LG
2052#define TPM_DAA_SIZE_r0 (43)\r
2053#define TPM_DAA_SIZE_r1 (43)\r
2054#define TPM_DAA_SIZE_r2 (128)\r
2055#define TPM_DAA_SIZE_r3 (168)\r
2056#define TPM_DAA_SIZE_r4 (219)\r
2057#define TPM_DAA_SIZE_NT (20)\r
2058#define TPM_DAA_SIZE_v0 (128)\r
2059#define TPM_DAA_SIZE_v1 (192)\r
2060#define TPM_DAA_SIZE_NE (256)\r
2061#define TPM_DAA_SIZE_w (256)\r
2062#define TPM_DAA_SIZE_issuerModulus (256)\r
4135253b 2063//\r
2064// Part 2, section 22.2: Constant definitions\r
2065//\r
267669ba
LG
2066#define TPM_DAA_power0 (104)\r
2067#define TPM_DAA_power1 (1024)\r
2068\r
427987f5 2069///\r
2070/// Part 2, section 22.3: TPM_DAA_ISSUER\r
2071///\r
4135253b 2072typedef struct tdTPM_DAA_ISSUER {\r
2073 TPM_STRUCTURE_TAG tag;\r
2074 TPM_DIGEST DAA_digest_R0;\r
2075 TPM_DIGEST DAA_digest_R1;\r
2076 TPM_DIGEST DAA_digest_S0;\r
2077 TPM_DIGEST DAA_digest_S1;\r
2078 TPM_DIGEST DAA_digest_n;\r
2079 TPM_DIGEST DAA_digest_gamma;\r
2080 UINT8 DAA_generic_q[26];\r
267669ba
LG
2081} TPM_DAA_ISSUER;\r
2082\r
427987f5 2083///\r
2084/// Part 2, section 22.4: TPM_DAA_TPM\r
2085///\r
4135253b 2086typedef struct tdTPM_DAA_TPM {\r
2087 TPM_STRUCTURE_TAG tag;\r
2088 TPM_DIGEST DAA_digestIssuer;\r
2089 TPM_DIGEST DAA_digest_v0;\r
2090 TPM_DIGEST DAA_digest_v1;\r
2091 TPM_DIGEST DAA_rekey;\r
2092 UINT32 DAA_count;\r
267669ba
LG
2093} TPM_DAA_TPM;\r
2094\r
427987f5 2095///\r
2096/// Part 2, section 22.5: TPM_DAA_CONTEXT\r
2097///\r
4135253b 2098typedef struct tdTPM_DAA_CONTEXT {\r
2099 TPM_STRUCTURE_TAG tag;\r
2100 TPM_DIGEST DAA_digestContext;\r
2101 TPM_DIGEST DAA_digest;\r
2102 TPM_DAA_CONTEXT_SEED DAA_contextSeed;\r
2103 UINT8 DAA_scratch[256];\r
2104 UINT8 DAA_stage;\r
267669ba
LG
2105} TPM_DAA_CONTEXT;\r
2106\r
427987f5 2107///\r
2108/// Part 2, section 22.6: TPM_DAA_JOINDATA\r
2109///\r
4135253b 2110typedef struct tdTPM_DAA_JOINDATA {\r
2111 UINT8 DAA_join_u0[128];\r
2112 UINT8 DAA_join_u1[138];\r
2113 TPM_DIGEST DAA_digest_n0;\r
267669ba
LG
2114} TPM_DAA_JOINDATA;\r
2115\r
427987f5 2116///\r
2117/// Part 2, section 22.8: TPM_DAA_BLOB\r
2118///\r
4135253b 2119typedef struct tdTPM_DAA_BLOB {\r
2120 TPM_STRUCTURE_TAG tag;\r
2121 TPM_RESOURCE_TYPE resourceType;\r
2122 UINT8 label[16];\r
2123 TPM_DIGEST blobIntegrity;\r
2124 UINT32 additionalSize;\r
2125 UINT8 *additionalData;\r
2126 UINT32 sensitiveSize;\r
2127 UINT8 *sensitiveData;\r
267669ba
LG
2128} TPM_DAA_BLOB;\r
2129\r
427987f5 2130///\r
2131/// Part 2, section 22.9: TPM_DAA_SENSITIVE\r
2132///\r
4135253b 2133typedef struct tdTPM_DAA_SENSITIVE {\r
2134 TPM_STRUCTURE_TAG tag;\r
2135 UINT32 internalSize;\r
2136 UINT8 *internalData;\r
267669ba
LG
2137} TPM_DAA_SENSITIVE;\r
2138\r
2139\r
2140//\r
2141// Part 2, section 23: Redirection\r
2142//\r
2143\r
427987f5 2144///\r
2145/// Part 2 section 23.1: TPM_REDIR_COMMAND\r
2146/// This section defines exactly one value but does not\r
2147/// give it a name. The definition of TPM_SetRedirection in Part3\r
2148/// refers to exactly one name but does not give its value. We join\r
2149/// them here.\r
2150///\r
267669ba
LG
2151#define TPM_REDIR_GPIO (0x00000001)\r
2152\r
427987f5 2153///\r
cc078d72 2154/// TPM Command Headers defined in Part 3\r
427987f5 2155///\r
267669ba
LG
2156typedef struct tdTPM_RQU_COMMAND_HDR {\r
2157 TPM_STRUCTURE_TAG tag;\r
2158 UINT32 paramSize;\r
2159 TPM_COMMAND_CODE ordinal;\r
2160} TPM_RQU_COMMAND_HDR;\r
2161\r
cc078d72 2162///\r
2163/// TPM Response Headers defined in Part 3\r
2164///\r
267669ba
LG
2165typedef struct tdTPM_RSP_COMMAND_HDR {\r
2166 TPM_STRUCTURE_TAG tag;\r
2167 UINT32 paramSize;\r
2168 TPM_RESULT returnCode;\r
2169} TPM_RSP_COMMAND_HDR;\r
2170\r
a04ad3f0 2171#pragma pack ()\r
267669ba 2172\r
4135253b 2173#endif\r