3 Copyright (c) 2005 - 2006, Intel Corporation
4 All rights reserved. This program and the accompanying materials
5 are licensed and made available under the terms and conditions of the BSD License
6 which accompanies this distribution. The full text of the license may be found at
7 http://opensource.org/licenses/bsd-license.php
9 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
10 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
18 TPM Specification data structures (TCG TPM Specification Version 1.2 Revision 94)
20 See http://trustedcomputinggroup.org for latest specification updates
28 // The start of TPM return codes
30 #define TPM_BASE (EFI_MAX_BIT + (EFI_MAX_BIT >> 1))
33 // Structures are all packed on 1-byte alignment
40 // Part 2, section 2.2: Basic types & Helper redefinitions
42 typedef UINT8 TPM_AUTH_DATA_USAGE
;
43 typedef UINT8 TPM_PAYLOAD_TYPE
;
44 typedef UINT8 TPM_VERSION_BYTE
;
45 typedef UINT16 TPM_TAG
;
46 typedef UINT16 TPM_PROTOCOL_ID
;
47 typedef UINT16 TPM_STARTUP_TYPE
;
48 typedef UINT16 TPM_ENC_SCHEME
;
49 typedef UINT16 TPM_SIG_SCHEME
;
50 typedef UINT16 TPM_MIGRATE_SCHEME
;
51 typedef UINT16 TPM_PHYSICAL_PRESENCE
;
52 typedef UINT16 TPM_ENTITY_TYPE
;
53 typedef UINT16 TPM_KEY_USAGE
;
54 typedef UINT16 TPM_EK_TYPE
;
55 typedef UINT16 TPM_STRUCTURE_TAG
;
56 typedef UINT16 TPM_PLATFORM_SPECIFIC
;
57 typedef UINT32 TPM_COMMAND_CODE
;
58 typedef UINT32 TPM_CAPABILITY_AREA
;
59 typedef UINT32 TPM_KEY_FLAGS
;
60 typedef UINT32 TPM_ALGORITHM_ID
;
61 typedef UINT32 TPM_MODIFIER_INDICATOR
;
62 typedef UINT32 TPM_ACTUAL_COUNT
;
63 typedef UINT32 TPM_TRANSPORT_ATTRIBUTES
;
64 typedef UINT32 TPM_AUTHHANDLE
;
65 typedef UINT32 TPM_DIRINDEX
;
66 typedef UINT32 TPM_KEY_HANDLE
;
67 typedef UINT32 TPM_PCRINDEX
;
68 typedef UINT32 TPM_RESULT
;
69 typedef UINT32 TPM_RESOURCE_TYPE
;
70 typedef UINT32 TPM_KEY_CONTROL
;
71 typedef UINT32 TPM_NV_INDEX
;
72 typedef UINT32 TPM_FAMILY_ID
;
73 typedef UINT32 TPM_FAMILY_VERIFICATION
;
74 typedef UINT32 TPM_STARTUP_EFFECTS
;
75 typedef UINT32 TPM_SYM_MODE
;
76 typedef UINT32 TPM_FAMILY_FLAGS
;
77 typedef UINT32 TPM_DELEGATE_INDEX
;
78 typedef UINT32 TPM_CMK_DELEGATE
;
79 typedef UINT32 TPM_COUNT_ID
;
80 typedef UINT32 TPM_REDIT_COMMAND
;
81 typedef UINT32 TPM_TRANSHANDLE
;
82 typedef UINT32 TPM_HANDLE
;
83 typedef UINT32 TPM_FAMILY_OPERATION
;
86 // Part 2, section 2.2.4: Vendor specific
87 // The following defines allow for the quick specification of a
88 // vendor specific item.
90 #define TPM_Vendor_Specific32 ((UINT32) 0x00000400)
91 #define TPM_Vendor_Specific8 ((UINT8) 0x80)
94 // Part 2, section 3.1: Structure TAGs
96 #define TPM_TAG_CONTEXTBLOB ((TPM_STRUCTURE_TAG) 0x0001)
97 #define TPM_TAG_CONTEXT_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0002)
98 #define TPM_TAG_CONTEXTPOINTER ((TPM_STRUCTURE_TAG) 0x0003)
99 #define TPM_TAG_CONTEXTLIST ((TPM_STRUCTURE_TAG) 0x0004)
100 #define TPM_TAG_SIGNINFO ((TPM_STRUCTURE_TAG) 0x0005)
101 #define TPM_TAG_PCR_INFO_LONG ((TPM_STRUCTURE_TAG) 0x0006)
102 #define TPM_TAG_PERSISTENT_FLAGS ((TPM_STRUCTURE_TAG) 0x0007)
103 #define TPM_TAG_VOLATILE_FLAGS ((TPM_STRUCTURE_TAG) 0x0008)
104 #define TPM_TAG_PERSISTENT_DATA ((TPM_STRUCTURE_TAG) 0x0009)
105 #define TPM_TAG_VOLATILE_DATA ((TPM_STRUCTURE_TAG) 0x000A)
106 #define TPM_TAG_SV_DATA ((TPM_STRUCTURE_TAG) 0x000B)
107 #define TPM_TAG_EK_BLOB ((TPM_STRUCTURE_TAG) 0x000C)
108 #define TPM_TAG_EK_BLOB_AUTH ((TPM_STRUCTURE_TAG) 0x000D)
109 #define TPM_TAG_COUNTER_VALUE ((TPM_STRUCTURE_TAG) 0x000E)
110 #define TPM_TAG_TRANSPORT_INTERNAL ((TPM_STRUCTURE_TAG) 0x000F)
111 #define TPM_TAG_TRANSPORT_LOG_IN ((TPM_STRUCTURE_TAG) 0x0010)
112 #define TPM_TAG_TRANSPORT_LOG_OUT ((TPM_STRUCTURE_TAG) 0x0011)
113 #define TPM_TAG_AUDIT_EVENT_IN ((TPM_STRUCTURE_TAG) 0x0012)
114 #define TPM_TAG_AUDIT_EVENT_OUT ((TPM_STRUCTURE_TAG) 0x0013)
115 #define TPM_TAG_CURRENT_TICKS ((TPM_STRUCTURE_TAG) 0x0014)
116 #define TPM_TAG_KEY ((TPM_STRUCTURE_TAG) 0x0015)
117 #define TPM_TAG_STORED_DATA12 ((TPM_STRUCTURE_TAG) 0x0016)
118 #define TPM_TAG_NV_ATTRIBUTES ((TPM_STRUCTURE_TAG) 0x0017)
119 #define TPM_TAG_NV_DATA_PUBLIC ((TPM_STRUCTURE_TAG) 0x0018)
120 #define TPM_TAG_NV_DATA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0019)
121 #define TPM_TAG_DELEGATIONS ((TPM_STRUCTURE_TAG) 0x001A)
122 #define TPM_TAG_DELEGATE_PUBLIC ((TPM_STRUCTURE_TAG) 0x001B)
123 #define TPM_TAG_DELEGATE_TABLE_ROW ((TPM_STRUCTURE_TAG) 0x001C)
124 #define TPM_TAG_TRANSPORT_AUTH ((TPM_STRUCTURE_TAG) 0x001D)
125 #define TPM_TAG_TRANSPORT_PUBLIC ((TPM_STRUCTURE_TAG) 0x001E)
126 #define TPM_TAG_PERMANENT_FLAGS ((TPM_STRUCTURE_TAG) 0x001F)
127 #define TPM_TAG_STCLEAR_FLAGS ((TPM_STRUCTURE_TAG) 0x0020)
128 #define TPM_TAG_STANY_FLAGS ((TPM_STRUCTURE_TAG) 0x0021)
129 #define TPM_TAG_PERMANENT_DATA ((TPM_STRUCTURE_TAG) 0x0022)
130 #define TPM_TAG_STCLEAR_DATA ((TPM_STRUCTURE_TAG) 0x0023)
131 #define TPM_TAG_STANY_DATA ((TPM_STRUCTURE_TAG) 0x0024)
132 #define TPM_TAG_FAMILY_TABLE_ENTRY ((TPM_STRUCTURE_TAG) 0x0025)
133 #define TPM_TAG_DELEGATE_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0026)
134 #define TPM_TAG_DELG_KEY_BLOB ((TPM_STRUCTURE_TAG) 0x0027)
135 #define TPM_TAG_KEY12 ((TPM_STRUCTURE_TAG) 0x0028)
136 #define TPM_TAG_CERTIFY_INFO2 ((TPM_STRUCTURE_TAG) 0x0029)
137 #define TPM_TAG_DELEGATE_OWNER_BLOB ((TPM_STRUCTURE_TAG) 0x002A)
138 #define TPM_TAG_EK_BLOB_ACTIVATE ((TPM_STRUCTURE_TAG) 0x002B)
139 #define TPM_TAG_DAA_BLOB ((TPM_STRUCTURE_TAG) 0x002C)
140 #define TPM_TAG_DAA_CONTEXT ((TPM_STRUCTURE_TAG) 0x002D)
141 #define TPM_TAG_DAA_ENFORCE ((TPM_STRUCTURE_TAG) 0x002E)
142 #define TPM_TAG_DAA_ISSUER ((TPM_STRUCTURE_TAG) 0x002F)
143 #define TPM_TAG_CAP_VERSION_INFO ((TPM_STRUCTURE_TAG) 0x0030)
144 #define TPM_TAG_DAA_SENSITIVE ((TPM_STRUCTURE_TAG) 0x0031)
145 #define TPM_TAG_DAA_TPM ((TPM_STRUCTURE_TAG) 0x0032)
146 #define TPM_TAG_CMK_MIGAUTH ((TPM_STRUCTURE_TAG) 0x0033)
147 #define TPM_TAG_CMK_SIGTICKET ((TPM_STRUCTURE_TAG) 0x0034)
148 #define TPM_TAG_CMK_MA_APPROVAL ((TPM_STRUCTURE_TAG) 0x0035)
149 #define TPM_TAG_QUOTE_INFO2 ((TPM_STRUCTURE_TAG) 0x0036)
152 // Part 2, section 4: TPM Types
156 // Part 2, section 4.1: TPM_RESOURCE_TYPE
158 #define TPM_RT_KEY ((TPM_RESOURCE_TYPE) 0x00000001) // The handle is a key handle and is the result of a LoadKey type operation
159 #define TPM_RT_AUTH ((TPM_RESOURCE_TYPE) 0x00000002) // The handle is an authorization handle. Auth handles come from TPM_OIAP, TPM_OSAP and TPM_DSAP
160 #define TPM_RT_HASH ((TPM_RESOURCE_TYPE) 0x00000003) // Reserved for hashes
161 #define TPM_RT_TRANS ((TPM_RESOURCE_TYPE) 0x00000004) // The handle is for a transport session. Transport handles come from TPM_EstablishTransport
162 #define TPM_RT_CONTEXT ((TPM_RESOURCE_TYPE) 0x00000005) // Resource wrapped and held outside the TPM using the context save/restore commands
163 #define TPM_RT_COUNTER ((TPM_RESOURCE_TYPE) 0x00000006) // Reserved for counters
164 #define TPM_RT_DELEGATE ((TPM_RESOURCE_TYPE) 0x00000007) // The handle is for a delegate row. These are the internal rows held in NV storage by the TPM
165 #define TPM_RT_DAA_TPM ((TPM_RESOURCE_TYPE) 0x00000008) // The value is a DAA TPM specific blob
166 #define TPM_RT_DAA_V0 ((TPM_RESOURCE_TYPE) 0x00000009) // The value is a DAA V0 parameter
167 #define TPM_RT_DAA_V1 ((TPM_RESOURCE_TYPE) 0x0000000A) // The value is a DAA V1 parameter
170 // Part 2, section 4.2: TPM_PAYLOAD_TYPE
172 #define TPM_PT_ASYM ((TPM_PAYLOAD_TYPE) 0x01) // The entity is an asymmetric key
173 #define TPM_PT_BIND ((TPM_PAYLOAD_TYPE) 0x02) // The entity is bound data
174 #define TPM_PT_MIGRATE ((TPM_PAYLOAD_TYPE) 0x03) // The entity is a migration blob
175 #define TPM_PT_MAINT ((TPM_PAYLOAD_TYPE) 0x04) // The entity is a maintenance blob
176 #define TPM_PT_SEAL ((TPM_PAYLOAD_TYPE) 0x05) // The entity is sealed data
177 #define TPM_PT_MIGRATE_RESTRICTED ((TPM_PAYLOAD_TYPE) 0x06) // The entity is a restricted-migration asymmetric key
178 #define TPM_PT_MIGRATE_EXTERNAL ((TPM_PAYLOAD_TYPE) 0x07) // The entity is a external migratable key
179 #define TPM_PT_CMK_MIGRATE ((TPM_PAYLOAD_TYPE) 0x08) // The entity is a CMK migratable blob
180 #define TPM_PT_VENDOR_SPECIFIC ((TPM_PAYLOAD_TYPE) 0x80) // 0x80 - 0xFF Vendor specific payloads
183 // Part 2, section 4.3: TPM_ENTIRY_TYPE
185 #define TPM_ET_KEYHANDLE ((UINT16) 0x0001) // The entity is a keyHandle or key
186 #define TPM_ET_OWNER ((UINT16) 0x0002) // The entity is the TPM Owner
187 #define TPM_ET_DATA ((UINT16) 0x0003) // The entity is some data
188 #define TPM_ET_SRK ((UINT16) 0x0004) // The entity is the SRK
189 #define TPM_ET_KEY ((UINT16) 0x0005) // The entity is a key or keyHandle
190 #define TPM_ET_REVOKE ((UINT16) 0x0006) // The entity is the RevokeTrust value
191 #define TPM_ET_DEL_OWNER_BLOB ((UINT16) 0x0007) // The entity is a delegate owner blob
192 #define TPM_ET_DEL_ROW ((UINT16) 0x0008) // The entity is a delegate row
193 #define TPM_ET_DEL_KEY_BLOB ((UINT16) 0x0009) // The entity is a delegate key blob
194 #define TPM_ET_COUNTER ((UINT16) 0x000A) // The entity is a counter
195 #define TPM_ET_NV ((UINT16) 0x000B) // The entity is a NV index
196 #define TPM_ET_RESERVED_HANDLE ((UINT16) 0x0040) // Reserved. This value avoids collisions with the handle MSB setting.
198 // TPM_ENTITY_TYPE MSB Values: The MSB is used to indicate the ADIP encryption sheme when applicable
200 #define TPM_ET_XOR ((UINT16) 0x0000) // ADIP encryption scheme: XOR
201 #define TPM_ET_AES128 ((UINT16) 0x0006) // ADIP encryption scheme: AES 128 bits
204 // Part 2, section 4.4.1: Reserved Key Handles
206 #define TPM_KH_SRK ((TPM_KEY_HANDLE) 0x40000000) // The handle points to the SRK
207 #define TPM_KH_OWNER ((TPM_KEY_HANDLE) 0x40000001) // The handle points to the TPM Owner
208 #define TPM_KH_REVOKE ((TPM_KEY_HANDLE) 0x40000002) // The handle points to the RevokeTrust value
209 #define TPM_KH_TRANSPORT ((TPM_KEY_HANDLE) 0x40000003) // The handle points to the EstablishTransport static authorization
210 #define TPM_KH_OPERATOR ((TPM_KEY_HANDLE) 0x40000004) // The handle points to the Operator auth
211 #define TPM_KH_ADMIN ((TPM_KEY_HANDLE) 0x40000005) // The handle points to the delegation administration auth
212 #define TPM_KH_EK ((TPM_KEY_HANDLE) 0x40000006) // The handle points to the PUBEK, only usable with TPM_OwnerReadInternalPub
215 // Part 2, section 4.5: TPM_STARTUP_TYPE
217 #define TPM_ST_CLEAR ((TPM_STARTUP_TYPE) 0x0001) // The TPM is starting up from a clean state
218 #define TPM_ST_STATE ((TPM_STARTUP_TYPE) 0x0002) // The TPM is starting up from a saved state
219 #define TPM_ST_DEACTIVATED ((TPM_STARTUP_TYPE) 0x0003) // The TPM is to startup and set the deactivated flag to TRUE
222 // Part 2, section 4.6: TPM_STATUP_EFFECTS
223 // The table makeup is still an open issue.
227 // Part 2, section 4.7: TPM_PROTOCOL_ID
229 #define TPM_PID_OIAP ((TPM_PROTOCOL_ID) 0x0001) // The OIAP protocol.
230 #define TPM_PID_OSAP ((TPM_PROTOCOL_ID) 0x0002) // The OSAP protocol.
231 #define TPM_PID_ADIP ((TPM_PROTOCOL_ID) 0x0003) // The ADIP protocol.
232 #define TPM_PID_ADCP ((TPM_PROTOCOL_ID) 0x0004) // The ADCP protocol.
233 #define TPM_PID_OWNER ((TPM_PROTOCOL_ID) 0x0005) // The protocol for taking ownership of a TPM.
234 #define TPM_PID_DSAP ((TPM_PROTOCOL_ID) 0x0006) // The DSAP protocol
235 #define TPM_PID_TRANSPORT ((TPM_PROTOCOL_ID) 0x0007) // The transport protocol
238 // Part 2, section 4.8: TPM_ALGORITHM_ID
239 // The TPM MUST support the algorithms TPM_ALG_RSA, TPM_ALG_SHA, TPM_ALG_HMAC,
242 #define TPM_ALG_RSA ((TPM_ALGORITHM_ID) 0x00000001) // The RSA algorithm.
243 #define TPM_ALG_DES ((TPM_ALGORITHM_ID) 0x00000002) // The DES algorithm
244 #define TPM_ALG_3DES ((TPM_ALGORITHM_ID) 0x00000003) // The 3DES algorithm in EDE mode
245 #define TPM_ALG_SHA ((TPM_ALGORITHM_ID) 0x00000004) // The SHA1 algorithm
246 #define TPM_ALG_HMAC ((TPM_ALGORITHM_ID) 0x00000005) // The RFC 2104 HMAC algorithm
247 #define TPM_ALG_AES128 ((TPM_ALGORITHM_ID) 0x00000006) // The AES algorithm, key size 128
248 #define TPM_ALG_MGF1 ((TPM_ALGORITHM_ID) 0x00000007) // The XOR algorithm using MGF1 to create a string the size of the encrypted block
249 #define TPM_ALG_AES192 ((TPM_ALGORITHM_ID) 0x00000008) // AES, key size 192
250 #define TPM_ALG_AES256 ((TPM_ALGORITHM_ID) 0x00000009) // AES, key size 256
251 #define TPM_ALG_XOR ((TPM_ALGORITHM_ID) 0x0000000A) // XOR using the rolling nonces
254 // Part 2, section 4.9: TPM_PHYSICAL_PRESENCE
256 #define TPM_PHYSICAL_PRESENCE_HW_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0200) // Sets the physicalPresenceHWEnable to FALSE
257 #define TPM_PHYSICAL_PRESENCE_CMD_DISABLE ((TPM_PHYSICAL_PRESENCE) 0x0100) // Sets the physicalPresenceCMDEnable to FALSE
258 #define TPM_PHYSICAL_PRESENCE_LIFETIME_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0080) // Sets the physicalPresenceLifetimeLock to TRUE
259 #define TPM_PHYSICAL_PRESENCE_HW_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0040) // Sets the physicalPresenceHWEnable to TRUE
260 #define TPM_PHYSICAL_PRESENCE_CMD_ENABLE ((TPM_PHYSICAL_PRESENCE) 0x0020) // Sets the physicalPresenceCMDEnable to TRUE
261 #define TPM_PHYSICAL_PRESENCE_NOTPRESENT ((TPM_PHYSICAL_PRESENCE) 0x0010) // Sets PhysicalPresence = FALSE
262 #define TPM_PHYSICAL_PRESENCE_PRESENT ((TPM_PHYSICAL_PRESENCE) 0x0008) // Sets PhysicalPresence = TRUE
263 #define TPM_PHYSICAL_PRESENCE_LOCK ((TPM_PHYSICAL_PRESENCE) 0x0004) // Sets PhysicalPresenceLock = TRUE
266 // Part 2, section 4.10: TPM_MIGRATE_SCHEME
268 #define TPM_MS_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0001) // A public key that can be used with all TPM migration commands other than 'ReWrap' mode.
269 #define TPM_MS_REWRAP ((TPM_MIGRATE_SCHEME) 0x0002) // A public key that can be used for the ReWrap mode of TPM_CreateMigrationBlob.
270 #define TPM_MS_MAINT ((TPM_MIGRATE_SCHEME) 0x0003) // A public key that can be used for the Maintenance commands
271 #define TPM_MS_RESTRICT_MIGRATE ((TPM_MIGRATE_SCHEME) 0x0004) // The key is to be migrated to a Migration Authority.
272 #define TPM_MS_RESTRICT_APPROVE_DOUBLE ((TPM_MIGRATE_SCHEME) 0x0005) // The key is to be migrated to an entity approved by a Migration Authority using double wrapping
275 // Part 2, section 4.11: TPM_EK_TYPE
277 #define TPM_EK_TYPE_ACTIVATE ((TPM_EK_TYPE) 0x0001) // The blob MUST be TPM_EK_BLOB_ACTIVATE
278 #define TPM_EK_TYPE_AUTH ((TPM_EK_TYPE) 0x0002) // The blob MUST be TPM_EK_BLOB_AUTH
281 // Part 2, section 4.12: TPM_PLATFORM_SPECIFIC
283 #define TPM_PS_PC_11 ((TPM_PLATFORM_SPECIFIC) 0x0001) // PC Specific version 1.1
284 #define TPM_PS_PC_12 ((TPM_PLATFORM_SPECIFIC) 0x0002) // PC Specific version 1.2
285 #define TPM_PS_PDA_12 ((TPM_PLATFORM_SPECIFIC) 0x0003) // PDA Specific version 1.2
286 #define TPM_PS_Server_12 ((TPM_PLATFORM_SPECIFIC) 0x0004) // Server Specific version 1.2
287 #define TPM_PS_Mobile_12 ((TPM_PLATFORM_SPECIFIC) 0x0005) // Mobil Specific version 1.2
290 // Part 2, section 5: Basic Structures
294 // Part 2, section 5.1: TPM_STRUCT_VER
296 typedef struct tdTPM_STRUCT_VER
{
304 // Part 2, section 5.3: TPM_VERSION
306 typedef struct tdTPM_VERSION
{
307 TPM_VERSION_BYTE major
;
308 TPM_VERSION_BYTE minor
;
314 // Part 2, section 5.4: TPM_DIGEST
316 #define TPM_SHA1_160_HASH_LEN 0x14
317 #define TPM_SHA1BASED_NONCE_LEN TPM_SHA1_160_HASH_LEN
319 typedef struct tdTPM_DIGEST
{
320 UINT8 digest
[TPM_SHA1_160_HASH_LEN
];
323 typedef TPM_DIGEST TPM_CHOSENID_HASH
; // This SHALL be the digest of the chosen identityLabel and privacyCA for a new TPM identity.
324 typedef TPM_DIGEST TPM_COMPOSITE_HASH
; // This SHALL be the hash of a list of PCR indexes and PCR values that a key or data is bound to.
325 typedef TPM_DIGEST TPM_DIRVALUE
; // This SHALL be the value of a DIR register
326 typedef TPM_DIGEST TPM_HMAC
;
327 typedef TPM_DIGEST TPM_PCRVALUE
; // The value inside of the PCR
328 typedef TPM_DIGEST TPM_AUDITDIGEST
; // This SHALL be the value of the current internal audit state
329 typedef TPM_DIGEST TPM_DAA_TPM_SEED
; // This SHALL be a random value generated by a TPM immediately after the EK is installed in that TPM, whenever an EK is installed in that TPM
330 typedef TPM_DIGEST TPM_DAA_CONTEXT_SEED
; // This SHALL be a random value
333 // Part 2, section 5.5: TPM_NONCE
335 typedef struct tdTPM_NONCE
{
340 // Part 2, section 5.6: TPM_AUTHDATA
342 typedef UINT8 tdTPM_AUTHDATA
[20];
343 typedef tdTPM_AUTHDATA TPM_AUTHDATA
;
344 typedef TPM_AUTHDATA TPM_SECRET
;
345 typedef TPM_AUTHDATA TPM_ENCAUTH
;
348 // Part 2, section 5.7: TPM_KEY_HANDLE_LIST
349 // Size of handle is loaded * sizeof(TPM_KEY_HANDLE)
351 typedef struct tdTPM_KEY_HANDLE_LIST
{
353 TPM_KEY_HANDLE handle
[1];
354 } TPM_KEY_HANDLE_LIST
;
357 // Part 2, section 5.8: TPM_KEY_USAGE values
360 #define TPM_KEY_SIGNING ((UINT16) 0x0010)
361 // TPM_KEY_SIGNING SHALL indicate a signing key. The [private] key SHALL be
362 // used for signing operations, only. This means that it MUST be a leaf of the
363 // Protected Storage key hierarchy.
365 #define TPM_KEY_STORAGE ((UINT16) 0x0011)
366 // TPM_KEY_STORAGE SHALL indicate a storage key. The key SHALL be used to wrap
367 // and unwrap other keys in the Protected Storage hierarchy
369 #define TPM_KEY_IDENTITY ((UINT16) 0x0012)
370 // TPM_KEY_IDENTITY SHALL indicate an identity key. The key SHALL be used for
371 // operations that require a TPM identity, only.
373 #define TPM_KEY_AUTHCHANGE ((UINT16) 0x0013)
374 // TPM_KEY_AUTHCHANGE SHALL indicate an ephemeral key that is in use during
375 // the ChangeAuthAsym process, only.
377 #define TPM_KEY_BIND ((UINT16) 0x0014)
378 // TPM_KEY_BIND SHALL indicate a key that can be used for TPM_Bind and
379 // TPM_Unbind operations only.
381 #define TPM_KEY_LEGACY ((UINT16) 0x0015)
382 // TPM_KEY_LEGACY SHALL indicate a key that can perform signing and binding
383 // operations. The key MAY be used for both signing and binding operations.
384 // The TPM_KEY_LEGACY key type is to allow for use by applications where both
385 // signing and encryption operations occur with the same key. The use of this
386 // key type is not recommended TPM_KEY_MIGRATE 0x0016 This SHALL indicate a
387 // key in use for TPM_MigrateKey
389 #define TPM_KEY_MIGRATE ((UINT16) 0x0016)
390 // TPM_KEY_MIGRAGE SHALL indicate a key in use for TPM_MigrateKey
393 // Part 2, section 5.8.1: Encryption/Signature schemes
396 #define TPM_ES_NONE ((TPM_ENC_SCHEME) 0x0001)
397 #define TPM_ES_RSAESPKCSv15 ((TPM_ENC_SCHEME) 0x0002)
398 #define TPM_ES_RSAESOAEP_SHA1_MGF1 ((TPM_ENC_SCHEME) 0x0003)
399 #define TPM_ES_SYM_CNT ((TPM_ENC_SCHEME) 0x0004)
400 #define TPM_ES_SYM_OFB ((TPM_ENC_SCHEME) 0x0005)
402 #define TPM_SS_NONE ((TPM_SIG_SCHEME) 0x0001)
403 #define TPM_SS_RSASSAPKCS1v15_SHA1 ((TPM_SIG_SCHEME) 0x0002)
404 #define TPM_SS_RSASSAPKCS1v15_DER ((TPM_SIG_SCHEME) 0x0003)
405 #define TPM_SS_RSASSAPKCS1v15_INFO ((TPM_SIG_SCHEME) 0x0004)
408 // Part 2, section 5.9: TPM_AUTH_DATA_USAGE values
410 #define TPM_AUTH_NEVER ((TPM_AUTH_DATA_USAGE) 0x00)
411 #define TPM_AUTH_ALWAYS ((TPM_AUTH_DATA_USAGE) 0x01)
412 #define TPM_AUTH_PRIV_USE_ONLY ((TPM_AUTH_DATA_USAGE) 0x03)
415 // Part 2, section 5.10: TPM_KEY_FLAGS
417 enum tdTPM_KEY_FLAGS
{
418 redirection
= 0x00000001,
419 migratable
= 0x00000002,
420 isVolatile
= 0x00000004,
421 pcrIgnoredOnRead
= 0x00000008,
422 migrateAuthority
= 0x00000010
426 // Part 2, section 5.11: TPM_CHANGEAUTH_VALIDATE
428 typedef struct tdTPM_CHANGEAUTH_VALIDATE
{
429 TPM_SECRET newAuthSecret
;
431 } TPM_CHANGEAUTH_VALIDATE
;
434 // Part 2, section 5.12: TPM_MIGRATIONKEYAUTH
435 // decalared after section 10 to catch declaration of TPM_PUBKEY
437 // Part 2 section 10.1: TPM_KEY_PARMS
438 // [size_is(parmSize)] BYTE* parms;
440 typedef struct tdTPM_KEY_PARMS
{
441 TPM_ALGORITHM_ID algorithmID
;
442 TPM_ENC_SCHEME encScheme
;
443 TPM_SIG_SCHEME sigScheme
;
449 // Part 2, section 10.4: TPM_STORE_PUBKEY
451 typedef struct tdTPM_STORE_PUBKEY
{
457 // Part 2, section 10.5: TPM_PUBKEY
459 typedef struct tdTPM_PUBKEY
{
460 TPM_KEY_PARMS algorithmParms
;
461 TPM_STORE_PUBKEY pubKey
;
465 // Part 2, section 5.12: TPM_MIGRATIONKEYAUTH
467 typedef struct tdTPM_MIGRATIONKEYAUTH
{
468 TPM_PUBKEY migrationKey
;
469 TPM_MIGRATE_SCHEME migrationScheme
;
471 } TPM_MIGRATIONKEYAUTH
;
474 // Part 2, section 5.13: TPM_COUNTER_VALUE
476 typedef struct tdTPM_COUNTER_VALUE
{
477 TPM_STRUCTURE_TAG tag
;
479 TPM_ACTUAL_COUNT counter
;
483 // Part 2, section 5.14: TPM_SIGN_INFO
484 // Size of data indicated by dataLen
486 typedef struct tdTPM_SIGN_INFO
{
487 TPM_STRUCTURE_TAG tag
;
495 // Part 2, section 5.15: TPM_MSA_COMPOSITE
496 // Number of migAuthDigest indicated by MSAlist
498 typedef struct tdTPM_MSA_COMPOSITE
{
500 TPM_DIGEST migAuthDigest
[1];
504 // Part 2, section 5.16: TPM_CMK_AUTH
506 typedef struct tdTPM_CMK_AUTH
{
507 TPM_DIGEST migrationAuthorityDigest
;
508 TPM_DIGEST destinationKeyDigest
;
509 TPM_DIGEST sourceKeyDigest
;
513 // Part 2, section 5.17: TPM_CMK_DELEGATE
515 #define TPM_CMK_DELEGATE_SIGNING (((TPM_CMK_DELEGATE)1) << 31)
516 #define TPM_CMK_DELEGATE_STORAGE (((TPM_CMK_DELEGATE)1) << 30)
517 #define TPM_CMK_DELEGATE_BIND (((TPM_CMK_DELEGATE)1) << 29)
518 #define TPM_CMK_DELEGATE_LEGACY (((TPM_CMK_DELEGATE)1) << 28)
519 #define TPM_CMK_DELEGATE_MIGRATE (((TPM_CMK_DELEGATE)1) << 27)
522 // Part 2, section 5.18: TPM_SELECT_SIZE
524 typedef struct tdTPM_SELECT_SIZE
{
531 // Part 2, section 5,19: TPM_CMK_MIGAUTH
533 typedef struct tdTPM_CMK_MIGAUTH
{
534 TPM_STRUCTURE_TAG tag
;
535 TPM_DIGEST msaDigest
;
536 TPM_DIGEST pubKeyDigest
;
540 // Part 2, section 5.20: TPM_CMK_SIGTICKET
542 typedef struct tdTPM_CMK_SIGTICKET
{
543 TPM_STRUCTURE_TAG tag
;
544 TPM_DIGEST verKeyDigest
;
545 TPM_DIGEST signedData
;
549 // Part 2, section 5.21: TPM_CMK_MA_APPROVAL
551 typedef struct tdTPM_CMK_MA_APPROVAL
{
552 TPM_STRUCTURE_TAG tag
;
553 TPM_DIGEST migrationAuthorityDigest
;
554 } TPM_CMK_MA_APPROVAL
;
557 // Part 2, section 6: Command Tags
559 #define TPM_TAG_RQU_COMMAND ((TPM_STRUCTURE_TAG) 0x00C1)
560 #define TPM_TAG_RQU_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C2)
561 #define TPM_TAG_RQU_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C3)
562 #define TPM_TAG_RSP_COMMAND ((TPM_STRUCTURE_TAG) 0x00C4)
563 #define TPM_TAG_RSP_AUTH1_COMMAND ((TPM_STRUCTURE_TAG) 0x00C5)
564 #define TPM_TAG_RSP_AUTH2_COMMAND ((TPM_STRUCTURE_TAG) 0x00C6)
567 // Part 2, section 7.1: TPM_PERMANENT_FLAGS
569 typedef struct tdTPM_PERMANENT_FLAGS
{
570 TPM_STRUCTURE_TAG tag
;
575 BOOLEAN disableOwnerClear
;
576 BOOLEAN allowMaintenance
;
577 BOOLEAN physicalPresenceLifetimeLock
;
578 BOOLEAN physicalPresenceHWEnable
;
579 BOOLEAN physicalPresenceCMDEnable
;
585 BOOLEAN enableRevokeEK
;
588 BOOLEAN tpmEstablished
;
589 BOOLEAN maintenanceDone
;
590 } TPM_PERMANENT_FLAGS
;
593 // Part 2, section 7.1.1: PERMANENT_FLAGS Subcap for SetCapability
595 #define TPM_PF_DISABLE ((TPM_CAPABILITY_AREA) 1)
596 #define TPM_PF_OWNERSHIP ((TPM_CAPABILITY_AREA) 2)
597 #define TPM_PF_DEACTIVATED ((TPM_CAPABILITY_AREA) 3)
598 #define TPM_PF_READPUBEK ((TPM_CAPABILITY_AREA) 4)
599 #define TPM_PF_DISABLEOWNERCLEAR ((TPM_CAPABILITY_AREA) 5)
600 #define TPM_PF_ALLOWMAINTENANCE ((TPM_CAPABILITY_AREA) 6)
601 #define TPM_PF_PHYSICALPRESENCELIFETIMELOCK ((TPM_CAPABILITY_AREA) 7)
602 #define TPM_PF_PHYSICALPRESENCEHWENABLE ((TPM_CAPABILITY_AREA) 8)
603 #define TPM_PF_PHYSICALPRESENCECMDENABLE ((TPM_CAPABILITY_AREA) 9)
604 #define TPM_PF_CEKPUSED ((TPM_CAPABILITY_AREA) 10)
605 #define TPM_PF_TPMPOST ((TPM_CAPABILITY_AREA) 11)
606 #define TPM_PF_TPMPOSTLOCK ((TPM_CAPABILITY_AREA) 12)
607 #define TPM_PF_FIPS ((TPM_CAPABILITY_AREA) 13)
608 #define TPM_PF_OPERATOR ((TPM_CAPABILITY_AREA) 14)
609 #define TPM_PF_ENABLEREVOKEEK ((TPM_CAPABILITY_AREA) 15)
610 #define TPM_PF_NV_LOCKED ((TPM_CAPABILITY_AREA) 16)
611 #define TPM_PF_READSRKPUB ((TPM_CAPABILITY_AREA) 17)
612 #define TPM_PF_TPMESTABLISHED ((TPM_CAPABILITY_AREA) 18)
613 #define TPM_PF_MAINTENANCEDONE ((TPM_CAPABILITY_AREA) 19)
616 // Part 2, section 7.2: TPM_STCLEAR_FLAGS
618 typedef struct tdTPM_STCLEAR_FLAGS
{
619 TPM_STRUCTURE_TAG tag
;
621 BOOLEAN disableForceClear
;
622 BOOLEAN physicalPresence
;
623 BOOLEAN physicalPresenceLock
;
628 // Part 2, section 7.2.1: STCLEAR_FLAGS Subcap for SetCapability
630 #define TPM_SF_DEACTIVATED ((TPM_CAPABILITY_AREA) 1)
631 #define TPM_SF_DISABLEFORCECLEAR ((TPM_CAPABILITY_AREA) 2)
632 #define TPM_SF_PHYSICALPRESENCE ((TPM_CAPABILITY_AREA) 3)
633 #define TPM_SF_PHYSICALPRESENCELOCK ((TPM_CAPABILITY_AREA) 4)
634 #define TPM_SF_BGLOBALLOCK ((TPM_CAPABILITY_AREA) 5)
637 // Part 2, section 7.3: TPM_STANY_FLAGS
639 typedef struct tdTPM_STANY_FLAGS
{
640 TPM_STRUCTURE_TAG tag
;
641 BOOLEAN postInitialise
;
642 TPM_MODIFIER_INDICATOR localityModifier
;
643 BOOLEAN transportExclusive
;
648 // Part 2, section 7.3.1: STANY_FLAGS Subcap for SetCapability
650 #define TPM_AF_POSTINITIALISE ((TPM_CAPABILITY_AREA) 1)
651 #define TPM_AF_LOCALITYMODIFIER ((TPM_CAPABILITY_AREA) 2)
652 #define TPM_AF_TRANSPORTEXCLUSIVE ((TPM_CAPABILITY_AREA) 3)
653 #define TPM_AF_TOSPRESENT ((TPM_CAPABILITY_AREA) 4)
656 // All those structures (section 7.4, 7.5, 7.6) are not normative and
657 // thus no definitions here
659 // Part 2, section 7.4: TPM_PERMANENT_DATA
661 //#define TPM_MIN_COUNTERS 4 // the minimum number of counters is 4
662 //#define TPM_DELEGATE_KEY TPM_KEY
663 //#define TPM_NUM_PCR 16
664 //#define TPM_MAX_NV_WRITE_NOOWNER 64
665 //typedef struct tdTPM_PERMANENT_DATA
667 // TPM_STRUCTURE_TAG tag;
670 // TPM_NONCE tpmProof;
671 // TPM_NONCE ekReset;
672 // TPM_SECRET ownerAuth;
673 // TPM_SECRET operatorAuth;
674 // TPM_DIRVALUE authDIR[1];
675 // TPM_PUBKEY manuMaintPub;
676 // TPM_KEY endorsementKey;
678 // TPM_KEY contextKey;
679 // TPM_KEY delegateKey;
680 // TPM_COUNTER_VALUE auditMonotonicCounter;
681 // TPM_COUNTER_VALUE monitonicCounter[TPM_MIN_COUNTERS];
682 // TPM_PCR_ATTRIBUTES pcrAttrib[TPM_NUM_PCR];
683 // UINT8 ordinalAuditStatus[];
685 // TPM_FAMILY_TABLE familyTable;
686 // TPM_DELEGATE_TABLE delegateTable;
687 // UINT32 maxNVBufSize;
688 // UINT32 lastFamilyID;
689 // UINT32 noOwnerNVWrite;
690 // TPM_CMK_DELEGATE restrictDelegate;
691 // TPM_DAA_TPM_SEED tpmDAASeed;
692 //} TPM_PERMANENT_DATA;
695 // Part 2, section 7.5: TPM_STCLEAR_DATA
696 // available inside TPM only
698 //typedef struct tdTPM_STCLEAR_DATA
700 // TPM_STRUCTURE_TAG tag;
701 // TPM_NONCE contextNonceKey;
702 // TPM_COUNT_ID countID;
703 // UINT32 ownerReference;
704 // BOOLEAN disableResetLock;
705 //} TPM_STCLEAR_DATA;
708 // Part 2, section 7.6: TPM_STANY_DATA
709 // available inside TPM only
711 //typedef struct tdTPM_STANY_DATA
713 // TPM_STRUCTURE_TAG tag;
714 // TPM_NONCE contextNonceSession;
715 // TPM_DIGEST auditDigest;
716 // TPM_CURRENT_TICKS currentTicks;
717 // UINT32 contextCount;
718 // UINT32 contextList[TPM_MIN_SESSION_LIST];
719 // TPM_SESSION_DATA sessions[TPM_MIN_SESSIONS];
723 // Part 2, section 8: PCR Structures
727 // Part 2, section 8.1: TPM_PCR_SELECTION
728 // Size of pcrSelect[] indicated by sizeOfSelect
730 typedef struct tdTPM_PCR_SELECTION
{
736 // Part 2, section 8.2: TPM_PCR_COMPOSITE
737 // Size of pcrValue[] indicated by valueSize
739 typedef struct tdTPM_PCR_COMPOSITE
{
740 TPM_PCR_SELECTION select
;
742 TPM_PCRVALUE pcrValue
[1];
746 // Part 2, section 8.3: TPM_PCR_INFO
748 typedef struct tdTPM_PCR_INFO
{
749 TPM_PCR_SELECTION pcrSelection
;
750 TPM_COMPOSITE_HASH digestAtRelease
;
751 TPM_COMPOSITE_HASH digestAtCreation
;
755 // Part 2, section 8.6: TPM_LOCALITY_SELECTION
757 typedef UINT8 TPM_LOCALITY_SELECTION
;
759 #define TPM_LOC_FOUR ((UINT8) 0x10)
760 #define TPM_LOC_THREE ((UINT8) 0x08)
761 #define TPM_LOC_TWO ((UINT8) 0x04)
762 #define TPM_LOC_ONE ((UINT8) 0x02)
763 #define TPM_LOC_ZERO ((UINT8) 0x01)
766 // Part 2, section 8.4: TPM_PCR_INFO_LONG
768 typedef struct tdTPM_PCR_INFO_LONG
{
769 TPM_STRUCTURE_TAG tag
;
770 TPM_LOCALITY_SELECTION localityAtCreation
;
771 TPM_LOCALITY_SELECTION localityAtRelease
;
772 TPM_PCR_SELECTION creationPCRSelection
;
773 TPM_PCR_SELECTION releasePCRSelection
;
774 TPM_COMPOSITE_HASH digestAtCreation
;
775 TPM_COMPOSITE_HASH digestAtRelease
;
779 // Part 2, section 8.5: TPM_PCR_INFO_SHORT
781 typedef struct tdTPM_PCR_INFO_SHORT
{
782 TPM_PCR_SELECTION pcrSelection
;
783 TPM_LOCALITY_SELECTION localityAtRelease
;
784 TPM_COMPOSITE_HASH digestAtRelease
;
785 } TPM_PCR_INFO_SHORT
;
788 // Part 2, section 8.8: TPM_PCR_ATTRIBUTES
790 typedef struct tdTPM_PCR_ATTRIBUTES
{
792 TPM_LOCALITY_SELECTION pcrExtendLocal
;
793 TPM_LOCALITY_SELECTION pcrResetLocal
;
794 } TPM_PCR_ATTRIBUTES
;
797 // Part 2, section 9: Storage Structures
801 // Part 2, section 9.1: TPM_STORED_DATA
802 // [size_is(sealInfoSize)] BYTE* sealInfo;
803 // [size_is(encDataSize)] BYTE* encData;
805 typedef struct tdTPM_STORED_DATA
{
814 // Part 2, section 9.2: TPM_STORED_DATA12
815 // [size_is(sealInfoSize)] BYTE* sealInfo;
816 // [size_is(encDataSize)] BYTE* encData;
818 typedef struct tdTPM_STORED_DATA12
{
819 TPM_STRUCTURE_TAG tag
;
828 // Part 2, section 9.3: TPM_SEALED_DATA
829 // [size_is(dataSize)] BYTE* data;
831 typedef struct tdTPM_SEALED_DATA
{
832 TPM_PAYLOAD_TYPE payload
;
835 TPM_DIGEST storedDigest
;
841 // Part 2, section 9.4: TPM_SYMMETRIC_KEY
842 // [size_is(size)] BYTE* data;
844 typedef struct tdTPM_SYMMETRIC_KEY
{
845 TPM_ALGORITHM_ID algId
;
846 TPM_ENC_SCHEME encScheme
;
852 // Part 2, section 9.5: TPM_BOUND_DATA
854 typedef struct tdTPM_BOUND_DATA
{
856 TPM_PAYLOAD_TYPE payload
;
857 UINT8 payloadData
[1];
861 // Part 2 section 10: TPM_KEY complex
865 // Part 2, section 10.2: TPM_KEY
866 // [size_is(encDataSize)] BYTE* encData;
868 typedef struct tdTPM_KEY
{
870 TPM_KEY_USAGE keyUsage
;
871 TPM_KEY_FLAGS keyFlags
;
872 TPM_AUTH_DATA_USAGE authDataUsage
;
873 TPM_KEY_PARMS algorithmParms
;
876 TPM_STORE_PUBKEY pubKey
;
882 // Part 2, section 10.3: TPM_KEY12
883 // [size_is(encDataSize)] BYTE* encData;
885 typedef struct tdTPM_KEY12
{
886 TPM_STRUCTURE_TAG tag
;
888 TPM_KEY_USAGE keyUsage
;
889 TPM_KEY_FLAGS keyFlags
;
890 TPM_AUTH_DATA_USAGE authDataUsage
;
891 TPM_KEY_PARMS algorithmParms
;
894 TPM_STORE_PUBKEY pubKey
;
900 // Part 2, section 10.7: TPM_STORE_PRIVKEY
901 // [size_is(keyLength)] BYTE* key;
903 typedef struct tdTPM_STORE_PRIVKEY
{
909 // Part 2, section 10.6: TPM_STORE_ASYMKEY
911 typedef struct tdTPM_STORE_ASYMKEY
{ // pos len total
912 TPM_PAYLOAD_TYPE payload
; // 0 1 1
913 TPM_SECRET usageAuth
; // 1 20 21
914 TPM_SECRET migrationAuth
; // 21 20 41
915 TPM_DIGEST pubDataDigest
; // 41 20 61
916 TPM_STORE_PRIVKEY privKey
; // 61 132-151 193-214
920 // Part 2, section 10.8: TPM_MIGRATE_ASYMKEY
921 // [size_is(partPrivKeyLen)] BYTE* partPrivKey;
923 typedef struct tdTPM_MIGRATE_ASYMKEY
{ // pos len total
924 TPM_PAYLOAD_TYPE payload
; // 0 1 1
925 TPM_SECRET usageAuth
; // 1 20 21
926 TPM_DIGEST pubDataDigest
; // 21 20 41
927 UINT32 partPrivKeyLen
; // 41 4 45
928 UINT8
*partPrivKey
; // 45 112-127 157-172
929 } TPM_MIGRATE_ASYMKEY
;
932 // Part 2, section 10.9: TPM_KEY_CONTROL
934 #define TPM_KEY_CONTROL_OWNER_EVICT ((UINT32) 0x00000001)
937 // Part 2, section 11: Signed Structures
940 typedef struct tdTPM_CERTIFY_INFO
942 TPM_STRUCT_VER version
;
943 TPM_KEY_USAGE keyUsage
;
944 TPM_KEY_FLAGS keyFlags
;
945 TPM_AUTH_DATA_USAGE authDataUsage
;
946 TPM_KEY_PARMS algorithmParms
;
947 TPM_DIGEST pubkeyDigest
;
949 BOOLEAN parentPCRStatus
;
954 typedef struct tdTPM_CERTIFY_INFO2
956 TPM_STRUCTURE_TAG tag
;
958 TPM_PAYLOAD_TYPE payloadType
;
959 TPM_KEY_USAGE keyUsage
;
960 TPM_KEY_FLAGS keyFlags
;
961 TPM_AUTH_DATA_USAGE authDataUsage
;
962 TPM_KEY_PARMS algorithmParms
;
963 TPM_DIGEST pubkeyDigest
;
965 BOOLEAN parentPCRStatus
;
968 UINT32 migrationAuthoritySize
;
969 UINT8
*migrationAuthority
;
972 typedef struct tdTPM_QUOTE_INFO
974 TPM_STRUCT_VER version
;
976 TPM_COMPOSITE_HASH digestValue
;
977 TPM_NONCE externalData
;
980 typedef struct tdTPM_QUOTE_INFO2
982 TPM_STRUCTURE_TAG tag
;
984 TPM_NONCE externalData
;
985 TPM_PCR_INFO_SHORT infoShort
;
989 // Part 2, section 12: Identity Structures
992 typedef struct tdTPM_EK_BLOB
994 TPM_STRUCTURE_TAG tag
;
1000 typedef struct tdTPM_EK_BLOB_ACTIVATE
1002 TPM_STRUCTURE_TAG tag
;
1003 TPM_SYMMETRIC_KEY sessionKey
;
1004 TPM_DIGEST idDigest
;
1005 TPM_PCR_INFO_SHORT pcrInfo
;
1006 } TPM_EK_BLOB_ACTIVATE
;
1008 typedef struct tdTPM_EK_BLOB_AUTH
1010 TPM_STRUCTURE_TAG tag
;
1011 TPM_SECRET authValue
;
1015 typedef struct tdTPM_IDENTITY_CONTENTS
1019 TPM_CHOSENID_HASH labelPrivCADigest
;
1020 TPM_PUBKEY identityPubKey
;
1021 } TPM_IDENTITY_CONTENTS
;
1023 typedef struct tdTPM_IDENTITY_REQ
1027 TPM_KEY_PARMS asymAlgorithm
;
1028 TPM_KEY_PARMS symAlgorithm
;
1033 typedef struct tdTPM_IDENTITY_PROOF
1037 UINT32 identityBindingSize
;
1038 UINT32 endorsementSize
;
1039 UINT32 platformSize
;
1040 UINT32 conformanceSize
;
1041 TPM_PUBKEY identityKey
;
1043 UINT8
*identityBinding
;
1044 UINT8
*endorsementCredential
;
1045 UINT8
*platformCredential
;
1046 UINT8
*conformanceCredential
;
1047 } TPM_IDENTITY_PROOF
;
1049 typedef struct tdTPM_ASYM_CA_CONTENTS
1051 TPM_SYMMETRIC_KEY sessionKey
;
1052 TPM_DIGEST idDigest
;
1053 } TPM_ASYM_CA_CONTENTS
;
1055 typedef struct tdTPM_SYM_CA_ATTESTATION
1058 TPM_KEY_PARMS algorithm
;
1060 } TPM_SYM_CA_ATTESTATION
;
1063 // Part 2, section 15: TPM_CURRENT_TICKS
1064 // Placed here out of order because definitions are used in section 13.
1066 typedef struct tdTPM_CURRENT_TICKS
{
1067 TPM_STRUCTURE_TAG tag
;
1068 UINT64 currentTicks
;
1070 TPM_NONCE tickNonce
;
1071 } TPM_CURRENT_TICKS
;
1074 // Part 2, section 13: Transport structures
1077 #define TPM_TRANSPORT_ENCRYPT ((UINT32)0x00000001)
1078 #define TPM_TRANSPORT_LOG ((UINT32)0x00000002)
1079 #define TPM_TRANSPORT_EXCLUSIVE ((UINT32)0x00000004)
1081 typedef struct tdTPM_TRANSPORT_PUBLIC
1083 TPM_STRUCTURE_TAG tag
;
1084 TPM_TRANSPORT_ATTRIBUTES transAttributes
;
1085 TPM_ALGORITHM_ID algId
;
1086 TPM_ENC_SCHEME encScheme
;
1087 } TPM_TRANSPORT_PUBLIC
;
1089 typedef struct tdTPM_TRANSPORT_INTERNAL
1091 TPM_STRUCTURE_TAG tag
;
1092 TPM_AUTHDATA authData
;
1093 TPM_TRANSPORT_PUBLIC transPublic
;
1094 TPM_TRANSHANDLE transHandle
;
1095 TPM_NONCE transNonceEven
;
1096 TPM_DIGEST transDigest
;
1097 } TPM_TRANSPORT_INTERNAL
;
1099 typedef struct tdTPM_TRANSPORT_LOG_IN
1101 TPM_STRUCTURE_TAG tag
;
1102 TPM_DIGEST parameters
;
1103 TPM_DIGEST pubKeyHash
;
1104 } TPM_TRANSPORT_LOG_IN
;
1106 typedef struct tdTPM_TRANSPORT_LOG_OUT
1108 TPM_STRUCTURE_TAG tag
;
1109 TPM_CURRENT_TICKS currentTicks
;
1110 TPM_DIGEST parameters
;
1111 TPM_MODIFIER_INDICATOR locality
;
1112 } TPM_TRANSPORT_LOG_OUT
;
1114 typedef struct tdTPM_TRANSPORT_AUTH
1116 TPM_STRUCTURE_TAG tag
;
1117 TPM_AUTHDATA authData
;
1118 } TPM_TRANSPORT_AUTH
;
1121 // Part 2, section 14: Audit Structures
1124 typedef struct tdTPM_AUDIT_EVENT_IN
1126 TPM_STRUCTURE_TAG tag
;
1127 TPM_DIGEST inputParms
;
1128 TPM_COUNTER_VALUE auditCount
;
1129 } TPM_AUDIT_EVENT_IN
;
1131 typedef struct tdTPM_AUDIT_EVENT_OUT
1133 TPM_STRUCTURE_TAG tag
;
1134 TPM_COMMAND_CODE ordinal
;
1135 TPM_DIGEST outputParms
;
1136 TPM_COUNTER_VALUE auditCount
;
1137 TPM_RESULT returnCode
;
1138 } TPM_AUDIT_EVENT_OUT
;
1141 // Part 2, section 16: Return Codes
1144 #error "TPM Error Codes require definition of TPM_BASE"
1147 #define TPM_VENDOR_ERROR TPM_Vendor_Specific32
1148 #define TPM_NON_FATAL 0x00000800
1150 #define TPM_SUCCESS ((TPM_RESULT) TPM_BASE)
1151 #define TPM_AUTHFAIL ((TPM_RESULT) (TPM_BASE + 1))
1152 #define TPM_BADINDEX ((TPM_RESULT) (TPM_BASE + 2))
1153 #define TPM_BAD_PARAMETER ((TPM_RESULT) (TPM_BASE + 3))
1154 #define TPM_AUDITFAILURE ((TPM_RESULT) (TPM_BASE + 4))
1155 #define TPM_CLEAR_DISABLED ((TPM_RESULT) (TPM_BASE + 5))
1156 #define TPM_DEACTIVATED ((TPM_RESULT) (TPM_BASE + 6))
1157 #define TPM_DISABLED ((TPM_RESULT) (TPM_BASE + 7))
1158 #define TPM_DISABLED_CMD ((TPM_RESULT) (TPM_BASE + 8))
1159 #define TPM_FAIL ((TPM_RESULT) (TPM_BASE + 9))
1160 #define TPM_BAD_ORDINAL ((TPM_RESULT) (TPM_BASE + 10))
1161 #define TPM_INSTALL_DISABLED ((TPM_RESULT) (TPM_BASE + 11))
1162 #define TPM_INVALID_KEYHANDLE ((TPM_RESULT) (TPM_BASE + 12))
1163 #define TPM_KEYNOTFOUND ((TPM_RESULT) (TPM_BASE + 13))
1164 #define TPM_INAPPROPRIATE_ENC ((TPM_RESULT) (TPM_BASE + 14))
1165 #define TPM_MIGRATEFAIL ((TPM_RESULT) (TPM_BASE + 15))
1166 #define TPM_INVALID_PCR_INFO ((TPM_RESULT) (TPM_BASE + 16))
1167 #define TPM_NOSPACE ((TPM_RESULT) (TPM_BASE + 17))
1168 #define TPM_NOSRK ((TPM_RESULT) (TPM_BASE + 18))
1169 #define TPM_NOTSEALED_BLOB ((TPM_RESULT) (TPM_BASE + 19))
1170 #define TPM_OWNER_SET ((TPM_RESULT) (TPM_BASE + 20))
1171 #define TPM_RESOURCES ((TPM_RESULT) (TPM_BASE + 21))
1172 #define TPM_SHORTRANDOM ((TPM_RESULT) (TPM_BASE + 22))
1173 #define TPM_SIZE ((TPM_RESULT) (TPM_BASE + 23))
1174 #define TPM_WRONGPCRVAL ((TPM_RESULT) (TPM_BASE + 24))
1175 #define TPM_BAD_PARAM_SIZE ((TPM_RESULT) (TPM_BASE + 25))
1176 #define TPM_SHA_THREAD ((TPM_RESULT) (TPM_BASE + 26))
1177 #define TPM_SHA_ERROR ((TPM_RESULT) (TPM_BASE + 27))
1178 #define TPM_FAILEDSELFTEST ((TPM_RESULT) (TPM_BASE + 28))
1179 #define TPM_AUTH2FAIL ((TPM_RESULT) (TPM_BASE + 29))
1180 #define TPM_BADTAG ((TPM_RESULT) (TPM_BASE + 30))
1181 #define TPM_IOERROR ((TPM_RESULT) (TPM_BASE + 31))
1182 #define TPM_ENCRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 32))
1183 #define TPM_DECRYPT_ERROR ((TPM_RESULT) (TPM_BASE + 33))
1184 #define TPM_INVALID_AUTHHANDLE ((TPM_RESULT) (TPM_BASE + 34))
1185 #define TPM_NO_ENDORSEMENT ((TPM_RESULT) (TPM_BASE + 35))
1186 #define TPM_INVALID_KEYUSAGE ((TPM_RESULT) (TPM_BASE + 36))
1187 #define TPM_WRONG_ENTITYTYPE ((TPM_RESULT) (TPM_BASE + 37))
1188 #define TPM_INVALID_POSTINIT ((TPM_RESULT) (TPM_BASE + 38))
1189 #define TPM_INAPPROPRIATE_SIG ((TPM_RESULT) (TPM_BASE + 39))
1190 #define TPM_BAD_KEY_PROPERTY ((TPM_RESULT) (TPM_BASE + 40))
1191 #define TPM_BAD_MIGRATION ((TPM_RESULT) (TPM_BASE + 41))
1192 #define TPM_BAD_SCHEME ((TPM_RESULT) (TPM_BASE + 42))
1193 #define TPM_BAD_DATASIZE ((TPM_RESULT) (TPM_BASE + 43))
1194 #define TPM_BAD_MODE ((TPM_RESULT) (TPM_BASE + 44))
1195 #define TPM_BAD_PRESENCE ((TPM_RESULT) (TPM_BASE + 45))
1196 #define TPM_BAD_VERSION ((TPM_RESULT) (TPM_BASE + 46))
1197 #define TPM_NO_WRAP_TRANSPORT ((TPM_RESULT) (TPM_BASE + 47))
1198 #define TPM_AUDITFAIL_UNSUCCESSFUL ((TPM_RESULT) (TPM_BASE + 48))
1199 #define TPM_AUDITFAIL_SUCCESSFUL ((TPM_RESULT) (TPM_BASE + 49))
1200 #define TPM_NOTRESETABLE ((TPM_RESULT) (TPM_BASE + 50))
1201 #define TPM_NOTLOCAL ((TPM_RESULT) (TPM_BASE + 51))
1202 #define TPM_BAD_TYPE ((TPM_RESULT) (TPM_BASE + 52))
1203 #define TPM_INVALID_RESOURCE ((TPM_RESULT) (TPM_BASE + 53))
1204 #define TPM_NOTFIPS ((TPM_RESULT) (TPM_BASE + 54))
1205 #define TPM_INVALID_FAMILY ((TPM_RESULT) (TPM_BASE + 55))
1206 #define TPM_NO_NV_PERMISSION ((TPM_RESULT) (TPM_BASE + 56))
1207 #define TPM_REQUIRES_SIGN ((TPM_RESULT) (TPM_BASE + 57))
1208 #define TPM_KEY_NOTSUPPORTED ((TPM_RESULT) (TPM_BASE + 58))
1209 #define TPM_AUTH_CONFLICT ((TPM_RESULT) (TPM_BASE + 59))
1210 #define TPM_AREA_LOCKED ((TPM_RESULT) (TPM_BASE + 60))
1211 #define TPM_BAD_LOCALITY ((TPM_RESULT) (TPM_BASE + 61))
1212 #define TPM_READ_ONLY ((TPM_RESULT) (TPM_BASE + 62))
1213 #define TPM_PER_NOWRITE ((TPM_RESULT) (TPM_BASE + 63))
1214 #define TPM_FAMILYCOUNT ((TPM_RESULT) (TPM_BASE + 64))
1215 #define TPM_WRITE_LOCKED ((TPM_RESULT) (TPM_BASE + 65))
1216 #define TPM_BAD_ATTRIBUTES ((TPM_RESULT) (TPM_BASE + 66))
1217 #define TPM_INVALID_STRUCTURE ((TPM_RESULT) (TPM_BASE + 67))
1218 #define TPM_KEY_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 68))
1219 #define TPM_BAD_COUNTER ((TPM_RESULT) (TPM_BASE + 69))
1220 #define TPM_NOT_FULLWRITE ((TPM_RESULT) (TPM_BASE + 70))
1221 #define TPM_CONTEXT_GAP ((TPM_RESULT) (TPM_BASE + 71))
1222 #define TPM_MAXNVWRITES ((TPM_RESULT) (TPM_BASE + 72))
1223 #define TPM_NOOPERATOR ((TPM_RESULT) (TPM_BASE + 73))
1224 #define TPM_RESOURCEMISSING ((TPM_RESULT) (TPM_BASE + 74))
1225 #define TPM_DELEGATE_LOCK ((TPM_RESULT) (TPM_BASE + 75))
1226 #define TPM_DELEGATE_FAMILY ((TPM_RESULT) (TPM_BASE + 76))
1227 #define TPM_DELEGATE_ADMIN ((TPM_RESULT) (TPM_BASE + 77))
1228 #define TPM_TRANSPORT_NOTEXCLUSIVE ((TPM_RESULT) (TPM_BASE + 78))
1229 #define TPM_OWNER_CONTROL ((TPM_RESULT) (TPM_BASE + 79))
1230 #define TPM_DAA_RESOURCES ((TPM_RESULT) (TPM_BASE + 80))
1231 #define TPM_DAA_INPUT_DATA0 ((TPM_RESULT) (TPM_BASE + 81))
1232 #define TPM_DAA_INPUT_DATA1 ((TPM_RESULT) (TPM_BASE + 82))
1233 #define TPM_DAA_ISSUER_SETTINGS ((TPM_RESULT) (TPM_BASE + 83))
1234 #define TPM_DAA_TPM_SETTINGS ((TPM_RESULT) (TPM_BASE + 84))
1235 #define TPM_DAA_STAGE ((TPM_RESULT) (TPM_BASE + 85))
1236 #define TPM_DAA_ISSUER_VALIDITY ((TPM_RESULT) (TPM_BASE + 86))
1237 #define TPM_DAA_WRONG_W ((TPM_RESULT) (TPM_BASE + 87))
1238 #define TPM_BAD_HANDLE ((TPM_RESULT) (TPM_BASE + 88))
1239 #define TPM_BAD_DELEGATE ((TPM_RESULT) (TPM_BASE + 89))
1240 #define TPM_BADCONTEXT ((TPM_RESULT) (TPM_BASE + 90))
1241 #define TPM_TOOMANYCONTEXTS ((TPM_RESULT) (TPM_BASE + 91))
1242 #define TPM_MA_TICKET_SIGNATURE ((TPM_RESULT) (TPM_BASE + 92))
1243 #define TPM_MA_DESTINATION ((TPM_RESULT) (TPM_BASE + 93))
1244 #define TPM_MA_SOURCE ((TPM_RESULT) (TPM_BASE + 94))
1245 #define TPM_MA_AUTHORITY ((TPM_RESULT) (TPM_BASE + 95))
1246 #define TPM_PERMANENTEK ((TPM_RESULT) (TPM_BASE + 97))
1247 #define TPM_BAD_SIGNATURE ((TPM_RESULT) (TPM_BASE + 98))
1248 #define TPM_NOCONTEXTSPACE ((TPM_RESULT) (TPM_BASE + 99))
1250 #define TPM_RETRY ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL))
1251 #define TPM_NEEDS_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 1))
1252 #define TPM_DOING_SELFTEST ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 2))
1253 #define TPM_DEFEND_LOCK_RUNNING ((TPM_RESULT) (TPM_BASE + TPM_NON_FATAL + 3))
1256 // Part 2, section 17: Ordinals
1258 // Ordinals are 32 bit values. The upper byte contains values that serve as
1259 // flag indicators, the next byte contains values indicating what committee
1260 // designated the ordinal, and the final two bytes contain the Command
1263 // 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0
1264 // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1265 // |P|C|V| Reserved| Purview | Command Ordinal Index |
1266 // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1270 // * P is Protected/Unprotected command. When 0 the command is a Protected
1271 // command, when 1 the command is an Unprotected command.
1273 // * C is Non-Connection/Connection related command. When 0 this command
1274 // passes through to either the protected (TPM) or unprotected (TSS)
1277 // * V is TPM/Vendor command. When 0 the command is TPM defined, when 1 the
1278 // command is vendor defined.
1280 // * All reserved area bits are set to 0.
1283 #define TPM_ORD_ActivateIdentity ((TPM_COMMAND_CODE) 0x0000007A)
1284 #define TPM_ORD_AuthorizeMigrationKey ((TPM_COMMAND_CODE) 0x0000002B)
1285 #define TPM_ORD_CertifyKey ((TPM_COMMAND_CODE) 0x00000032)
1286 #define TPM_ORD_CertifyKey2 ((TPM_COMMAND_CODE) 0x00000033)
1287 #define TPM_ORD_CertifySelfTest ((TPM_COMMAND_CODE) 0x00000052)
1288 #define TPM_ORD_ChangeAuth ((TPM_COMMAND_CODE) 0x0000000C)
1289 #define TPM_ORD_ChangeAuthAsymFinish ((TPM_COMMAND_CODE) 0x0000000F)
1290 #define TPM_ORD_ChangeAuthAsymStart ((TPM_COMMAND_CODE) 0x0000000E)
1291 #define TPM_ORD_ChangeAuthOwner ((TPM_COMMAND_CODE) 0x00000010)
1292 #define TPM_ORD_CMK_ApproveMA ((TPM_COMMAND_CODE) 0x0000001D)
1293 #define TPM_ORD_CMK_ConvertMigration ((TPM_COMMAND_CODE) 0x00000024)
1294 #define TPM_ORD_CMK_CreateBlob ((TPM_COMMAND_CODE) 0x0000001B)
1295 #define TPM_ORD_CMK_CreateKey ((TPM_COMMAND_CODE) 0x00000013)
1296 #define TPM_ORD_CMK_CreateTicket ((TPM_COMMAND_CODE) 0x00000012)
1297 #define TPM_ORD_CMK_SetRestrictions ((TPM_COMMAND_CODE) 0x0000001C)
1298 #define TPM_ORD_ContinueSelfTest ((TPM_COMMAND_CODE) 0x00000053)
1299 #define TPM_ORD_ConvertMigrationBlob ((TPM_COMMAND_CODE) 0x0000002A)
1300 #define TPM_ORD_CreateCounter ((TPM_COMMAND_CODE) 0x000000DC)
1301 #define TPM_ORD_CreateEndorsementKeyPair ((TPM_COMMAND_CODE) 0x00000078)
1302 #define TPM_ORD_CreateMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002C)
1303 #define TPM_ORD_CreateMigrationBlob ((TPM_COMMAND_CODE) 0x00000028)
1304 #define TPM_ORD_CreateRevocableEK ((TPM_COMMAND_CODE) 0x0000007F)
1305 #define TPM_ORD_CreateWrapKey ((TPM_COMMAND_CODE) 0x0000001F)
1306 #define TPM_ORD_DAA_JOIN ((TPM_COMMAND_CODE) 0x00000029)
1307 #define TPM_ORD_DAA_SIGN ((TPM_COMMAND_CODE) 0x00000031)
1308 #define TPM_ORD_Delegate_CreateKeyDelegation ((TPM_COMMAND_CODE) 0x000000D4)
1309 #define TPM_ORD_Delegate_CreateOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D5)
1310 #define TPM_ORD_Delegate_LoadOwnerDelegation ((TPM_COMMAND_CODE) 0x000000D8)
1311 #define TPM_ORD_Delegate_Manage ((TPM_COMMAND_CODE) 0x000000D2)
1312 #define TPM_ORD_Delegate_ReadTable ((TPM_COMMAND_CODE) 0x000000DB)
1313 #define TPM_ORD_Delegate_UpdateVerification ((TPM_COMMAND_CODE) 0x000000D1)
1314 #define TPM_ORD_Delegate_VerifyDelegation ((TPM_COMMAND_CODE) 0x000000D6)
1315 #define TPM_ORD_DirRead ((TPM_COMMAND_CODE) 0x0000001A)
1316 #define TPM_ORD_DirWriteAuth ((TPM_COMMAND_CODE) 0x00000019)
1317 #define TPM_ORD_DisableForceClear ((TPM_COMMAND_CODE) 0x0000005E)
1318 #define TPM_ORD_DisableOwnerClear ((TPM_COMMAND_CODE) 0x0000005C)
1319 #define TPM_ORD_DisablePubekRead ((TPM_COMMAND_CODE) 0x0000007E)
1320 #define TPM_ORD_DSAP ((TPM_COMMAND_CODE) 0x00000011)
1321 #define TPM_ORD_EstablishTransport ((TPM_COMMAND_CODE) 0x000000E6)
1322 #define TPM_ORD_EvictKey ((TPM_COMMAND_CODE) 0x00000022)
1323 #define TPM_ORD_ExecuteTransport ((TPM_COMMAND_CODE) 0x000000E7)
1324 #define TPM_ORD_Extend ((TPM_COMMAND_CODE) 0x00000014)
1325 #define TPM_ORD_FieldUpgrade ((TPM_COMMAND_CODE) 0x000000AA)
1326 #define TPM_ORD_FlushSpecific ((TPM_COMMAND_CODE) 0x000000BA)
1327 #define TPM_ORD_ForceClear ((TPM_COMMAND_CODE) 0x0000005D)
1328 #define TPM_ORD_GetAuditDigest ((TPM_COMMAND_CODE) 0x00000085)
1329 #define TPM_ORD_GetAuditDigestSigned ((TPM_COMMAND_CODE) 0x00000086)
1330 #define TPM_ORD_GetAuditEvent ((TPM_COMMAND_CODE) 0x00000082)
1331 #define TPM_ORD_GetAuditEventSigned ((TPM_COMMAND_CODE) 0x00000083)
1332 #define TPM_ORD_GetCapability ((TPM_COMMAND_CODE) 0x00000065)
1333 #define TPM_ORD_GetCapabilityOwner ((TPM_COMMAND_CODE) 0x00000066)
1334 #define TPM_ORD_GetCapabilitySigned ((TPM_COMMAND_CODE) 0x00000064)
1335 #define TPM_ORD_GetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008C)
1336 #define TPM_ORD_GetPubKey ((TPM_COMMAND_CODE) 0x00000021)
1337 #define TPM_ORD_GetRandom ((TPM_COMMAND_CODE) 0x00000046)
1338 #define TPM_ORD_GetTestResult ((TPM_COMMAND_CODE) 0x00000054)
1339 #define TPM_ORD_GetTicks ((TPM_COMMAND_CODE) 0x000000F1)
1340 #define TPM_ORD_IncrementCounter ((TPM_COMMAND_CODE) 0x000000DD)
1341 #define TPM_ORD_Init ((TPM_COMMAND_CODE) 0x00000097)
1342 #define TPM_ORD_KeyControlOwner ((TPM_COMMAND_CODE) 0x00000023)
1343 #define TPM_ORD_KillMaintenanceFeature ((TPM_COMMAND_CODE) 0x0000002E)
1344 #define TPM_ORD_LoadAuthContext ((TPM_COMMAND_CODE) 0x000000B7)
1345 #define TPM_ORD_LoadContext ((TPM_COMMAND_CODE) 0x000000B9)
1346 #define TPM_ORD_LoadKey ((TPM_COMMAND_CODE) 0x00000020)
1347 #define TPM_ORD_LoadKey2 ((TPM_COMMAND_CODE) 0x00000041)
1348 #define TPM_ORD_LoadKeyContext ((TPM_COMMAND_CODE) 0x000000B5)
1349 #define TPM_ORD_LoadMaintenanceArchive ((TPM_COMMAND_CODE) 0x0000002D)
1350 #define TPM_ORD_LoadManuMaintPub ((TPM_COMMAND_CODE) 0x0000002F)
1351 #define TPM_ORD_MakeIdentity ((TPM_COMMAND_CODE) 0x00000079)
1352 #define TPM_ORD_MigrateKey ((TPM_COMMAND_CODE) 0x00000025)
1353 #define TPM_ORD_NV_DefineSpace ((TPM_COMMAND_CODE) 0x000000CC)
1354 #define TPM_ORD_NV_ReadValue ((TPM_COMMAND_CODE) 0x000000CF)
1355 #define TPM_ORD_NV_ReadValueAuth ((TPM_COMMAND_CODE) 0x000000D0)
1356 #define TPM_ORD_NV_WriteValue ((TPM_COMMAND_CODE) 0x000000CD)
1357 #define TPM_ORD_NV_WriteValueAuth ((TPM_COMMAND_CODE) 0x000000CE)
1358 #define TPM_ORD_OIAP ((TPM_COMMAND_CODE) 0x0000000A)
1359 #define TPM_ORD_OSAP ((TPM_COMMAND_CODE) 0x0000000B)
1360 #define TPM_ORD_OwnerClear ((TPM_COMMAND_CODE) 0x0000005B)
1361 #define TPM_ORD_OwnerReadInternalPub ((TPM_COMMAND_CODE) 0x00000081)
1362 #define TPM_ORD_OwnerReadPubek ((TPM_COMMAND_CODE) 0x0000007D)
1363 #define TPM_ORD_OwnerSetDisable ((TPM_COMMAND_CODE) 0x0000006E)
1364 #define TPM_ORD_PCR_Reset ((TPM_COMMAND_CODE) 0x000000C8)
1365 #define TPM_ORD_PcrRead ((TPM_COMMAND_CODE) 0x00000015)
1366 #define TPM_ORD_PhysicalDisable ((TPM_COMMAND_CODE) 0x00000070)
1367 #define TPM_ORD_PhysicalEnable ((TPM_COMMAND_CODE) 0x0000006F)
1368 #define TPM_ORD_PhysicalSetDeactivated ((TPM_COMMAND_CODE) 0x00000072)
1369 #define TPM_ORD_Quote ((TPM_COMMAND_CODE) 0x00000016)
1370 #define TPM_ORD_Quote2 ((TPM_COMMAND_CODE) 0x0000003E)
1371 #define TPM_ORD_ReadCounter ((TPM_COMMAND_CODE) 0x000000DE)
1372 #define TPM_ORD_ReadManuMaintPub ((TPM_COMMAND_CODE) 0x00000030)
1373 #define TPM_ORD_ReadPubek ((TPM_COMMAND_CODE) 0x0000007C)
1374 #define TPM_ORD_ReleaseCounter ((TPM_COMMAND_CODE) 0x000000DF)
1375 #define TPM_ORD_ReleaseCounterOwner ((TPM_COMMAND_CODE) 0x000000E0)
1376 #define TPM_ORD_ReleaseTransportSigned ((TPM_COMMAND_CODE) 0x000000E8)
1377 #define TPM_ORD_Reset ((TPM_COMMAND_CODE) 0x0000005A)
1378 #define TPM_ORD_ResetLockValue ((TPM_COMMAND_CODE) 0x00000040)
1379 #define TPM_ORD_RevokeTrust ((TPM_COMMAND_CODE) 0x00000080)
1380 #define TPM_ORD_SaveAuthContext ((TPM_COMMAND_CODE) 0x000000B6)
1381 #define TPM_ORD_SaveContext ((TPM_COMMAND_CODE) 0x000000B8)
1382 #define TPM_ORD_SaveKeyContext ((TPM_COMMAND_CODE) 0x000000B4)
1383 #define TPM_ORD_SaveState ((TPM_COMMAND_CODE) 0x00000098)
1384 #define TPM_ORD_Seal ((TPM_COMMAND_CODE) 0x00000017)
1385 #define TPM_ORD_Sealx ((TPM_COMMAND_CODE) 0x0000003D)
1386 #define TPM_ORD_SelfTestFull ((TPM_COMMAND_CODE) 0x00000050)
1387 #define TPM_ORD_SetCapability ((TPM_COMMAND_CODE) 0x0000003F)
1388 #define TPM_ORD_SetOperatorAuth ((TPM_COMMAND_CODE) 0x00000074)
1389 #define TPM_ORD_SetOrdinalAuditStatus ((TPM_COMMAND_CODE) 0x0000008D)
1390 #define TPM_ORD_SetOwnerInstall ((TPM_COMMAND_CODE) 0x00000071)
1391 #define TPM_ORD_SetOwnerPointer ((TPM_COMMAND_CODE) 0x00000075)
1392 #define TPM_ORD_SetRedirection ((TPM_COMMAND_CODE) 0x0000009A)
1393 #define TPM_ORD_SetTempDeactivated ((TPM_COMMAND_CODE) 0x00000073)
1394 #define TPM_ORD_SHA1Complete ((TPM_COMMAND_CODE) 0x000000A2)
1395 #define TPM_ORD_SHA1CompleteExtend ((TPM_COMMAND_CODE) 0x000000A3)
1396 #define TPM_ORD_SHA1Start ((TPM_COMMAND_CODE) 0x000000A0)
1397 #define TPM_ORD_SHA1Update ((TPM_COMMAND_CODE) 0x000000A1)
1398 #define TPM_ORD_Sign ((TPM_COMMAND_CODE) 0x0000003C)
1399 #define TPM_ORD_Startup ((TPM_COMMAND_CODE) 0x00000099)
1400 #define TPM_ORD_StirRandom ((TPM_COMMAND_CODE) 0x00000047)
1401 #define TPM_ORD_TakeOwnership ((TPM_COMMAND_CODE) 0x0000000D)
1402 #define TPM_ORD_Terminate_Handle ((TPM_COMMAND_CODE) 0x00000096)
1403 #define TPM_ORD_TickStampBlob ((TPM_COMMAND_CODE) 0x000000F2)
1404 #define TPM_ORD_UnBind ((TPM_COMMAND_CODE) 0x0000001E)
1405 #define TPM_ORD_Unseal ((TPM_COMMAND_CODE) 0x00000018)
1406 #define TSC_ORD_PhysicalPresence ((TPM_COMMAND_CODE) 0x4000000A)
1407 #define TSC_ORD_ResetEstablishmentBit ((TPM_COMMAND_CODE) 0x4000000B)
1410 // Part 2, section 18: Context structures
1413 typedef struct tdTPM_CONTEXT_BLOB
1415 TPM_STRUCTURE_TAG tag
;
1416 TPM_RESOURCE_TYPE resourceType
;
1419 UINT32 contextCount
;
1420 TPM_DIGEST integrityDigest
;
1421 UINT32 additionalSize
;
1422 UINT8
*additionalData
;
1423 UINT32 sensitiveSize
;
1424 UINT8
*sensitiveData
;
1427 typedef struct tdTPM_CONTEXT_SENSITIVE
1429 TPM_STRUCTURE_TAG tag
;
1430 TPM_NONCE contextNonce
;
1431 UINT32 internalSize
;
1432 UINT8
*internalData
;
1433 } TPM_CONTEXT_SENSITIVE
;
1436 // Part 2, section 19: NV Structures
1439 #define TPM_NV_INDEX_LOCK ((UINT32)0xffffffff)
1440 #define TPM_NV_INDEX0 ((UINT32)0x00000000)
1441 #define TPM_NV_INDEX_DIR ((UINT32)0x10000001)
1442 #define TPM_NV_INDEX_EKCert ((UINT32)0x0000f000)
1443 #define TPM_NV_INDEX_TPM_CC ((UINT32)0x0000f001)
1444 #define TPM_NV_INDEX_PlatformCert ((UINT32)0x0000f002)
1445 #define TPM_NV_INDEX_Platform_CC ((UINT32)0x0000f003)
1446 // The following define ranges of reserved indices.
1447 #define TPM_NV_INDEX_TSS_BASE ((UINT32)0x00011100)
1448 #define TPM_NV_INDEX_PC_BASE ((UINT32)0x00011200)
1449 #define TPM_NV_INDEX_SERVER_BASE ((UINT32)0x00011300)
1450 #define TPM_NV_INDEX_MOBILE_BASE ((UINT32)0x00011400)
1451 #define TPM_NV_INDEX_PERIPHERAL_BASE ((UINT32)0x00011500)
1452 #define TPM_NV_INDEX_GROUP_RESV_BASE ((UINT32)0x00010000)
1454 typedef UINT32 TPM_NV_PER_ATTRIBUTES
;
1455 // The typedefs TPM_NV_PER_ATTRIBUTES (not present in TPM 1.2 Spec. have been added
1456 // and structure fields that were to hold the following values
1457 #define TPM_NV_PER_READ_STCLEAR (((UINT32)1)<<31)
1458 #define TPM_NV_PER_AUTHREAD (((UINT32)1)<<18)
1459 #define TPM_NV_PER_OWNERREAD (((UINT32)1)<<17)
1460 #define TPM_NV_PER_PPREAD (((UINT32)1)<<16)
1461 #define TPM_NV_PER_GLOBALLOCK (((UINT32)1)<<15)
1462 #define TPM_NV_PER_WRITE_STCLEAR (((UINT32)1)<<14)
1463 #define TPM_NV_PER_WRITEDEFINE (((UINT32)1)<<13)
1464 #define TPM_NV_PER_WRITEALL (((UINT32)1)<<12)
1465 #define TPM_NV_PER_AUTHWRITE (((UINT32)1)<<2)
1466 #define TPM_NV_PER_OWNERWRITE (((UINT32)1)<<1)
1467 #define TPM_NV_PER_PPWRITE (((UINT32)1)<<0)
1469 typedef struct tdTPM_NV_ATTRIBUTES
1471 TPM_STRUCTURE_TAG tag
;
1472 TPM_NV_PER_ATTRIBUTES attributes
;
1473 } TPM_NV_ATTRIBUTES
;
1476 typedef struct tdTPM_NV_DATA_PUBLIC
1478 TPM_STRUCTURE_TAG tag
;
1479 TPM_NV_INDEX nvIndex
;
1480 TPM_PCR_INFO_SHORT pcrInfoRead
;
1481 TPM_PCR_INFO_SHORT pcrInfoWrite
;
1482 TPM_NV_ATTRIBUTES permission
;
1483 BOOLEAN bReadSTClear
;
1484 BOOLEAN bWriteSTClear
;
1485 BOOLEAN bWriteDefine
;
1487 } TPM_NV_DATA_PUBLIC
;
1492 //typedef struct tdTPM_NV_DATA_SENSITIVE
1494 // TPM_STRUCTURE_TAG tag;
1495 // TPM_NV_DATA_PUBLIC pubInfo;
1496 // TPM_AUTHDATA authValue;
1498 //} TPM_NV_DATA_SENSITIVE;
1502 // Part 2, section 20: Delegation
1506 // Part 2, section 20.3: Owner Permissions Settings for per1 bits
1508 #define TPM_DELEGATE_SetOrdinalAuditStatus (((UINT32)1)<<30)
1509 #define TPM_DELEGATE_DirWriteAuth (((UINT32)1)<<29)
1510 #define TPM_DELEGATE_CMK_ApproveMA (((UINT32)1)<<28)
1511 #define TPM_DELEGATE_CMK_CreateTicket (((UINT32)1)<<26)
1512 #define TPM_DELEGATE_Delegate_LoadOwnerDelegation (((UINT32)1)<<24)
1513 #define TPM_DELEGATE_DAA_Join (((UINT32)1)<<23)
1514 #define TPM_DELEGATE_AuthorizeMigrationKey (((UINT32)1)<<22)
1515 #define TPM_DELEGATE_CreateMaintenanceArchive (((UINT32)1)<<21)
1516 #define TPM_DELEGATE_LoadMaintenanceArchive (((UINT32)1)<<20)
1517 #define TPM_DELEGATE_KillMaintenanceFeature (((UINT32)1)<<19)
1518 #define TPM_DELEGATE_OwnerReadInteralPub (((UINT32)1)<<18)
1519 #define TPM_DELEGATE_ResetLockValue (((UINT32)1)<<17)
1520 #define TPM_DELEGATE_OwnerClear (((UINT32)1)<<16)
1521 #define TPM_DELEGATE_DisableOwnerClear (((UINT32)1)<<15)
1522 #define TPM_DELEGATE_OwnerSetDisable (((UINT32)1)<<13)
1523 #define TPM_DELEGATE_SetCapability (((UINT32)1)<<12)
1524 #define TPM_DELEGATE_MakeIdentity (((UINT32)1)<<11)
1525 #define TPM_DELEGATE_ActivateIdentity (((UINT32)1)<<10)
1526 #define TPM_DELEGATE_OwnerReadPubek (((UINT32)1)<<9)
1527 #define TPM_DELEGATE_DisablePubekRead (((UINT32)1)<<8)
1528 #define TPM_DELEGATE_SetRedirection (((UINT32)1)<<7)
1529 #define TPM_DELEGATE_FieldUpgrade (((UINT32)1)<<6)
1530 #define TPM_DELEGATE_Delegate_UpdateVerification (((UINT32)1)<<5)
1531 #define TPM_DELEGATE_CreateCounter (((UINT32)1)<<4)
1532 #define TPM_DELEGATE_ReleaseCounterOwner (((UINT32)1)<<3)
1533 #define TPM_DELEGATE_DelegateManage (((UINT32)1)<<2)
1534 #define TPM_DELEGATE_Delegate_CreateOwnerDelegation (((UINT32)1)<<1)
1535 #define TPM_DELEGATE_DAA_Sign (((UINT32)1)<<0)
1538 // Part 2, section 20.3: Key Permissions Settings for per1 bits
1540 #define TPM_KEY_DELEGATE_CMK_ConvertMigration (((UINT32)1)<<28)
1541 #define TPM_KEY_DELEGATE_TickStampBlob (((UINT32)1)<<27)
1542 #define TPM_KEY_DELEGATE_ChangeAuthAsymStart (((UINT32)1)<<26)
1543 #define TPM_KEY_DELEGATE_ChangeAuthAsymFinish (((UINT32)1)<<25)
1544 #define TPM_KEY_DELEGATE_CMK_CreateKey (((UINT32)1)<<24)
1545 #define TPM_KEY_DELEGATE_MigrateKey (((UINT32)1)<<23)
1546 #define TPM_KEY_DELEGATE_LoadKey2 (((UINT32)1)<<22)
1547 #define TPM_KEY_DELEGATE_EstablishTransport (((UINT32)1)<<21)
1548 #define TPM_KEY_DELEGATE_ReleaseTransportSigned (((UINT32)1)<<20)
1549 #define TPM_KEY_DELEGATE_Quote2 (((UINT32)1)<<19)
1550 #define TPM_KEY_DELEGATE_Sealx (((UINT32)1)<<18)
1551 #define TPM_KEY_DELEGATE_MakeIdentity (((UINT32)1)<<17)
1552 #define TPM_KEY_DELEGATE_ActivateIdentity (((UINT32)1)<<16)
1553 #define TPM_KEY_DELEGATE_GetAuditDigestSigned (((UINT32)1)<<15)
1554 #define TPM_KEY_DELEGATE_Sign (((UINT32)1)<<14)
1555 #define TPM_KEY_DELEGATE_CertifyKey2 (((UINT32)1)<<13)
1556 #define TPM_KEY_DELEGATE_CertifyKey (((UINT32)1)<<12)
1557 #define TPM_KEY_DELEGATE_CreateWrapKey (((UINT32)1)<<11)
1558 #define TPM_KEY_DELEGATE_CMK_CreateBlob (((UINT32)1)<<10)
1559 #define TPM_KEY_DELEGATE_CreateMigrationBlob (((UINT32)1)<<9)
1560 #define TPM_KEY_DELEGATE_ConvertMigrationBlob (((UINT32)1)<<8)
1561 #define TPM_KEY_DELEGATE_CreateKeyDelegation (((UINT32)1)<<7)
1562 #define TPM_KEY_DELEGATE_ChangeAuth (((UINT32)1)<<6)
1563 #define TPM_KEY_DELEGATE_GetPubKey (((UINT32)1)<<5)
1564 #define TPM_KEY_DELEGATE_UnBind (((UINT32)1)<<4)
1565 #define TPM_KEY_DELEGATE_Quote (((UINT32)1)<<3)
1566 #define TPM_KEY_DELEGATE_Unseal (((UINT32)1)<<2)
1567 #define TPM_KEY_DELEGATE_Seal (((UINT32)1)<<1)
1568 #define TPM_KEY_DELEGATE_LoadKey (((UINT32)1)<<0)
1570 #define TPM_FAMILY_CREATE ((UINT32)0x00000001)
1571 #define TPM_FAMILY_ENABLE ((UINT32)0x00000002)
1572 #define TPM_FAMILY_ADMIN ((UINT32)0x00000003)
1573 #define TPM_FAMILY_INVALIDATE ((UINT32)0x00000004)
1575 #define TPM_FAMFLAG_DELEGATE_ADMIN_LOCK (((UINT32)1)<<1)
1576 #define TPM_FAMFLAG_ENABLE (((UINT32)1)<<0)
1578 typedef struct tdTPM_FAMILY_LABEL
1583 typedef struct tdTPM_FAMILY_TABLE_ENTRY
1585 TPM_STRUCTURE_TAG tag
;
1586 TPM_FAMILY_LABEL label
;
1587 TPM_FAMILY_ID familyID
;
1588 TPM_FAMILY_VERIFICATION verificationCount
;
1589 TPM_FAMILY_FLAGS flags
;
1590 } TPM_FAMILY_TABLE_ENTRY
;
1592 #define TPM_FAMILY_TABLE_ENTRY_MIN 8
1593 //typedef struct tdTPM_FAMILY_TABLE
1595 // TPM_FAMILY_TABLE_ENTRY FamTableRow[TPM_NUM_FAMILY_TABLE_ENTRY_MIN];
1596 //} TPM_FAMILY_TABLE;
1599 typedef struct tdTPM_DELEGATE_LABEL
1602 } TPM_DELEGATE_LABEL
;
1605 typedef UINT32 TPM_DELEGATE_TYPE
;
1606 #define TPM_DEL_OWNER_BITS ((UINT32)0x00000001)
1607 #define TPM_DEL_KEY_BITS ((UINT32)0x00000002)
1609 typedef struct tdTPM_DELEGATIONS
1611 TPM_STRUCTURE_TAG tag
;
1612 TPM_DELEGATE_TYPE delegateType
;
1617 typedef struct tdTPM_DELEGATE_PUBLIC
1619 TPM_STRUCTURE_TAG tag
;
1620 TPM_DELEGATE_LABEL label
;
1621 TPM_PCR_INFO_SHORT pcrInfo
;
1622 TPM_DELEGATIONS permissions
;
1623 TPM_FAMILY_ID familyID
;
1624 TPM_FAMILY_VERIFICATION verificationCount
;
1625 } TPM_DELEGATE_PUBLIC
;
1627 typedef struct tdTPM_DELEGATE_TABLE_ROW
1629 TPM_STRUCTURE_TAG tag
;
1630 TPM_DELEGATE_PUBLIC pub
;
1631 TPM_SECRET authValue
;
1632 } TPM_DELEGATE_TABLE_ROW
;
1635 #define TPM_NUM_DELEGATE_TABLE_ENTRY_MIN 2
1636 //typedef struct tdTPM_DELEGATE_TABLE
1638 // TPM_DELEGATE_TABLE_ROW delRow[TPM_NUM_DELEGATE_TABLE_ENTRY_MIN];
1639 //} TPM_DELEGATE_TABLE;
1641 typedef struct tdTPM_DELEGATE_SENSITIVE
1643 TPM_STRUCTURE_TAG tag
;
1644 TPM_SECRET authValue
;
1645 } TPM_DELEGATE_SENSITIVE
;
1647 typedef struct tdTPM_DELEGATE_OWNER_BLOB
1649 TPM_STRUCTURE_TAG tag
;
1650 TPM_DELEGATE_PUBLIC pub
;
1651 TPM_DIGEST integrityDigest
;
1652 UINT32 additionalSize
;
1653 UINT8
*additionalArea
;
1654 UINT32 sensitiveSize
;
1655 UINT8
*sensitiveArea
;
1656 } TPM_DELEGATE_OWNER_BLOB
;
1658 typedef struct tdTPM_DELEGATE_KEY_BLOB
1660 TPM_STRUCTURE_TAG tag
;
1661 TPM_DELEGATE_PUBLIC pub
;
1662 TPM_DIGEST integrityDigest
;
1663 TPM_DIGEST pubKeyDigest
;
1664 UINT32 additionalSize
;
1665 UINT8
*additionalArea
;
1666 UINT32 sensitiveSize
;
1667 UINT8
*sensitiveArea
;
1668 } TPM_DELEGATE_KEY_BLOB
;
1671 // Part 2, section 21.1: TPM_CAPABILITY_AREA for GetCapability
1673 #define TPM_CAP_ORD ((TPM_CAPABILITY_AREA) 0x00000001)
1674 #define TPM_CAP_ALG ((TPM_CAPABILITY_AREA) 0x00000002)
1675 #define TPM_CAP_PID ((TPM_CAPABILITY_AREA) 0x00000003)
1676 #define TPM_CAP_FLAG ((TPM_CAPABILITY_AREA) 0x00000004)
1677 #define TPM_CAP_PROPERTY ((TPM_CAPABILITY_AREA) 0x00000005)
1678 #define TPM_CAP_VERSION ((TPM_CAPABILITY_AREA) 0x00000006)
1679 #define TPM_CAP_KEY_HANDLE ((TPM_CAPABILITY_AREA) 0x00000007)
1680 #define TPM_CAP_CHECK_LOADED ((TPM_CAPABILITY_AREA) 0x00000008)
1681 #define TPM_CAP_SYM_MODE ((TPM_CAPABILITY_AREA) 0x00000009)
1682 #define TPM_CAP_KEY_STATUS ((TPM_CAPABILITY_AREA) 0x0000000C)
1683 #define TPM_CAP_NV_LIST ((TPM_CAPABILITY_AREA) 0x0000000D)
1684 #define TPM_CAP_MFR ((TPM_CAPABILITY_AREA) 0x00000010)
1685 #define TPM_CAP_NV_INDEX ((TPM_CAPABILITY_AREA) 0x00000011)
1686 #define TPM_CAP_TRANS_ALG ((TPM_CAPABILITY_AREA) 0x00000012)
1687 #define TPM_CAP_HANDLE ((TPM_CAPABILITY_AREA) 0x00000014)
1688 #define TPM_CAP_TRANS_ES ((TPM_CAPABILITY_AREA) 0x00000015)
1689 #define TPM_CAP_AUTH_ENCRYPT ((TPM_CAPABILITY_AREA) 0x00000017)
1690 #define TPM_CAP_SELECT_SIZE ((TPM_CAPABILITY_AREA) 0x00000018)
1691 #define TPM_CAP_VERSION_VAL ((TPM_CAPABILITY_AREA) 0x0000001A)
1693 #define TPM_CAP_FLAG_PERMANENT ((TPM_CAPABILITY_AREA) 0x00000108)
1694 #define TPM_CAP_FLAG_VOLATILE ((TPM_CAPABILITY_AREA) 0x00000109)
1697 // Part 2, section 21.2: CAP_PROPERTY Subcap values for GetCapability
1699 #define TPM_CAP_PROP_PCR ((TPM_CAPABILITY_AREA) 0x00000101)
1700 #define TPM_CAP_PROP_DIR ((TPM_CAPABILITY_AREA) 0x00000102)
1701 #define TPM_CAP_PROP_MANUFACTURER ((TPM_CAPABILITY_AREA) 0x00000103)
1702 #define TPM_CAP_PROP_KEYS ((TPM_CAPABILITY_AREA) 0x00000104)
1703 #define TPM_CAP_PROP_MIN_COUNTER ((TPM_CAPABILITY_AREA) 0x00000107)
1704 #define TPM_CAP_PROP_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010A)
1705 #define TPM_CAP_PROP_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010B)
1706 #define TPM_CAP_PROP_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010C)
1707 #define TPM_CAP_PROP_MAX_AUTHSESS ((TPM_CAPABILITY_AREA) 0x0000010D)
1708 #define TPM_CAP_PROP_MAX_TRANSESS ((TPM_CAPABILITY_AREA) 0x0000010E)
1709 #define TPM_CAP_PROP_MAX_COUNTERS ((TPM_CAPABILITY_AREA) 0x0000010F)
1710 #define TPM_CAP_PROP_MAX_KEYS ((TPM_CAPABILITY_AREA) 0x00000110)
1711 #define TPM_CAP_PROP_OWNER ((TPM_CAPABILITY_AREA) 0x00000111)
1712 #define TPM_CAP_PROP_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000112)
1713 #define TPM_CAP_PROP_MAX_CONTEXT ((TPM_CAPABILITY_AREA) 0x00000113)
1714 #define TPM_CAP_PROP_FAMILYROWS ((TPM_CAPABILITY_AREA) 0x00000114)
1715 #define TPM_CAP_PROP_TIS_TIMEOUT ((TPM_CAPABILITY_AREA) 0x00000115)
1716 #define TPM_CAP_PROP_STARTUP_EFFECT ((TPM_CAPABILITY_AREA) 0x00000116)
1717 #define TPM_CAP_PROP_DELEGATE_ROW ((TPM_CAPABILITY_AREA) 0x00000117)
1718 #define TPM_CAP_PROP_DAA_MAX ((TPM_CAPABILITY_AREA) 0x00000119)
1719 #define CAP_PROP_SESSION_DAA ((TPM_CAPABILITY_AREA) 0x0000011A)
1720 #define TPM_CAP_PROP_CONTEXT_DIST ((TPM_CAPABILITY_AREA) 0x0000011B)
1721 #define TPM_CAP_PROP_DAA_INTERRUPT ((TPM_CAPABILITY_AREA) 0x0000011C)
1722 #define TPM_CAP_PROP_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011D)
1723 #define TPM_CAP_PROP_MAX_SESSIONS ((TPM_CAPABILITY_AREA) 0x0000011E)
1724 #define TPM_CAP_PROP_CMK_RESTRICTION ((TPM_CAPABILITY_AREA) 0x0000011F)
1725 #define TPM_CAP_PROP_DURATION ((TPM_CAPABILITY_AREA) 0x00000120)
1726 #define TPM_CAP_PROP_ACTIVE_COUNTER ((TPM_CAPABILITY_AREA) 0x00000122)
1727 #define TPM_CAP_PROP_MAX_NV_AVAILABLE ((TPM_CAPABILITY_AREA) 0x00000123)
1728 #define TPM_CAP_PROP_INPUT_BUFFER ((TPM_CAPABILITY_AREA) 0x00000124)
1731 // Part 2, section 21.6: TPM_CAP_VERSION_INFO
1732 // [size_is(vendorSpecificSize)] BYTE* vendorSpecific;
1734 typedef struct tdTPM_CAP_VERSION_INFO
{
1735 TPM_STRUCTURE_TAG tag
;
1736 TPM_VERSION version
;
1739 UINT8 tpmVendorID
[4];
1740 UINT16 vendorSpecificSize
;
1741 UINT8
*vendorSpecific
;
1742 } TPM_CAP_VERSION_INFO
;
1745 // Part 2, section 22: DAA Structures
1748 #define TPM_DAA_SIZE_r0 (43)
1749 #define TPM_DAA_SIZE_r1 (43)
1750 #define TPM_DAA_SIZE_r2 (128)
1751 #define TPM_DAA_SIZE_r3 (168)
1752 #define TPM_DAA_SIZE_r4 (219)
1753 #define TPM_DAA_SIZE_NT (20)
1754 #define TPM_DAA_SIZE_v0 (128)
1755 #define TPM_DAA_SIZE_v1 (192)
1756 #define TPM_DAA_SIZE_NE (256)
1757 #define TPM_DAA_SIZE_w (256)
1758 #define TPM_DAA_SIZE_issuerModulus (256)
1759 #define TPM_DAA_power0 (104)
1760 #define TPM_DAA_power1 (1024)
1762 typedef struct tdTPM_DAA_ISSUER
1764 TPM_STRUCTURE_TAG tag
;
1765 TPM_DIGEST DAA_digest_R0
;
1766 TPM_DIGEST DAA_digest_R1
;
1767 TPM_DIGEST DAA_digest_S0
;
1768 TPM_DIGEST DAA_digest_S1
;
1769 TPM_DIGEST DAA_digest_n
;
1770 TPM_DIGEST DAA_digest_gamma
;
1771 UINT8 DAA_generic_q
[26];
1775 typedef struct tdTPM_DAA_TPM
1777 TPM_STRUCTURE_TAG tag
;
1778 TPM_DIGEST DAA_digestIssuer
;
1779 TPM_DIGEST DAA_digest_v0
;
1780 TPM_DIGEST DAA_digest_v1
;
1781 TPM_DIGEST DAA_rekey
;
1785 typedef struct tdTPM_DAA_CONTEXT
1787 TPM_STRUCTURE_TAG tag
;
1788 TPM_DIGEST DAA_digestContext
;
1789 TPM_DIGEST DAA_digest
;
1790 TPM_DAA_CONTEXT_SEED DAA_contextSeed
;
1791 UINT8 DAA_scratch
[256];
1795 typedef struct tdTPM_DAA_JOINDATA
1797 UINT8 DAA_join_u0
[128];
1798 UINT8 DAA_join_u1
[138];
1799 TPM_DIGEST DAA_digest_n0
;
1802 typedef struct tdTPM_DAA_BLOB
1804 TPM_STRUCTURE_TAG tag
;
1805 TPM_RESOURCE_TYPE resourceType
;
1807 TPM_DIGEST blobIntegrity
;
1808 UINT32 additionalSize
;
1809 UINT8
*additionalData
;
1810 UINT32 sensitiveSize
;
1811 UINT8
*sensitiveData
;
1814 typedef struct tdTPM_DAA_SENSITIVE
1816 TPM_STRUCTURE_TAG tag
;
1817 UINT32 internalSize
;
1818 UINT8
*internalData
;
1819 } TPM_DAA_SENSITIVE
;
1823 // Part 2, section 23: Redirection
1826 // This section of the TPM spec defines exactly one value but does not
1827 // give it a name. The definition of TPM_SetRedirection in Part3
1828 // refers to exactly one name but does not give its value. We join
1830 #define TPM_REDIR_GPIO (0x00000001)
1833 // TPM Command & Response Headers
1835 typedef struct tdTPM_RQU_COMMAND_HDR
{
1836 TPM_STRUCTURE_TAG tag
;
1838 TPM_COMMAND_CODE ordinal
;
1839 } TPM_RQU_COMMAND_HDR
;
1841 typedef struct tdTPM_RSP_COMMAND_HDR
{
1842 TPM_STRUCTURE_TAG tag
;
1844 TPM_RESULT returnCode
;
1845 } TPM_RSP_COMMAND_HDR
;