Esys_Duplicate.3 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. .TH "Esys_Duplicate" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_Duplicate
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_Duplicate_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP objectHandle, \fBESYS_TR\fP newParentHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA *encryptionKeyIn, const TPMT_SYM_DEF_OBJECT *symmetricAlg)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_Duplicate\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP objectHandle, \fBESYS_TR\fP newParentHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA *encryptionKeyIn, const TPMT_SYM_DEF_OBJECT *symmetricAlg, TPM2B_DATA **encryptionKeyOut, TPM2B_PRIVATE **duplicate, TPM2B_ENCRYPTED_SECRET **outSymSeed)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_Duplicate_Finish\fP (\fBESYS_CONTEXT\fP *esysContext, TPM2B_DATA **encryptionKeyOut, TPM2B_PRIVATE **duplicate, TPM2B_ENCRYPTED_SECRET **outSymSeed)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_Duplicate command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_Duplicate (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP objectHandle, \fBESYS_TR\fP newParentHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA * encryptionKeyIn, const TPMT_SYM_DEF_OBJECT * symmetricAlg, TPM2B_DATA ** encryptionKeyOut, TPM2B_PRIVATE ** duplicate, TPM2B_ENCRYPTED_SECRET ** outSymSeed)"
  27. One-Call function for TPM2_Duplicate
  28. .PP
  29. This function invokes the TPM2_Duplicate command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIobjectHandle\fP Loaded object to duplicate\&.
  36. .br
  37. \fInewParentHandle\fP Shall reference the public area of an asymmetric key\&.
  38. .br
  39. \fIshandle1\fP Session handle for authorization of objectHandle
  40. .br
  41. \fIshandle2\fP Second session handle\&.
  42. .br
  43. \fIshandle3\fP Third session handle\&.
  44. .br
  45. \fIencryptionKeyIn\fP Optional symmetric encryption key\&.
  46. .br
  47. \fIsymmetricAlg\fP Definition for the symmetric algorithm to be used for the inner wrapper\&.
  48. .br
  49. \fIencryptionKeyOut\fP TPM2_If the caller provided an encryption key or if symmetricAlg was TPM2_ALG_NULL, then this will be the TPM2_Empty TPM2_Buffer; otherwise, it shall contain the TPM2_TPM-generated, symmetric encryption key for the inner wrapper\&.\&. (callee-allocated)
  50. .br
  51. \fIduplicate\fP Private area that may be encrypted by encryptionKeyIn; and may be doubly encrypted\&. (callee-allocated)
  52. .br
  53. \fIoutSymSeed\fP Seed protected by the asymmetric algorithms of new parent (NP)\&. (callee-allocated)
  54. .RE
  55. .PP
  56. \fBReturn values:\fP
  57. .RS 4
  58. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  59. .br
  60. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  61. .br
  62. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  63. .br
  64. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  65. .br
  66. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  67. .br
  68. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  69. .br
  70. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  71. .br
  72. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  73. .br
  74. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  75. .br
  76. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  77. .br
  78. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  79. .br
  80. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  81. .RE
  82. .PP
  83. .SS "TSS2_RC Esys_Duplicate_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP objectHandle, \fBESYS_TR\fP newParentHandle, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA * encryptionKeyIn, const TPMT_SYM_DEF_OBJECT * symmetricAlg)"
  84. Asynchronous function for TPM2_Duplicate
  85. .PP
  86. This function invokes the TPM2_Duplicate command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_Duplicate_Finish\&.
  87. .PP
  88. \fBParameters:\fP
  89. .RS 4
  90. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  91. .br
  92. \fIobjectHandle\fP Loaded object to duplicate\&.
  93. .br
  94. \fInewParentHandle\fP Shall reference the public area of an asymmetric key\&.
  95. .br
  96. \fIshandle1\fP Session handle for authorization of objectHandle
  97. .br
  98. \fIshandle2\fP Second session handle\&.
  99. .br
  100. \fIshandle3\fP Third session handle\&.
  101. .br
  102. \fIencryptionKeyIn\fP Optional symmetric encryption key\&.
  103. .br
  104. \fIsymmetricAlg\fP Definition for the symmetric algorithm to be used for the inner wrapper\&.
  105. .RE
  106. .PP
  107. \fBReturn values:\fP
  108. .RS 4
  109. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  110. .br
  111. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  112. .br
  113. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  114. .br
  115. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  116. .br
  117. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  118. .br
  119. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  120. .br
  121. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  122. .br
  123. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  124. .RE
  125. .PP
  126. .SS "TSS2_RC Esys_Duplicate_Finish (\fBESYS_CONTEXT\fP * esysContext, TPM2B_DATA ** encryptionKeyOut, TPM2B_PRIVATE ** duplicate, TPM2B_ENCRYPTED_SECRET ** outSymSeed)"
  127. Asynchronous finish function for TPM2_Duplicate
  128. .PP
  129. This function returns the results of a TPM2_Duplicate command invoked via Esys_Duplicate_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  130. .PP
  131. \fBParameters:\fP
  132. .RS 4
  133. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  134. .br
  135. \fIencryptionKeyOut\fP TPM2_If the caller provided an encryption key or if symmetricAlg was TPM2_ALG_NULL, then this will be the TPM2_Empty TPM2_Buffer; otherwise, it shall contain the TPM2_TPM-generated, symmetric encryption key for the inner wrapper\&.\&. (callee-allocated)
  136. .br
  137. \fIduplicate\fP Private area that may be encrypted by encryptionKeyIn; and may be doubly encrypted\&. (callee-allocated)
  138. .br
  139. \fIoutSymSeed\fP Seed protected by the asymmetric algorithms of new parent (NP)\&. (callee-allocated)
  140. .RE
  141. .PP
  142. \fBReturn values:\fP
  143. .RS 4
  144. \fITSS2_RC_SUCCESS\fP on success
  145. .br
  146. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  147. .br
  148. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  149. .br
  150. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  151. .br
  152. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  153. .br
  154. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  155. .br
  156. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  157. .br
  158. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  159. .br
  160. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  161. .br
  162. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  163. .br
  164. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  165. .RE
  166. .PP
  167. .SH "Author"
  168. .PP
  169. Generated automatically by Doxygen for tpm2-tss from the source code\&.