Esys_NV_Certify.3 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. .TH "Esys_NV_Certify" 3 "Fri Oct 7 2022" "Version 3.2.0" "tpm2-tss" \" -*- nroff -*-
  2. .ad l
  3. .nh
  4. .SH NAME
  5. Esys_NV_Certify
  6. .SH SYNOPSIS
  7. .br
  8. .PP
  9. .SS "Functions"
  10. .in +1c
  11. .ti -1c
  12. .RI "TSS2_RC \fBEsys_NV_Certify_Async\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP signHandle, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA *qualifyingData, const TPMT_SIG_SCHEME *inScheme, UINT16 size, UINT16 offset)"
  13. .br
  14. .ti -1c
  15. .RI "TSS2_RC \fBEsys_NV_Certify\fP (\fBESYS_CONTEXT\fP *esysContext, \fBESYS_TR\fP signHandle, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA *qualifyingData, const TPMT_SIG_SCHEME *inScheme, UINT16 size, UINT16 offset, TPM2B_ATTEST **certifyInfo, TPMT_SIGNATURE **signature)"
  16. .br
  17. .ti -1c
  18. .RI "TSS2_RC \fBEsys_NV_Certify_Finish\fP (\fBESYS_CONTEXT\fP *esysContext, TPM2B_ATTEST **certifyInfo, TPMT_SIGNATURE **signature)"
  19. .br
  20. .in -1c
  21. .SH "Detailed Description"
  22. .PP
  23. ESAPI function to invoke the TPM2_NV_Certify command either as a one-call or in an asynchronous manner\&.
  24. .SH "Function Documentation"
  25. .PP
  26. .SS "TSS2_RC Esys_NV_Certify (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP signHandle, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA * qualifyingData, const TPMT_SIG_SCHEME * inScheme, UINT16 size, UINT16 offset, TPM2B_ATTEST ** certifyInfo, TPMT_SIGNATURE ** signature)"
  27. One-Call function for TPM2_NV_Certify
  28. .PP
  29. This function invokes the TPM2_NV_Certify command in a one-call variant\&. This means the function will block until the TPM response is available\&. All input parameters are const\&. The memory for non-simple output parameters is allocated by the function implementation\&.
  30. .PP
  31. \fBParameters:\fP
  32. .RS 4
  33. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  34. .br
  35. \fIsignHandle\fP Handle of the key used to sign the attestation structure\&.
  36. .br
  37. \fIauthHandle\fP Handle indicating the source of the authorization value for the NV Index\&.
  38. .br
  39. \fInvIndex\fP Index for the area to be certified\&.
  40. .br
  41. \fIshandle1\fP Session handle for authorization of signHandle
  42. .br
  43. \fIshandle2\fP Session handle for authorization of authHandle
  44. .br
  45. \fIshandle3\fP Third session handle\&.
  46. .br
  47. \fIqualifyingData\fP User-provided qualifying data\&.
  48. .br
  49. \fIinScheme\fP TPM2_Signing scheme to use if the scheme for signHandle is TPM2_ALG_NULL\&.
  50. .br
  51. \fIsize\fP Number of octets to certify\&.
  52. .br
  53. \fIoffset\fP Octet offset into the area\&.
  54. .br
  55. \fIcertifyInfo\fP The structure that was signed\&. (callee-allocated)
  56. .br
  57. \fIsignature\fP The asymmetric signature over certifyInfo using the key referenced by signHandle\&. (callee-allocated)
  58. .RE
  59. .PP
  60. \fBReturn values:\fP
  61. .RS 4
  62. \fITSS2_RC_SUCCESS\fP if the function call was a success\&.
  63. .br
  64. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  65. .br
  66. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  67. .br
  68. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  69. .br
  70. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  71. .br
  72. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  73. .br
  74. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  75. .br
  76. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  77. .br
  78. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  79. .br
  80. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  81. .br
  82. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  83. .br
  84. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  85. .RE
  86. .PP
  87. .SS "TSS2_RC Esys_NV_Certify_Async (\fBESYS_CONTEXT\fP * esysContext, \fBESYS_TR\fP signHandle, \fBESYS_TR\fP authHandle, \fBESYS_TR\fP nvIndex, \fBESYS_TR\fP shandle1, \fBESYS_TR\fP shandle2, \fBESYS_TR\fP shandle3, const TPM2B_DATA * qualifyingData, const TPMT_SIG_SCHEME * inScheme, UINT16 size, UINT16 offset)"
  88. Asynchronous function for TPM2_NV_Certify
  89. .PP
  90. This function invokes the TPM2_NV_Certify command in a asynchronous variant\&. This means the function will return as soon as the command has been sent downwards the stack to the TPM\&. All input parameters are const\&. In order to retrieve the TPM's response call Esys_NV_Certify_Finish\&.
  91. .PP
  92. \fBParameters:\fP
  93. .RS 4
  94. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  95. .br
  96. \fIsignHandle\fP Handle of the key used to sign the attestation structure\&.
  97. .br
  98. \fIauthHandle\fP Handle indicating the source of the authorization value for the NV Index\&.
  99. .br
  100. \fInvIndex\fP Index for the area to be certified\&.
  101. .br
  102. \fIshandle1\fP Session handle for authorization of signHandle
  103. .br
  104. \fIshandle2\fP Session handle for authorization of authHandle
  105. .br
  106. \fIshandle3\fP Third session handle\&.
  107. .br
  108. \fIqualifyingData\fP User-provided qualifying data\&.
  109. .br
  110. \fIinScheme\fP TPM2_Signing scheme to use if the scheme for signHandle is TPM2_ALG_NULL\&.
  111. .br
  112. \fIsize\fP Number of octets to certify\&.
  113. .br
  114. \fIoffset\fP Octet offset into the area\&.
  115. .RE
  116. .PP
  117. \fBReturn values:\fP
  118. .RS 4
  119. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  120. .br
  121. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  122. .br
  123. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  124. .br
  125. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  126. .br
  127. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  128. .br
  129. \fITSS2_ESYS_RC_MULTIPLE_DECRYPT_SESSIONS\fP if more than one session has the 'decrypt' attribute bit set\&.
  130. .br
  131. \fITSS2_ESYS_RC_MULTIPLE_ENCRYPT_SESSIONS\fP if more than one session has the 'encrypt' attribute bit set\&.
  132. .br
  133. \fITSS2_ESYS_RC_BAD_TR\fP if any of the ESYS_TR objects are unknown to the \fBESYS_CONTEXT\fP or are of the wrong type or if required ESYS_TR objects are ESYS_TR_NONE\&.
  134. .RE
  135. .PP
  136. .SS "TSS2_RC Esys_NV_Certify_Finish (\fBESYS_CONTEXT\fP * esysContext, TPM2B_ATTEST ** certifyInfo, TPMT_SIGNATURE ** signature)"
  137. Asynchronous finish function for TPM2_NV_Certify
  138. .PP
  139. This function returns the results of a TPM2_NV_Certify command invoked via Esys_NV_Certify_Finish\&. All non-simple output parameters are allocated by the function's implementation\&. NULL can be passed for every output parameter if the value is not required\&.
  140. .PP
  141. \fBParameters:\fP
  142. .RS 4
  143. \fIesysContext\fP The \fBESYS_CONTEXT\fP\&.
  144. .br
  145. \fIcertifyInfo\fP The structure that was signed\&. (callee-allocated)
  146. .br
  147. \fIsignature\fP The asymmetric signature over certifyInfo using the key referenced by signHandle\&. (callee-allocated)
  148. .RE
  149. .PP
  150. \fBReturn values:\fP
  151. .RS 4
  152. \fITSS2_RC_SUCCESS\fP on success
  153. .br
  154. \fIESYS_RC_SUCCESS\fP if the function call was a success\&.
  155. .br
  156. \fITSS2_ESYS_RC_BAD_REFERENCE\fP if the esysContext or required input pointers or required output handle references are NULL\&.
  157. .br
  158. \fITSS2_ESYS_RC_BAD_CONTEXT\fP if esysContext corruption is detected\&.
  159. .br
  160. \fITSS2_ESYS_RC_MEMORY\fP if the ESAPI cannot allocate enough memory for internal operations or return parameters\&.
  161. .br
  162. \fITSS2_ESYS_RC_BAD_SEQUENCE\fP if the context has an asynchronous operation already pending\&.
  163. .br
  164. \fITSS2_ESYS_RC_TRY_AGAIN\fP if the timeout counter expires before the TPM response is received\&.
  165. .br
  166. \fITSS2_ESYS_RC_INSUFFICIENT_RESPONSE\fP if the TPM's response does not at least contain the tag, response length, and response code\&.
  167. .br
  168. \fITSS2_ESYS_RC_RSP_AUTH_FAILED\fP if the response HMAC from the TPM did not verify\&.
  169. .br
  170. \fITSS2_ESYS_RC_MALFORMED_RESPONSE\fP if the TPM's response is corrupted\&.
  171. .br
  172. \fITSS2_RCs\fP produced by lower layers of the software stack may be returned to the caller unaltered unless handled internally\&.
  173. .RE
  174. .PP
  175. .SH "Author"
  176. .PP
  177. Generated automatically by Doxygen for tpm2-tss from the source code\&.