分享
ISO_IEC_11889-3_2015.pdf
下载文档

ID:234855

大小:17.86MB

页数:484页

格式:PDF

时间:2023-03-14

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
ISO_IEC_11889 _2015
Information technology Trusted Platform Module Library Part 3:CommandsTechnologies de linformation Bibliothque de module de plate-forme de con?iance?Partie 3:CommandesINTERNATIONAL STANDARDISO/IEC11889-3Reference numberISO/IEC 11889-3:2015(E)Second edition 2015-12-15 ISO/IEC 2015ii ISO/IEC 2015 All rights reservedCOPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015,Published in Switzerland?the requester.?Ch.de Blandonnet 8 CP 401CH-1214 Vernier,Geneva,SwitzerlandTel.+41 22 749 01 11Fax+41 22 749 09 47?www.iso.orgISO/IEC 11889-3:2015(E)ISO/IEC 11889-3:2015(E)CONTENTS Foreword.xxiv Introduction.xxv 1 Scope.1 2 Normative references.2 3 Terms and Definitions.2 4 Symbols and abbreviated terms.2 5 Notation.2 5.1 Introduction.2 5.2 Table Decorations.2 5.3 Handle and Parameter Demarcation.4 5.4 AuthorizationSize and ParameterSize.4 6 Command Processing.5 6.1 Introduction.5 6.2 Command Header Validation.5 6.3 Mode Checks.5 6.4 Handle Area Validation.6 6.5 Session Area Validation.7 6.6 Authorization Checks.8 6.7 Parameter Decryption.10 6.8 Parameter Unmarshaling.10 6.8.1 Introduction.10 6.8.2 Unmarshaling Errors.10 6.9 Command Post Processing.11 7 Response Values.13 7.1 Tag.13 7.2 Response Codes.13 8 Implementation Dependent.16 9 Detailed Actions Assumptions.17 9.1 Introduction.17 9.2 Pre-processing.17 9.3 Post Processing.17 10 Start-up.18 10.1 Introduction.18 10.2 _TPM_Init.18 10.2.1 General Description.18 10.2.2 Detailed Actions.19 10.3 TPM2_Startup.20 10.3.1 General Description.20 10.3.2 Command and Response.23 10.3.3 Detailed Actions.24 10.4 TPM2_Shutdown.27 10.4.1 General Description.27 ISO/IEC 2015 All rights reserved iii ISO/IEC 11889-3:2015(E)10.4.2 Command and Response.28 10.4.3 Detailed Actions.29 11 Testing.31 11.1 Introduction.31 11.2 TPM2_SelfTest.32 11.2.1 General Description.32 11.2.2 Command and Response.33 11.2.3 Detailed Actions.34 11.3 TPM2_IncrementalSelfTest.35 11.3.1 General Description.35 11.3.2 Command and Response.36 11.3.3 Detailed Actions.37 11.4 TPM2_GetTestResult.38 11.4.1 General Description.38 11.4.2 Command and Response.39 11.4.3 Detailed Actions.40 12 Session Commands.41 12.1 TPM2_StartAuthSession.41 12.1.1 General Description.41 12.1.2 Command and Response.43 12.1.3 Detailed Actions.44 12.2 TPM2_PolicyRestart.46 12.2.1 General Description.46 12.2.2 Command and Response.47 12.2.3 Detailed Actions.48 13 Object Commands.49 13.1 TPM2_Create.49 13.1.1 General Description.49 13.1.2 Command and Response.52 13.1.3 Detailed Actions.53 13.2 TPM2_Load.55 13.2.1 General Description.55 13.2.2 Command and Response.56 13.2.3 Detailed Actions.57 13.3 TPM2_LoadExternal.59 13.3.1 General Description.59 13.3.2 Command and Response.61 13.3.3 Detailed Actions.62 13.4 TPM2_ReadPublic.64 13.4.1 General Description.64 13.4.2 Command and Response.65 iv ISO/IEC 2015 All rights reserved ISO/IEC 11889-3:2015(E)13.4.3 Detailed Actions.66 13.5 TPM2_ActivateCredential.67 13.5.1 General Description.67 13.5.2 Command and Response.68 13.5.3 Detailed Actions.69 13.6 TPM2_MakeCredential.71 13.6.1 General Description.71 13.6.2 Command and Response.72 13.6.3 Detailed Actions.73 13.7 TPM2_Unseal.74 13.7.1 General Description.74 13.7.2 Command and Response.75 13.7.3 Detailed Actions.76 13.8 TPM2_ObjectChangeAuth.77 13.8.1 General Description.77 13.8.2 Command and Response.78 13.8.3 Detailed Actions.79 14 Duplication Commands.81 14.1 TPM2_Duplicate.81 14.1.1 General Description.81 14.1.2 Command and Response.82 14.1.3 Detailed Actions.83 14.2 TPM2_Rewrap.85 14.2.1 General Description.85 14.2.2 Command and Response.86 14.2.3 Detailed Actions.87 14.3 TPM2_Import.90 14.3.1 General Description.90 14.3.2 Command and Response.92 14.3.3 Detailed Actions.93 15 Asymmetric Primitives.97 15.1 Introduction.97 15.2 TPM2_RSA_Encrypt.97 15.2.1 General Description.97 15.2.2 Command and Response.99 15.2.3 Detailed Actions.100 15.3 TPM2_RSA_Decrypt.102 15.3.1 General Description.102 15.3.2 Command and Response.103 15.3.3 Detailed Actions.104 15.4 TPM2_ECDH_KeyGen.106 ISO/IEC 2015 All rights reserved v ISO/IEC 11889-3:2015(E)15.4.1 General Description.106 15.4.2 Command and Response.107 15.4.3 Detailed Actions.108 15.5 TPM2_ECDH_ZGen.110 15.5.1 General Description.110 15.5.2 Command and Response.111 15.5.3 Detailed Actions.112 15.6 TPM2_ECC_Parameters.113 15.6.1 General Description.113 15.6.2 Command and Response.113 15.6.3 Detailed Actions.114 15.7 TPM2_ZGen_2Phase.114 15.7.1 General Description.114 15.7.2 Command and Response.116 15.7.3 Detailed Actions.117 16 Symmetric Primitives.119 16.1 Introduction.119 16.2 TPM2_EncryptDecrypt.121 16.2.1 General Description.121 16.2.2 Command and Response.122 16.2.3 Detailed Actions.123 16.3 TPM2_Hash.125 16.3.1 General Description.125 16.3.2 Command and Response.126 16.3.3 Detailed Actions.127 16.4 TPM2_HMAC.128 16.4.1 General Description.128 16.4.2 Command and Response.129 16.4.3 Detailed Actions.130 17 Random Number Generator.132 17.1 TPM2_GetRandom.132 17.1.1 General Description.132 17.1.2 Command and Response

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开