| Package | Description |
|---|---|
| tss | |
| tss.tpm |
| Modifier and Type | Method and Description |
|---|---|
TPMU_SIGNATURE |
Tpm.Sign(TPM_HANDLE keyHandle,
byte[] digest,
TPMU_SIG_SCHEME inScheme,
TPMT_TK_HASHCHECK validation)
This command causes the TPM to sign an externally provided hash with the specified symmetric or asymmetric signing key.
|
| Modifier and Type | Method and Description |
|---|---|
void |
Tpm.FieldUpgradeStart(TPM_HANDLE authorization,
TPM_HANDLE keyHandle,
byte[] fuDigest,
TPMU_SIGNATURE manifestSignature)
This command uses platformPolicy and a TPM Vendor Authorization Key to authorize a Field Upgrade Manifest.
|
PolicySignedResponse |
Tpm.PolicySigned(TPM_HANDLE authObject,
TPM_HANDLE policySession,
byte[] nonceTPM,
byte[] cpHashA,
byte[] policyRef,
int expiration,
TPMU_SIGNATURE auth)
This command includes a signed authorization in a policy.
|
static boolean |
Crypto.validateSignature(TPMT_PUBLIC _pubKey,
byte[] _dataThatWasSigned,
TPMU_SIGNATURE _signature)
Validate a TPM signature.
|
TPMT_TK_VERIFIED |
Tpm.VerifySignature(TPM_HANDLE keyHandle,
byte[] digest,
TPMU_SIGNATURE signature)
This command uses loaded keys to validate a signature on a message with the message digest passed to the TPM.
|
| Modifier and Type | Class and Description |
|---|---|
class |
TPMS_AES_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_ANY_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_CAMELLIA_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_ENC_SCHEME_OAEP
These are the RSA encryption schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_KEY_SCHEME_ECDH
These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_KEY_SCHEME_ECMQV
These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_NULL_ASYM_SCHEME
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_KDF_SCHEME
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SCHEME_KEYEDHASH
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SIG_SCHEME
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SIGNATURE
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SYM_KEY_BITS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_SYM_MODE
Custom data structure representing an empty element (i.e.
|
class |
TPMS_NULL_UNION
Base class for empty union elements.
|
class |
TPMS_SCHEME_ECDH
Underlying type comment: These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_SCHEME_ECDSA
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SCHEME_ECMQV
Underlying type comment: These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_SCHEME_ECSCHNORR
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SCHEME_HASH
This structure is the scheme data for schemes that only require a hash to complete their definition.
|
class |
TPMS_SCHEME_HMAC
Table 145 Definition of Types for HMAC_SIG_SCHEME
|
class |
TPMS_SCHEME_KDF1_SP800_108
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
class |
TPMS_SCHEME_KDF1_SP800_56A
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
class |
TPMS_SCHEME_KDF2
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
class |
TPMS_SCHEME_MGF1
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
class |
TPMS_SCHEME_OAEP
Underlying type comment: These are the RSA encryption schemes that only need a hash algorithm as a controlling parameter.
|
class |
TPMS_SCHEME_RSAPSS
Underlying type comment: These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
class |
TPMS_SCHEME_RSASSA
Underlying type comment: These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
class |
TPMS_SCHEME_SM2
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SIG_SCHEME_ECDSA
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SIG_SCHEME_ECSCHNORR
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SIG_SCHEME_RSAPSS
These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
class |
TPMS_SIG_SCHEME_RSASSA
These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
class |
TPMS_SIG_SCHEME_SM2
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
class |
TPMS_SIGNATURE_ECC
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
class |
TPMS_SIGNATURE_ECDAA
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
class |
TPMS_SIGNATURE_ECDSA
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
class |
TPMS_SIGNATURE_ECSCHNORR
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
class |
TPMS_SIGNATURE_RSA
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
class |
TPMS_SIGNATURE_RSAPSS
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
class |
TPMS_SIGNATURE_RSASSA
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
class |
TPMS_SIGNATURE_SM2
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
class |
TPMS_SM4_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_TDES_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_XOR_SYM_DETAILS
Custom data structure representing an empty element (i.e.
|
class |
TPMS_XOR_SYM_MODE
Custom data structure representing an empty element (i.e.
|
| Modifier and Type | Field and Description |
|---|---|
TPMU_SIGNATURE |
TPM2_PolicySigned_REQUEST.auth
signed authorization (not optional)
|
TPMU_SIGNATURE |
TPM2_FieldUpgradeStart_REQUEST.manifestSignature
signature over fuDigest using the key associated with keyHandle (not optional)
|
TPMU_SIGNATURE |
TPMT_SIGNATURE.signature
This shall be the actual signature information.
|
TPMU_SIGNATURE |
TPM2_VerifySignature_REQUEST.signature
signature to be tested
|
TPMU_SIGNATURE |
SignResponse.signature
the signature
|
TPMU_SIGNATURE |
QuoteResponse.signature
the signature over quoted
|
TPMU_SIGNATURE |
NV_CertifyResponse.signature
the asymmetric signature over certifyInfo using the key referenced by signHandle
|
TPMU_SIGNATURE |
GetTimeResponse.signature
the signature over timeInfo
|
TPMU_SIGNATURE |
GetSessionAuditDigestResponse.signature
the signature over auditInfo
|
TPMU_SIGNATURE |
GetCommandAuditDigestResponse.signature
the signature over auditInfo
|
TPMU_SIGNATURE |
CertifyResponse.signature
the asymmetric signature over certifyInfo using the key referenced by signHandle
|
TPMU_SIGNATURE |
CertifyCreationResponse.signature
the signature over certifyInfo
|
| Modifier and Type | Method and Description |
|---|---|
boolean |
TPMT_PUBLIC.validateSignature(byte[] _dataThatWasSigned,
TPMU_SIGNATURE _signature)
Validate a TPM signature.
|
| Constructor and Description |
|---|
CertifyCreationResponse(TPMS_ATTEST _certifyInfo,
TPMU_SIGNATURE _signature)
This command is used to prove the association between an object and its creation data.
|
CertifyResponse(TPMS_ATTEST _certifyInfo,
TPMU_SIGNATURE _signature)
The purpose of this command is to prove that an object with a specific Name is loaded in the TPM.
|
GetCommandAuditDigestResponse(TPMS_ATTEST _auditInfo,
TPMU_SIGNATURE _signature)
This command returns the current value of the command audit digest, a digest of the commands being audited, and the audit hash algorithm.
|
GetSessionAuditDigestResponse(TPMS_ATTEST _auditInfo,
TPMU_SIGNATURE _signature)
This command returns a digital signature of the audit session digest.
|
GetTimeResponse(TPMS_ATTEST _timeInfo,
TPMU_SIGNATURE _signature)
This command returns the current values of Time and Clock.
|
NV_CertifyResponse(TPMS_ATTEST _certifyInfo,
TPMU_SIGNATURE _signature)
The purpose of this command is to certify the contents of an NV Index or portion of an NV Index.
|
QuoteResponse(TPMS_ATTEST _quoted,
TPMU_SIGNATURE _signature)
This command is used to quote PCR values.
|
SignResponse(TPMU_SIGNATURE _signature)
This command causes the TPM to sign an externally provided hash with the specified symmetric or asymmetric signing key.
|
TPM2_FieldUpgradeStart_REQUEST(TPM_HANDLE _authorization,
TPM_HANDLE _keyHandle,
byte[] _fuDigest,
TPMU_SIGNATURE _manifestSignature)
This command uses platformPolicy and a TPM Vendor Authorization Key to authorize a Field Upgrade Manifest.
|
TPM2_PolicySigned_REQUEST(TPM_HANDLE _authObject,
TPM_HANDLE _policySession,
byte[] _nonceTPM,
byte[] _cpHashA,
byte[] _policyRef,
int _expiration,
TPMU_SIGNATURE _auth)
This command includes a signed authorization in a policy.
|
TPM2_VerifySignature_REQUEST(TPM_HANDLE _keyHandle,
byte[] _digest,
TPMU_SIGNATURE _signature)
This command uses loaded keys to validate a signature on a message with the message digest passed to the TPM.
|
TPMT_SIGNATURE(TPMU_SIGNATURE _signature)
Table 180 shows the basic algorithm-agile structure when a symmetric or asymmetric signature is indicated.
|
Copyright © 2017. All rights reserved.