Lines Matching refs:TPM

472 10.11 TPM Attestation Structures ..................................................................…
816 Table 9 — TPM Command Format Fields Description ...................................................…
1115 Figure 4 — TPM 1.2 TPM_NV_INDEX ...................................................................…
1116 Figure 5 — TPM 2.0 TPM_NV_INDEX ...................................................................…
1138 flags, structure, and union definitions used to communicate with the TPM. Values defined in this
1139 document are used by the TPM commands defined in part 3: Commands and by the functions in part 4:
1146 are "packed" with no octets of padding between structure elements. The TPM-internal form of the
1147 structures is dependent on the processor and compiler for the TPM implementation.
1698 be communicated on the TPM interface and used by the TPM:
2033 Parameter limits expressed using braces apply only to inputs to the TPM. Any value returned by the
2034 TPM is assumed to be valid.
2183 The “=” indicates that the TPM is required to
2197 definition of size, the TPM is required to validate
2220 …re or union may be input (IN), output (OUT), or internal. An input structure is sent to the TPM and
2221 is unmarshaled by the TPM. An output structure is sent from the TPM and is marshaled by the TPM. An
2222 internal structure is not used outside of the TPM except that it may be included in a saved context.
2247 By default, when a structure is used for input to the TPM, the code generation tool will generate t…
2287 an indication/signal from the TPM’s system interface
2364 The TPM commands are defined in Part 3. The command definition included C code that details the
2388 required that the TPM validate that the parameters meet the requirements of the expected data type …
2396 Table 11 has a listing of TPM command code values. The last row in the table contains
2397 "#TPM_RC_COMMAND_CODE" indicating the response code that is returned if the TPM is unmarshaling
2432 the TPM
2461 TPM is implemented. The values in the “Name” column should remain the same because these values
2654 This constant value differentiates TPM-generated structures from non-TPM structures.
2685 definitive list of algorithms that may be supported by a TPM.
2702 In TPM 1.2, these were defined as 32-bit constants. This specification limits the future size of the
2706 with the command structure tags used in TPM 1.2.
2713 TPM_ALG_KEYEDHASH and TPM_ALG_NULL are required of all TPM implementations.
2794 defined by TCG in the TPM 2.0 specification
3134 NOTE a Column Indicates the algorithm type and use of the algorithm inside of the TPM. The values a…
3160 definitive list of curves that may be supported by a TPM.
3239 Table 9 — TPM Command Format Fields Description
3315 Any command may be delayed in order for the TPM to complete
4309 Each return from the TPM has a 32-bit response code. The TPM will always set the upper 20 bits (31:…
4311 When a command succeeds, the TPM shall return TPM_RC_SUCCESS (0 0016) and will update any
4313 When a command fails to complete for any reason, the TPM shall return
4329 response code will be as defined in this specification. Commands that use tags defined in the TPM 1…
4330 specification will use TPM_TAG_RSP_COMMAND in an error and a response code defined in TPM 1.2.
4331 If the tag of the command is not a recognized command tag, the TPM error response will differ depen…
4332 on TPM 1.2 compatibility. If the TPM supports 1.2 compatibility, the TPM shall return a tag of
4333 TPM_TAG_RSP_COMMAND and an appropriate TPM 1.2 response code (TPM_BADTAG =
4334 00 00 00 1E16). If the TPM does not have compatibility with TPM 1.2, the TPM shall return
4336 When a command fails, the TPM shall not update the authorization-session nonces associated with the
4339 the state of the TPM as if the command had not been attempted. The exception to this principle is t…
4359 codes used for this specification and those assigned in previous TPM specifications.
4361 The response codes use two different format groups. One group contains the TPM 1.2 compatible
4461 CLEAR (0): The error number is defined by a previous TPM specification. The error number is
4467 In any error number returned by a TPM, the F (bit 7) and V (bit 8) attributes shall be CLEAR
4468 when the response tag is TPM_TAG_RSP_COMMAND value used in TPM 1.2.
4477 SET (1): The response code is defined by the TPM vendor.
4489 command indicates that the TPM is busy or that the resources of the TPM have to be adjusted in
4495 input parameter to the TPM. Figure 3 shows the format for the response codes when bit 7 is one.
4625 a response code defined by TPM 1.2
4673 indicate that it is a TPM 2.0 response code.
4695 defined for compatibility with TPM 1.2
4707 TPM not initialized
4708 commands not being accepted because of a TPM
4784 that the TPM is in field upgrade mode; for
4786 that the TPM is not in field upgrade mode
4806 before the TPM can resume operation.
5126 the TPM was unable to unmarshal a value
5296 the TPM has suspended operation on the
5321 TPM is performing self-tests
5468 the TPM is rate-limiting accesses to prevent
5476 are not allowed at this time because the TPM is in
5483 the TPM was not able to start the command
5497 the TPM
5639 A TPM_CLOCK_ADJUST value is used to change the rate at which the TPM internal oscillator is divided.
5806 TPM is compatible with a previous TPM specification and the TPM cannot determine which family of
5842 If the responseCode from the TPM is not
5876 When used between application software and the TPM
5885 Between the TRM and TPM, this tag would occur in a
5886 response from a TPM that overlaps the tag parameter
5895 This tag is not used by all TPM or TRM
5898 When used between application software and the TPM
5908 Between the TRM and TPM, would occur in a
5909 response from a TPM that overlaps the tag parameter
5914 This tag is not used by all TPM or TRM
6026 a) TPM Reset – Two cases:
6029 b) TPM Restart – Shutdown(STATE) followed by Startup(CLEAR)
6030 c) TPM Resume – Shutdown(STATE) followed by Startup(STATE)
6031 TPM_SU values of 80 0016 and above are reserved for internal use of the TPM and may not be assigned
6038 defined in the implementation as required for internal TPM uses.
6051 on TPM2_Shutdown(), indicates that the TPM should prepare
6053 (TPM Reset).
6054 on TPM2_Startup(), indicates that the TPM should start from
6055 perform TPM Reset or TPM Restart
6061 on TPM2_Shutdown(), indicates that the TPM should prepare
6063 (TPM Restart or TPM Resume)
6064 on TPM2_Startup(), indicates that the TPM should restore the
6203 firmware update. The values in the variable group (PT_VAR) may be changed with TPM commands but
6238 firmware change in the TPM.
6243 a 4-octet character string containing the TPM Family value
6310 the vendor ID unique to each TPM manufacturer
6342 vendor-defined value indicating the TPM model
6366 in TPM RAM
6380 to which the TPM is built.
6383 held in TPM NV memory
6393 to which the TPM is built.
6396 be held in TPM RAM
6404 to which the TPM is built.
6427 its handle. The context may either be in TPM RAM or be
6433 which the TPM is built.
6463 the platform-specific specification with which the TPM
6482 would be indicative of a TPM implementation that did
6495 method for the TPM
6554 TPM
6621 TPM
6626 total number of commands implemented in the TPM
6631 number of commands from the TPM library that are
6677 TPM RAM
6684 type, that could be loaded into TPM RAM
6702 being tracked by the TPM
6738 could be loaded into TPM RAM
6753 TPM NV memory
6802 TPM
6841 number of milliseconds before the TPM will accept
7048 This property is only present if the TPM supports policy control
7057 This property is only present if the TPM supports authorization
7132 If the TPM receives a request for a PCR property with a value
7133 larger than this, the TPM will return a zero length list and set the
7157 Values below six (6) have the same values as the purview assignments in TPM 1.2.
7282 Handles are 32-bit values used to reference shielded locations of various types within the TPM.
7295 Indexes, permanent TPM locations, and PCR.
7335 HMAC Authorization Session – assigned by the TPM when the
7351 Policy Authorization Session – assigned by the TPM when the
7361 the TPM is maintaining tracking information.
7373 Transient Objects – assigned by the TPM when an object is loaded
7381 Persistent Objects – assigned by the TPM when a loaded transient
7397 When a transient object is loaded, the TPM shall assign a handle with an MSO of TPM_HT_TRANSIENT.
7398 The object may be assigned a different handle each time it is loaded. The TPM shall ensure that han…
7402 If a TPM is only able to hold 4 transient objects in internal memory, it might choose to assign han…
7405 When a transient object is converted to a persistent object (TPM2_EvictControl()), the TPM shall va…
7410 TPM shall ensure that a session handle is only associated with one session at a time. When the sess…
7411 is loaded into the TPM using TPM2_LoadContext(), it will have the same handle each time it is loade…
7416 If a TPM is only able to track 64 active sessions at a time, it could number those sessions using t…
7426 While this “namespace” allocation of the handle ranges could have been handled by convention, TPM
7431 the TPM will return an error if ownerAuth is used to attempt to assign a persistent handle outside …
7542 value reserved to the TPM to indicate a handle location that
7629 C - a controlNote 1 The handle is only used in a TPM that is compatible with a previous version of …
7869 When any reserved bit in an attribute is SET, the TPM shall return TPM_RC_RESERVED_BITS. This
7963 TPM. Additionally, the setting of these structures is reflected in the integrity value of the priva…
7964 object in order to allow the TPM to detect modifications of the Protected Object when stored off th…
8015 TPM2_CreatePrimary(), the TPM generated all of the sensitive data other than
8159 For any consistency error of attributes in TPMA_OBJECT, the TPM shall return TPM_RC_ATTRIBUTES.
8164 When SET, the object cannot be duplicated for use on a different TPM, either directly or indirectly…
8219 TPM2_Startup(TPM_SU_CLEAR). If the attribute is CLEAR, then the TPM shall not invalidate the saved
8220 context if the TPM received TPM2_Shutdown(TPM_SU_STATE). If the saved state is valid when checked
8221 at the next TPM2_Startup(), then the TPM shall continue to be able to use the saved contexts.
8278 This attribute is SET for any key that was generated by TPM in TPM2_Create() or
8425 authorization of the object is not blocked if the TPM is in lockout.
8586 then the TPM will return an error if the external decrypted blob is not formatted as appropriate fo…
8590 Since TPM-generated keys and sealed data will contain a hash and a structure tag, the TPM can ensure
8631 SET, then the key may only be used to sign a digest that was computed by the TPM. A restricted sign…
8632 key may be used to sign a TPM-generated digest. If a structure is generated by the TPM, it will beg…
8633 TPM_GENERATED_VALUE and the TPM may sign the digest of that structure. If the data is externally
8634 supplied and has TPM_GENERATED_VALUE as its first octets, then the TPM will not sign a digest of
8636 If restricted is CLEAR, then the key may be used to sign any digest, whether generated by the TPM or
8703 CLEAR (0): In a command, this setting indicates that the TPM should close the
8706 This attribute has no meaning for a password authorization and the TPM will allow
8744 1. The TPM will decrypt the parameter after performing any HMAC computations and
8784 SET (1): In a command, this setting indicates that the TPM should use this session to
8786 attribute was set in the command and that the TPM used the session to encrypt the
8953 SET (1): The TPM is in lockout and commands that require authorization with other
8960 SET (1): The EPS was created by the TPM.
8961 CLEAR (0): The EPS was created outside of the TPM using a manufacturerspecific process.
8981 These attributes are set to their default state on reset on each TPM Reset or TPM Restart. The attr…
8982 are preserved on TPM Resume.
8983 On each TPM2_Startup(TPM_SU_CLEAR), the TPM will set these attributes to their indicated defaults.
9053 NOTE The TPM must query the index TPMA_PLATFORM_CREATE attribute to determine
9054 whether phEnableNV is applicable. Since the TPM will return TPM_RC_HANDLE if the index
9055 does not exist, it also returns this error code if the index is disabled. Otherwise, the TPM
9085 SET (1): The TPM received a TPM2_Shutdown() and a matching TPM2_Startup().
9092 A shutdown is orderly if the TPM receives a TPM2_Shutdown() of any type
9093 followed by a TPM2_Startup() of any type. However, the TPM will return an error if
9103 This structure of this attribute is used to report the memory management method used by the TPM for
9146 SET (1): indicates that the TPM copies persistent objects to a transient-object
9149 CLEAR (0): indicates that the TPM does not use transient-object slots when
9177 the structure indicate to the TPM Resource Manager (TRM) the number of resources required by a
9178 command and how the command affects the TPM’s resources.
9179 This structure is only used in a list returned by the TPM in response to TPM2_GetCapability(capabil…
9181 For a command to the TPM, only the commandIndex field and V attribute are allowed to be non-zero.
9254 specification. If V is one, then the meaning of commandIndex is as determined by the TPM vendor.
9259 If this attribute is SET, then the TPM may perform an NV write as part of the command actions. This…
9261 CLEAR, then the TPM shall not perform an NV write as part of the command actions.
9279 If this attribute is SET, then the TPM may flush many transient objects as a side effect of this co…
9295 If this attribute is SET, then the TPM will flush transient objects as a side effect of this comman…
9296 transient objects listed in the handle area of the command will be flushed from TPM memory. Handles
9297 associated with persistent objects, sessions, PCR, or other fixed TPM resources are not flushed.
9300 The TRM is expected to use this value to determine how many objects are loaded into transient TPM
9349 A TPM command is only allowed to have one handle in the session area.
9354 When this attribute is SET, it indicates that the command operation is defined by the TPM vendor. W…
9360 … field is reserved for system software. This field is required to be zero for a command to the TPM.
9395 This list is not used as input to the TPM.
9418 according to the TPM implementation.
9421 These interface types should not be used by system software to qualify the keys produced by the TPM.
9422 The value returned by the TPM shall be used to reference the object.
9476 The TPMI_DH_ENTITY interface type is TPM-defined values that are used to indicate that the handle
9477 refers to an authValue. The range of these values would change according to the TPM implementation.
9517 range of values would change according to the TPM implementation.
9525 TPM specifications.
9543 The TPMI_SH_AUTH_SESSION interface type is TPM-defined values that are used to indicate that the
9802 management of the resources of the TPM and this interface type will be used.
9923 A TPMI_ALG_HASH is an interface type of all the hash algorithms implemented on a specific TPM. Table
9925 the algorithms that will be accepted by a TPM.
9960 A TPMI_ALG_ASYM is an interface type of all the asymmetric algorithms implemented on a specific TPM.
9987 by the TCG and are implemented on the TPM.
9989 code will only accept the subset of algorithms implemented on a TPM.
9994 algorithm is not implemented on the TPM, then the case for the algorithm is not generated, and use …
9995 algorithm will cause a TPM error (TPM_RC_SYMMETRIC).
10024 Table 60 is illustrative. It would be modified to indicate the algorithms of the TPM.
10064 would be replaced by one containing the algorithms implemented on the TPM and that the values in th…
10088 shall be implemented in all TPM compliant with this specification
10100 …PMI_ALG_KDF is an interface type of all the key derivation functions implemented on a specific TPM.
10101 Table 62 is exemplary and would change based on the algorithms implemented in a TPM.
10129 the algorithms implemented on the TPM.
10158 present on all TPM
10167 according to the algorithms implemented on the TPM.
10189 The response code for a bad command tag has the same value as the TPM 1.2 response code
10238 A TPMU_HA is a union of all the hash algorithms implemented on a TPM. Table 67 is exemplary and
10239 would change based on the algorithms implemented in a TPM.
10243 the hash algorithm is not implemented on the TPM, the parameter associated with that hash is not
10245 TPM.
10343 When the type of the second parameter in a TPM2B_ structure is BYTE, the TPM shall unmarshal the
10351 TPM will be able to determine how many octets are in the structure when it is unmarshaled. If that …
10362 If a TPM2B_ is encrypted, the TPM will encrypt/decrypt the data field of the TPM2B_ but not the size
10363 parameter. The TPM will encrypt/decrypt the number of octets indicated by the size field.
10389 hash algorithm implemented on the TPM.
10455 largest digest produced by a TPM. In order to ensure consistency within an object, the authValue ma…
10456 no larger than the size of the digest produced by the object’s nameAlg. This ensures that any TPM t…
10486 maximum size of the operand is implementation dependent but a TPM is required to support an operand
10487 …hat is at least as big as the digest produced by any of the hash algorithms implemented on the TPM.
10592 TPM-
10602 This TPM-dependent structure is used to provide the timeout value for an authorization.
10615 This value is fixed for a TPM implementation.
10624 This structure is used for passing an initial value for a symmetric block cipher to or from the TPM
10625 size is set to be the largest block size of any implemented symmetric cipher implemented on the TPM.
10638 This value is fixed for a TPM implementation.
10738 number of PCR implemented in the TPM. The minimum value for sizeofSelect is:
10759 the number of PCR implemented on the TPM
10771 If the TPM implements more PCR than there are bits in pcrSelect, the additional PCR are not selecte…
10774 If the applicable platform-specific specification requires that the TPM have a minimum of 24 PCR bu…
10775 TPM implements 32, then a PCR select of 3 octets would imply that PCR 24-31 are not selected.
10829 Tickets are evidence that the TPM has previously processed some information. A ticket is an HMAC ov…
10830 the data using a secret key known only to the TPM. A ticket is a way to expand the state memory of …
10831 TPM. A ticket is only usable by the TPM that produced it.
10832 The formulations for tickets shown in this clause are to be used by a TPM that is compliant with th…
10848 a TPM secret value (depends on hierarchy)
10856 one or more values that were checked by the TPM
10932 response indicates that a ticket is returned, the TPM may return a NULL Ticket.
10968 a TPM secret value associated with the hierarchy associated with name
11030 ticket provides evidence that the TPM has validated that a digest was signed by a key with the Name…
11045 a TPM secret value associated with the hierarchy associated with
11122 a TPM secret value associated with the hierarchy of the key associated
11213 a TPM secret value associated with the hierarchy indicated by the
11341 A list of command codes may be input to the TPM or returned by the TPM depending on the command.
11437 This structure is used when the TPM returns a list of loaded handles when the capability in
11441 This list is not used as input to the TPM.
11518 …s construct limits the number of hashes in the list to the number of digests implemented in the TPM
11524 The digest for an unimplemented hash algorithm may not be in a list because the TPM may not recogni…
11701 This list is used to report the ECC curve ID values supported by the TPM. It is returned by a
11838 time in milliseconds during which the TPM has been powered
11839 This structure element is used to report on the TPM's Clock value.
11842 less often than once per 2 milliseconds (~69.9 minutes) of TPM
11843 operation. The reference for the millisecond timer is the TPM
11853 number of occurrences of TPM Reset since the last TPM2_Clear()
11860 occurred since the last TPM Reset or TPM2_Clear().
11867 previously reported by the TPM. Set to YES on TPM2_Clear().
11870 Clock is a monotonically increasing counter that advances whenever power is applied to the TPM. The
11880 This counter shall increment on each TPM Reset. This counter shall be reset to zero by TPM2_Clear().
11896 This counter shall increment by one for each TPM Restart or TPM Resume. The restartCount shall be
11897 reset to zero on a TPM Reset or TPM2_Clear().
11905 If a TPM implementation does not implement
11925 The Time value reported in this structure is reset whenever the TPM is reset. An implementation may
11926 reset the value of Time any time after _TPM_Init and before the TPM returns after TPM2_Start(). The
11927 value of Time shall increment continuously while power is applied to the TPM.
11940 This structure element is used to report on the TPM's Time value.
11961 10.11 TPM Attestation Structures
11963 This clause describes the structures that are used when a TPM creates a structure to be signed. The
11966 This structure is used when the TPM performs TPM2_GetClock.
12090 executed without any intervening TPM command that did not use
12259 This structure is used on each TPM-generated signed structure. The signature is over this structure.
12273 the indication that this structure was created by a TPM (always
12310 TPM-vendor-specific field identifying the firmware on the TPM
12390 This is the format for each of the authorizations in the session area of the response. If the TPM r…
12805 When sent to the TPM or unsealed, data is usually encrypted using parameter encryption.
13674 This sized buffer holds the largest RSA public key supported by the TPM.
13706 An implementation is allowed to provide limited support for smaller RSA key sizes. That is, a TPM m…
13709 key. This would allow the TPM to validate signatures using the smaller key but would prevent the TPM
13746 This sized buffer holds the largest RSA prime number supported by the TPM.
13785 This sized buffer holds the largest ECC parameter (coordinate) supported by the TPM.
13900 The ECC curves implemented by the TPM.
14057 When the TPM generates a PSS signature, the salt size is the largest size allowed by the key and ha…
14126 TPM implementation. The union allows substitution of any signature algorithm wherever a signature is
14127 required in a structure. Table 172 is an illustration of a TPMU_SIGNATURE for a TPM that implements
14131 All TPM are required to support a hash algorithm and the HMAC algorithm.
14138 The table below is illustrative. It would be modified to reflect the signatures produced by the TPM.
14276 Table 174 is illustrative. It would be modified depending on the algorithms supported in the TPM.
14364 structure. When the structure is stored off the TPM, the TPMT_SENSITIVE structure is encrypted with…
14367 parameters in the TPM2_Load() command. When the TPM creates an object that requires both
14368 components, the TPM will return them as separate parameters from the TPM2_Create() operation.
14369 The TPM may produce multiple different TPM2B_PRIVATE structures for a single TPM2B_PUBLIC
14398 required of all TPM
14402 required of all TPM
14602 A TPM compatible with this specification and supporting RSA shall support numPrimes of two and an
14793 the TPM.
14901 The “=” will force the TPM to try to unmarshal a
14904 a TPMT_PUBLIC are not present, the TPM will return
14916 The structures in 12.3 define the contents and construction of the private portion of a TPM object.…
14917 TPM2B_PRIVATE along with a TPM2B_PUBLIC are needed to describe a TPM object.
14926 various entities. A TPM may store the sensitive information in any desired format but when construc…
14932 This structure is defined for coding purposes. For IO to the TPM, the sensitive portion of the key …
15110 outside of the TPM.
15182 An identity object is used to convey credential protection value (CV) to a TPM that can load the ob…
15183 associated with the object. The CV is encrypted to a storage key on the target TPM, and if the cred…
15184 integrity checks and the proper object is loaded in the TPM, then the TPM will return the CV.
15207 The TPM is not required to check that the size is not larger
15209 larger, the ID object may not be usable on a TPM that has
15249 changed from TPM 1.2 in order to include the Index in the reserved handle space. Handles in this ra…
15251 The 32-bit TPM 1.2 NV Index format is shown in Figure 4. In order to allow the Index to fit into th…
15268 Figure 4 — TPM 1.2 TPM_NV_INDEX
15282 Figure 5 — TPM 2.0 TPM_NV_INDEX
15286 handle as in TPM 1.2. The TPMA_NV_PLATFORMCREATE attribute is a property of an Index that
15335 …erent entities. Since this assignment was a convention and not an architectural element of the TPM,
15339 This structure allows the TPM to keep track of the data and permissions to manipulate an NV Index.
15372 The TPM is expected to maintain indicators to indicate that the Index is temporarily locked. The st…
15514 writes to this location until the next TPM Reset or TPM Restart.
15542 writes to this location are not permitted until the next TPM Reset or
15543 TPM Restart.
15589 and authorization of the Index is not blocked when the TPM is in
15593 allowed when the TPM is in Lockout mode.
15599 SET (1): NV Index state is only required to be saved when the TPM
15610 SET (1): TPMA_NV_WRITTEN for the Index is CLEAR by TPM
15611 Reset or TPM Restart.
15612 CLEAR (0): TPMA_NV_WRITTEN is not changed by TPM Restart.
15624 be CLEAR by TPM Reset.
15630 SET (1): Reads of the Index are blocked until the next TPM Reset or
15631 TPM Restart.
15650 The TPM will validate that this attribute is SET when the Index is
15731 This structure is used when a TPMS_NV_PUBLIC is sent on the TPM interface.
15778 TPM when the context was saved, the integrity check of the TPM2B_CONTEXT will fail and the object or
15851 was saved (TPM2_ContextSave()), then the TPM shall not load the context.
15856 object after a TPM Reset or TPM Restart.
15859 The reference implementation prevents reloads after TPM Restart by including the curre nt value of a
15868 match the value in the sequence parameter, then TPM shall enter the failure mode because this is
15873 implies that either the TPM is faulty or an external entity is able to forge an integrity val ue fo…
15874 but they have insufficient information to know what the encryption key of the context. Since the TPM
15876 incorrectly other than the TPM is faulty or the TPM is under attack. In either case, it is appropri…
15877 TPM to enter failure more.
15931 The sequence parameter is used to differentiate the contexts and to allow the TPM to create a diffe…
15938 If an input value for sequence is larger than the value used in any saved context, the TPM shall re…
15941 contextID minus the maximum range for sessions, the TPM shall return an error (TPM_RC_VALUE) and
15948 If an input value for handle is outside of the range of values used by the TPM, the TPM shall retur…
16005 TPM Restart. If a Storage Key has its stClear attribute SET, the descendants of this key shall not …
16006 loadable after TPM Restart.
16007 Previously saved contexts for a session and objects shall not be loadable after a TPM Reset.
16105 …is structure is created by TPM2_Create() and TPM2_CreatePrimary(). It is never entered into the TPM
16395 the TPM input/output buffer is “big endian” with the most significant octet of any datum at the low…
16449 Table 214 is used to indicate the algorithms that are implemented in a TPM. The selections in the V…
17349 The values listed in Table 221 are defined for a specific TPM implementation. The numbers in the Va…
17393 the number of PCR in the TPM
17420 supported by the TPM
17441 supported by the TPM
17463 TPM may have in memory
17497 supported by the TPM; this
17508 objects supported by the TPM
17583 cycles of the TPM's oscillator for