Function report |
Source Code:security\keys\trusted-keys\trusted_tpm2.c |
Create Date:2022-07-28 18:32:13 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:pm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0
Proto:static int tpm2_unseal_cmd(struct tpm_chip *chip, struct trusted_key_payload *payload, struct trusted_key_options *options, unsigned int blob_handle)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct tpm_chip * | chip | |
struct trusted_key_payload * | payload | |
struct trusted_key_options * | options | |
unsigned int | blob_handle |
250 | rc = tpm_buf_init( & buf, TPM2_ST_SESSIONS, TPM2_CC_UNSEAL) |
254 | tpm_buf_append_u32( & buf, blob_handle) |
267 | If Not rc Then |
268 | data_len = be16_to_cpup((__be16 * ) & data[TPM_HEADER_SIZE + 4]) |
270 | If data_len < MIN_KEY_SIZE || data_len > MAX_KEY_SIZE + 1 Then |
275 | If tpm_buf_length( & buf) < TPM_HEADER_SIZE + 6 + data_len Then |
279 | data = data[TPM_HEADER_SIZE + 6] |
283 | migratable = data[data_len - 1] |
286 | out : |
287 | tpm_buf_destroy( & buf) |
288 | Return rc |
Name | Describe |
---|---|
tpm2_unseal_trusted | pm2_unseal_trusted() - unseal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: Same as with tpm_send. |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |