Function report |
Source Code:security\keys\trusted-keys\trusted_tpm2.c |
Create Date:2022-07-28 18:32:13 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:pm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0
Proto:static int tpm2_unseal_cmd(struct tpm_chip *chip, struct trusted_key_payload *payload, struct trusted_key_options *options, unsigned int blob_handle)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct tpm_chip * | chip | |
| struct trusted_key_payload * | payload | |
| struct trusted_key_options * | options | |
| unsigned int | blob_handle |
| 250 | rc = tpm_buf_init( & buf, TPM2_ST_SESSIONS, TPM2_CC_UNSEAL) |
| 254 | tpm_buf_append_u32( & buf, blob_handle) |
| 267 | If Not rc Then |
| 268 | data_len = be16_to_cpup((__be16 * ) & data[TPM_HEADER_SIZE + 4]) |
| 270 | If data_len < MIN_KEY_SIZE || data_len > MAX_KEY_SIZE + 1 Then |
| 275 | If tpm_buf_length( & buf) < TPM_HEADER_SIZE + 6 + data_len Then |
| 279 | data = data[TPM_HEADER_SIZE + 6] |
| 283 | migratable = data[data_len - 1] |
| 286 | out : |
| 287 | tpm_buf_destroy( & buf) |
| 288 | Return rc |
| Name | Describe |
|---|---|
| tpm2_unseal_trusted | pm2_unseal_trusted() - unseal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: Same as with tpm_send. |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |