ImageVerifierCode 换一换
格式:PDF , 页数:484 ,大小:17.86MB ,
资源ID:234855      下载积分:10 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wnwk.com/docdown/234855.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ISO_IEC_11889-3_2015.pdf)为本站会员(益****师)主动上传,蜗牛文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知蜗牛文库(发送邮件至admin@wnwk.com或直接QQ联系客服),我们立即给予删除!

ISO_IEC_11889-3_2015.pdf

1、Information technology Trusted Platform Module Library Part 3:CommandsTechnologies de linformation Bibliothque de module de plate-forme de con?iance?Partie 3:CommandesINTERNATIONAL STANDARDISO/IEC11889-3Reference numberISO/IEC 11889-3:2015(E)Second edition 2015-12-15 ISO/IEC 2015ii ISO/IEC 2015 All

2、rights reservedCOPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015,Published in Switzerland?the requester.?Ch.de Blandonnet 8 CP 401CH-1214 Vernier,Geneva,SwitzerlandTel.+41 22 749 01 11Fax+41 22 749 09 47?www.iso.orgISO/IEC 11889-3:2015(E)ISO/IEC 11889-3:2015(E)CONTENTS Foreword.xxiv Introduction.xxv 1 Scope

3、.1 2 Normative references.2 3 Terms and Definitions.2 4 Symbols and abbreviated terms.2 5 Notation.2 5.1 Introduction.2 5.2 Table Decorations.2 5.3 Handle and Parameter Demarcation.4 5.4 AuthorizationSize and ParameterSize.4 6 Command Processing.5 6.1 Introduction.5 6.2 Command Header Validation.5 6

4、.3 Mode Checks.5 6.4 Handle Area Validation.6 6.5 Session Area Validation.7 6.6 Authorization Checks.8 6.7 Parameter Decryption.10 6.8 Parameter Unmarshaling.10 6.8.1 Introduction.10 6.8.2 Unmarshaling Errors.10 6.9 Command Post Processing.11 7 Response Values.13 7.1 Tag.13 7.2 Response Codes.13 8 I

5、mplementation Dependent.16 9 Detailed Actions Assumptions.17 9.1 Introduction.17 9.2 Pre-processing.17 9.3 Post Processing.17 10 Start-up.18 10.1 Introduction.18 10.2 _TPM_Init.18 10.2.1 General Description.18 10.2.2 Detailed Actions.19 10.3 TPM2_Startup.20 10.3.1 General Description.20 10.3.2 Comma

6、nd and Response.23 10.3.3 Detailed Actions.24 10.4 TPM2_Shutdown.27 10.4.1 General Description.27 ISO/IEC 2015 All rights reserved iii ISO/IEC 11889-3:2015(E)10.4.2 Command and Response.28 10.4.3 Detailed Actions.29 11 Testing.31 11.1 Introduction.31 11.2 TPM2_SelfTest.32 11.2.1 General Description.

7、32 11.2.2 Command and Response.33 11.2.3 Detailed Actions.34 11.3 TPM2_IncrementalSelfTest.35 11.3.1 General Description.35 11.3.2 Command and Response.36 11.3.3 Detailed Actions.37 11.4 TPM2_GetTestResult.38 11.4.1 General Description.38 11.4.2 Command and Response.39 11.4.3 Detailed Actions.40 12

8、Session Commands.41 12.1 TPM2_StartAuthSession.41 12.1.1 General Description.41 12.1.2 Command and Response.43 12.1.3 Detailed Actions.44 12.2 TPM2_PolicyRestart.46 12.2.1 General Description.46 12.2.2 Command and Response.47 12.2.3 Detailed Actions.48 13 Object Commands.49 13.1 TPM2_Create.49 13.1.

9、1 General Description.49 13.1.2 Command and Response.52 13.1.3 Detailed Actions.53 13.2 TPM2_Load.55 13.2.1 General Description.55 13.2.2 Command and Response.56 13.2.3 Detailed Actions.57 13.3 TPM2_LoadExternal.59 13.3.1 General Description.59 13.3.2 Command and Response.61 13.3.3 Detailed Actions.

10、62 13.4 TPM2_ReadPublic.64 13.4.1 General Description.64 13.4.2 Command and Response.65 iv ISO/IEC 2015 All rights reserved ISO/IEC 11889-3:2015(E)13.4.3 Detailed Actions.66 13.5 TPM2_ActivateCredential.67 13.5.1 General Description.67 13.5.2 Command and Response.68 13.5.3 Detailed Actions.69 13.6 T

11、PM2_MakeCredential.71 13.6.1 General Description.71 13.6.2 Command and Response.72 13.6.3 Detailed Actions.73 13.7 TPM2_Unseal.74 13.7.1 General Description.74 13.7.2 Command and Response.75 13.7.3 Detailed Actions.76 13.8 TPM2_ObjectChangeAuth.77 13.8.1 General Description.77 13.8.2 Command and Res

12、ponse.78 13.8.3 Detailed Actions.79 14 Duplication Commands.81 14.1 TPM2_Duplicate.81 14.1.1 General Description.81 14.1.2 Command and Response.82 14.1.3 Detailed Actions.83 14.2 TPM2_Rewrap.85 14.2.1 General Description.85 14.2.2 Command and Response.86 14.2.3 Detailed Actions.87 14.3 TPM2_Import.9

13、0 14.3.1 General Description.90 14.3.2 Command and Response.92 14.3.3 Detailed Actions.93 15 Asymmetric Primitives.97 15.1 Introduction.97 15.2 TPM2_RSA_Encrypt.97 15.2.1 General Description.97 15.2.2 Command and Response.99 15.2.3 Detailed Actions.100 15.3 TPM2_RSA_Decrypt.102 15.3.1 General Descri

14、ption.102 15.3.2 Command and Response.103 15.3.3 Detailed Actions.104 15.4 TPM2_ECDH_KeyGen.106 ISO/IEC 2015 All rights reserved v ISO/IEC 11889-3:2015(E)15.4.1 General Description.106 15.4.2 Command and Response.107 15.4.3 Detailed Actions.108 15.5 TPM2_ECDH_ZGen.110 15.5.1 General Description.110

15、15.5.2 Command and Response.111 15.5.3 Detailed Actions.112 15.6 TPM2_ECC_Parameters.113 15.6.1 General Description.113 15.6.2 Command and Response.113 15.6.3 Detailed Actions.114 15.7 TPM2_ZGen_2Phase.114 15.7.1 General Description.114 15.7.2 Command and Response.116 15.7.3 Detailed Actions.117 16

16、Symmetric Primitives.119 16.1 Introduction.119 16.2 TPM2_EncryptDecrypt.121 16.2.1 General Description.121 16.2.2 Command and Response.122 16.2.3 Detailed Actions.123 16.3 TPM2_Hash.125 16.3.1 General Description.125 16.3.2 Command and Response.126 16.3.3 Detailed Actions.127 16.4 TPM2_HMAC.128 16.4.1 General Description.128 16.4.2 Command and Response.129 16.4.3 Detailed Actions.130 17 Random Number Generator.132 17.1 TPM2_GetRandom.132 17.1.1 General Description.132 17.1.2 Command and Response

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2