Go to main content

man pages section 3: Library Interfaces and Headers

Exit Print View

Updated: Thursday, June 13, 2019
 
 

Tspi_TPM_CheckMaintenancePubKey (3)

Name

Tspi_TPM_CheckMaintenancePubKey - check the public maintenance key

Synopsis

#include <tss/platform.h>
#include <tss/tcpa_defines.h>
#include <tss/tcpa_typedef.h>
#include <tss/tcpa_struct.h>
#include <tss/tss_typedef.h>
#include <tss/tss_structs.h>
#include <tss/tspi.h>

TSS_RESULT Tspi_TPM_CheckMaintenancePubKey(TSS_HTPM        hTPM, TSS_HKEY hMaintenanceKey,
TSS_VALIDATION* pValidationData);

Description

Library Functions Manual                    Tspi_TPM_CheckMaintenancePubKey(3)



                   TCG Software Stack Developer's Reference

NAME
       Tspi_TPM_CheckMaintenancePubKey- check the public maintenance key

SYNOPSIS
       #include <tss/platform.h>
       #include <tss/tcpa_defines.h>
       #include <tss/tcpa_typedef.h>
       #include <tss/tcpa_struct.h>
       #include <tss/tss_typedef.h>
       #include <tss/tss_structs.h>
       #include <tss/tspi.h>

       TSS_RESULT Tspi_TPM_CheckMaintenancePubKey(TSS_HTPM        hTPM, TSS_HKEY hMaintenanceKey,
                                                  TSS_VALIDATION* pValidationData);



DESCRIPTION
       Tspi_TPM_CheckMaintenancePubKey  checks  the public maintenance key. If
       hMaintenanceKey is NULL, then pValidationData must  not  be  NULL;  the
       caller  has  to  proof the digest on its own. If hMaintenanceKey is not
       NULL, then pValidationData must  be  NULL;  the  TSS  service  provider
       proofs  the digest got internally from the TPM. The key information re-
       quired for proofing the public maintenance key must be set in  the  key
       object  by  Tspi_SetAttribData before this method is called. This func-
       tion is not yet implemented.

PARAMETERS
   hTPM
       Handle of the TPM object

   hMaintenanceKey
       Handle of the maintenance key object

   pValidationData
       Validation data structure.  [IN] Provide externalData  information  re-
       quired to compute the signature.  [OUT] On successful completion of the
       ocmmand, the structure provides a buffer containing the validation data
       and a buffer containing the data the validation data was computed from.


RETURN CODES
       Tspi_TPM_CheckMaintenancePubKey  returns TSS_SUCCESS on success, other-
       wise one of the following values are returned:

       TSS_E_INVALID_HANDLE
              hTPM is not a valid handle.

       TSS_E_INTERNAL_ERROR
              An internal SW error has been detected.

       TSS_E_BAD_PARAMETER
              One or more of the parameters is incorrect.

       TSS_E_NOTIMPL
              The command is not implemented.


CONFORMING TO
       Tspi_TPM_CheckMaintenancePubKey conforms to the Trusted Computing Group
       Software Specification version 1.1 Golden


ATTRIBUTES
       See attributes(7) for descriptions of the following attributes:


       +---------------+---------------------------+
       |ATTRIBUTE TYPE |     ATTRIBUTE VALUE       |
       +---------------+---------------------------+
       |Availability   | library/security/trousers |
       +---------------+---------------------------+
       |Stability      | Uncommitted               |
       +---------------+---------------------------+
SEE ALSO
       Tspi_TPM_LoadMaintenancePubKey(3),               Tspi_TPM_CreateMainte-
       nanceArchive(3), Tspi_TPM_KillMaintenanceFeature(3).




NOTES
       This software was built from source available at https://github.com/or-
       acle/solaris-userland.   The  original  community source was downloaded
       from                                                    https://source-
       forge.net/projects/trousers/files/trousers/0.3.13/trousers-0.3.13.tar.gz

       Further information about this software can be found on the open source
       community website at http://trousers.sourceforge.net/.



TSS 1.1                           2004-05-26
                                            Tspi_TPM_CheckMaintenancePubKey(3)