亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? keys.c

?? IBM開發(fā)的TPM的驅動, 有少量的例子可以供參考
?? C
?? 第 1 頁 / 共 3 頁
字號:
	kparmbufsize = ret;	/* calculate authorization HMAC value */	ret =	    TSS_authhmac(pubauth, sess.ssecret, TPM_HASH_SIZE, sess.enonce,			 nonceodd, c, TPM_U32_SIZE, &ordinal,			 TPM_HASH_SIZE, encauth1, TPM_HASH_SIZE, encauth2,			 kparmbufsize, kparmbuf, 0, 0);	if (ret != 0) {		TSS_OSAPclose(&sess);		return ret;	}	/* build the request buffer */	ret = TSS_buildbuff(create_key_fmt, tpmdata,			    ordinal,			    keyhndl,			    TPM_HASH_SIZE, encauth1,			    TPM_HASH_SIZE, encauth2,			    kparmbufsize, kparmbuf,			    sess.handle,			    TPM_NONCE_SIZE, nonceodd,			    c, TPM_HASH_SIZE, pubauth);	if ((ret & ERR_MASK) != 0) {		TSS_OSAPclose(&sess);		return ret;	}	/* transmit the request buffer to the TPM device and read the reply */	ret = TPM_Transmit(tpmdata, "CreateWrapKey");	if (ret != 0) {		TSS_OSAPclose(&sess);		return ret;	}	kparmbufsize = TSS_KeySize(tpmdata + TPM_DATA_OFFSET);	ret =	    TSS_checkhmac1(tpmdata, ordinal, nonceodd, sess.ssecret,			   TPM_HASH_SIZE, kparmbufsize, TPM_DATA_OFFSET, 0,			   0);	TSS_OSAPclose(&sess);	if (ret != 0)		return ret;	/* convert the returned key to a structure */	if (key != NULL)		TSS_KeyExtract(tpmdata + TPM_DATA_OFFSET, key);	/* copy the key blob to caller */	if (keyblob != NULL) {		memcpy(keyblob, tpmdata + TPM_DATA_OFFSET, kparmbufsize);		if (bloblen != NULL)			*bloblen = kparmbufsize;	}	return 0;}/****************************************************************************//*                                                                          *//* Load a new Key into the TPM                                              *//*                                                                          *//* The arguments are...                                                     *//*                                                                          *//* keyhandle is the handle of parent key for the new key                    *//*           0x40000000 for the SRK                                         *//* keyauth   is the authorization data (password) for the parent key        *//*           if null, it is assumed that the parent requires no auth        *//* keyparms  is a pointer to a keydata structure with all data  for the new *//*           key                                                            *//* newhandle is a pointer to a 32bit word which will receive the handle     *//*           of the new key                                                 *//*                                                                          *//****************************************************************************/uint32_t TPM_LoadKey(uint32_t keyhandle, unsigned char *keyauth,		     keydata * keyparms, uint32_t * newhandle){	unsigned char load_key_fmt[] = "00 c2 T l l % l % o %";	unsigned char load_key_fmt_noauth[] = "00 c1 T l l %";	uint32_t ret;	unsigned char tpmdata[TPM_MAX_BUFF_SIZE];	unsigned char kparmbuf[TPM_MAX_BUFF_SIZE];	unsigned char nonceodd[TPM_NONCE_SIZE];	unsigned char evennonce[TPM_NONCE_SIZE];	unsigned char pubauth[TPM_HASH_SIZE];	unsigned char c;	uint32_t ordinal;	uint32_t keyhndl;	uint32_t authhandle;	int kparmbufsize;	/* check input arguments */	if (keyparms == NULL || newhandle == NULL)		return ERR_NULL_ARG;	if (keyauth != NULL) {	/* parent requires authorization */		/* generate odd nonce */		TSS_gennonce(nonceodd);		/* Open OIAP Session */		ret = TSS_OIAPopen(&authhandle, evennonce);		if (ret != 0)			return ret;		/* move Network byte order data to variables for hmac calculation */		ordinal = htonl(0x20);		keyhndl = htonl(keyhandle);		c = 0;		/* convert keyparm structure to buffer */		ret = TPM_BuildKey(kparmbuf, keyparms);		if ((ret & ERR_MASK) != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		kparmbufsize = ret;		/* calculate authorization HMAC value */		ret =		    TSS_authhmac(pubauth, keyauth, TPM_HASH_SIZE,				 evennonce, nonceodd, c, TPM_U32_SIZE,				 &ordinal, kparmbufsize, kparmbuf, 0, 0);		if (ret < 0) {			TSS_OIAPclose(authhandle);			return ret;		}		/* build the request buffer */		ret = TSS_buildbuff(load_key_fmt, tpmdata,				    ordinal,				    keyhndl,				    kparmbufsize, kparmbuf,				    authhandle,				    TPM_NONCE_SIZE, nonceodd,				    c, TPM_HASH_SIZE, pubauth);		if ((ret & ERR_MASK) != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		/* transmit the request buffer to the TPM device and read the reply */		ret = TPM_Transmit(tpmdata, "LoadKey");		if (ret != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		TSS_OIAPclose(authhandle);		ret =		    TSS_checkhmac1(tpmdata, ordinal, nonceodd, keyauth,				   TPM_HASH_SIZE, TPM_U32_SIZE,				   TPM_DATA_OFFSET, 0, 0);		if (ret != 0)			return ret;		*newhandle = LOAD32(tpmdata, TPM_DATA_OFFSET);	} else {		/* parent requires NO authorization */		/* move Network byte order data to variables for hmac calculation */		ordinal = htonl(0x20);		keyhndl = htonl(keyhandle);		/* convert keyparm structure to buffer */		ret = TPM_BuildKey(kparmbuf, keyparms);		if ((ret & ERR_MASK) != 0)			return ret;		kparmbufsize = ret;		/* build the request buffer */		ret = TSS_buildbuff(load_key_fmt_noauth, tpmdata,				    ordinal,				    keyhndl, kparmbufsize, kparmbuf);		if ((ret & ERR_MASK) != 0)			return ret;		/* transmit the request buffer to the TPM device and read the reply */		ret = TPM_Transmit(tpmdata, "LoadKey");		if (ret != 0)			return ret;		*newhandle = LOAD32(tpmdata, TPM_DATA_OFFSET);	}	return 0;}/****************************************************************************//*                                                                          *//* Get a Public Key from the TPM                                            *//*                                                                          *//* The arguments are...                                                     *//*                                                                          *//* keyhandle is the handle of the key to be read                            *//*           0x40000000 for the SRK                                         *//* keyauth   is the authorization data (password) for the key               *//*           if null, it is assumed that the key requires no authorization  *//* keyblob   is a pointer to an area which will receive a copy of the       *//*           public key blob.                                               *//* keyblen   is a pointer to an integer which will receive the length of    *//*           the key blob                                                   *//*                                                                          *//****************************************************************************/uint32_t TPM_GetPubKey(uint32_t keyhandle,		       unsigned char *keyauth,		       unsigned char *keyblob, unsigned int *keyblen){	unsigned char getpub_key_fmt[] = "00 c2 T l l l % o %";	unsigned char getpub_key_fmt_noauth[] = "00 c1 T l l";	uint32_t ret;	unsigned char tpmdata[TPM_MAX_BUFF_SIZE];	unsigned char nonceodd[TPM_NONCE_SIZE];	unsigned char evennonce[TPM_NONCE_SIZE];	unsigned char pubauth[TPM_HASH_SIZE];	unsigned char c;	uint32_t ordinal;	uint32_t keyhndl;	uint32_t authhandle;	int size;	/* check input arguments */	if (keyblob == NULL || keyblen == NULL)		return ERR_NULL_ARG;	if (keyauth != NULL) {	/* key requires authorization */		/* generate odd nonce */		TSS_gennonce(nonceodd);		/* Open OIAP Session */		ret = TSS_OIAPopen(&authhandle, evennonce);		if (ret != 0)			return ret;		/* move Network byte order data to variables for hmac calculation */		ordinal = htonl(0x21);		keyhndl = htonl(keyhandle);		c = 0;		/* calculate authorization HMAC value */		ret =		    TSS_authhmac(pubauth, keyauth, TPM_HASH_SIZE,				 evennonce, nonceodd, c, TPM_U32_SIZE,				 &ordinal, 0, 0);		if (ret != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		/* build the request buffer */		ret = TSS_buildbuff(getpub_key_fmt, tpmdata,				    ordinal,				    keyhndl,				    authhandle,				    TPM_NONCE_SIZE, nonceodd,				    c, TPM_HASH_SIZE, pubauth);		if ((ret & ERR_MASK) != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		/* transmit the request buffer to the TPM device and read the reply */		ret = TPM_Transmit(tpmdata, "GetPubKey");		if (ret != 0) {			TSS_OIAPclose(authhandle);			return ret;		}		TSS_OIAPclose(authhandle);		size = TSS_PubKeySize(tpmdata + TPM_DATA_OFFSET, 0);		ret =		    TSS_checkhmac1(tpmdata, ordinal, nonceodd, keyauth,				   TPM_HASH_SIZE, size, TPM_DATA_OFFSET, 0,				   0);		if (ret != 0)			return ret;		memcpy(keyblob, tpmdata + TPM_DATA_OFFSET, size);		*keyblen = size;	} else {		/* key requires NO authorization */		/* move Network byte order data to variables for hmac calculation */		ordinal = htonl(0x21);		keyhndl = htonl(keyhandle);		/* build the request buffer */		ret = TSS_buildbuff(getpub_key_fmt_noauth, tpmdata,				    ordinal, keyhndl);		if ((ret & ERR_MASK) != 0)			return ret;		/* transmit the request buffer to the TPM device and read the reply */		ret = TPM_Transmit(tpmdata, "GetPubKey");		if (ret != 0)			return ret;		size = TSS_PubKeySize(tpmdata + TPM_DATA_OFFSET, 0);		memcpy(keyblob, tpmdata + TPM_DATA_OFFSET, size);		*keyblen = size;	}	return 0;}/****************************************************************************//*                                                                          *//* Evict (delete) a  Key from the TPM                                       *//*                                                                          *//* The arguments are...                                                     *//*                                                                          *//* keyhandle is the handle of the key to be evicted                         *//*                                                                          *//****************************************************************************/uint32_t TPM_EvictKey(uint32_t keyhandle){	unsigned char evict_key_fmt[] = "00 c1 T 00 00 00 22 L";	uint32_t ret;	unsigned char tpmdata[TPM_MAX_BUFF_SIZE];	ret = TSS_buildbuff(evict_key_fmt, tpmdata, keyhandle);	if ((ret & ERR_MASK) != 0)		return ret;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区播放| 国产伦精品一区二区三区免费迷 | 另类的小说在线视频另类成人小视频在线| 91精品1区2区| 亚洲成人一二三| 欧美一区二区精品| 精品写真视频在线观看| 久久婷婷国产综合精品青草| 国产一区二区三区| 国产精品麻豆视频| 欧美性做爰猛烈叫床潮| 视频一区在线视频| 精品欧美一区二区久久| 国产成人精品亚洲午夜麻豆| 国产精品国产三级国产有无不卡| 国产成人av电影在线观看| 国产精品传媒在线| 欧美另类久久久品| 精品一区二区成人精品| 欧美经典一区二区| 91精品福利在线| 激情另类小说区图片区视频区| 久久久精品欧美丰满| 99精品热视频| 午夜精品一区二区三区电影天堂 | 欧美色图免费看| 日本免费新一区视频| 欧美激情自拍偷拍| 欧美肥胖老妇做爰| 成人深夜福利app| 日韩成人精品视频| 久久久久久一级片| 欧美久久一二区| 成人蜜臀av电影| 蜜臀精品久久久久久蜜臀 | 精品久久国产97色综合| 99久久99久久免费精品蜜臀| 日本最新不卡在线| 中文字幕欧美一| 久久亚洲欧美国产精品乐播 | 麻豆91精品91久久久的内涵| 成人免费在线观看入口| 欧美成人激情免费网| 99久久精品情趣| 国产麻豆精品在线观看| 日韩高清在线电影| 夜色激情一区二区| 欧美激情综合网| 精品国产一区二区亚洲人成毛片 | 自拍偷自拍亚洲精品播放| 精品久久国产老人久久综合| 欧美日韩中文一区| 94色蜜桃网一区二区三区| 国产激情91久久精品导航| 天堂午夜影视日韩欧美一区二区| 亚洲欧美激情视频在线观看一区二区三区| 日韩欧美国产1| 91精品蜜臀在线一区尤物| 日本韩国欧美国产| 北岛玲一区二区三区四区| 国产一区二区在线观看免费| 蜜桃精品视频在线| 日本va欧美va瓶| 亚洲r级在线视频| 亚洲国产综合色| 一区二区三区精品| 一级精品视频在线观看宜春院| 国产欧美一区二区精品性色超碰| 欧美一区二区三区成人| 69p69国产精品| 欧美精品丝袜中出| 91麻豆精品久久久久蜜臀| 欧美日韩国产小视频| 欧美性色黄大片| 欧美日韩亚洲综合一区| 欧美三区在线观看| 欧美日韩成人在线一区| 欧美三级在线看| 欧美人与禽zozo性伦| 欧美妇女性影城| 欧美精品18+| 日韩视频一区在线观看| 日韩一卡二卡三卡四卡| 日韩欧美一区二区久久婷婷| 日韩丝袜情趣美女图片| 欧美成人激情免费网| 欧美成人午夜电影| 国产丝袜美腿一区二区三区| 久久精品人人做人人综合 | 这里是久久伊人| 欧美精品自拍偷拍| 日韩三区在线观看| 久久久久久久久久久黄色| 国产亚洲综合性久久久影院| 国产精品色在线观看| 国产精品人妖ts系列视频| 亚洲日本va午夜在线影院| 亚洲综合另类小说| 日韩电影在线免费观看| 久久精品国产在热久久| 国产成人午夜视频| 91最新地址在线播放| 欧洲视频一区二区| 日韩一区二区三区视频在线| 久久伊人中文字幕| 亚洲特级片在线| 亚洲高清一区二区三区| 久久国产夜色精品鲁鲁99| 懂色av噜噜一区二区三区av| 色婷婷综合久久久久中文| 欧美一区二区三区在线视频| 国产日产欧美一区| 一区二区国产视频| 久久福利视频一区二区| 高清av一区二区| 欧美日韩www| 国产欧美日韩不卡| 亚洲国产一区二区视频| 久久91精品国产91久久小草| av欧美精品.com| 欧美一级搡bbbb搡bbbb| 中文字幕日韩一区二区| 日本欧美久久久久免费播放网| 福利一区二区在线| 欧美性受极品xxxx喷水| 久久久99久久| 日韩av电影免费观看高清完整版 | 91精品国产综合久久婷婷香蕉 | 精品动漫一区二区三区在线观看| 国产精品久久久久久久久图文区| 日日噜噜夜夜狠狠视频欧美人| 国产成人精品免费一区二区| 91精品婷婷国产综合久久性色 | 日韩欧美国产午夜精品| 亚洲欧美日韩在线不卡| 久久99国产精品久久| 欧美疯狂做受xxxx富婆| 国产精品久久久久久久久动漫| 久久精品国产999大香线蕉| 在线中文字幕不卡| 日本一区二区动态图| 日韩精品欧美精品| 色婷婷综合久久久中文一区二区 | 久久99精品网久久| 欧美精品v国产精品v日韩精品| 中文字幕色av一区二区三区| 国产剧情一区二区三区| 在线综合+亚洲+欧美中文字幕| 亚洲四区在线观看| 成人激情免费视频| 欧美精品一区二区在线观看| 香蕉久久夜色精品国产使用方法| 99久久精品99国产精品 | 亚洲欧美激情在线| 成人爽a毛片一区二区免费| 亚洲精品一区二区三区在线观看| 日产欧产美韩系列久久99| 欧美少妇bbb| 亚洲精品国产a| 色综合久久久久综合99| 国产精品国产自产拍在线| 成人综合在线网站| 亚洲国产岛国毛片在线| 国产美女精品一区二区三区| 久久影院午夜论| 国产精品中文欧美| 久久久久亚洲蜜桃| 国产精品888| 国产三级欧美三级日产三级99 | 激情综合色综合久久| 欧美大片一区二区| 久久9热精品视频| 欧美成人video| 久久精品国产精品青草| 精品国产乱码久久久久久牛牛 | 激情综合色综合久久| 日韩午夜激情av| 国产真实乱偷精品视频免| 精品理论电影在线观看| 国产激情一区二区三区四区 | 国产一二三精品| 国产午夜精品美女毛片视频| 高清不卡一区二区| 亚洲色图在线播放| 在线看不卡av| 日韩福利电影在线观看| 欧美精品一区二区三| 成人永久看片免费视频天堂| 中文字幕制服丝袜一区二区三区| 91香蕉视频污在线| 亚洲成人黄色影院| 日韩欧美一卡二卡| 成人av先锋影音| 五月婷婷久久丁香| www激情久久| 色综合天天做天天爱| 午夜精品一区在线观看| 久久奇米777| 99国产精品一区| 三级欧美韩日大片在线看|