Function report | 
Source Code:security\keys\trusted-keys\trusted_tpm2.c | 
Create Date:2022-07-28 18:32:13 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:pm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0
Proto:static int tpm2_unseal_cmd(struct tpm_chip *chip, struct trusted_key_payload *payload, struct trusted_key_options *options, unsigned int blob_handle)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct tpm_chip * | chip | |
| struct trusted_key_payload * | payload | |
| struct trusted_key_options * | options | |
| unsigned int | blob_handle | 
| 250 | rc = tpm_buf_init( & buf, TPM2_ST_SESSIONS, TPM2_CC_UNSEAL) | 
| 254 | tpm_buf_append_u32( & buf, blob_handle) | 
| 267 | If Not rc Then | 
| 268 | data_len = be16_to_cpup((__be16 * ) & data[TPM_HEADER_SIZE + 4]) | 
| 270 | If data_len < MIN_KEY_SIZE || data_len > MAX_KEY_SIZE + 1 Then | 
| 275 | If tpm_buf_length( & buf) < TPM_HEADER_SIZE + 6 + data_len Then | 
| 279 | data = data[TPM_HEADER_SIZE + 6] | 
| 283 | migratable = data[data_len - 1] | 
| 286 | out : | 
| 287 | tpm_buf_destroy( & buf) | 
| 288 | Return rc | 
| Name | Describe | 
|---|---|
| tpm2_unseal_trusted | pm2_unseal_trusted() - unseal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: Same as with tpm_send. | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |