TCPA Main Specification Version 1.1B
Total Page:16
File Type:pdf, Size:1020Kb
Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1b Published by the Trusted Computing Group Copyright © 2003 Trusted Computing Group, Incorporated. Copyright © 2000-2001 Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation Previously published by Trusted Computing Platform Alliance under the title: Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1a. DISCLAIMERS: THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. No license, express or implied, by estoppel or otherwise, to any TCG or TCG member intellectual property rights is granted herein. Except that a license is hereby granted by TCG to copy and reproduce this specification for internal use only. TCPA Main Specification Page ii Contact the Trusted Computing Group at http://www.trustedcomputinggroup.org for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owners. Copyright C 2005 Trusted Computing Group (TCG) (www.trustedcomputinggroup.org). All rights reserved. The only official, normative version of a TCG Specification or related document is the English-language text adopted by TCG under its Bylaws and published on the TCG website, www.trustedcomputing.org. TCG does not guarantee the accuracy or completeness of any other version. Other language versions of Specifications and related documents are provided for convenience and are intended to be technically identical to the official English version, but they may contain translation and other errors. Translations may be provided by volunteers through the Trusted Computing Group's translation program (see www.trustedcomputinggroup.org/specifications. Other legal notices and terms governing the publication of materials on the TCG website are found at www.trustedcomputinggroup.org/about/legal. TCG incorporates by reference the same notices and terms with respect to TCG-authorized translations of Specifications and related documents, whether published on the TCG website or at another online location. Version 1.1b 22 February 2002 TCPA Main Specification Page iii Acknowledgement The Trusted Computing Group wishes to thank members of the PKI, PC Specific and Conformance Workgroup who contributed expertise and text to this document. Thanks must be given to the members of the TCG Technical Committee who were Michael Angelo, Boris Balacheff, Josh Benaloh, David Challener, Dhruv Desai, Paul England, David Grawrock, Bob Meinschein, Manny Novoa, Graeme Proudler, Jim Ward and Monty Wiseman. David Chan Technical Committee Chair Version 1.1b 22 February 2002 TCPA Main Specification Page iv Change History Version Date Description 0.44 July 2000 Voted by members as appropriate for public release with modifications. 0.90 August 2000 First version released to public. 0.91 October 26, 2000 Remove chapters 1 & 2. Complete reformat 0.92 4 November, 2000 Added new chapter for structures, updated functions to match IDL, editing changes. 1.0 RC1 28 November 2000 Incorporated comments cleaned up structures and made ready for publication. 1.0 RC2 11 December 2000 Incorporated changes from reflector. Added new change authorization command. 1.0 RC4 10 Jan 2001 Incorporated changes and fixed up IDL 1.0 RC5 11 Jan 2001 PKCS#1 changes 1.01 17 April 2001 Implemented corrections. Mid point save made to avoid problems with track changes in document 1.02 18 April 2001 Continue with changes for 1.1 release, changed IDL to table format 1.03 First attempt to reconcile IDL misses 1.04 7 May 2001 Mid level drop to show all changes in regard to IDL 1.06 17 May 2001 All CR’s complete 1.07 22 May 2001 Cleanup from WG messages and changing in Audit commands. 1.1 RC1 25 May 2001 Release candidate for specification 1.1 RC2 4 June 2001 All changes 1.1 RC3 12 June 2001 Removal of TSS commands, cleanup of parameter blocks, all comments from v1 reflector. 1.1 RC4 5 July 2001 Editing changes, candidate for final review 1.1 RC6 17 July 2001 All changes made and version ready for voting 1.1 31 July 2001 Voted on release of 1.1 1.1a 12th November 2001 Includes all errata up to and including #55 1.1b 22 February 2002 Includes all errata up to and including #85 Version 1.1b 22 February 2002 TCPA Main Specification Page v Table Of Contents 1. Forward ..............................................................................................................................................1 2. The Trusted Platform Subsystem.......................................................................................................2 2.1 Introduction.....................................................................................................................................2 2.2 Roots of Trust .................................................................................................................................2 2.2.1 Definitions................................................................................................................................3 2.2.2 Instantiations and Trust Bindings ............................................................................................3 2.3 Integrity Operations ........................................................................................................................5 2.3.1 Storage of Integrity Metrics .....................................................................................................5 2.3.2 Reporting of Integrity Metrics ..................................................................................................6 2.4 Use of Keys Associated with TPM Identities ..................................................................................7 2.5 Cryptographic Operations...............................................................................................................7 2.6 Opting to use a TPM.......................................................................................................................8 2.6.1 Enabling Ownership ................................................................................................................9 2.6.2 Activating a TPM .....................................................................................................................9 2.6.3 Selected operations...............................................................................................................11 2.7 Protected, Unprotected, and Connection Operations...................................................................13 3. Protection .........................................................................................................................................14 3.1 Introduction...................................................................................................................................14 3.2 Threat ...........................................................................................................................................14 3.3 Integrity .........................................................................................................................................15 3.4 Privileged Access .........................................................................................................................15 3.5 Side effects ...................................................................................................................................15 4. Structures and Defines.....................................................................................................................16 4.1.1 Endness of Structures ...........................................................................................................16 4.1.2 Byte Packing..........................................................................................................................16 4.1.3 Lengths..................................................................................................................................16 4.2 Defines..........................................................................................................................................17 4.2.1 Basic data types ....................................................................................................................17 4.2.2 Boolean types........................................................................................................................17 4.2.3 Helper redefinitions ...............................................................................................................17 4.2.4 Enumerated Helper redefinitions...........................................................................................18 4.2.5 Vendor specific......................................................................................................................19