Generated by JEB on 2019/08/01

PE: C:\Windows\WinSxS\amd64_microsoft-windows-p..ioningsecureprocess_31bf3856ad364e35_10.0.17763.615_none_0bbf0d51a55301ca\psp.exe Base=0x140000000 SHA-256=DFD3F85641239074CBF5DEB3F04C997168F2BBCD7DA0FE63C3137BCA55D3BB70
PDB: psp.pdb GUID={933C6E48-84D3-9D27-A9EACF3AEB0A2B48} Age=1

835 located named symbols:
0x140019838: SymCryptSha512Result
0x140012680: "unsigned int __cdecl TPM2_StartAuthSession_Unmarshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_StartAuthSession_Unmarshal@@YAIPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001E828: "__cdecl _imp_LockResource" __imp_LockResource
0x140019958: SymCryptSha384Result
0x140008B18: "private: long __cdecl CPspPolicy::SerializePolicyToSet(void * __ptr64 * __ptr64) __ptr64" ?SerializePolicyToSet@CPspPolicy@@AEAAJPEAPEAX@Z
0x14001D34C: "__cdecl _raise_securityfailure" __raise_securityfailure
0x140023D50: "unsigned char * SecureBootSeparator" ?SecureBootSeparator@@3PAEA
0x14001E970: "__cdecl _imp_EventRegister" __imp_EventRegister
0x1400085F4: "public: long __cdecl CPspEfiDatabase::PredictAndExtendBootLockPCR(void * __ptr64) __ptr64" ?PredictAndExtendBootLockPCR@CPspEfiDatabase@@QEAAJPEAX@Z
0x14000A1D4: "long __cdecl EbfpPopulateTransportKey(struct _PSP_SYMMETRIC_TRANSPORT_KEY * __ptr64,void * __ptr64,unsigned char * __ptr64,unsigned int,unsigned char,unsigned char)" ?EbfpPopulateTransportKey@@YAJPEAU_PSP_SYMMETRIC_TRANSPORT_KEY@@PEAXPEAEIEE@Z
0x1400082D0: "private: long __cdecl CPspEfiDatabase::ExtendTrEEVariableData(void * __ptr64,unsigned int,struct _GUID,unsigned short const * __ptr64,unsigned char * __ptr64,unsigned int) __ptr64" ?ExtendTrEEVariableData@CPspEfiDatabase@@AEAAJPEAXIU_GUID@@PEBGPEAEI@Z
0x14001D160: "__cdecl FindPESection" _FindPESection
0x14001CB74: "public: virtual __cdecl std::bad_alloc::~bad_alloc(void) __ptr64" ??1bad_alloc@std@@UEAA@XZ
0x14000D740: "void __cdecl DeletePcrCollection(struct _RTPM_PCR_COLLECTION * __ptr64)" ?DeletePcrCollection@@YAXPEAU_RTPM_PCR_COLLECTION@@@Z
0x1400121F0: "void __cdecl CryptSymmetricDecrypt(unsigned char * __ptr64,unsigned short,unsigned short,unsigned short,unsigned char * __ptr64,union TPM2B_IV * __ptr64,unsigned int,unsigned char * __ptr64)" ?CryptSymmetricDecrypt@@YAXPEAEGGG0PEATTPM2B_IV@@I0@Z
0x14001EA28: "__cdecl _imp_??1exception@@UEAA@XZ" __imp_??1exception@@UEAA@XZ
0x14001FD00: "SHA384" ??_C@_1O@KOBLHLEG@?$AAS?$AAH?$AAA?$AA3?$AA8?$AA4?$AA?$AA@
0x140021C64: "__cdecl _IMPORT_DESCRIPTOR_ntdll" __IMPORT_DESCRIPTOR_ntdll
0x14001EE68: Session_PspFailedToMatchTargetBootOsScenarioAndVersion
0x140001A78: "public: long __cdecl CProvisioningSecurityProcess::CleanUp(void) __ptr64" ?CleanUp@CProvisioningSecurityProcess@@QEAAJXZ
0x1400199EC: SymCryptSha512AppendBlocks_ull
0x1400145B0: "__cdecl wsetargv" _wsetargv
0x14000A408: "long __cdecl EbfpCreateContext(void * __ptr64 * __ptr64,unsigned int,unsigned char,unsigned char * __ptr64,unsigned int,unsigned char,unsigned char,unsigned char * __ptr64,unsigned int,unsigned char)" ?EbfpCreateContext@@YAJPEAPEAXIEPEAEIEE1IE@Z
0x1400234C0: "__cdecl _security_cookie_complement" __security_cookie_complement
0x14001FBC0: "unsigned short const * const s_commandAttributes" ?s_commandAttributes@@3QBGB
0x14001EA78: "__cdecl _imp_wcsncpy_s" __imp_wcsncpy_s
0x14001EF58: Session_PspInvalidCommandLine
0x14001EA60: "__cdecl _imp___wgetmainargs" __imp___wgetmainargs
0x140012E34: "unsigned short __cdecl TPM2B_PUBLIC_KEY_RSA_Marshal(union TPM2B_PUBLIC_KEY_RSA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_PUBLIC_KEY_RSA_Marshal@@YAGPEATTPM2B_PUBLIC_KEY_RSA@@PEAPEAEPEAH@Z
0x14001F0A8: Session_PspSecureKernelSecurityInfoError
0x140016F80: "long __cdecl RrkAllocZerod(unsigned __int64,void * __ptr64 * __ptr64)" ?RrkAllocZerod@@YAJ_KPEAPEAX@Z
0x140011BC0: "unsigned short __cdecl CryptStartHMAC2B(unsigned short,struct TPM2B * __ptr64,struct HMAC_STATE * __ptr64)" ?CryptStartHMAC2B@@YAGGPEAUTPM2B@@PEAUHMAC_STATE@@@Z
0x14001F928: "KeyLength" ??_C@_1BE@FGBADLPC@?$AAK?$AAe?$AAy?$AAL?$AAe?$AAn?$AAg?$AAt?$AAh?$AA?$AA@
0x14001F2D0: "ncalrpc" ??_C@_1BA@EONDGCCM@?$AAn?$AAc?$AAa?$AAl?$AAr?$AAp?$AAc?$AA?$AA@
0x14001E870: "__cdecl _imp_GetCurrentThreadId" __imp_GetCurrentThreadId
0x14001E7B0: "__cdecl _imp_NdrServerCallAll" __imp_NdrServerCallAll
0x14001C988: WbclApiGetCurrentElement
0x1400185AC: PolPolSetPointerFromHandle
0x140006DB0: RpcPspSetMessageBuffer
0x14001FA10: "PrepareOperationContext" ??_C@_0BI@CGBBCHOC@PrepareOperationContext?$AA@
0x14001CF38: "__cdecl _CxxFrameHandler3" __CxxFrameHandler3
0x14001CB34: "public: __cdecl std::bad_alloc::bad_alloc(void) __ptr64" ??0bad_alloc@std@@QEAA@XZ
0x14001E7A0: "__cdecl _imp_RpcServerRegisterIfEx" __imp_RpcServerRegisterIfEx
0x14001EF18: Session_PspServerKeyGenerationFailed
0x1400146A0: "unsigned int __cdecl TPM2_Create_Unmarshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_Create_Unmarshal@@YAIPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140015040: "short __cdecl _cpri__AESDecryptCFB(unsigned char * __ptr64,unsigned int,unsigned char * __ptr64,unsigned char * __ptr64,unsigned int,unsigned char * __ptr64)" ?_cpri__AESDecryptCFB@@YAFPEAEI00I0@Z
0x140005148: "private: long __cdecl CProvisioningSecurityProcess::SetSecurityInformation(struct _PSP_SECURITY_MESSAGE_PAYLOAD * __ptr64) __ptr64" ?SetSecurityInformation@CProvisioningSecurityProcess@@AEAAJPEAU_PSP_SECURITY_MESSAGE_PAYLOAD@@@Z
0x14001FB78: "UnmarshalTpmCommand" ??_C@_0BE@EDHGPOLI@UnmarshalTpmCommand?$AA@
0x14001D6B0: "__cdecl guard_dispatch_icall_nop" _guard_dispatch_icall_nop
0x14001EE88: Session_PspReceivedUnusablePDK
0x140013978: "unsigned short __cdecl TPMU_PUBLIC_PARMS_Marshal(union TPMU_PUBLIC_PARMS * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_PUBLIC_PARMS_Marshal@@YAGPEATTPMU_PUBLIC_PARMS@@PEAPEAEPEAHI@Z
0x14001FAF8: "ExtractPcrSelectionData" ??_C@_0BI@JDHGBAN@ExtractPcrSelectionData?$AA@
0x140009A48: "public: long __cdecl PspMessageQueue::AppendMessageFragment(unsigned int,unsigned int,unsigned char * __ptr64,unsigned int) __ptr64" ?AppendMessageFragment@PspMessageQueue@@QEAAJIIPEAEI@Z
0x1400202D0: SymCryptSha512InitialState
0x14000BA1C: "long __cdecl DeriveStateEncryptionKey(struct _RTPM_INSTANCE * __ptr64,unsigned char,struct _ENCRYPTED_STATE_OBJECT * __ptr64,void * __ptr64 * __ptr64)" ?DeriveStateEncryptionKey@@YAJPEAU_RTPM_INSTANCE@@EPEAU_ENCRYPTED_STATE_OBJECT@@PEAPEAX@Z
0x140020290: SymCryptSha384InitialState
0x14001F3F8: "struct _NDR64_RANGE_FORMAT const __midl_frag33" ?__midl_frag33@@3U_NDR64_RANGE_FORMAT@@B
0x14001F128: Session_PspBootLockPCRExtensionFailed
0x140011794: "unsigned int __cdecl Command_Unmarshal(unsigned int,struct SESSION * __ptr64,unsigned int,unsigned int (__cdecl*)(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64),struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?Command_Unmarshal@@YAIIPEAUSESSION@@IP6AIPEAUMarshal_Parms@@PEAPEAEPEAH@Z123@Z
0x14000F460: "long __cdecl PcrRead_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?PcrRead_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001F730: "ChainingModeGCM" ??_C@_1CA@HMDKAIAD@?$AAC?$AAh?$AAa?$AAi?$AAn?$AAi?$AAn?$AAg?$AAM?$AAo?$AAd?$AAe?$AAG?$AAC?$AAM?$AA?$AA@
0x140007600: "public: long __cdecl CPspEfiDatabase::PopulateFromTemplate(unsigned char const * __ptr64,unsigned int,struct _PSP_PARSED_WBCL_ENTRY * __ptr64,struct _PSP_PARSED_WBCL_ENTRY * __ptr64) __ptr64" ?PopulateFromTemplate@CPspEfiDatabase@@QEAAJPEBEIPEAU_PSP_PARSED_WBCL_ENTRY@@1@Z
0x14001F040: Session_PspFailedToSetTrustletIdentity
0x140023D54: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUkilerhrlmUkhkUkhkfgroUoryUlyquivUznwGEUkivxlnkrovwsvzwviOlyq@psputil" __@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUkilerhrlmUkhkUkhkfgroUoryUlyquivUznwGEUkivxlnkrovwsvzwviOlyq@psputil
0x14001F8A8: "RtpmCompleteCreateKey" ??_C@_0BG@PAOJPHJD@RtpmCompleteCreateKey?$AA@
0x14001216C: "void __cdecl CryptSymmetricEncrypt(unsigned char * __ptr64,unsigned short,unsigned short,unsigned short,unsigned char * __ptr64,union TPM2B_IV * __ptr64,unsigned int,unsigned char * __ptr64)" ?CryptSymmetricEncrypt@@YAXPEAEGGG0PEATTPM2B_IV@@I0@Z
0x140006D60: RpcPspCloseHandle
0x14001E9C8: "__cdecl _imp_BCryptDestroyKey" __imp_BCryptDestroyKey
0x140007E04: "public: long __cdecl CPspEfiDatabase::SetOneOverrideVariable(unsigned char * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64) __ptr64" ?SetOneOverrideVariable@CPspEfiDatabase@@QEAAJPEAEIPEAPEAEPEAI@Z
0x1400237A8: "__cdecl commode" _commode
0x140005E3C: "private: long __cdecl CProvisioningSecurityProcess::InitializeRtpmAssets(void) __ptr64" ?InitializeRtpmAssets@CProvisioningSecurityProcess@@AEAAJXZ
0x140004A80: "public: long __cdecl CProvisioningSecurityProcess::ProcessVMRK(struct _KEYFILE * __ptr64) __ptr64" ?ProcessVMRK@CProvisioningSecurityProcess@@QEAAJPEAU_KEYFILE@@@Z
0x14001E100: "struct _RTPM_OPERATION g_PcrReadOperation" ?g_PcrReadOperation@@3U_RTPM_OPERATION@@A
0x14000BEE0: "long __cdecl EncryptStateObject(struct _STATE_OBJECT * __ptr64,struct _RTPM_INSTANCE * __ptr64,struct _ENCRYPTED_STATE_OBJECT * __ptr64)" ?EncryptStateObject@@YAJPEAU_STATE_OBJECT@@PEAU_RTPM_INSTANCE@@PEAU_ENCRYPTED_STATE_OBJECT@@@Z
0x14001FDA8: "PTP_EBEK" ??_C@_1BC@HJONNLFO@?$AAP?$AAT?$AAP?$AA_?$AAE?$AAB?$AAE?$AAK?$AA?$AA@
0x14001EA10: bcrypt_NULL_THUNK_DATA
0x14001EFF0: Session_PspVersionNegotiationPayload
0x140012D98: "unsigned int __cdecl TPMI_ALG_HASH_Unmarshal(unsigned short * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMI_ALG_HASH_Unmarshal@@YAIPEAGPEAPEAEPEAHH@Z
0x14000E780: "long __cdecl SealInitialize(void * __ptr64,struct _RTPM_INPUT * __ptr64)" ?SealInitialize@@YAJPEAXPEAU_RTPM_INPUT@@@Z
0x14001E780: "__cdecl _imp_RpcServerUnregisterIf" __imp_RpcServerUnregisterIf
0x140003498: "private: void __cdecl CProvisioningSecurityProcess::SendMspsDiagnosticPayload(unsigned long,struct _PTPDIAG_PAYLOAD_HEADER * __ptr64,unsigned long) __ptr64" ?SendMspsDiagnosticPayload@CProvisioningSecurityProcess@@AEAAXKPEAU_PTPDIAG_PAYLOAD_HEADER@@K@Z
0x140016D78: "long __cdecl VerifyFlatRootRecoveryKey(struct _FLAT_PTP_ROOT_RECOVERY_KEY * __ptr64,unsigned __int64)" ?VerifyFlatRootRecoveryKey@@YAJPEAU_FLAT_PTP_ROOT_RECOVERY_KEY@@_K@Z
0x1400136D8: "unsigned int __cdecl TPMS_KEYEDHASH_PARMS_Unmarshal(struct TPMS_KEYEDHASH_PARMS * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMS_KEYEDHASH_PARMS_Unmarshal@@YAIPEAUTPMS_KEYEDHASH_PARMS@@PEAPEAEPEAH@Z
0x14000DA28: "long __cdecl AcquirePcrBank(struct _RTPM_PCR_COLLECTION * __ptr64,unsigned short,struct _RTPM_PCR_BANK * __ptr64 * __ptr64)" ?AcquirePcrBank@@YAJPEAU_RTPM_PCR_COLLECTION@@GPEAPEAU_RTPM_PCR_BANK@@@Z
0x14001E8F0: "__cdecl _imp_SetEvent" __imp_SetEvent
0x14000873C: "public: static long __cdecl CPspPolicy::ConstructPolicy(void * __ptr64,void * __ptr64,class CPspPolicy * __ptr64 * __ptr64)" ?ConstructPolicy@CPspPolicy@@SAJPEAX0PEAPEAV1@@Z
0x140014F80: "short __cdecl _cpri__AESEncryptCFB(unsigned char * __ptr64,unsigned int,unsigned char * __ptr64,unsigned char * __ptr64,unsigned int,unsigned char * __ptr64)" ?_cpri__AESEncryptCFB@@YAFPEAEI00I0@Z
0x14000F800: "long __cdecl MarshalReadPublicSRK(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalReadPublicSRK@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14001F700: "NmpsDebugWait" ??_C@_1BM@MEJPIIJO@?$AAN?$AAm?$AAp?$AAs?$AAD?$AAe?$AAb?$AAu?$AAg?$AAW?$AAa?$AAi?$AAt?$AA?$AA@
0x14001D040: "long __cdecl __CxxUnhandledExceptionFilter(struct _EXCEPTION_POINTERS * __ptr64)" ?__CxxUnhandledExceptionFilter@@YAJPEAU_EXCEPTION_POINTERS@@@Z
0x14001EB88: "__cdecl _guard_dispatch_icall_fptr" __guard_dispatch_icall_fptr
0x140019310: PolNextPolicyFromPolicySet
0x1400237B4: "__cdecl fmode" _fmode
0x14001F078: Session_PspReceivedUnparsableNMPSMessage
0x14001E8E8: "__cdecl _imp_InitializeCriticalSection" __imp_InitializeCriticalSection
0x140019054: PolUnprotectPolicySet
0x140012BDC: "unsigned short __cdecl MemoryRemoveTrailingZeros(union TPM2B_DIGEST * __ptr64)" ?MemoryRemoveTrailingZeros@@YAGPEATTPM2B_DIGEST@@@Z
0x14000CA28: "struct _RTPM_ACTION * __ptr64 __cdecl GetCurrentAction(struct _STATE_OBJECT * __ptr64)" ?GetCurrentAction@@YAPEAU_RTPM_ACTION@@PEAU_STATE_OBJECT@@@Z
0x14000CA90: "long __cdecl ProcessInboundContext(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_CONTEXT * __ptr64,struct _STATE_OBJECT * __ptr64)" ?ProcessInboundContext@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_CONTEXT@@PEAU_STATE_OBJECT@@@Z
0x14001FAD0: "ReadPcr" ??_C@_07GHNPNLLC@ReadPcr?$AA@
0x14001D09E: "__cdecl XcptFilter" _XcptFilter
0x14001EB90: "__cdecl _xc_a" __xc_a
0x140012B94: "int __cdecl Memory2BEqual(struct TPM2B const * __ptr64,struct TPM2B const * __ptr64)" ?Memory2BEqual@@YAHPEBUTPM2B@@0@Z
0x14001F910: "AddResultCollection" ??_C@_0BE@CONLDCPF@AddResultCollection?$AA@
0x140013610: "unsigned int __cdecl TPM2B_PUBLIC_KEY_RSA_Unmarshal(union TPM2B_PUBLIC_KEY_RSA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_PUBLIC_KEY_RSA_Unmarshal@@YAIPEATTPM2B_PUBLIC_KEY_RSA@@PEAPEAEPEAH@Z
0x14000F820: "long __cdecl UnmarshalReadPublicSRK(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalReadPublicSRK@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x140008A30: "public: long __cdecl CPspPolicy::IsBootOsScenarioVersionPermitted(unsigned int,unsigned char,unsigned int,unsigned char * __ptr64) __ptr64" ?IsBootOsScenarioVersionPermitted@CPspPolicy@@QEAAJIEIPEAE@Z
0x140023D58: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUkgkUvyukilgvxgUoryUfhviUlyquivUznwGEUkxsOlyq@ebfprotect" __@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUkgkUvyukilgvxgUoryUfhviUlyquivUznwGEUkxsOlyq@ebfprotect
0x14000969C: "public: void __cdecl PspMessageQueue::Shutdown(unsigned long) __ptr64" ?Shutdown@PspMessageQueue@@QEAAXK@Z
0x140021CA0: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-timezone-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-timezone-l1-1-0
0x140019218: PolGetPolicyDataPtr
0x1400230A8: "struct _TPM_COMMAND g_CreateKeyedHash" ?g_CreateKeyedHash@@3U_TPM_COMMAND@@A
0x14001E9A0: "__cdecl _imp_BCryptCreateHash" __imp_BCryptCreateHash
0x14001F2A0: "AES" ??_C@_17PJMHNJHG@?$AAA?$AAE?$AAS?$AA?$AA@
0x14000EB30: "long __cdecl EkSaltedSession_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?EkSaltedSession_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001F098: Session_PspFailedToPredictLaunchAuthorityFromAttestation
0x140014130: "unsigned short __cdecl TPM2_CreatePrimary_Parameter_Marshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_CreatePrimary_Parameter_Marshal@@YAGPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140001D80: "private: static unsigned long __cdecl CProvisioningSecurityProcess::StaticPDKMessageCallback(void * __ptr64,unsigned int,unsigned long,unsigned char * __ptr64,int)" ?StaticPDKMessageCallback@CProvisioningSecurityProcess@@CAKPEAXIKPEAEH@Z
0x14001EE18: Session_PspFailedToInitializeRTPM
0x140015A88: KeyFile_BuildFromSection
0x140012C20: "unsigned short __cdecl UINT8_Marshal(unsigned char * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?UINT8_Marshal@@YAGPEAEPEAPEAEPEAH@Z
0x14001580C: "void __cdecl _cpri__PlatformReleaseCrypt(void)" ?_cpri__PlatformReleaseCrypt@@YAXXZ
0x14000A95C: "long __cdecl EbfpEncryptDataWithTransportKey(void * __ptr64,unsigned int,struct _PSP_SYMMETRIC_TRANSPORT_KEY * __ptr64,unsigned char * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64)" ?EbfpEncryptDataWithTransportKey@@YAJPEAXIPEAU_PSP_SYMMETRIC_TRANSPORT_KEY@@PEAEIPEAPEAEPEAI@Z
0x14000E580: "long __cdecl CreateKeyInitialize(void * __ptr64,struct _RTPM_INPUT * __ptr64)" ?CreateKeyInitialize@@YAJPEAXPEAU_RTPM_INPUT@@@Z
0x14001EB60: "__cdecl _imp_RtlNtStatusToDosErrorNoTeb" __imp_RtlNtStatusToDosErrorNoTeb
0x14001FA00: "CreateContext" ??_C@_0O@PIMAHNDI@CreateContext?$AA@
0x14001CFDC: "__cdecl callnewh" _callnewh
0x140023D30: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUkilerhrlmUkhkUhvierxvUlyquivUznwGEUkxsOlyq@psp" __@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUkilerhrlmUkhkUhvierxvUlyquivUznwGEUkxsOlyq@psp
0x14001ED48: "__cdecl _guard_iat_table" __guard_iat_table
0x14001D682: memcpy
0x14001E9E8: "__cdecl _imp_BCryptDecrypt" __imp_BCryptDecrypt
0x14001CA28: WbclApiMoveToNextElement
0x14001FBA4: "CFB" ??_C@_03OBECALMF@CFB?$AA@
0x14001E778: IUMBASE_NULL_THUNK_DATA
0x14001B18C: SymCryptSha256Result
0x140023730: "unsigned char SecureBootValue" ?SecureBootValue@@3EA
0x14001E960: "__cdecl _imp_EventWriteTransfer" __imp_EventWriteTransfer
0x140011CD4: "unsigned int __cdecl CryptEncryptRSA(unsigned short * __ptr64,unsigned char * __ptr64,struct OBJECT * __ptr64,struct TPMT_RSA_DECRYPT * __ptr64,unsigned short,unsigned char * __ptr64,char const * __ptr64)" ?CryptEncryptRSA@@YAIPEAGPEAEPEAUOBJECT@@PEAUTPMT_RSA_DECRYPT@@G1PEBD@Z
0x14001EB28: "__cdecl _imp_memset" __imp_memset
0x14001F0D8: Session_PspPspFailedToMatchTargetUefiSecureBoot
0x14001F878: "RtpmContinueContext" ??_C@_0BE@LCIAOPBM@RtpmContinueContext?$AA@
0x14001E8F8: "__cdecl _imp_CreateEventW" __imp_CreateEventW
0x14001D31F: "__cdecl initterm" _initterm
0x14001CB0C: "public: __cdecl std::bad_alloc::bad_alloc(class std::bad_alloc const & __ptr64) __ptr64" ??0bad_alloc@std@@QEAA@AEBV01@@Z
0x14000F004: "long __cdecl HandleCreatePrimaryEk(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),enum _MARSHAL_ACTION)" ?HandleCreatePrimaryEk@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@ZW4_MARSHAL_ACTION@@@Z
0x140018498: PolpCalculateAuthenticator
0x140021C8C: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-sysinfo-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-sysinfo-l1-1-0
0x140023ED8: "__cdecl _dyn_tls_init_callback" __dyn_tls_init_callback
0x14001E910: "__cdecl _imp_Sleep" __imp_Sleep
0x1400081D0: "private: long __cdecl CPspEfiDatabase::BuildTrEEVariableData(struct _GUID,unsigned short const * __ptr64,unsigned char * __ptr64,unsigned int,struct _TREE_VARIABLE_DATA * __ptr64 * __ptr64,unsigned int * __ptr64) __ptr64" ?BuildTrEEVariableData@CPspEfiDatabase@@AEAAJU_GUID@@PEBGPEAEIPEAPEAU_TREE_VARIABLE_DATA@@PEAI@Z
0x14001EBD8: "__cdecl _xi_z" __xi_z
0x1400042E8: "private: long __cdecl CProvisioningSecurityProcess::ProcessRTPMMessage(unsigned long,unsigned char * __ptr64,int) __ptr64" ?ProcessRTPMMessage@CProvisioningSecurityProcess@@AEAAJKPEAEH@Z
0x14001E920: "__cdecl _imp_GetSystemTime" __imp_GetSystemTime
0x140015CC8: KeyFile_AddDestination
0x14001E7D8: "__cdecl _imp_UnhandledExceptionFilter" __imp_UnhandledExceptionFilter
0x14001FCF8: "RNG" ??_C@_17LOEPNPLF@?$AAR?$AAN?$AAG?$AA?$AA@
0x140009058: "public: long __cdecl CPspPolicy::CreateProvisioningAgentPdkBuffer(unsigned char,unsigned char,void * __ptr64,struct _KEYFILE_SECTION_BUFFER * __ptr64 * __ptr64,unsigned int * __ptr64) __ptr64" ?CreateProvisioningAgentPdkBuffer@CPspPolicy@@QEAAJEEPEAXPEAPEAU_KEYFILE_SECTION_BUFFER@@PEAI@Z
0x1400145C0: "unsigned int __cdecl TPM2_ReadPublic_Parameter_Unmarshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_ReadPublic_Parameter_Unmarshal@@YAIPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001D32B: "__cdecl _C_specific_handler" __C_specific_handler
0x140005330: "private: long __cdecl CProvisioningSecurityProcess::ExtractRsa2048PublicFromEkTpm2bPublic(unsigned char * __ptr64,unsigned int,unsigned char * __ptr64,unsigned int * __ptr64) __ptr64" ?ExtractRsa2048PublicFromEkTpm2bPublic@CProvisioningSecurityProcess@@AEAAJPEAEI0PEAI@Z
0x140006BE0: MIDL_user_free
0x14001E8D0: "__cdecl _imp_ReleaseSRWLockExclusive" __imp_ReleaseSRWLockExclusive
0x14000F2E8: "long __cdecl HandleCreatePrimarySRK(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),enum _MARSHAL_ACTION)" ?HandleCreatePrimarySRK@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@ZW4_MARSHAL_ACTION@@@Z
0x1400097E0: "public: unsigned long __cdecl PspMessageQueue::DoQueueProcessing(unsigned long) __ptr64" ?DoQueueProcessing@PspMessageQueue@@QEAAKK@Z
0x1400129E0: "unsigned short __cdecl TPM2_StartAuthSession_Parameter_Marshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_StartAuthSession_Parameter_Marshal@@YAGPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14000D208: "long __cdecl InitializeOperation(enum _OPERATION_TYPE,void * __ptr64,struct _RTPM_KEY * __ptr64,unsigned long,void * __ptr64,unsigned int * __ptr64,unsigned char * __ptr64 * __ptr64)" ?InitializeOperation@@YAJW4_OPERATION_TYPE@@PEAXPEAU_RTPM_KEY@@K1PEAIPEAPEAE@Z
0x140017660: PplpCopyPolicySegment
0x1400231A0: "struct _PSP_ATTESTATION_DATA_POINT * Pcr7Evaluation" ?Pcr7Evaluation@@3PAU_PSP_ATTESTATION_DATA_POINT@@A
0x14001D68E: memmove
0x1400065EC: McTemplateU0jhhhhuu
0x140023098: "struct _TPM_COMMAND g_CreateKeySealed" ?g_CreateKeySealed@@3U_TPM_COMMAND@@A
0x14001E128: "struct _RTPM_OPERATION g_CreateKeyOperation" ?g_CreateKeyOperation@@3U_RTPM_OPERATION@@A
0x140017908: PplpAddPolicyToSetWithRealloc
0x14001F9F0: "PackagePayload" ??_C@_0P@MKMCAAMK@PackagePayload?$AA@
0x1400108CC: "unsigned short __cdecl EntityGetName(union ANY_OBJECT * __ptr64,union TPM2B_NAME * __ptr64)" ?EntityGetName@@YAGPEATANY_OBJECT@@PEATTPM2B_NAME@@@Z
0x14000EF70: "long __cdecl CreatePrimaryEk_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreatePrimaryEk_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001FBAC: "SECRET" ??_C@_06PJOKHKLP@SECRET?$AA@
0x14001CF74: malloc
0x140013EC0: "unsigned int __cdecl BYTE_Array_Unmarshal(unsigned char * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?BYTE_Array_Unmarshal@@YAIPEAEPEAPEAEPEAHH@Z
0x140015120: "unsigned short __cdecl _cpri__GenerateRandom(int,unsigned char * __ptr64)" ?_cpri__GenerateRandom@@YAGHPEAE@Z
0x14001E800: api-ms-win-core-handle-l1-1-0_NULL_THUNK_DATA
0x1400162FC: "long __cdecl KeyFile_CreateSectionBuffer(struct _KEYFILE_SECTION_BUFFER * __ptr64 * __ptr64,unsigned char)" ?KeyFile_CreateSectionBuffer@@YAJPEAPEAU_KEYFILE_SECTION_BUFFER@@E@Z
0x14000C55C: "long __cdecl CreateContext(struct _RTPM_INSTANCE * __ptr64,struct _DATABLOCK_DESC_ARRAY_TOKEN * __ptr64,struct _RTPM_CONTEXT * __ptr64 * __ptr64)" ?CreateContext@@YAJPEAU_RTPM_INSTANCE@@PEAU_DATABLOCK_DESC_ARRAY_TOKEN@@PEAPEAU_RTPM_CONTEXT@@@Z
0x140013C0C: "unsigned short __cdecl TPMT_PUBLIC_Marshal(struct TPMT_PUBLIC * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMT_PUBLIC_Marshal@@YAGPEAUTPMT_PUBLIC@@PEAPEAEPEAH@Z
0x1400134B8: "unsigned short __cdecl TPMT_KDF_SCHEME_Marshal(struct TPMT_KDF_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMT_KDF_SCHEME_Marshal@@YAGPEAUTPMT_KDF_SCHEME@@PEAPEAEPEAH@Z
0x140013220: "unsigned short __cdecl TPMT_SYM_DEF_OBJECT_Marshal(struct TPMT_SYM_DEF_OBJECT * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMT_SYM_DEF_OBJECT_Marshal@@YAGPEAUTPMT_SYM_DEF_OBJECT@@PEAPEAEPEAH@Z
0x140012E34: "unsigned short __cdecl TPM2B_ECC_PARAMETER_Marshal(union TPM2B_ECC_PARAMETER * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_ECC_PARAMETER_Marshal@@YAGPEATTPM2B_ECC_PARAMETER@@PEAPEAEPEAH@Z
0x140006B04: McTemplateU0jmtuuquuu
0x14001E8A0: "__cdecl _imp_RegCloseKey" __imp_RegCloseKey
0x14001D60C: "__cdecl _GSHandlerCheckCommon" __GSHandlerCheckCommon
0x14001E178: "unsigned char const * __ptr64 * Sha256ImageAuthorityList" ?Sha256ImageAuthorityList@@3PAPEBEA
0x14000F724: "long __cdecl HandleReadPublicSRK(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),enum _MARSHAL_ACTION)" ?HandleReadPublicSRK@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@ZW4_MARSHAL_ACTION@@@Z
0x14001EE58: Session_PspAllowsUefiCA
0x140016810: "long __cdecl PdkpGetItems(struct _KEYFILE * __ptr64,long (__cdecl*)(unsigned char const * __ptr64,unsigned int,void * __ptr64 * __ptr64,unsigned int * __ptr64),struct _GUID,struct _GUID * __ptr64,void * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkpGetItems@@YAJPEAU_KEYFILE@@P6AJPEBEIPEAPEAXPEAI@ZU_GUID@@PEAU2@23@Z
0x14001520C: "unsigned short __cdecl _cpri__StartHash(unsigned short,int,struct _HASH_STATE * __ptr64)" ?_cpri__StartHash@@YAGGHPEAU_HASH_STATE@@@Z
0x140017010: "long __cdecl RrkVerifyOffsetStringIsTerminated(unsigned char * __ptr64,unsigned __int64,unsigned __int64)" ?RrkVerifyOffsetStringIsTerminated@@YAJPEAE_K1@Z
0x14001F2A8: "KeyDataBlob" ??_C@_1BI@NNGJONND@?$AAK?$AAe?$AAy?$AAD?$AAa?$AAt?$AAa?$AAB?$AAl?$AAo?$AAb?$AA?$AA@
0x140007210: "public: static long __cdecl CPspEfiDatabase::CreateEfiDatabase(unsigned char,class CPspEfiDatabase * __ptr64 * __ptr64)" ?CreateEfiDatabase@CPspEfiDatabase@@SAJEPEAPEAV1@@Z
0x14000AB64: "long __cdecl EbfpAsymmetricWrapTk(void * __ptr64,struct _PSP_SYMMETRIC_TRANSPORT_KEY * __ptr64,unsigned char * __ptr64,unsigned int,unsigned long * __ptr64)" ?EbfpAsymmetricWrapTk@@YAJPEAXPEAU_PSP_SYMMETRIC_TRANSPORT_KEY@@PEAEIPEAK@Z
0x14000A67C: EbfCreateContextForMachine
0x14001B0CC: SymCryptSha256Append
0x14001EB70: "__cdecl _imp_RtlAllocateHeap" __imp_RtlAllocateHeap
0x140012B44: "void __cdecl MemoryMove(void * __ptr64,void const * __ptr64,unsigned int,unsigned int)" ?MemoryMove@@YAXPEAXPEBXII@Z
0x14001FB50: "SealComplete" ??_C@_0N@LKGEDLPO@SealComplete?$AA@
0x14000F3E0: "long __cdecl MarshalCreateSRK(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalCreateSRK@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x140009F58: EbfCloseHandle
0x14001F2F0: "*** Unexpected attestation event" ??_C@_1EK@LOLGGJDP@?$AA?$CK?$AA?$CK?$AA?$CK?$AA?5?$AAU?$AAn?$AAe?$AAx?$AAp?$AAe?$AAc?$AAt?$AAe?$AAd?$AA?5?$AAa?$AAt?$AAt?$AAe?$AAs?$AAt?$AAa?$AAt?$AAi?$AAo?$AAn?$AA?5?$AAe?$AAv?$AAe?$AAn?$AAt@
0x14001D153: "__cdecl amsg_exit" _amsg_exit
0x140013510: "unsigned int __cdecl TPMU_ASYM_SCHEME_Unmarshal(union TPMU_ASYM_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_ASYM_SCHEME_Unmarshal@@YAIPEATTPMU_ASYM_SCHEME@@PEAPEAEPEAHI@Z
0x14001EA18: "__cdecl _imp__callnewh" __imp__callnewh
0x14001EF48: Session_PspAttestationDiagnosisEvent
0x1400089B0: "private: long __cdecl CPspPolicy::BuildDefaultBootOsVersionSet(void) __ptr64" ?BuildDefaultBootOsVersionSet@CPspPolicy@@AEAAJXZ
0x14001E7C0: "__cdecl _imp_DebugBreak" __imp_DebugBreak
0x14001EFB0: Session_PspSentPDK
0x1400017A8: "public: long __cdecl CProvisioningSecurityProcess::Initialize(unsigned short * __ptr64) __ptr64" ?Initialize@CProvisioningSecurityProcess@@QEAAJPEAG@Z
0x140023068: "struct _TPM_COMMAND g_CreatePrimarySRK" ?g_CreatePrimarySRK@@3U_TPM_COMMAND@@A
0x14001B034: SymCryptSha256
0x14001C700: "unsigned int __cdecl WbclGetCurrentElementDataSize(struct _WBCL_Iterator * __ptr64)" ?WbclGetCurrentElementDataSize@@YAIPEAU_WBCL_Iterator@@@Z
0x140023728: "unsigned char * BootEnvironmentScenarioCap" ?BootEnvironmentScenarioCap@@3PAEA
0x14001F940: "DeriveStateEncryptionKey" ??_C@_0BJ@CNOFDIPL@DeriveStateEncryptionKey?$AA@
0x14000F50C: "long __cdecl HandlePcrRead(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),struct _RESULT_ARRAY_TOKEN * __ptr64,enum _MARSHAL_ACTION)" ?HandlePcrRead@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@ZPEAU_RESULT_ARRAY_TOKEN@@W4_MARSHAL_ACTION@@@Z
0x140013D40: "unsigned short __cdecl TPM2B_PUBLIC_Marshal(union TPM2B_PUBLIC * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_PUBLIC_Marshal@@YAGPEATTPM2B_PUBLIC@@PEAPEAEPEAH@Z
0x140021CC8: "__cdecl _IMPORT_DESCRIPTOR_bcrypt" __IMPORT_DESCRIPTOR_bcrypt
0x14001FA28: "ProcessTpmResponse" ??_C@_0BD@ILILKLDE@ProcessTpmResponse?$AA@
0x140004CE4: "public: long __cdecl CProvisioningSecurityProcess::ProcessProvisioningInputs(void) __ptr64" ?ProcessProvisioningInputs@CProvisioningSecurityProcess@@QEAAJXZ
0x140023720: "unsigned int Pcr11EvaluationSize" ?Pcr11EvaluationSize@@3IA
0x1400196B8: SymCryptSha512Init
0x1400186D8: PolInitializePolicySet
0x140001E40: "private: static unsigned long __cdecl CProvisioningSecurityProcess::StaticFSKMessageCallback(void * __ptr64,unsigned int,unsigned long,unsigned char * __ptr64,int)" ?StaticFSKMessageCallback@CProvisioningSecurityProcess@@CAKPEAXIKPEAEH@Z
0x14000F210: "long __cdecl CreatePrimarySRK_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreatePrimarySRK_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x140023DB0: "void * __ptr64 __ptr64 g_hRngAlg" ?g_hRngAlg@@3PEAXEA
0x140019704: SymCryptSha384Init
0x14000A774: "long __cdecl EbfpDecryptDataWithTransportKey(void * __ptr64,struct _PSP_SYMMETRIC_TRANSPORT_KEY * __ptr64,unsigned char * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64)" ?EbfpDecryptDataWithTransportKey@@YAJPEAXPEAU_PSP_SYMMETRIC_TRANSPORT_KEY@@PEAEIPEAPEAEPEAI@Z
0x1400027D0: "private: struct _RTPM_PCR_RESULT * __ptr64 __cdecl CProvisioningSecurityProcess::GetPcrFromAttestation(unsigned short,unsigned short) __ptr64" ?GetPcrFromAttestation@CProvisioningSecurityProcess@@AEAAPEAU_RTPM_PCR_RESULT@@GG@Z
0x14001EA98: "__cdecl _imp_exit" __imp_exit
0x140023DC0: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUxlnnlmUiipUoryUlyquivUznwGEUkxsOlyq@rrk" __@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUxlnnlmUiipUoryUlyquivUznwGEUkxsOlyq@rrk
0x14001F6E0: "PspDebugWait" ??_C@_1BK@FCCOBCPH@?$AAP?$AAs?$AAp?$AAD?$AAe?$AAb?$AAu?$AAg?$AAW?$AAa?$AAi?$AAt?$AA?$AA@
0x140012CC8: "unsigned int __cdecl UINT32_Unmarshal(unsigned int * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?UINT32_Unmarshal@@YAIPEAIPEAPEAEPEAH@Z
0x14001F960: "DecryptStateObject" ??_C@_0BD@DNKLHMNL@DecryptStateObject?$AA@
0x140007AC4: "private: long __cdecl CPspEfiDatabase::ValidateEFISignatureList(unsigned char * __ptr64,unsigned int,unsigned char const * __ptr64,unsigned int,unsigned char,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64,unsigned char) __ptr64" ?ValidateEFISignatureList@CPspEfiDatabase@@AEAAJPEAEIPEBEIEPEAPEAEPEAIE@Z
0x1400063AC: McTemplateU0jqqbr2
0x140020400: SymCryptSha256K
0x14000C2E8: "long __cdecl ValidateIncomingObject(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,void * __ptr64,unsigned char * __ptr64)" ?ValidateIncomingObject@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAXPEAE@Z
0x1400067CC: McTemplateU0jqbr1
0x140017BE0: PplpGetRawPolicyDataPtr
0x14000F400: "long __cdecl UnmarshalCreateSRK(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalCreateSRK@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x140006440: McTemplateU0jqqzqqbr5qqbr8
0x140016148: KeyFile_DeserializeKeyFile
0x14001EE00: "bad allocation" ??_C@_0P@GHFPNOJB@bad?5allocation?$AA@
0x14000FB70: "long __cdecl CreateKeyedHash_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreateKeyedHash_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001E8C0: "__cdecl _imp_EnterCriticalSection" __imp_EnterCriticalSection
0x14001F3C4: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag14" ?__midl_frag14@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x14000F850: "long __cdecl CreateKeySealed_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreateKeySealed_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x1400234D0: "struct _PSP_STATE_MACHINE_ENTRY * PspStateMachineStates" ?PspStateMachineStates@@3PAU_PSP_STATE_MACHINE_ENTRY@@A
0x14001E8A8: api-ms-win-core-registry-l1-1-0_NULL_THUNK_DATA
0x14001EEB8: Session_PspReceivedUnparsableNMPSMessagePayload
0x14001F1D0: "Provisioning Scenario ID Cap" ??_C@_1DK@BJLANMHF@?$AAP?$AAr?$AAo?$AAv?$AAi?$AAs?$AAi?$AAo?$AAn?$AAi?$AAn?$AAg?$AA?5?$AAS?$AAc?$AAe?$AAn?$AAa?$AAr?$AAi?$AAo?$AA?5?$AAI?$AAD?$AA?5?$AAC?$AAa?$AAp?$AA?$AA@
0x14000EE24: "long __cdecl HandleStartAuthSession(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),enum _MARSHAL_ACTION)" ?HandleStartAuthSession@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z5W4_MARSHAL_ACTION@@@Z
0x14001FB38: "CreateKeyComplete" ??_C@_0BC@FOFELAHJ@CreateKeyComplete?$AA@
0x14001E7F0: api-ms-win-core-errorhandling-l1-1-0_NULL_THUNK_DATA
0x14000C8E4: "long __cdecl PrepareOperationContext(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_INPUT * __ptr64,struct _RTPM_KEY * __ptr64,struct _RTPM_CONTEXT * __ptr64)" ?PrepareOperationContext@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_INPUT@@PEAU_RTPM_KEY@@PEAU_RTPM_CONTEXT@@@Z
0x14001F020: Session_PspStateTransitionEx
0x140016548: "long __cdecl KeyFile_DeserializeEntry(struct _KEYFILE_ENTRY_BUFFER * __ptr64 const,unsigned long,unsigned char,struct _KEYFILE_ENTRY * __ptr64 * __ptr64)" ?KeyFile_DeserializeEntry@@YAJQEAU_KEYFILE_ENTRY_BUFFER@@KEPEAPEAU_KEYFILE_ENTRY@@@Z
0x14001FB28: "PCRReadComplete" ??_C@_0BA@ECFAHJAI@PCRReadComplete?$AA@
0x1400230B8: "struct _PSP_ATTESTATION_DATA_POINT * __ptr64 __ptr64 Pcr11Evaluation" ?Pcr11Evaluation@@3PEAU_PSP_ATTESTATION_DATA_POINT@@EA
0x14001E850: "__cdecl _imp_GetCurrentProcess" __imp_GetCurrentProcess
0x14000F9F8: "long __cdecl Create_FinalizeUnmarshal(struct _RTPM_PCR_SELECTIONDATA * __ptr64,struct Create_Out * __ptr64,struct _RTPM_CREATION_DATA * __ptr64)" ?Create_FinalizeUnmarshal@@YAJPEAU_RTPM_PCR_SELECTIONDATA@@PEAUCreate_Out@@PEAU_RTPM_CREATION_DATA@@@Z
0x14001F178: "dbx" ??_C@_17CFMLKIPF@?$AAd?$AAb?$AAx?$AA?$AA@
0x1400124A0: "unsigned short __cdecl TPM2_StartAuthSession_Marshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_StartAuthSession_Marshal@@YAGPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14000947C: "public: long __cdecl PspMessage::Initialize(unsigned int,unsigned int,unsigned char * __ptr64,unsigned int) __ptr64" ?Initialize@PspMessage@@QEAAJIIPEAEI@Z
0x140023EC8: "__cdecl _native_startup_lock" __native_startup_lock
0x140015FBC: KeyFile_GetSections
0x14000DE38: "long __cdecl CalculateAuthAndPcrPolicyDigest(struct _RTPM_PCR_SELECTIONDATA * __ptr64,union TPM2B_DIGEST * __ptr64)" ?CalculateAuthAndPcrPolicyDigest@@YAJPEAU_RTPM_PCR_SELECTIONDATA@@PEATTPM2B_DIGEST@@@Z
0x14001E988: "__cdecl _imp_BCryptHashData" __imp_BCryptHashData
0x140023D70: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUfixsrmUfixsrmoryUfixsrmoryCFGUlyquivUznwGEUhgwzucOlyq@UrchinLib256" __@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUfixsrmUfixsrmoryUfixsrmoryCFGUlyquivUznwGEUhgwzucOlyq@UrchinLib256
0x140015DCC: KeyFile_RemoveEntry
0x14001FB60: "MarshalTpmCommand" ??_C@_0BC@HHLLEFMO@MarshalTpmCommand?$AA@
0x14001E798: "__cdecl _imp_UuidFromStringW" __imp_UuidFromStringW
0x14001EF08: Session_PspReceivedMessage
0x14001D080: "__cdecl _CxxSetUnhandledExceptionFilter" __CxxSetUnhandledExceptionFilter
0x14001EA40: "__cdecl _imp_wcscat_s" __imp_wcscat_s
0x140013F70: "unsigned short __cdecl TPM2_CreatePrimary_Marshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_CreatePrimary_Marshal@@YAGPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140013E50: "unsigned int __cdecl TPM2B_CREATION_DATA_Unmarshal(union TPM2B_CREATION_DATA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_CREATION_DATA_Unmarshal@@YAIPEATTPM2B_CREATION_DATA@@PEAPEAEPEAH@Z
0x14001EA90: "__cdecl _imp_realloc" __imp_realloc
0x14001EAC0: "__cdecl _imp___C_specific_handler" __imp___C_specific_handler
0x14001D530: SymCryptWipeAsm
0x14001F8C0: "Failed to initialize urchin plat" ??_C@_0CF@EADNIFIN@Failed?5to?5initialize?5urchin?5plat@
0x14001EFD0: Session_PspRtpmFailure
0x14001EB58: "__cdecl _imp_RtlCaptureContext" __imp_RtlCaptureContext
0x14001E830: api-ms-win-core-libraryloader-l1-2-0_NULL_THUNK_DATA
0x14001E848: api-ms-win-core-libraryloader-l1-2-1_NULL_THUNK_DATA
0x14001EF80: Session_PspStateTransition
0x140002C5C: "private: long __cdecl CProvisioningSecurityProcess::LogAttestationDiagnosisEvent(unsigned int,unsigned int,unsigned short * __ptr64,unsigned int,unsigned int,unsigned char * __ptr64,unsigned int,unsigned int,unsigned char * __ptr64) __ptr64" ?LogAttestationDiagnosisEvent@CProvisioningSecurityProcess@@AEAAJIIPEAGIIPEAEII1@Z
0x140021CB4: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-eventing-provider-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-eventing-provider-l1-1-0
0x14001FCA0: "struct HASH_INFO const * const g_hashData" ?g_hashData@@3QBUHASH_INFO@@B
0x140009F10: "void __cdecl EbfpDestroyTransportKey(struct _PSP_SYMMETRIC_TRANSPORT_KEY * __ptr64)" ?EbfpDestroyTransportKey@@YAXPEAU_PSP_SYMMETRIC_TRANSPORT_KEY@@@Z
0x14001389C: "unsigned int __cdecl TPMU_PUBLIC_PARMS_Unmarshal(union TPMU_PUBLIC_PARMS * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_PUBLIC_PARMS_Unmarshal@@YAIPEATTPMU_PUBLIC_PARMS@@PEAPEAEPEAHI@Z
0x1400025CC: "private: long __cdecl CProvisioningSecurityProcess::CreateAndSendProvisioningMsg(unsigned char) __ptr64" ?CreateAndSendProvisioningMsg@CProvisioningSecurityProcess@@AEAAJE@Z
0x140014964: "unsigned short __cdecl _cpri__CompleteHMAC(struct _HASH_STATE * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned char * __ptr64)" ?_cpri__CompleteHMAC@@YAGPEAU_HASH_STATE@@PEAUTPM2B@@IPEAE@Z
0x140014710: "unsigned int __cdecl TPM2_Create_Parameter_Unmarshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_Create_Parameter_Unmarshal@@YAIPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001E7E0: "__cdecl _imp_GetLastError" __imp_GetLastError
0x14001CB8C: "void * __ptr64 __cdecl operator new(unsigned __int64)" ??2@YAPEAX_K@Z
0x14001E978: api-ms-win-eventing-provider-l1-1-0_NULL_THUNK_DATA
0x14001D5E8: "__cdecl _GSHandlerCheck" __GSHandlerCheck
0x14001FDC0: BootOsVersionId
0x14001E768: "__cdecl _imp_SecureStorageGet" __imp_SecureStorageGet
0x14000B994: "void __cdecl CopyRtpmBlobFromResult(struct _RTPM_CREATION_DATA * __ptr64,struct _RTPM_BLOB * __ptr64)" ?CopyRtpmBlobFromResult@@YAXPEAU_RTPM_CREATION_DATA@@PEAU_RTPM_BLOB@@@Z
0x14001EAE0: "__cdecl _imp_memcmp" __imp_memcmp
0x14000D430: "long __cdecl CompleteOperation(enum _OPERATION_TYPE,void * __ptr64,struct _RTPM_KEY * __ptr64,void * __ptr64,struct _RTPM_OP_RESULT * __ptr64 * __ptr64)" ?CompleteOperation@@YAJW4_OPERATION_TYPE@@PEAXPEAU_RTPM_KEY@@1PEAPEAU_RTPM_OP_RESULT@@@Z
0x14001F0C8: Session_PspInitializeFailed
0x1400159B0: KeyFile_CreateKeyFile
0x140023058: "struct _TPM_COMMAND g_CreatePrimaryEk" ?g_CreatePrimaryEk@@3U_TPM_COMMAND@@A
0x14001EAD0: "__cdecl _imp__commode" __imp__commode
0x140018780: PolGetPolicySetMinSize
0x14001EAB0: "__cdecl _imp___setusermatherr" __imp___setusermatherr
0x14001E4D0: "struct __midl_frag29_t const __midl_frag29" ?__midl_frag29@@3U__midl_frag29_t@@B
0x14001E9D0: "__cdecl _imp_BCryptCloseAlgorithmProvider" __imp_BCryptCloseAlgorithmProvider
0x14000FF00: "long __cdecl MarshalCreateKeyedHash(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalCreateKeyedHash@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14001F628: "SHA1" ??_C@_19DILNDFJH@?$AAS?$AAH?$AAA?$AA1?$AA?$AA@
0x14001F390: "NULL" ??_C@_19CIJIHAKK@?$AAN?$AAU?$AAL?$AAL?$AA?$AA@
0x140009940: "private: static unsigned long __cdecl PspMessageQueue::StaticReaderThreadProc(void * __ptr64)" ?StaticReaderThreadProc@PspMessageQueue@@CAKPEAX@Z
0x1400172A0: "long __cdecl DeriveNewKeyFromWrappedSymmetricKey(struct _FLAT_PTP_WRAPPED_SYMMETRIC_KEY * __ptr64,unsigned __int64,unsigned char * __ptr64,unsigned __int64,unsigned char * __ptr64 * __ptr64,unsigned __int64 * __ptr64)" ?DeriveNewKeyFromWrappedSymmetricKey@@YAJPEAU_FLAT_PTP_WRAPPED_SYMMETRIC_KEY@@_KPEAE1PEAPEAEPEA_K@Z
0x14001E860: "__cdecl _imp_GetCurrentProcessId" __imp_GetCurrentProcessId
0x140014480: "unsigned int __cdecl TPM2_ReadPublic_Unmarshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_ReadPublic_Unmarshal@@YAIPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14000F150: "long __cdecl CreatePrimarySRK_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreatePrimarySRK_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001E8C8: "__cdecl _imp_WaitForSingleObject" __imp_WaitForSingleObject
0x140012D0C: "unsigned short __cdecl UINT32_Marshal(unsigned int * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?UINT32_Marshal@@YAGPEAIPEAPEAEPEAH@Z
0x140023D40: Microsoft_Windows_ShieldedVM_ProvisioningSecureProcessEnableBits
0x140015614: "short __cdecl AES_create_key(unsigned char const * __ptr64,int,void * __ptr64 * __ptr64)" ?AES_create_key@@YAFPEBEHPEAPEAX@Z
0x140023738: "unsigned char * PdkKdfLabel" ?PdkKdfLabel@@3PAEA
0x1400232B0: "struct _BCryptBuffer * PdkKdfBuffers" ?PdkKdfBuffers@@3PAU_BCryptBuffer@@A
0x14000ED60: "long __cdecl EkSaltedSession_FinalizeMarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?EkSaltedSession_FinalizeMarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x140015370: "unsigned short __cdecl _cpri__HashBlock(unsigned short,unsigned int,unsigned char * __ptr64,unsigned int,unsigned char * __ptr64)" ?_cpri__HashBlock@@YAGGIPEAEI0@Z
0x14001D210: "__cdecl ValidateImageBase" _ValidateImageBase
0x14001F108: Session_PspAcceptedVersion
0x14001755C: PplpGetPolicyInformation
0x14001F8F8: "MarshalWbclResult" ??_C@_0BC@EJJMLAJJ@MarshalWbclResult?$AA@
0x140003548: "private: void __cdecl CProvisioningSecurityProcess::SendMspsEvent(unsigned long) __ptr64" ?SendMspsEvent@CProvisioningSecurityProcess@@AEAAXK@Z
0x14001E808: "__cdecl _imp_SizeofResource" __imp_SizeofResource
0x140015720: "short __cdecl AES_encrypt(unsigned char const * __ptr64,unsigned char * __ptr64,void * __ptr64)" ?AES_encrypt@@YAFPEBEPEAEPEAX@Z
0x140012DCC: "unsigned int __cdecl TPM2B_ECC_PARAMETER_Unmarshal(union TPM2B_ECC_PARAMETER * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_ECC_PARAMETER_Unmarshal@@YAIPEATTPM2B_ECC_PARAMETER@@PEAPEAEPEAH@Z
0x14001CFB8: "public: __cdecl exception::exception(class exception const & __ptr64) __ptr64" ??0exception@@QEAA@AEBV0@@Z
0x140023340: "struct _RTPM_ACTION * g_CreateKeyMap" ?g_CreateKeyMap@@3PAU_RTPM_ACTION@@A
0x14000F100: "long __cdecl MarshalCreateEk(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalCreateEk@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14001EB40: "__cdecl _imp_RtlFreeHeap" __imp_RtlFreeHeap
0x140016C84: "void __cdecl PdkpFreeByteArray(struct _BYTE_ARRAY_BLOB * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkpFreeByteArray@@YAXPEAPEAU_BYTE_ARRAY_BLOB@@PEAI@Z
0x14001F118: Session_PspCreated
0x14000B5A4: "void __cdecl ReleasePlatform(void)" ?ReleasePlatform@@YAXXZ
0x14001FD10: "SHA512" ??_C@_1O@GKBAHMNF@?$AAS?$AAH?$AAA?$AA5?$AA1?$AA2?$AA?$AA@
0x140021D40: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-libraryloader-l1-2-0" __IMPORT_DESCRIPTOR_api-ms-win-core-libraryloader-l1-2-0
0x140012B30: "unsigned int __cdecl TPM2_StartAuthSession_Parameter_Unmarshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_StartAuthSession_Parameter_Unmarshal@@YAIPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140023D60: "struct _TPM_PLATFORM g_Platform" ?g_Platform@@3U_TPM_PLATFORM@@A
0x1400230C0: "struct _PSP_ATTESTATION_DATA_POINT * Pcr11Evaluation_WithVer" ?Pcr11Evaluation_WithVer@@3PAU_PSP_ATTESTATION_DATA_POINT@@A
0x14001EE10: "\" ??_C@_13FPGAJAPJ@?$AA?2?$AA?$AA@
0x14001F439: "unsigned char const __midl_frag38" ?__midl_frag38@@3EB
0x14000FF30: "long __cdecl UnmarshalCreateKeyedHash(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalCreateKeyedHash@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x140023D5C: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUoryUrmrgrzgliUlyquivUznwGEUhgwzucOlyq@RtpmInitiator" __@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUoryUrmrgrzgliUlyquivUznwGEUhgwzucOlyq@RtpmInitiator
0x140016DB4: "long __cdecl FlattenVirtualMachineRecoveryKey(struct _PTP_VIRTUALMACHINERECOVERYKEY * __ptr64,struct _FLAT_PTP_VIRTUALMACHINERECOVERYKEY * __ptr64,unsigned __int64 * __ptr64)" ?FlattenVirtualMachineRecoveryKey@@YAJPEAU_PTP_VIRTUALMACHINERECOVERYKEY@@PEAU_FLAT_PTP_VIRTUALMACHINERECOVERYKEY@@PEA_K@Z
0x14001E820: "__cdecl _imp_FreeLibrary" __imp_FreeLibrary
0x140023D48: g_PspProc
0x14001E8E0: "__cdecl _imp_AcquireSRWLockExclusive" __imp_AcquireSRWLockExclusive
0x140019750: SymCryptSha512Append
0x140019824: SymCryptSha384Append
0x1400233D0: "struct _RTPM_ACTION * g_PcrSealMap" ?g_PcrSealMap@@3PAU_RTPM_ACTION@@A
0x1400237B0: "__cdecl newmode" _newmode
0x14001EED8: Session_PspShutdown
0x14001EEC8: Session_PspUnableToAdoptMismatchedUefiDb
0x14001EAB8: "__cdecl _imp__initterm" __imp__initterm
0x14001EA68: "__cdecl _imp___set_app_type" __imp___set_app_type
0x140021D90: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-debug-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-debug-l1-1-0
0x140023724: "unsigned char * BootEnvironmentCapFinal" ?BootEnvironmentCapFinal@@3PAEA
0x14001EE98: Session_PspInvalidCommandLineArgument
0x14001C598: "long __cdecl WbclGetCurrentElementDigestSize(struct _WBCL_Iterator * __ptr64,unsigned int * __ptr64)" ?WbclGetCurrentElementDigestSize@@YAJPEAU_WBCL_Iterator@@PEAI@Z
0x14001F088: Session_PspUnableToAdoptMismatchedUefiDbx
0x14001FAA0: "CompleteOperation" ??_C@_0BC@LFCLADMJ@CompleteOperation?$AA@
0x14001F668: "SBDB" ??_C@_19IADKLHJO@?$AAS?$AAB?$AAD?$AAB?$AA?$AA@
0x140021B70: "__cdecl TI2?AVbad_alloc@std@@" _TI2?AVbad_alloc@std@@
0x14001E770: "__cdecl _imp_IsSecureProcess" __imp_IsSecureProcess
0x14001CFC4: "public: virtual __cdecl exception::~exception(void) __ptr64" ??1exception@@UEAA@XZ
0x140019648: SymCryptSha512
0x14001E568: "struct _MIDL_STUBLESS_PROXY_INFO const PspRpc_ProxyInfo" ?PspRpc_ProxyInfo@@3U_MIDL_STUBLESS_PROXY_INFO@@B
0x1400195D8: SymCryptSha384
0x1400036A0: "private: void __cdecl CProvisioningSecurityProcess::MatchDbAndDbxToAttesationValues(void) __ptr64" ?MatchDbAndDbxToAttesationValues@CProvisioningSecurityProcess@@AEAAXXZ
0x140021DA4: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-registry-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-registry-l1-1-0
0x140023000: ProvisioningSecureProcessEvents_Context
0x140011C00: "void __cdecl CryptUpdateDigest(void * __ptr64,unsigned int,unsigned char * __ptr64)" ?CryptUpdateDigest@@YAXPEAXIPEAE@Z
0x140014814: "unsigned short __cdecl _cpri__StartHMAC(unsigned short,int,struct _HASH_STATE * __ptr64,unsigned short,unsigned char * __ptr64,struct TPM2B * __ptr64)" ?_cpri__StartHMAC@@YAGGHPEAU_HASH_STATE@@GPEAEPEAUTPM2B@@@Z
0x140021BD0: "__cdecl CT??_R0?AVexception@@@8??0exception@@QEAA@AEBV0@@Z24" _CT??_R0?AVexception@@@8??0exception@@QEAA@AEBV0@@Z24
0x14001B0A4: SymCryptSha256Init
0x14000E8E0: "long __cdecl SealComplete(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_RESULT_COLLECTION * __ptr64,void * __ptr64)" ?SealComplete@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_RESULT_COLLECTION@@PEAX@Z
0x140017C80: PplpFindSinglePolicyInSet
0x140023EB8: "__cdecl _onexitend" __onexitend
0x14001E858: "__cdecl _imp_CreateThread" __imp_CreateThread
0x1400147E0: "struct HASH_INFO const * __ptr64 __cdecl GetHashInfoPointer(unsigned short)" ?GetHashInfoPointer@@YAPEBUHASH_INFO@@G@Z
0x14001EAA0: "__cdecl _imp__exit" __imp__exit
0x140020000: SymCryptSha512K
0x14000D800: "long __cdecl ReadPcr(struct _RTPM_PCR_COLLECTION * __ptr64,unsigned short,unsigned int,unsigned int,unsigned char * __ptr64)" ?ReadPcr@@YAJPEAU_RTPM_PCR_COLLECTION@@GIIPEAE@Z
0x14001EA00: "__cdecl _imp_BCryptSetProperty" __imp_BCryptSetProperty
0x140021D2C: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-libraryloader-l1-2-1" __IMPORT_DESCRIPTOR_api-ms-win-core-libraryloader-l1-2-1
0x14001EB80: "__cdecl _guard_check_icall_fptr" __guard_check_icall_fptr
0x14001E7A8: "__cdecl _imp_RpcServerUseProtseqEpW" __imp_RpcServerUseProtseqEpW
0x14001E9B8: "__cdecl _imp_BCryptGetProperty" __imp_BCryptGetProperty
0x14001EB18: "__cdecl _imp__CxxThrowException" __imp__CxxThrowException
0x1400015DC: "private: long __cdecl CProvisioningSecurityProcess::GenerateServerKey(unsigned long * __ptr64,struct _BCRYPT_KEY_DATA_BLOB_HEADER * __ptr64 * __ptr64) __ptr64" ?GenerateServerKey@CProvisioningSecurityProcess@@AEAAJPEAKPEAPEAU_BCRYPT_KEY_DATA_BLOB_HEADER@@@Z
0x14001D000: "public: virtual void * __ptr64 __cdecl type_info::`vector deleting destructor'(unsigned int) __ptr64" ??_Etype_info@@UEAAPEAXI@Z
0x14001F438: "unsigned char const __midl_frag37" ?__midl_frag37@@3EB
0x14001E9F8: "__cdecl _imp_BCryptEncrypt" __imp_BCryptEncrypt
0x14001E840: "__cdecl _imp_FindResourceW" __imp_FindResourceW
0x14001E868: "__cdecl _imp_TerminateProcess" __imp_TerminateProcess
0x14000D678: "long __cdecl CreatePcrCollection(unsigned char * __ptr64 (__cdecl*)(unsigned __int64),void (__cdecl*)(void * __ptr64),struct _RTPM_PCR_COLLECTION * __ptr64 * __ptr64)" ?CreatePcrCollection@@YAJP6APEAE_K@ZP6AXPEAX@ZPEAPEAU_RTPM_PCR_COLLECTION@@@Z
0x14000CF2C: "long __cdecl ProcessOutboundContext(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _RTPM_CONTEXT * __ptr64 * __ptr64)" ?ProcessOutboundContext@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAPEAU_RTPM_CONTEXT@@@Z
0x140017614: PplpPolicyGuidFromId
0x14001F000: Session_PspEFIDBFailure
0x14001F010: ProvisioningSecureProcessEvents
0x1400056B0: "private: long __cdecl CProvisioningSecurityProcess::ProcessNMPSDiagnosticMessage(unsigned int,unsigned int,unsigned char * __ptr64,int) __ptr64" ?ProcessNMPSDiagnosticMessage@CProvisioningSecurityProcess@@AEAAJIIPEAEH@Z
0x14001FA40: "ProcessTpmRequest" ??_C@_0BC@LJOBCDHG@ProcessTpmRequest?$AA@
0x140009544: "public: long __cdecl PspMessage::AppendFragment(unsigned int,unsigned int,unsigned char * __ptr64,unsigned int) __ptr64" ?AppendFragment@PspMessage@@QEAAJIIPEAEI@Z
0x14001FAE8: "AcquirePcr" ??_C@_0L@CPIFEDED@AcquirePcr?$AA@
0x14001EFA0: Session_PspAttestationFailedWontProduceMk
0x14001F750: "ChainingMode" ??_C@_1BK@BCJKEJJO@?$AAC?$AAh?$AAa?$AAi?$AAn?$AAi?$AAn?$AAg?$AAM?$AAo?$AAd?$AAe?$AA?$AA@
0x14001E980: "__cdecl _imp_BCryptDestroyHash" __imp_BCryptDestroyHash
0x140016AF0: "long __cdecl PdkDeserializeByteArray(unsigned char const * __ptr64,unsigned int,void * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkDeserializeByteArray@@YAJPEBEIPEAPEAXPEAI@Z
0x14000F660: "long __cdecl ReadPublicSRK_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?ReadPublicSRK_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001E7C8: "__cdecl _imp_IsDebuggerPresent" __imp_IsDebuggerPresent
0x14001329C: "unsigned short __cdecl TPM2B_SENSITIVE_CREATE_Marshal(union TPM2B_SENSITIVE_CREATE * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_SENSITIVE_CREATE_Marshal@@YAGPEATTPM2B_SENSITIVE_CREATE@@PEAPEAEPEAH@Z
0x140012C54: "unsigned int __cdecl UINT16_Unmarshal(unsigned short * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?UINT16_Unmarshal@@YAIPEAGPEAPEAEPEAH@Z
0x14001E948: api-ms-win-core-sysinfo-l1-1-0_NULL_THUNK_DATA
0x14001EBC0: "__cdecl _xi_a" __xi_a
0x140016434: "long __cdecl KeyFile_SerializeEntry(struct _KEYFILE_ENTRY * __ptr64 const,struct _KEYFILE_ENTRY_BUFFER * __ptr64 * __ptr64,unsigned long * __ptr64)" ?KeyFile_SerializeEntry@@YAJQEAU_KEYFILE_ENTRY@@PEAPEAU_KEYFILE_ENTRY_BUFFER@@PEAK@Z
0x14001E938: "__cdecl _imp_GetTickCount" __imp_GetTickCount
0x14001E7D0: api-ms-win-core-debug-l1-1-0_NULL_THUNK_DATA
0x1400145B0: "__cdecl matherr" _matherr
0x140005F28: wmain
0x14000DC6C: "long __cdecl ExtractPcrSelectionData(struct _RTPM_PCR_COLLECTION * __ptr64,unsigned short,struct _RTPM_PCR_SELECTIONDATA * __ptr64)" ?ExtractPcrSelectionData@@YAJPEAU_RTPM_PCR_COLLECTION@@GPEAU_RTPM_PCR_SELECTIONDATA@@@Z
0x14001EE38: Session_PspPdkAuthenticationFailure
0x14001807C: PplpBuiltPolicySetSegmentForActor
0x140014A28: "short __cdecl _cpri__MGF1(unsigned int,unsigned char * __ptr64,unsigned short,unsigned int,unsigned char * __ptr64)" ?_cpri__MGF1@@YAFIPEAEGI0@Z
0x14001E308: "struct __midl_frag2_t const __midl_frag2" ?__midl_frag2@@3U__midl_frag2_t@@B
0x14001E340: "struct __midl_frag4_t const __midl_frag4" ?__midl_frag4@@3U__midl_frag4_t@@B
0x140014130: "unsigned short __cdecl TPM2_Create_Parameter_Marshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_Create_Parameter_Marshal@@YAGPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x1400113D0: "unsigned short __cdecl Command_Marshal(unsigned int,struct SESSION * __ptr64,unsigned int,unsigned short (__cdecl*)(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64),struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?Command_Marshal@@YAGIPEAUSESSION@@IP6AGPEAUMarshal_Parms@@PEAPEAEPEAH@Z123@Z
0x140023734: "unsigned char * PdkKdfContext" ?PdkKdfContext@@3PAEA
0x14001CBE0: "public: virtual void * __ptr64 __cdecl std::bad_alloc::`scalar deleting destructor'(unsigned int) __ptr64" ??_Gbad_alloc@std@@UEAAPEAXI@Z
0x140021BA8: "__cdecl CT??_R0?AVbad_alloc@std@@@8??0bad_alloc@std@@QEAA@AEBV01@@Z24" _CT??_R0?AVbad_alloc@std@@@8??0bad_alloc@std@@QEAA@AEBV01@@Z24
0x140002238: "private: long __cdecl CProvisioningSecurityProcess::ProcessPANotification(unsigned long,unsigned char * __ptr64,unsigned int) __ptr64" ?ProcessPANotification@CProvisioningSecurityProcess@@AEAAJKPEAEI@Z
0x14001E490: "struct __midl_frag26_t const __midl_frag26" ?__midl_frag26@@3U__midl_frag26_t@@B
0x14000E2F0: "long __cdecl PCRReadComplete(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_RESULT_COLLECTION * __ptr64,void * __ptr64)" ?PCRReadComplete@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_RESULT_COLLECTION@@PEAX@Z
0x1400133B8: "unsigned short __cdecl TPMU_SIG_SCHEME_Marshal(union TPMU_SIG_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_SIG_SCHEME_Marshal@@YAGPEATTPMU_SIG_SCHEME@@PEAPEAEPEAHI@Z
0x140006AA4: McGenEventWrite
0x140017824: PplpCopyToNewPolicySet
0x140023048: "struct _TPM_COMMAND g_EkSaltedAuthSession" ?g_EkSaltedAuthSession@@3U_TPM_COMMAND@@A
0x1400141D0: "unsigned int __cdecl TPM2_CreatePrimary_Parameter_Unmarshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_CreatePrimary_Parameter_Unmarshal@@YAIPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140021D68: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-processthreads-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-processthreads-l1-1-0
0x14000EDB0: "long __cdecl EkSaltedSession_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?EkSaltedSession_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x140005A70: "private: long __cdecl CProvisioningSecurityProcess::PredictPcrValues(unsigned int,unsigned char * __ptr64,struct _PSP_PARSED_WBCL_ENTRY * __ptr64,struct _PSP_PARSED_WBCL_ENTRY * __ptr64) __ptr64" ?PredictPcrValues@CProvisioningSecurityProcess@@AEAAJIPEAEPEAU_PSP_PARSED_WBCL_ENTRY@@1@Z
0x140007EB8: "public: long __cdecl CPspEfiDatabase::SetEfiVariableOverrides(unsigned char,unsigned char * __ptr64,unsigned int,unsigned char,unsigned char * __ptr64,unsigned int,unsigned char,unsigned char * __ptr64,unsigned int,unsigned char,unsigned char * __ptr64,unsigned int) __ptr64" ?SetEfiVariableOverrides@CPspEfiDatabase@@QEAAJEPEAEIE0IE0IE0I@Z
0x140007498: "public: long __cdecl CPspEfiDatabase::ParseAndValidateTemplate(unsigned char * __ptr64,unsigned long,unsigned char const * __ptr64,unsigned int,struct _SB_RESOURCE_TEMPLATE * __ptr64) __ptr64" ?ParseAndValidateTemplate@CPspEfiDatabase@@QEAAJPEAEKPEBEIPEAU_SB_RESOURCE_TEMPLATE@@@Z
0x14001EB20: "__cdecl _imp_??1type_info@@UEAA@XZ" __imp_??1type_info@@UEAA@XZ
0x140002828: "private: long __cdecl CProvisioningSecurityProcess::ParseWbcl(unsigned int,unsigned char * __ptr64,unsigned char,unsigned int,struct _PSP_PARSED_WBCL * __ptr64 * __ptr64) __ptr64" ?ParseWbcl@CProvisioningSecurityProcess@@AEAAJIPEAEEIPEAPEAU_PSP_PARSED_WBCL@@@Z
0x14000AC64: EbfGetWrappedEgressTk
0x140014B64: "unsigned short __cdecl _cpri__KDFa(unsigned short,struct TPM2B * __ptr64,char const * __ptr64,struct TPM2B * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned char * __ptr64,unsigned int * __ptr64,int)" ?_cpri__KDFa@@YAGGPEAUTPM2B@@PEBD00IPEAEPEAIH@Z
0x14001637C: "long __cdecl KeyFile_AppendSectionEntry(struct _KEYFILE_SECTION_BUFFER * __ptr64 * __ptr64,struct _KEYFILE_ENTRY_BUFFER * __ptr64 const,unsigned long)" ?KeyFile_AppendSectionEntry@@YAJPEAPEAU_KEYFILE_SECTION_BUFFER@@QEAU_KEYFILE_ENTRY_BUFFER@@K@Z
0x14001E9B0: "__cdecl _imp_BCryptKeyDerivation" __imp_BCryptKeyDerivation
0x14001F8E8: "CreatePlatform" ??_C@_0P@JLMAANPD@CreatePlatform?$AA@
0x14001CF8C: "void __cdecl operator delete(void * __ptr64)" ??3@YAXPEAX@Z
0x14001FB90: "HandleTpmCommand" ??_C@_0BB@FIIPNOHP@HandleTpmCommand?$AA@
0x140023D88: "void * __ptr64 * g_hAlg" ?g_hAlg@@3PAPEAXA
0x14001E010: "const type_info::`vftable'" ??_7type_info@@6B@
0x140015E88: KeyFile_AddEntry
0x140012F4C: "unsigned int __cdecl TPMT_TK_CREATION_Unmarshal(struct TPMT_TK_CREATION * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMT_TK_CREATION_Unmarshal@@YAIPEAUTPMT_TK_CREATION@@PEAPEAEPEAH@Z
0x14001CF50: "__cdecl _security_check_cookie" __security_check_cookie
0x14001EEF8: Session_PspStartingVersionNegotiation
0x14000F620: "long __cdecl UnmarshalPCRRead(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalPCRRead@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x14001EBB8: "__cdecl _xc_z" __xc_z
0x1400066D4: McTemplateU0juhhhhuuuu
0x14001E990: "__cdecl _imp_BCryptExportKey" __imp_BCryptExportKey
0x140014330: "unsigned short __cdecl TPM2_PCR_Read_Parameter_Marshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_PCR_Read_Parameter_Marshal@@YAGPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001FA58: "ProcessInboundContext" ??_C@_0BG@NGONJICC@ProcessInboundContext?$AA@
0x14001E878: api-ms-win-core-processthreads-l1-1-0_NULL_THUNK_DATA
0x140001B68: "public: void * __ptr64 __cdecl CPspEfiDatabase::`scalar deleting destructor'(unsigned int) __ptr64" ??_GCPspEfiDatabase@@QEAAPEAXI@Z
0x140013F0C: "unsigned short __cdecl BYTE_Array_Marshal(unsigned char * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?BYTE_Array_Marshal@@YAGPEAEPEAPEAEPEAHH@Z
0x140023D80: "void * __ptr64 __ptr64 g_hRsaAlg" ?g_hRsaAlg@@3PEAXEA
0x14001F7B8: "RSA" ??_C@_17CEGMJBCM@?$AAR?$AAS?$AAA?$AA?$AA@
0x14001F828: "Error: %s : Line: %d : Info: %s " ??_C@_0CB@EMAFKNFE@Error?3?5?$CFs?5?3?5Line?3?5?$CFd?5?3?5Info?3?5?$CFs?6@
0x14000EFF0: "long __cdecl CreatePrimaryEk_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreatePrimaryEk_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x140012EE4: "unsigned int __cdecl TPM2B_NAME_Unmarshal(union TPM2B_NAME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_NAME_Unmarshal@@YAIPEATTPM2B_NAME@@PEAPEAEPEAH@Z
0x14001C740: WbclApiInitIterator
0x140011F78: "void __cdecl ParmEncryptSym(unsigned short,unsigned short,unsigned short,struct TPM2B * __ptr64,struct TPM2B * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned char * __ptr64)" ?ParmEncryptSym@@YAXGGGPEAUTPM2B@@00IPEAE@Z
0x14001CFE8: "__cdecl CxxThrowException" _CxxThrowException
0x14001EAD8: "__cdecl _imp_?terminate@@YAXXZ" __imp_?terminate@@YAXXZ
0x140023E40: "struct _RTPM_OPERATION * g_OperationList" ?g_OperationList@@3PAU_RTPM_OPERATION@@A
0x14001E150: "struct _RTPM_OPERATION g_PcrSealOperation" ?g_PcrSealOperation@@3U_RTPM_OPERATION@@A
0x14001E928: "__cdecl _imp_GetSystemTimeAsFileTime" __imp_GetSystemTimeAsFileTime
0x14001FBA8: "XOR" ??_C@_03CDEJPCIF@XOR?$AA@
0x140009CBC: PspUtilCreateNameFromStringGuid
0x14000B3B4: RtpmCompleteCreateKey
0x140023460: "__vectorcall ??_R0?AVbad_alloc@std@" ??_R0?AVbad_alloc@std@@@8
0x140001F00: "private: static unsigned long __cdecl CProvisioningSecurityProcess::StaticPspMessageCallback(void * __ptr64,unsigned int,unsigned long,unsigned char * __ptr64,int)" ?StaticPspMessageCallback@CProvisioningSecurityProcess@@CAKPEAXIKPEAEH@Z
0x14001F410: "struct __midl_frag36_t const __midl_frag36" ?__midl_frag36@@3U__midl_frag36_t@@B
0x14001F720: "UseVsm" ??_C@_1O@DOEFBFAI@?$AAU?$AAs?$AAe?$AAV?$AAs?$AAm?$AA?$AA@
0x1400078D4: "private: unsigned char __cdecl CPspEfiDatabase::IsValidTemplate(struct _SB_RESOURCE_TEMPLATE * __ptr64,unsigned char const * __ptr64,unsigned int) __ptr64" ?IsValidTemplate@CPspEfiDatabase@@AEAAEPEAU_SB_RESOURCE_TEMPLATE@@PEBEI@Z
0x140013D9C: "unsigned int __cdecl TPMS_CREATION_DATA_Unmarshal(struct TPMS_CREATION_DATA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMS_CREATION_DATA_Unmarshal@@YAIPEAUTPMS_CREATION_DATA@@PEAPEAEPEAH@Z
0x14000F600: "long __cdecl MarshalPCRRead(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalPCRRead@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14001D6D0: "__cdecl _chkstk" __chkstk
0x140011E64: "void __cdecl ParmDecryptSym(unsigned short,unsigned short,unsigned short,struct TPM2B * __ptr64,struct TPM2B * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned char * __ptr64)" ?ParmDecryptSym@@YAXGGGPEAUTPM2B@@00IPEAE@Z
0x14001D000: "public: virtual void * __ptr64 __cdecl type_info::`scalar deleting destructor'(unsigned int) __ptr64" ??_Gtype_info@@UEAAPEAXI@Z
0x140018394: PolpPolicySetFromHandle
0x140007CF8: "public: long __cdecl CPspEfiDatabase::VerifySelectedDbxIsCoveredBySpecifiedDbx(unsigned char * __ptr64,unsigned int) __ptr64" ?VerifySelectedDbxIsCoveredBySpecifiedDbx@CPspEfiDatabase@@QEAAJPEAEI@Z
0x14000C7A0: "long __cdecl ValidateContext(struct _RTPM_CONTEXT * __ptr64,unsigned long)" ?ValidateContext@@YAJPEAU_RTPM_CONTEXT@@K@Z
0x140008C28: "private: long __cdecl CPspPolicy::DeserializePolicy(void * __ptr64,unsigned char * __ptr64,unsigned __int64) __ptr64" ?DeserializePolicy@CPspPolicy@@AEAAJPEAXPEAE_K@Z
0x1400059B0: "protected: virtual void __cdecl CProvisioningSecurityProcess::EnterState(void) __ptr64" ?EnterState@CProvisioningSecurityProcess@@MEAAXXZ
0x14001F180: "Secure Boot Separator" ??_C@_1CM@PIKKMIEP@?$AAS?$AAe?$AAc?$AAu?$AAr?$AAe?$AA?5?$AAB?$AAo?$AAo?$AAt?$AA?5?$AAS?$AAe?$AAp?$AAa?$AAr?$AAa?$AAt?$AAo?$AAr?$AA?$AA@
0x14000BC6C: "long __cdecl DecryptStateObject(struct _ENCRYPTED_STATE_OBJECT * __ptr64,struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64)" ?DecryptStateObject@@YAJPEAU_ENCRYPTED_STATE_OBJECT@@PEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@@Z
0x14001F680: "Software\Microsoft\Windows\Curre" ??_C@_1FO@IBLGFICI@?$AAS?$AAo?$AAf?$AAt?$AAw?$AAa?$AAr?$AAe?$AA?2?$AAM?$AAi?$AAc?$AAr?$AAo?$AAs?$AAo?$AAf?$AAt?$AA?2?$AAW?$AAi?$AAn?$AAd?$AAo?$AAw?$AAs?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe@
0x14002372C: "unsigned char * BootEnvironmentCapBitlocker" ?BootEnvironmentCapBitlocker@@3PAEA
0x14001E5A0: "struct _MIDL_SERVER_INFO_ const PspRpc_ServerInfo" ?PspRpc_ServerInfo@@3U_MIDL_SERVER_INFO_@@B
0x14001F288: "Global\SIG-" ??_C@_1BI@HBMJGDND@?$AAG?$AAl?$AAo?$AAb?$AAa?$AAl?$AA?2?$AAS?$AAI?$AAG?$AA?9?$AA?$AA@
0x14001E950: "__cdecl _imp_SystemTimeToFileTime" __imp_SystemTimeToFileTime
0x140023748: "char * TCG_EfiSpecIdEventStruct_Signature_03" ?TCG_EfiSpecIdEventStruct_Signature_03@@3PADA
0x14001FDD0: PolicyMap
0x140009FFC: "long __cdecl EbfpOpenAndConfigureProviders(void * __ptr64 * __ptr64,void * __ptr64 * __ptr64,void * __ptr64 * __ptr64,unsigned long)" ?EbfpOpenAndConfigureProviders@@YAJPEAPEAX00K@Z
0x14001EF90: Session_PspFailedRPCRegister
0x14001E888: api-ms-win-core-profile-l1-1-0_NULL_THUNK_DATA
0x140023140: "struct _PSP_ATTESTATION_DATA_POINT * Pcr11Evaluation_NoVer" ?Pcr11Evaluation_NoVer@@3PAU_PSP_ATTESTATION_DATA_POINT@@A
0x14001EBE0: "__cdecl _guard_fids_table" __guard_fids_table
0x14001EAF0: "__cdecl _imp_wcscpy_s" __imp_wcscpy_s
0x14001FB10: "LoadTPMPCRSelection" ??_C@_0BE@FKGAEMLC@LoadTPMPCRSelection?$AA@
0x1400182E8: PplGetBooleanPolicy
0x1400156F4: "short __cdecl AES_destroy_key(void * __ptr64)" ?AES_destroy_key@@YAFPEAX@Z
0x14001EB30: msvcrt_NULL_THUNK_DATA
0x14001F810: "RtpmCreateInitiator" ??_C@_0BE@LCAMAHCP@RtpmCreateInitiator?$AA@
0x1400054F4: "private: long __cdecl CProvisioningSecurityProcess::GetSecurityInfoFromSKernel(void) __ptr64" ?GetSecurityInfoFromSKernel@CProvisioningSecurityProcess@@AEAAJXZ
0x14001E660: "__cdecl load_config_used" _load_config_used
0x14001F160: "PK" ??_C@_15OKGIJJH@?$AAP?$AAK?$AA?$AA@
0x14001EA38: "__cdecl _imp_??0exception@@QEAA@AEBQEBDH@Z" __imp_??0exception@@QEAA@AEBQEBDH@Z
0x140015C68: KeyFile_DestroyEntry
0x14000684C: McTemplateU0juq
0x14000656C: McTemplateU0juu
0x140006C30: PSP_CONTEXT_HANDLE_rundown
0x14001CBE0: "public: virtual void * __ptr64 __cdecl std::bad_alloc::`vector deleting destructor'(unsigned int) __ptr64" ??_Ebad_alloc@std@@UEAAPEAXI@Z
0x14001E030: "const PspStateMachine::`vftable'" ??_7PspStateMachine@@6B@
0x1400142D0: "unsigned int __cdecl TPM2_PCR_Read_Unmarshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_PCR_Read_Unmarshal@@YAIPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x1400061C4: McGenEventUnregister
0x140016950: "long __cdecl PdkDeserializeUINT32(unsigned char const * __ptr64,unsigned int,void * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkDeserializeUINT32@@YAJPEBEIPEAPEAXPEAI@Z
0x1400022F0: "private: long __cdecl CProvisioningSecurityProcess::ProcessPAMessage(unsigned long,unsigned char * __ptr64,int) __ptr64" ?ProcessPAMessage@CProvisioningSecurityProcess@@AEAAJKPEAEH@Z
0x14001F450: "struct _psprpc_MIDL_TYPE_FORMAT_STRING const psprpc__MIDL_TypeFormatString" ?psprpc__MIDL_TypeFormatString@@3U_psprpc_MIDL_TYPE_FORMAT_STRING@@B
0x14001EFC0: Session_PspReceivedPdkWithoutRRK
0x14001E548: "struct __midl_frag35_t const __midl_frag35" ?__midl_frag35@@3U__midl_frag35_t@@B
0x1400158BC: "long __cdecl PdkRetrievePolicySetInfo(enum _PDK_POLICYSET_TYPE,struct _GUID * __ptr64,struct _GUID * __ptr64,unsigned char * __ptr64)" ?PdkRetrievePolicySetInfo@@YAJW4_PDK_POLICYSET_TYPE@@PEAU_GUID@@1PEAE@Z
0x140009974: "public: __cdecl PspMessageQueue::PspMessageQueue(unsigned long (__cdecl*)(void * __ptr64,unsigned int,unsigned long,unsigned char * __ptr64,int),void * __ptr64,unsigned char) __ptr64" ??0PspMessageQueue@@QEAA@P6AKPEAXIKPEAEH@Z0E@Z
0x140012C90: "unsigned short __cdecl UINT16_Marshal(unsigned short * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?UINT16_Marshal@@YAGPEAGPEAPEAEPEAH@Z
0x14001E9D8: "__cdecl _imp_BCryptDuplicateKey" __imp_BCryptDuplicateKey
0x14001E8B0: "__cdecl _imp_OpenEventW" __imp_OpenEventW
0x14001F068: Session_PspVMRKCreationFailed
0x140006C50: RpcPspOpenHandle
0x140017530: PplpCheckPlatform
0x140014410: "unsigned short __cdecl TPM2_ReadPublic_Marshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_ReadPublic_Marshal@@YAGPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001EA50: "__cdecl _imp__amsg_exit" __imp__amsg_exit
0x14001CFD0: "public: virtual char const * __ptr64 __cdecl exception::what(void)const __ptr64" ?what@exception@@UEBAPEBDXZ
0x14001FAB8: "CreatePcrCollection" ??_C@_0BE@EAOMLAFA@CreatePcrCollection?$AA@
0x14000FD94: "long __cdecl HandleTpm2Create(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),long (__cdecl*)(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64),struct _RESULT_ARRAY_TOKEN * __ptr64,enum _MARSHAL_ACTION)" ?HandleTpm2Create@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@P6AJ0PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z5PEAU_RESULT_ARRAY_TOKEN@@W4_MARSHAL_ACTION@@@Z
0x140016F44: "long __cdecl RrkFree(void * __ptr64)" ?RrkFree@@YAJPEAX@Z
0x14001E060: "struct _MIDL_STUB_DESC const PspRpc_StubDesc" ?PspRpc_StubDesc@@3U_MIDL_STUB_DESC@@B
0x14001E9A8: "__cdecl _imp_BCryptOpenAlgorithmProvider" __imp_BCryptOpenAlgorithmProvider
0x14001FAD8: "ExtendPcr" ??_C@_09BMNABIIA@ExtendPcr?$AA@
0x14000D8C8: "long __cdecl ExtendPcr(struct _RTPM_PCR_COLLECTION * __ptr64,unsigned short,unsigned int,unsigned int,unsigned char * __ptr64)" ?ExtendPcr@@YAJPEAU_RTPM_PCR_COLLECTION@@GIIPEAE@Z
0x14000E5A0: "long __cdecl CreateKeyComplete(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_RESULT_COLLECTION * __ptr64,void * __ptr64)" ?CreateKeyComplete@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_RESULT_COLLECTION@@PEAX@Z
0x140023758: "char * TCG_EfiSpecIdEventStruct_Signature_02" ?TCG_EfiSpecIdEventStruct_Signature_02@@3PADA
0x14000F650: "long __cdecl ReadPublicSRK_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?ReadPublicSRK_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001EB50: "__cdecl _imp_RtlLookupFunctionEntry" __imp_RtlLookupFunctionEntry
0x14001E9F0: "__cdecl _imp_BCryptGenRandom" __imp_BCryptGenRandom
0x14001E998: "__cdecl _imp_BCryptGenerateSymmetricKey" __imp_BCryptGenerateSymmetricKey
0x14001E880: "__cdecl _imp_QueryPerformanceCounter" __imp_QueryPerformanceCounter
0x1400232A0: "struct _BCryptBufferDesc PdkKdfParams" ?PdkKdfParams@@3U_BCryptBufferDesc@@A
0x14000F430: "long __cdecl PcrRead_Prepare(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?PcrRead_Prepare@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14000C4F8: "struct _CTX_DATA_HEADER * __ptr64 __cdecl GetFirstDataBlockByType(struct _RTPM_CONTEXT * __ptr64,enum _CTX_DATA_TYPE)" ?GetFirstDataBlockByType@@YAPEAU_CTX_DATA_HEADER@@PEAU_RTPM_CONTEXT@@W4_CTX_DATA_TYPE@@@Z
0x1400237AC: "__cdecl dowildcard" _dowildcard
0x14000B6CC: "long __cdecl RetrievePlatformOutput(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_RESULT_COLLECTION * __ptr64,struct _RTPM_OP_RESULT * __ptr64 * __ptr64)" ?RetrievePlatformOutput@@YAJPEAU_RTPM_INSTANCE@@PEAU_RTPM_RESULT_COLLECTION@@PEAPEAU_RTPM_OP_RESULT@@@Z
0x1400177CC: PplpFreePolicySet
0x14001F138: Session_PspBepaVersionNegotiationPayload
0x14001E8B8: "__cdecl _imp_InitializeSRWLock" __imp_InitializeSRWLock
0x14001EA30: "__cdecl _imp_??0exception@@QEAA@AEBV0@@Z" __imp_??0exception@@QEAA@AEBV0@@Z
0x14001F3C0: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag9" ?__midl_frag9@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x140001D2C: "public: unsigned char __cdecl CProvisioningSecurityProcess::EnforceSecurityCookie(unsigned __int64) __ptr64" ?EnforceSecurityCookie@CProvisioningSecurityProcess@@QEAAE_K@Z
0x14001E000: "const std::bad_alloc::`vftable'" ??_7bad_alloc@std@@6B@
0x14001CF80: free
0x1400152A8: "unsigned short __cdecl _cpri__CompleteHash(struct _HASH_STATE * __ptr64,unsigned int,unsigned char * __ptr64)" ?_cpri__CompleteHash@@YAGPEAU_HASH_STATE@@IPEAE@Z
0x14001F9C0: "AllocContextBuffer" ??_C@_0BD@FKAHKDNI@AllocContextBuffer?$AA@
0x14001F1B0: "Bitlocker Cap" ??_C@_1BM@DMGPPPNK@?$AAB?$AAi?$AAt?$AAl?$AAo?$AAc?$AAk?$AAe?$AAr?$AA?5?$AAC?$AAa?$AAp?$AA?$AA@
0x140010578: "void __cdecl SetEkTemplate(union TPM2B_PUBLIC * __ptr64)" ?SetEkTemplate@@YAXPEATTPM2B_PUBLIC@@@Z
0x14001E3F0: "struct __midl_frag16_t const __midl_frag16" ?__midl_frag16@@3U__midl_frag16_t@@B
0x14001EB48: "__cdecl _imp_RtlVirtualUnwind" __imp_RtlVirtualUnwind
0x14000E1B0: "long __cdecl PCRReadInitialize(void * __ptr64,struct _RTPM_INPUT * __ptr64)" ?PCRReadInitialize@@YAJPEAXPEAU_RTPM_INPUT@@@Z
0x14001CFA0: "__cdecl purecall" _purecall
0x140004730: "private: long __cdecl CProvisioningSecurityProcess::ProcessRTPMCreateKeyMessage(int,unsigned long,unsigned char * __ptr64,int) __ptr64" ?ProcessRTPMCreateKeyMessage@CProvisioningSecurityProcess@@AEAAJHKPEAEH@Z
0x140001120: MIDL_user_allocate
0x140018814: PolPolicySetFromStream
0x14001D340: "__cdecl guard_check_icall_nop" _guard_check_icall_nop
0x14001D676: memcmp
0x14001E940: "__cdecl _imp_GetSystemDirectoryW" __imp_GetSystemDirectoryW
0x14000B8D4: "void __cdecl FreeCollection(struct _RTPM_INSTANCE * __ptr64,struct _RTPM_RESULT_COLLECTION * __ptr64)" ?FreeCollection@@YAXPEAU_RTPM_INSTANCE@@PEAU_RTPM_RESULT_COLLECTION@@@Z
0x14001D0AC: RtlpImageNtHeader
0x14000F120: "long __cdecl UnmarshalCreateEk(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalCreateEk@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x1400079E0: "public: long __cdecl CPspEfiDatabase::CalculateOneEfiSha256Signature(unsigned int,unsigned char * __ptr64,unsigned char * __ptr64) __ptr64" ?CalculateOneEfiSha256Signature@CPspEfiDatabase@@QEAAJIPEAE0@Z
0x14001F210: "Boot Environment Cap" ??_C@_1CK@KLJPFCHH@?$AAB?$AAo?$AAo?$AAt?$AA?5?$AAE?$AAn?$AAv?$AAi?$AAr?$AAo?$AAn?$AAm?$AAe?$AAn?$AAt?$AA?5?$AAC?$AAa?$AAp?$AA?$AA@
0x140001374: "public: enum _PSP_STATE __cdecl PspStateMachine::ReportAction(enum _PSP_ACTION) __ptr64" ?ReportAction@PspStateMachine@@QEAA?AW4_PSP_STATE@@W4_PSP_ACTION@@@Z
0x1400166D0: "long __cdecl PdkpSetItems(struct _KEYFILE * __ptr64,long (__cdecl*)(void * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64),unsigned char,struct _GUID,struct _GUID,void * __ptr64,unsigned int)" ?PdkpSetItems@@YAJPEAU_KEYFILE@@P6AJPEAXIPEAPEAEPEAI@ZEU_GUID@@51I@Z
0x140012E34: "unsigned short __cdecl TPM2B_DIGEST_Marshal(union TPM2B_DIGEST * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_DIGEST_Marshal@@YAGPEATTPM2B_DIGEST@@PEAPEAEPEAH@Z
0x14001EF70: Session_PspParsedCommandLineArgument
0x140016CF4: "long __cdecl VerifyFlatWrappedSymmetricKey(struct _FLAT_PTP_WRAPPED_SYMMETRIC_KEY * __ptr64,unsigned __int64)" ?VerifyFlatWrappedSymmetricKey@@YAJPEAU_FLAT_PTP_WRAPPED_SYMMETRIC_KEY@@_K@Z
0x14001EE28: Session_PspFailedInitializeRPC
0x140021CF0: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-handle-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-handle-l1-1-0
0x14001E470: "struct __midl_frag22_t const __midl_frag22" ?__midl_frag22@@3U__midl_frag22_t@@B
0x140012374: "unsigned int __cdecl CryptParameterDecryption(struct SESSION * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned short,union TPM2B_DIGEST * __ptr64,unsigned char * __ptr64)" ?CryptParameterDecryption@@YAIPEAUSESSION@@PEAUTPM2B@@IGPEATTPM2B_DIGEST@@PEAE@Z
0x14001F9D8: "Invalid context format!" ??_C@_0BI@IPDHKMJO@Invalid?5context?5format?$CB?$AA@
0x140014350: "unsigned int __cdecl TPM2_PCR_Read_Parameter_Unmarshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_PCR_Read_Parameter_Unmarshal@@YAIPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001E810: "__cdecl _imp_GetModuleHandleW" __imp_GetModuleHandleW
0x14001F148: "SecureBoot" ??_C@_1BG@JEGAFCNI@?$AAS?$AAe?$AAc?$AAu?$AAr?$AAe?$AAB?$AAo?$AAo?$AAt?$AA?$AA@
0x14001F0B8: Session_PspSecureStorageFailure
0x14001E0F8: "void (__cdecl* const * const RundownRoutines)(void * __ptr64)" ?RundownRoutines@@3QBQ6AXPEAX@ZB
0x14001EF28: Session_PspFinishedVersionNegotiation
0x14001E3A0: "struct __midl_frag11_t const __midl_frag11" ?__midl_frag11@@3U__midl_frag11_t@@B
0x14001EA08: "__cdecl _imp_BCryptImportKey" __imp_BCryptImportKey
0x14001F790: "SP800_108_CTR_HMAC" ??_C@_1CG@GKFGHMMK@?$AAS?$AAP?$AA8?$AA0?$AA0?$AA_?$AA1?$AA0?$AA8?$AA_?$AAC?$AAT?$AAR?$AA_?$AAH?$AAM?$AAA?$AAC?$AA?$AA@
0x1400168F0: "long __cdecl PdkSerializeUINT32(void * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkSerializeUINT32@@YAJPEAXIPEAPEAEPEAI@Z
0x140010AB4: "unsigned short __cdecl InsertSessionBuffer(unsigned short,unsigned int,struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char const * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?InsertSessionBuffer@@YAGGIPEAUSESSION@@IPEAUMarshal_Parms@@PEBEIPEAPEAEPEAH@Z
0x1400169B0: "long __cdecl PdkSerializeByteArray(void * __ptr64,unsigned int,unsigned char * __ptr64 * __ptr64,unsigned int * __ptr64)" ?PdkSerializeByteArray@@YAJPEAXIPEAPEAEPEAI@Z
0x14001EA48: "__cdecl _imp__XcptFilter" __imp__XcptFilter
0x14001F7F0: "Failed to initialize platform." ??_C@_0BP@DJJHNPFJ@Failed?5to?5initialize?5platform?4?$AA@
0x14000DB04: "long __cdecl AcquirePcr(struct _RTPM_PCR_COLLECTION * __ptr64,unsigned short,unsigned int,struct _RTPM_PCR * __ptr64 * __ptr64)" ?AcquirePcr@@YAJPEAU_RTPM_PCR_COLLECTION@@GIPEAPEAU_RTPM_PCR@@@Z
0x14001EB78: ntdll_NULL_THUNK_DATA
0x14001EAE8: "__cdecl _imp_memcpy" __imp_memcpy
0x140023488: "__vectorcall ??_R0?AVexception@" ??_R0?AVexception@@@8
0x14001F4C0: "struct _psprpc_MIDL_PROC_FORMAT_STRING const psprpc__MIDL_ProcFormatString" ?psprpc__MIDL_ProcFormatString@@3U_psprpc_MIDL_PROC_FORMAT_STRING@@B
0x140023DB8: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUfixsrmUfixsrmkozgulinUfixsrmkozgulinUlyquivUznwGEUhgwzucOlyq@UrchinPlatform" __@@_PchSym_@00@KxulyqvxgPillgKxulmvxlivUyzhvUmthxyUigknUfixsrmUfixsrmkozgulinUfixsrmkozgulinUlyquivUznwGEUhgwzucOlyq@UrchinPlatform
0x14001FBB4: "ATH" ??_C@_03KOAGFMNK@ATH?$AA@
0x140017A94: PplpFormatPolicy
0x140018000: PplpGetSetListForPolicies
0x140021C78: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-synch-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-synch-l1-1-0
0x14000B4D8: "unsigned char __cdecl CreatePlatform(void)" ?CreatePlatform@@YAEXZ
0x14001EEE8: Session_PspPopulatingTemplate
0x140001C20: "public: void __cdecl CProvisioningSecurityProcess::WaitForTermination(void) __ptr64" ?WaitForTermination@CProvisioningSecurityProcess@@QEAAXXZ
0x140023088: "struct _TPM_COMMAND g_ReadPublicSRK" ?g_ReadPublicSRK@@3U_TPM_COMMAND@@A
0x14001EA58: "__cdecl _imp___CxxFrameHandler3" __imp___CxxFrameHandler3
0x1400234B8: "__cdecl _security_cookie" __security_cookie
0x14001E890: "__cdecl _imp_RegQueryValueExW" __imp_RegQueryValueExW
0x140023DC8: PlatformFunctions
0x14001D6D0: "__cdecl alloca_probe" _alloca_probe
0x140021D7C: "__cdecl _IMPORT_DESCRIPTOR_IUMBASE" __IMPORT_DESCRIPTOR_IUMBASE
0x140005088: "public: long __cdecl CProvisioningSecurityProcess::ProvisioningInputReceived(enum _PSP_ACTION) __ptr64" ?ProvisioningInputReceived@CProvisioningSecurityProcess@@QEAAJW4_PSP_ACTION@@@Z
0x140001CE4: "public: void __cdecl CProvisioningSecurityProcess::SignalTermination(void) __ptr64" ?SignalTermination@CProvisioningSecurityProcess@@QEAAXXZ
0x14001F050: Microsoft_Windows_ShieldedVM_ProvisioningSecureProcessKeywords
0x14001F3C8: "struct __midl_frag23_t const __midl_frag23" ?__midl_frag23@@3U__midl_frag23_t@@B
0x140012274: "void __cdecl CryptParameterEncryption(struct SESSION * __ptr64,struct TPM2B * __ptr64,unsigned short,union TPM2B_DIGEST * __ptr64,unsigned char * __ptr64)" ?CryptParameterEncryption@@YAXPEAUSESSION@@PEAUTPM2B@@GPEATTPM2B_DIGEST@@PEAE@Z
0x140008710: "long __cdecl FreeCallback(void * __ptr64)" ?FreeCallback@@YAJPEAX@Z
0x14001F890: "RtpmCompletePCRRead" ??_C@_0BE@MEDNMJMH@RtpmCompletePCRRead?$AA@
0x14001E900: "__cdecl _imp_ResetEvent" __imp_ResetEvent
0x14001E7F8: "__cdecl _imp_CloseHandle" __imp_CloseHandle
0x14001EB68: "__cdecl _imp_RtlCompareMemory" __imp_RtlCompareMemory
0x140012E7C: "unsigned int __cdecl TPM2B_DATA_Unmarshal(union TPM2B_DATA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_DATA_Unmarshal@@YAIPEATTPM2B_DATA@@PEAPEAEPEAH@Z
0x140023D78: "void * __ptr64 __ptr64 g_hAesAlg" ?g_hAesAlg@@3PEAXEA
0x14001F638: "sbresources.dll" ??_C@_1CA@DANOFEAB@?$AAs?$AAb?$AAr?$AAe?$AAs?$AAo?$AAu?$AAr?$AAc?$AAe?$AAs?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x1400234B0: "__cdecl _defaultmatherr" __defaultmatherr
0x140021D04: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-errorhandling-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-errorhandling-l1-1-0
0x140006260: McGenControlCallbackV2
0x14001E838: "__cdecl _imp_LoadLibraryW" __imp_LoadLibraryW
0x14001029C: "long __cdecl HandleTpmCommand(struct _RTPM_MARSHAL_LABEL * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,enum _MARSHAL_ACTION)" ?HandleTpmCommand@@YAJPEAU_RTPM_MARSHAL_LABEL@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@W4_MARSHAL_ACTION@@@Z
0x14000B5E4: "long __cdecl MarshalWbclResult(struct _RTPM_INSTANCE * __ptr64,unsigned char * __ptr64,unsigned long,void * __ptr64)" ?MarshalWbclResult@@YAJPEAU_RTPM_INSTANCE@@PEAEKPEAX@Z
0x140012DCC: "unsigned int __cdecl TPM2B_DIGEST_Unmarshal(union TPM2B_DIGEST * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_DIGEST_Unmarshal@@YAIPEATTPM2B_DIGEST@@PEAPEAEPEAH@Z
0x14001333C: "unsigned int __cdecl TPMU_SIG_SCHEME_Unmarshal(union TPMU_SIG_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_SIG_SCHEME_Unmarshal@@YAIPEATTPMU_SIG_SCHEME@@PEAPEAEPEAHI@Z
0x14001EFE0: Session_PspReceivedPdkWithRRK
0x14001E9E0: "__cdecl _imp_BCryptImportKeyPair" __imp_BCryptImportKeyPair
0x140016FC8: "long __cdecl RrkWcslen(unsigned short const * __ptr64,unsigned __int64 * __ptr64)" ?RrkWcslen@@YAJPEBGPEA_K@Z
0x14001EE78: Session_PspSendingPDK
0x140023EC0: "__cdecl _onexitbegin" __onexitbegin
0x1400086D0: "long __cdecl AllocCallback(unsigned __int64,void * __ptr64 * __ptr64)" ?AllocCallback@@YAJ_KPEAPEAX@Z
0x14001307C: "unsigned short __cdecl TPML_PCR_SELECTION_Marshal(struct TPML_PCR_SELECTION * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPML_PCR_SELECTION_Marshal@@YAGPEAUTPML_PCR_SELECTION@@PEAPEAEPEAH@Z
0x140006A08: McTemplateU0jmtuu
0x140001120: "unsigned char * __ptr64 __cdecl GlobalAllocateMemoryCallback(unsigned __int64)" ?GlobalAllocateMemoryCallback@@YAPEAE_K@Z
0x14001FA70: "ProcessOutboundContext" ??_C@_0BH@EIPOPLIK@ProcessOutboundContext?$AA@
0x140002F00: "private: long __cdecl CProvisioningSecurityProcess::DiagnoseAttestationForOnePcr(unsigned int,unsigned int,struct _PSP_ATTESTATION_DATA_POINT * __ptr64,struct _PSP_PARSED_WBCL * __ptr64,struct _PSP_PARSED_WBCL * __ptr64) __ptr64" ?DiagnoseAttestationForOnePcr@CProvisioningSecurityProcess@@AEAAJIIPEAU_PSP_ATTESTATION_DATA_POINT@@PEAU_PSP_PARSED_WBCL@@1@Z
0x140018954: PolAddPolicyToPolicySet
0x140014630: "unsigned short __cdecl TPM2_Create_Marshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_Create_Marshal@@YAGPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001F0F8: Session_PspMiniAttestationFailure
0x140013598: "unsigned short __cdecl TPMU_ASYM_SCHEME_Marshal(union TPMU_ASYM_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,unsigned int)" ?TPMU_ASYM_SCHEME_Marshal@@YAGPEATTPMU_ASYM_SCHEME@@PEAPEAEPEAHI@Z
0x140015B98: KeyFile_CreateEntry
0x140015920: PdkGetPolicyData
0x14001F9A8: "ValidateIncomingObject" ??_C@_0BH@KPFNDFOC@ValidateIncomingObject?$AA@
0x140012D5C: "unsigned int __cdecl TPMI_RH_HIERARCHY_Unmarshal(unsigned int * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMI_RH_HIERARCHY_Unmarshal@@YAIPEAIPEAPEAEPEAHH@Z
0x14001EA20: "__cdecl _imp_?what@exception@@UEBAPEBDXZ" __imp_?what@exception@@UEBAPEBDXZ
0x14001EB38: "__cdecl _imp_DbgPrint" __imp_DbgPrint
0x14001E7E8: "__cdecl _imp_SetUnhandledExceptionFilter" __imp_SetUnhandledExceptionFilter
0x14000AEA8: RtpmCreateInitiator
0x1400101B8: "long __cdecl UnmarshalTpmCommand(struct _RTPM_MARSHAL_LABEL * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64)" ?UnmarshalTpmCommand@@YAJPEAU_RTPM_MARSHAL_LABEL@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAUSESSION@@IPEAUMarshal_Parms@@@Z
0x140006C00: RpcPspTerminate
0x14001EF68: Microsoft_Windows_ShieldedVM_ProvisioningSecureProcessLevels
0x14001E898: "__cdecl _imp_RegOpenKeyExW" __imp_RegOpenKeyExW
0x140003D00: "private: void __cdecl CProvisioningSecurityProcess::EvaluateAttestationData(void) __ptr64" ?EvaluateAttestationData@CProvisioningSecurityProcess@@AEAAXXZ
0x1400035D4: "private: long __cdecl CProvisioningSecurityProcess::GetEfiDriverConfigVarFromParsedLog(struct _PSP_PARSED_WBCL * __ptr64,unsigned short * __ptr64,struct _PSP_PARSED_WBCL_ENTRY * __ptr64 * __ptr64) __ptr64" ?GetEfiDriverConfigVarFromParsedLog@CProvisioningSecurityProcess@@AEAAJPEAU_PSP_PARSED_WBCL@@PEAGPEAPEAU_PSP_PARSED_WBCL_ENTRY@@@Z
0x14001D244: "__cdecl _security_init_cookie" __security_init_cookie
0x14001FD20: "HashDigestLength" ??_C@_1CC@DMMMEHOM@?$AAH?$AAa?$AAs?$AAh?$AAD?$AAi?$AAg?$AAe?$AAs?$AAt?$AAL?$AAe?$AAn?$AAg?$AAt?$AAh?$AA?$AA@
0x14001F2E0: "BadPdk" ??_C@_1O@MPAMPPIB@?$AAB?$AAa?$AAd?$AAP?$AAd?$AAk?$AA?$AA@
0x14001E9C0: "__cdecl _imp_BCryptFinishHash" __imp_BCryptFinishHash
0x1400070B8: "private: long __cdecl CPspEfiDatabase::LogTcgEvent(unsigned int,unsigned int,unsigned int,unsigned char * __ptr64,unsigned int,struct _TCG_EVENT2_DIGEST_WRAPPER * __ptr64) __ptr64" ?LogTcgEvent@CPspEfiDatabase@@AEAAJIIIPEAEIPEAU_TCG_EVENT2_DIGEST_WRAPPER@@@Z
0x14001EAA8: "__cdecl _imp__cexit" __imp__cexit
0x14001F7C0: "RSAPUBLICBLOB" ??_C@_1BM@BJJGGDHH@?$AAR?$AAS?$AAA?$AAP?$AAU?$AAB?$AAL?$AAI?$AAC?$AAB?$AAL?$AAO?$AAB?$AA?$AA@
0x1400145B0: "unsigned short __cdecl TPM2_ReadPublic_Parameter_Marshal(struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_ReadPublic_Parameter_Marshal@@YAGPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x14001D108: "__cdecl get_image_app_type" _get_image_app_type
0x14001F030: Session_PspSecureBootPCRExtensionFailed
0x14001CFAC: "public: __cdecl exception::exception(char const * __ptr64 const & __ptr64,int) __ptr64" ??0exception@@QEAA@AEBQEBDH@Z
0x14001F850: "Error: %s : Line: %d : Status: 0" ??_C@_0CH@MAIFIIKG@Error?3?5?$CFs?5?3?5Line?3?5?$CFd?5?3?5Status?3?50@
0x140021C50: "__cdecl _IMPORT_DESCRIPTOR_msvcrt" __IMPORT_DESCRIPTOR_msvcrt
0x14001367C: "unsigned int __cdecl TPMT_ECC_SCHEME_Unmarshal(struct TPMT_ECC_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMT_ECC_SCHEME_Unmarshal@@YAIPEAUTPMT_ECC_SCHEME@@PEAPEAEPEAHH@Z
0x14001EB00: "__cdecl _imp_memmove" __imp_memmove
0x140002150: "private: static unsigned long __cdecl CProvisioningSecurityProcess::StaticCallbackMessageCallback(void * __ptr64,unsigned int,unsigned long,unsigned char * __ptr64,int)" ?StaticCallbackMessageCallback@CProvisioningSecurityProcess@@CAKPEAXIKPEAEH@Z
0x140006EB4: "private: long __cdecl CPspEfiDatabase::CreateWbcl(void) __ptr64" ?CreateWbcl@CPspEfiDatabase@@AEAAJXZ
0x140015A2C: KeyFile_DestroyKeyFile
0x14001F990: "RecordOutgoingObject" ??_C@_0BF@DKIMOJBF@RecordOutgoingObject?$AA@
0x14001CF20: wmainCRTStartup
0x14000636C: McGenEventRegister
0x14001EB10: "__cdecl _imp_malloc" __imp_malloc
0x140023DBC: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUxlnnlmUkwpUoryUlyquivUznwGEUhgwzucOlyq@PTP_Types" __@@_PchSym_@00@KxulyqvxgPillgKxuhvievixlnnlmUyzhvUkgkUxlnnlmUkwpUoryUlyquivUznwGEUhgwzucOlyq@PTP_Types
0x140018C74: PolProtectPolicySet
0x14001EA70: "__cdecl _imp__purecall" __imp__purecall
0x14001B27C: SymCryptSha256AppendBlocks_ul1
0x14001E968: "__cdecl _imp_EventUnregister" __imp_EventUnregister
0x14000A530: EbfAddEgressRsaKeyToContext
0x1400032A0: "private: long __cdecl CProvisioningSecurityProcess::DiagnoseAttestationFailure(void) __ptr64" ?DiagnoseAttestationFailure@CProvisioningSecurityProcess@@AEAAJXZ
0x140021CDC: "__cdecl _IMPORT_DESCRIPTOR_RPCRT4" __IMPORT_DESCRIPTOR_RPCRT4
0x1400181E0: PplSetBooleanPolicy
0x14001E930: "__cdecl _imp_GetTickCount64" __imp_GetTickCount64
0x140011C3C: "void __cdecl CryptUpdateDigestInt(void * __ptr64,unsigned int,void * __ptr64)" ?CryptUpdateDigestInt@@YAXPEAXI0@Z
0x140013CE4: "unsigned int __cdecl TPM2B_PUBLIC_Unmarshal(union TPM2B_PUBLIC * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPM2B_PUBLIC_Unmarshal@@YAIPEATTPM2B_PUBLIC@@PEAPEAEPEAHH@Z
0x14000245C: "private: long __cdecl CProvisioningSecurityProcess::NegotiateCommunicationsVersion(struct _PTP_VERSION_NEGOTIATION * __ptr64) __ptr64" ?NegotiateCommunicationsVersion@CProvisioningSecurityProcess@@AEAAJPEAU_PTP_VERSION_NEGOTIATION@@@Z
0x14000B1CC: RtpmContinueContext
0x14001E7B8: RPCRT4_NULL_THUNK_DATA
0x14001F170: "db" ??_C@_15EMHHCMJI@?$AAd?$AAb?$AA?$AA@
0x14001D390: "__cdecl _report_gsfailure" __report_gsfailure
0x14001E958: api-ms-win-core-timezone-l1-1-0_NULL_THUNK_DATA
0x1400170DC: "long __cdecl DeriveNewVirtualMachineRecoveryKey(struct _FLAT_PTP_ROOT_RECOVERY_KEY * __ptr64,unsigned __int64,unsigned char * __ptr64,unsigned __int64,struct _FLAT_PTP_VIRTUALMACHINERECOVERYKEY * __ptr64 * __ptr64,unsigned __int64 * __ptr64)" ?DeriveNewVirtualMachineRecoveryKey@@YAJPEAU_FLAT_PTP_ROOT_RECOVERY_KEY@@_KPEAE1PEAPEAU_FLAT_PTP_VIRTUALMACHINERECOVERYKEY@@PEA_K@Z
0x14001E8D8: "__cdecl _imp_LeaveCriticalSection" __imp_LeaveCriticalSection
0x14001F240: "Provisioning Scenario Version Ca" ??_C@_1EE@GLLBPKFF@?$AAP?$AAr?$AAo?$AAv?$AAi?$AAs?$AAi?$AAo?$AAn?$AAi?$AAn?$AAg?$AA?5?$AAS?$AAc?$AAe?$AAn?$AAa?$AAr?$AAi?$AAo?$AA?5?$AAV?$AAe?$AAr?$AAs?$AAi?$AAo?$AAn?$AA?5?$AAC?$AAa@
0x140023ED0: "__cdecl _native_startup_state" __native_startup_state
0x140010934: "void __cdecl ComputeCpHash(unsigned short,unsigned int,struct Marshal_Parms * __ptr64,unsigned int,unsigned char const * __ptr64,union TPM2B_DIGEST * __ptr64,union TPM2B_DIGEST * __ptr64)" ?ComputeCpHash@@YAXGIPEAUMarshal_Parms@@IPEBEPEATTPM2B_DIGEST@@2@Z
0x14001EF38: Session_PspReceivedUnusablePDKPayload
0x140012E34: "unsigned short __cdecl TPM2B_DATA_Marshal(union TPM2B_DATA * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2B_DATA_Marshal@@YAGPEATTPM2B_DATA@@PEAPEAEPEAH@Z
0x1400068C8: McTemplateU0jq
0x140002B08: "private: long __cdecl CProvisioningSecurityProcess::MatchEventToWbclEventList(struct _PSP_PARSED_WBCL_ENTRY * __ptr64,unsigned int,struct _PSP_PARSED_WBCL_ENTRY * __ptr64,unsigned char * __ptr64) __ptr64" ?MatchEventToWbclEventList@CProvisioningSecurityProcess@@AEAAJPEAU_PSP_PARSED_WBCL_ENTRY@@I0PEAE@Z
0x140001154: "private: void __cdecl PspStateMachine::RecordState(struct _PSP_STATE_MACHINE_ENTRY * __ptr64) __ptr64" ?RecordState@PspStateMachine@@AEAAXPEAU_PSP_STATE_MACHINE_ENTRY@@@Z
0x14001F168: "KEK" ??_C@_17PNKKLKMO@?$AAK?$AAE?$AAK?$AA?$AA@
0x14000EF20: "long __cdecl MarshalEkSaltedAuthSession(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalEkSaltedAuthSession@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14000FE90: "long __cdecl MarshalCreateKeySealed(struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64)" ?MarshalCreateKeySealed@@YAJPEAU_STATE_OBJECT@@PEAU_TPM_CMD@@@Z
0x14001F3F0: "unsigned char const __midl_frag30" ?__midl_frag30@@3EB
0x14001F2C0: "PSP_" ??_C@_19OBCIPCOH@?$AAP?$AAS?$AAP?$AA_?$AA?$AA@
0x140006E60: RpcPspCallbackWorker
0x140001140: "void __cdecl GlobalFreeMemoryCallback(void * __ptr64)" ?GlobalFreeMemoryCallback@@YAXPEAX@Z
0x1400232E0: "struct _RTPM_ACTION * g_PcrReadMap" ?g_PcrReadMap@@3PAU_RTPM_ACTION@@A
0x14001E818: "__cdecl _imp_LoadResource" __imp_LoadResource
0x14001208C: "void __cdecl CryptXORObfuscation(unsigned short,struct TPM2B * __ptr64,struct TPM2B * __ptr64,struct TPM2B * __ptr64,unsigned int,unsigned char * __ptr64)" ?CryptXORObfuscation@@YAXGPEAUTPM2B@@00IPEAE@Z
0x14001F0E8: Session_PspReceivedPDKRequest
0x1400043D0: "private: long __cdecl CProvisioningSecurityProcess::ProcessRTPMGetAttestationDataMessage(int,unsigned long,unsigned char * __ptr64,int) __ptr64" ?ProcessRTPMGetAttestationDataMessage@CProvisioningSecurityProcess@@AEAAJHKPEAEH@Z
0x140004FA8: "public: long __cdecl CProvisioningSecurityProcess::BuildAndEncryptTargetPdk(void) __ptr64" ?BuildAndEncryptTargetPdk@CProvisioningSecurityProcess@@QEAAJXZ
0x14001F658: "SHA256" ??_C@_1O@HECGKAIN@?$AAS?$AAH?$AAA?$AA2?$AA5?$AA6?$AA?$AA@
0x14001F978: "EncryptStateObject" ??_C@_0BD@BHJOIPON@EncryptStateObject?$AA@
0x140013AC0: "unsigned int __cdecl TPMT_PUBLIC_Unmarshal(struct TPMT_PUBLIC * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMT_PUBLIC_Unmarshal@@YAIPEAUTPMT_PUBLIC@@PEAPEAEPEAHH@Z
0x140013424: "unsigned int __cdecl TPMT_KDF_SCHEME_Unmarshal(struct TPMT_KDF_SCHEME * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMT_KDF_SCHEME_Unmarshal@@YAIPEAUTPMT_KDF_SCHEME@@PEAPEAEPEAHH@Z
0x14001EAF8: "__cdecl _imp_??3@YAXPEAX@Z" __imp_??3@YAXPEAX@Z
0x14001EAC8: "__cdecl _imp__fmode" __imp__fmode
0x14000FD50: "long __cdecl CreateKeyedHash_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreateKeyedHash_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x14001EEA8: Session_PspGeneralCryptographicError
0x14000F9B0: "long __cdecl CreateKeySealed_FinalizeUnmarshal(struct _STATE_OBJECT * __ptr64,struct SESSION * __ptr64,struct Marshal_Parms * __ptr64,void * __ptr64)" ?CreateKeySealed_FinalizeUnmarshal@@YAJPEAU_STATE_OBJECT@@PEAUSESSION@@PEAUMarshal_Parms@@PEAX@Z
0x140023078: "struct _TPM_COMMAND g_PCRRead" ?g_PCRRead@@3U_TPM_COMMAND@@A
0x14001E790: "__cdecl _imp_NdrClientCall3" __imp_NdrClientCall3
0x140009DA4: "private: long __cdecl PspConfiguration::ReadConfiguration(void) __ptr64" ?ReadConfiguration@PspConfiguration@@AEAAJXZ
0x140013114: "unsigned int __cdecl TPMT_SYM_DEF_OBJECT_Unmarshal(struct TPMT_SYM_DEF_OBJECT * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64,int)" ?TPMT_SYM_DEF_OBJECT_Unmarshal@@YAIPEAUTPMT_SYM_DEF_OBJECT@@PEAPEAEPEAHH@Z
0x140026000: "__cdecl _ImagePolicyMetadata" __ImagePolicyMetadata
0x14001F770: "AuthTagLength" ??_C@_1BM@PNAKGHPG@?$AAA?$AAu?$AAt?$AAh?$AAT?$AAa?$AAg?$AAL?$AAe?$AAn?$AAg?$AAt?$AAh?$AA?$AA@
0x140021B90: "__cdecl CTA2?AVbad_alloc@std@@" _CTA2?AVbad_alloc@std@@
0x14001FA88: "InitializeOperation" ??_C@_0BE@FIGLAEFM@InitializeOperation?$AA@
0x140008394: "public: long __cdecl CPspEfiDatabase::PredictAndExtendSecureBootPCR(void * __ptr64) __ptr64" ?PredictAndExtendSecureBootPCR@CPspEfiDatabase@@QEAAJPEAX@Z
0x140021D54: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-profile-l1-1-0" __IMPORT_DESCRIPTOR_api-ms-win-core-profile-l1-1-0
0x14001E788: "__cdecl _imp_NdrServerCall2" __imp_NdrServerCall2
0x140017E20: PplpGetSetListForPoliciesForSegment
0x14000C0D0: "long __cdecl RecordOutgoingObject(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,void * __ptr64)" ?RecordOutgoingObject@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAX@Z
0x14000FEC0: "long __cdecl UnmarshalCreateKeySealed(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalCreateKeySealed@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x14000EF40: "long __cdecl UnmarshalEkSaltedAuthSession(struct _RTPM_INSTANCE * __ptr64,struct _STATE_OBJECT * __ptr64,struct _TPM_CMD * __ptr64,struct _RESULT_ARRAY_TOKEN * __ptr64)" ?UnmarshalEkSaltedAuthSession@@YAJPEAU_RTPM_INSTANCE@@PEAU_STATE_OBJECT@@PEAU_TPM_CMD@@PEAU_RESULT_ARRAY_TOKEN@@@Z
0x14001EA80: "__cdecl _imp_calloc" __imp_calloc
0x140018640: PolHandleFromPolSetPointer
0x140014270: "unsigned short __cdecl TPM2_PCR_Read_Marshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_PCR_Read_Marshal@@YAGPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140013FE0: "unsigned int __cdecl TPM2_CreatePrimary_Unmarshal(struct SESSION * __ptr64,unsigned int,struct Marshal_Parms * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPM2_CreatePrimary_Unmarshal@@YAIPEAUSESSION@@IPEAUMarshal_Parms@@PEAPEAEPEAH@Z
0x140007F88: "private: long __cdecl CPspEfiDatabase::ExtendPcrAndLogEvent(void * __ptr64,unsigned int,unsigned int,unsigned int,unsigned char * __ptr64) __ptr64" ?ExtendPcrAndLogEvent@CPspEfiDatabase@@AEAAJPEAXIIIPEAE@Z
0x14001EB08: "__cdecl _imp_free" __imp_free
0x14001D1B0: "__cdecl IsNonwritableInCurrentImage" _IsNonwritableInCurrentImage
0x14001E918: api-ms-win-core-synch-l1-2-0_NULL_THUNK_DATA
0x140023280: "struct _EBFPROTECT_DERIVATION_PARAMS * EbfDerivationParams" ?EbfDerivationParams@@3PAU_EBFPROTECT_DERIVATION_PARAMS@@A
0x14001E028: "const CProvisioningSecurityProcess::`vftable'" ??_7CProvisioningSecurityProcess@@6B@
0x14001EA88: "__cdecl _imp_memcpy_s" __imp_memcpy_s
0x14001EE48: Session_PspCommandLine
0x14000B948: "struct _RTPM_RESULT * __ptr64 __cdecl FindResultByType(struct _RTPM_RESULT_COLLECTION * __ptr64,enum _RESULT_TYPE)" ?FindResultByType@@YAPEAU_RTPM_RESULT@@PEAU_RTPM_RESULT_COLLECTION@@W4_RESULT_TYPE@@@Z
0x14001E908: api-ms-win-core-synch-l1-1-0_NULL_THUNK_DATA
0x14001E5E0: "struct RPC_DISPATCH_TABLE const PspRpc_DispatchTable" ?PspRpc_DispatchTable@@3URPC_DISPATCH_TABLE@@B
0x1400013E8: "public: __cdecl CProvisioningSecurityProcess::CProvisioningSecurityProcess(void) __ptr64" ??0CProvisioningSecurityProcess@@QEAA@XZ
0x140021D18: "__cdecl _IMPORT_DESCRIPTOR_api-ms-win-core-synch-l1-2-0" __IMPORT_DESCRIPTOR_api-ms-win-core-synch-l1-2-0
0x1400061F8: McTemplateU0q
0x140015468: "short __cdecl RSAEP(unsigned int,unsigned char * __ptr64,struct RSA_KEY * __ptr64)" ?RSAEP@@YAFIPEAEPEAURSA_KEY@@@Z
0x1400137C0: "unsigned int __cdecl TPMS_RSA_PARMS_Unmarshal(struct TPMS_RSA_PARMS * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPMS_RSA_PARMS_Unmarshal@@YAIPEAUTPMS_RSA_PARMS@@PEAPEAEPEAH@Z
0x140006988: McTemplateU0z
0x140012FB4: "unsigned int __cdecl TPML_PCR_SELECTION_Unmarshal(struct TPML_PCR_SELECTION * __ptr64,unsigned char * __ptr64 * __ptr64,int * __ptr64)" ?TPML_PCR_SELECTION_Unmarshal@@YAIPEAUTPML_PCR_SELECTION@@PEAPEAEPEAH@Z
0x140015164: "int __cdecl _cpri__HashStartup(void)" ?_cpri__HashStartup@@YAHXZ
0x14001D69A: memset
0x140021DB8: "__cdecl _NULL_IMPORT_DESCRIPTOR" __NULL_IMPORT_DESCRIPTOR
0x140003A74: "private: void __cdecl CProvisioningSecurityProcess::AuthorizeTargetBootOsVersion(void) __ptr64" ?AuthorizeTargetBootOsVersion@CProvisioningSecurityProcess@@AEAAXXZ
0x140006934: McTemplateU0j

[JEB Decompiler by PNF Software]