A Practical Guide to Trusted Computing
by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
Appendix A
TPM Command Reference
Commands to the TPM go through an interface known as the TSS. There are two types of commands that go to the TSS: those that are known to be secure, and those that are not needed to be secure. Commands that need not be secure are not usually implemented in the TPM and are found in Appendix B, “TSS Command Reference.” These include bind and verify signature. Commands that must be secure, and that therefore must be implemented in hardware, are prefixed with TPM.
Beyond this breakdown, there are several different kinds of commands. Some of them are designed to be used during setup of the system, some are designed to be used by the TSS to load and evict keys as necessary, some are designed to be used by an administrator, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access