O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C

Function Library

In reviewing the various software programs that are listed in this document, it became clear that a few subroutines that make use of the base functions of the TCG TPM would be useful. These functions would either separate out functionality from TPM functions that are so overloaded with function as to make them hard to use, or they would provide function that is an aggregate of functions defined in the TPM. This appendix is a list of those functions (which are not in the standard itself) and a description of their functionality.

image

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required