O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B

TSS Command Reference

This appendix provides a list of the TSS commands that are available in either 1.1 or 1.2 TCG software stacks. Those listed as 1.2 will only be available for machines with a 1.2 TSS. Along with the list is a brief description of what each command does, so that a user can quickly find the correct command to use:

A = Application developer (or referenced in applications in this document).

B = For the BIOS.

S = Setup.

M = Middleware (such as loading/unloading keys as necessary).

D = Administration.

O = Optional command. These are unlikely to actually appear in any chip.

P = Command that would only be used by the manufacturer of the PC.

C = Core service—not typically used unless one is talking remotely to a TPM.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required