O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

The TCG Software Stack

The entry point for any programmer writing a trusted computing-enabled application is the Trusted Computing Group Software Stack (TSS). The TSS specifications define an architecture that makes accessing the TPM simple and direct, while exposing all the functionality that the TPM provides in a vendor-neutral way. The TSS also provides APIs for functionality on top of that provided by the TPM, such as

  • The ability to store key objects persistently on disk
  • Connecting with TPMs on both local and remote machines
  • Conversion of data blobs between portable formats (TSS 1.2 only)

In this chapter, we cover the following topics:

  • The overall design and architecture of the TSS
  • TSS API conventions
  • TSS object types and their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required