Pre-Installation Requirements
The Intel® Security Dev API pre-installation requirements are listed below:
Item | Description |
---|---|
Hardware | Your development machine must have a Trusted Platform Module (TPM) version 2.0. *(Or IBM TSS for TPM 2.0 simulation.) In all cases, simulation is strictly for development purposes and must never be used on the target device. |
Internet connection | Active and properly configured to reach the internet. |
Operating system | Ubuntu 16.04 (64-bit desktop version) |
Trusted Platform Module (TPM) Software Stack (TSS) | Deployment to actual TPM modules requires the TPM2-TSS package, located here: https://github.com/intel/tpm2-tss/blob/master/README.md |
BIOS Settings
You may need to enable your TPM in the BIOS of your development machine. Please consult your motherboard manufacturer for instructions on how to access the BIOS.
Get Started with Intel Security Dev API
Note: Because files are installed in /opt/
, all commands must be run as root, or via sudo
.
- These instructions assume that you have installed TSS, as discussed in the pre-installation requirements section. If you have not installed TSS, you must do so before installing the API.
- Unpack the archive by running:
tar -xvf IntegrationBuild_TPM_###_isecInstall.tar.gz
(Replace ### with the build number)
- This will unpack the following files:
isecsdk_linux_1.1.bin
GetStarted.txt
- This will unpack the following files:
- Make the
.bin
file executable by running the following:chmod +x ./isecsdk_linux_1.1.bin
If the installer is started with no arguments, it will attempt a fresh install of the Intel® Security Dev API for TPM development.
sudo -E ./isecsdk_linux_1.1.bin
Note: The installation will fail if a previous installation of the SDK is found. To resolve the problem, Uninstall the SDK, as described below, and then attempt to install the SDK again by following the instructions in this section.
To access the command-line help, run sudo -E ./isecsdk_linux_1.1.bin Help
After Installing TSS and the SDK, navigate to /opt/intel/isecsdk/api/go
to install the Go language package.
Get Go at https://golang.org/dl/
- Extract the archive into
/usr/local
, creating a Go tree in/usr/local/go
. For example: tar -C /usr/local -xzf go$VERSION.$OS-$ARCH.tar.gz
Update your PATH:
export PATH=$PATH:/usr/local/go/bin
Define a workspace directory, and set your GOPATH:
export GOPATH=<workspace>/go
Create the Go
<workspace>/src directory
mkdir -p $GOPATH/src cd $GOPATH/src
The
isecGo.tar.gz
file is provided with the isec installer, and is located in/opt/intel/isecsdk/api/go
, untar it by running the following:tar xzvf /opt/intel/isecsdk/api/go/isecGo.tar.gz
- Build the sample by running the following:
cd $GOPATH/src/intel.com/isec/samples/rsakey
go build -tags "tpm debug"
Remove the ./keys dir if it exists:
sudo rm -rf ./keys
Start the App:
sudo ./rsakey
Congratulations! The Intel® Security Dev API is ready to use. Please see the developers guide, located at <TDB>
Legal and Disclaimers
INTEL CONFIDENTIAL
You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document.
All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps.
The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.
No computer system can be absolutely secure.
Intel, the Intel logo, and Intel Core are trademarks of Intel Corporation in the U.S. and/or other countries.