Visible to Intel only — GUID: GUID-2D9999F1-4DEF-46A0-A75B-161B35EB177A
For API Level 1 - Intel® ME 7.x - Sandy Bridge
For API Level 1.1 - Intel® ME 8.x lite - Sandy Bridge
For API Level 2 - Intel® ME 8.0 - Ivy Bridge
For API Level 3 - Intel® ME 8.1 - Ivy Bridge
For API Level 3 - SEC1.0, SEC1.1, SEC1.2, SEC2.0
For API Level 4 - Intel® ME 9.5, Intel ME 9.5.55 - Haswell
For API Level 4 - Intel® ME 9.1, Intel ME 9.1.35 - Haswell
For API Level 5 - Intel® ME 10.0.0 - Haswell
For API Level 6 - Intel® ME 10.0.20 - Broadwell
For API Level 7 - ME 11.0 - Skylake_LP and Skylake_H
For API Level 8 - TXE3.0 - Broxton, ME 11.5/11.8 - Kabylake_LP, Kabylake_H
For API Level 9 - Intel® ME 12.0 - Cannon Lake
Trusted Application Validation Guidelines
Validating the Manifest
Memory and Performance
Error Handling and Recovery
Functional Validation and Multi-Instance Support
Pack and DALP Generation and Validation
Host-Side Software Validation Guidelines
Trusted Application Management Flows
Error Handling and Recovery Flows
Multi-Instance and Interoperability Testing of Trusted Application Management
General and Platform-Related Events
End-to-End and Setup Validation Guidelines
Cross Trusted Application Interoperability Functional Testing
Creating a New Project
Importing an Existing Project
Converting an Existing Project
Building and Packaging Your Project and Running in Emulated Environment
Running Your Project
Running and Testing on Emulation and on Silicon
Debugging Trusted Applications
Preparing and Submitting Your Project for Signing
Signing an Applet
Signing New Versions
Visible to Intel only — GUID: GUID-2D9999F1-4DEF-46A0-A75B-161B35EB177A
Admin Command Tool
In Intel® DAL Java* API level 7 for code name Sunrise Point platforms, the applet package format was changed to support administration command packages (ACPs). The Intel DAL administration framework is based on a package that is prepared and signed offline using the Pack Tool, and was loaded to the Intel DAL firmware. The Intel DAL Admin Command Tool is used to:
- Load an Admin Command Package (ACP) into a Security Domain (SD).
- Retrieve all installed trusted applications (TAs) by a specific Security Domain (SD).
- Retrieve all installed security domains (SDs).
- Retrieve general information about the DAL virtual machine (VM) from the firmware.
Command Line Arguments
http://developers.txe.iil.intel.com/sdk/contents/pack-toolRequired Arguments | |
---|---|
-acp <acp file> | Specifies that the desired action is to load an Admin Command Package (ACP). |
-get_installed_tas | Specifies that the desired action is to retrieve a UUIDs list of all installed |
-get_installed_sds | Retrieves all the installed security domains (SDs) |
-query_metadata | Specifies that the desired action is to retrieve Intel DAL VM general information from the firmware. |
Optional Arguments | |
---|---|
-help | Displays the command line arguments help. |
-emulation | Specifies that the tool will run over emulation. Emulauncher will run automatically. |
-fwVersion <FW emulation version> | Specifies the firmware emulation version that the tool should be run on (major.minor). Default value is 11.0. |
-sd <SD ID> | Specifies a security domain. Intel-SD is the default security domain. |