Perhaps the key word here is in the opening post (#1): "exercise". I doubt that there is any value in training anything if you let others do the exercising - you won't grow muscles from watching others lifting weights, so to say.
Normally i would at best ignore such a thread (or close it, if i think it is not only exercise but homework), but one thing I think i can mention without jeopardizing the intention of the exercise at all:
Quote:
Originally Posted by rbatte1
I suppose you could also use:-
...amongst other things
wc is not only counting lines (wc -l) but also words (wc) or characters (wc -c). A script intending to replace wc would have to implement all these functions, IMHO. No?
Hi all.
After installing ssh on a server, i'd like to create a user with root privileges.
My problem is that after creating a user rootssh (uid=0, gid=20, /home/rootshh), i make rootssh's ssh keys. The problem is that normally the ssh-keygen should create the keys under $HOME/.ssh/, and actually... (6 Replies)
Can anyone tell me which is the equivalent command to
'stats' in ksh shell which discribes the file system?
Thanks in advance
Regards,
Im_new (6 Replies)
Hi,
I am new to HP-UX.
Can someboby help me with the svcs equivalent command in HP-UX ???
svcs is command that we use in Solaris for service status. I need to get the status of services in HP-UX.
Thanks in advance. (2 Replies)
i know after you do something in smitty via the gui, you can click something in smitty that will show you how to do the same thing via the command line, (not using the gui) can anyone tell me how (2 Replies)
Hi guys,
I am new to Unix, Need your help here.
I have installed cygwin software (Unix) in my computer (Windows vista). Now i want to create a shell script (.sh file)/other script which is equivalent of VBA code (at the bottom) and then put this .sh file into bin directory of c:/cygwin.
so... (7 Replies)
Hello guys,
I'm cleaning out big XML files (we're talking about 1GB at least), most of them contain words written in a non-latin alphabet.
The command I'm using is so slow it's not even funny:
cat $1 | sed -e :a -e 's/<*>//g;/</N;//ba;s/</ /g;s/>/... (4 Replies)
Hi,
The title of this post is a little vague but I couldn't think of what to call it.
In Unix you can perform the following command
ftp -v IPADDRESS <<END
put FILE
END
In a DOS command prompt, is it possible to do the same kind of thing that the "<<END" does?
So for example, ... (4 Replies)
Sir I have read the book SCO Unix System Administrators Guide and I have found the command sysadmsh useful for system administration. I have tried the above command in unixware7.1.3 and I got the message command not found.
Currently I am running unixware7.1.3 in VmWare WorkStsation10.0.
... (1 Reply)
Discussion started by: rupeshforu3
1 Replies
LEARN ABOUT CENTOS
tpm_quote_tools
TPM QUOTE TOOLS(8) TPM QUOTE TOOLS(8)NAME
TPM Quote Tools
PROGRAMS
tpm_mkuuid, tpm_mkaik, tpm_loadkey, tpm_unloadkey, tpm_getpcrhash, tpm_updatepcrhash, tpm_getquote, tpm_verifyquote
DESCRIPTION
TPM Quote Tools is a collection of programs that provide support for TPM based attestation using the TPM quote operation.
A TPM contains a set of Platform Configuration Registers (PCRs). In a well configured machine, some of these registers are set to known
values during the boot up process or at other times. For example, a PCR might contain the hash of a boot loader in memory before it is
run.
The TPM quote operation is used to authoritatively verify the contents of a TPM's Platform Configuration Registers (PCRs). During provi-
sioning, a composite hash of a selected set of PCRs is computed. The TPM quote operation produces a composite hash that can be compared
with the one computed while provisioning.
To use the TPM quote operation, keys must be generated. During provisioning, an Attestation Identity Key (AIK) is generated for each TPM,
and the public part of the key is made available to entities that validate quotes.
The TPM quote operation returns signed data and a signature. The data that is signed contains the PCRs selected for the operation, the
composite hash for the selected PCRs, and a nonce provided as input, and used to prevent replay attacks. At provisioning time, the data
that is signed is stored, not just the composite hash. The signature is discarded.
An entity that wishes to evaluate a machine generates a nonce, and sends it along with the set of PCR used to generate the composite PCR
hash at provisioning time. For this use of the TPM quote operation, the signed data is ignored, and the signature returned is used to val-
idate the state of the TPM's PCRs. Given the signature, the evaluating entity replaces the nonce in the signed data generated at provi-
sioning time, and checks to see if the signature is valid for the data. If so, this check ensures the selected PCRs contain values that
match the ones measured during provisioning.
A typical scenario for an enterprise using these tools follows. The tools expect AIKs to be referenced via one enterprise-wide Universally
Unique Identifier (UUID). The program tpm_mkuuid creates one.
For each machine being checked, an AIK is created using tpm_mkaik. The key blob produced is bound to the UUID on its machine using
tpm_loadkey. The public key associated with the AIK is sent to the entities that verify quotes. Finally, the expected PCR composite hash
is obtained using tpm_getpcrhash. When the expected PCR values change, a new hash can be generated with tpm_updatepcrhash.
The program to obtain a quote, and thus measure the current state of the PCRs is tpm_getquote. The program that verifies the quote
describes the same PCR composite hash as was measured initially is tpm_verifyquote.
SEE ALSO tpm_mkuuid(8), tpm_mkaik(8), tpm_loadkey(8), tpm_unloadkey(8), tpm_getpcrhash(8), tpm_updatepcrhash(8), tpm_getquote(8), tpm_verifyquote(8)
Oct 2010 TPM QUOTE TOOLS(8)